PDF - This Chapter (858.0 KB)

INDEX
described
Numerics
6-16
802.1X authentication, configuring
1000 series access points
antennas
models
802.1X dynamic key settings
7-6 to 7-7
configuring
7-4
1030 remote edge access points
illustrated
overview
6-14
802.3 bridging
7-6
overview
6-14
7-5
using the CLI
4-18
using the GUI
4-17 to 4-18
802.3 Bridging parameter
7-5 to 7-6
802.3 frames, described
1500 series access points
4-18
4-17
802.3x flow control, enabling
4-14
See AP1510
7920 support mode
configuring
described
A
6-25
6-24
AAA override
802.11a (or 802.11b) > Client Roaming page
4-23
configuring
802.11a (or 802.11b) > Video Parameters page
4-30
using the CLI
5-62
802.11a (or 802.11b) > Voice Parameters page
4-28
using the GUI
5-62
802.11a (or 802.11b/g) Cisco APs > Configure page
5-52,
6-32, 10-29
802.11a (or 802.11b/g) Global Parameters > Auto RF
page 10-9
802.11a (or 802.11b/g) Global Parameters page
802.11a (or 802.11b/g) Network Status parameter
4-30, 4-31
802.11a (or 802.11b/g) Radios page
802.11a > Pico Cell page
10-38
802.11a > RRM > DCA page
802.1X
configuring
described
6-17
6-15
802.1X+CCKM
configuring
6-17
3-5
4-29,
5-60
Access Control List Name parameter
5-38
access control lists (ACLs)
and identity networking
5-58
applying to an interface
using the CLI
5-46
using the GUI
5-41 to 5-42
applying to a WLAN
10-23
802.11 bands, enabling and disabling
802.1Q VLAN trunk port
4-35, 10-27
10-33
described
4-7
using the CLI
5-46
using the GUI
5-43 to 5-44
applying to the controller CPU
using the CLI
5-46
using the GUI
5-42 to 5-43
configuring
using the CLI
5-45 to 5-46
using the GUI
5-38 to 5-41
Book Title
78-xxxxx-xx
IN-1
described
rules
connectors
5-37, 5-39, 5-45
5-37
7-8
Access Control Lists > Edit page
5-40
guidelines for operating in Japan
Access Control Lists > New page
5-38
LEDs
Access Control Lists > Rules > New page
Access Control Lists page
Access Mode parameter
5-39
4-22
access point groups
assigning access points to
6-37
using the GUI
6-37
7-7
interpreting
4-10, 4-12
using the CLI
7-76
described
5-38
access point assisted roaming, described
configuring
-2
migrating from -J regulatory domain to -U regulatory
domain 7-64
mounting options
7-9
number supported per controller
physical security
using the CLI
6-36
using the GUI
6-35 to 6-36
power supply
priming
7-8
7-9
7-2
regulatory information
described
6-33
illustrated
6-34
access points
1000 series
supported for use with hybrid REAP
VCI strings
models
overview
7-47
6-41
accounting servers, disabling per WLAN
7-6
ACL Name parameter
7-4
adding MAC address to controller filter list
12-2
7-9
Accounting Server parameters
7-4
B-7 to B-8
See also LWAPP-enabled access points
using monitor mode
B domain
B-2 to B-8
rules for operating in Taiwan
access point manager interface, configuring using the
configuration wizard 4-5
3-4
7-9
power requirements
creating
B-6
6-41
5-42, 5-43
ACS server configuration page
6-39
using the CLI
7-13
Action parameter
using the GUI
7-12 to 7-13
Adaptive Wireless Path Protocol (AWPP), described
antennas
5-40
Add AAA Client page (on CiscoSecure ACS)
7-6 to 7-7
AP1030 overview
7-5 to 7-6
Add Interface-Mapping button
AP1510 overview
7-9
Add New Rule button
authorizing
5-6
6-36
5-38
Add Web Server button
9-17
using MICs
7-47
administrator access
using SSCs
7-47
administrator usernames and passwords, configuring
configuring 4400 series controller to support more than
48 3-36 to 3-41
7-10
4-7
Admin Status parameter
4-7
3-22
Book Title
78-xxxxx-xx
IN-2
Index
Admission Control (ACM) parameter
AP Group Name parameter
4-29, 4-30
AES
AP Groups VLAN Feature Enable parameter
configuring
parameter
6-35, 6-37
AP Groups VLAN page
6-17, 6-18
6-35, 6-36
AP-manager interface
6-17
AES-CCMP, described
configuring
6-15
AES key wrap
configuring using the CLI
5-77
configuring using the GUI
5-75 to 5-76
Aironet IE parameter
using the CLI
3-14 to 3-15
using the GUI
3-10 to 3-12
creating multiple interfaces
described
6-19, 6-29
Aironet IEs
3-39 to 3-40
3-7
illustration
configuring using the CLI
6-32
of four AP-manager interfaces
configuring using the GUI
6-29
of three AP-manager interfaces
Alarm Trigger Threshold parameter
of two AP-manager interfaces
10-13
All APs > Access Point Name > Link Details > Neighbor
Name page 7-36
All APs > Access Point Name > Mesh Neighbor Stats
page 7-36
All APs > Access Point Name > Neighbor Info page
All APs > Access Point Name > Statistics page
7-34
7-29
All APs > Details page
4-45, 6-37, 7-19, 7-60, 7-69, 7-74, 10-12,
12-11
using multiple
Allow AAA Override parameter
anchor controller, in inter-subnet roaming
AP Role parameter
Anonymous Provision parameter
antenna connectors, external
antennas, for access points
antenna sectorization
5-28
Assignment Method parameter
10-29
asymmetric tunneling, illustrated
audience of document
11-17
1-20
authentication information element (IE)
10-11
5-11
4-12
6-17
Authority ID Information parameter
Authority ID parameter
7-6 to 7-7
5-28
5-27
auto-anchor mobility
7-6 to 7-7
configuring
7-7
AP > Clients > Traffic Stream Metrics page
4-36
using the CLI
11-15 to 11-16
using the GUI
11-13 to 11-15
AP > Clients page
4-36
guidelines
AP1010, described
7-6
overview
AP1020, described
7-6
AP1030, described
7-6
11-12
11-11 to 11-12
autonomous access points converted to lightweight mode
See LWAPP-enabled access points
AP1510
auto RF, configuring using the configuration wizard
configuring and deploying
overview
7-19
Auth Key Mgmt parameter
11-4
3-37
7-45
Authentication Protocol parameter
5-62, 12-7
3-38
7-19, 10-12, 12-11
Authentication Priority parameter
7-27, 7-34, 10-11, 12-11
3-39
3-37 to 3-40
AP Mode parameter
AP Policies page
All APs > Access Point Name > VLAN Mappings
page 12-12
All APs page
6-35
7-12 to 7-21
7-9
AP Authentication Policy page
AP Group Description paremeter
Average Data Rate parameter
6-27
Average Real-Time Rate parameter
5-49, 10-13
6-35
4-6
Avoid Cisco AP Load parameter
6-27
10-18
Avoid Foreign AP Interference parameter
10-17
Book Title
78-xxxxx-xx
IN-3
Index
Avoid Non-802.11a (802.11b) Noise parameter
using the GUI
10-18
in mesh networks
4-30
7-21
viewing in mesh networks
B
viewing using the CLI
scenarios
7-40
described
7-38
Backhaul Client Access parameter
Backhaul Interface parameter
7-19
ports
3-3, 3-4
caution, defined
4-26
1-21
CCA Sensitivity Threshold parameter
enabling
10-40
CCKM
using the CLI
4-37
using the GUI
4-29
for mesh networks
7-21
configuring
described
3-27
4-4
Bridge Data Rate parameter
7-20
bridge group name, described
using the CLI
6-32
using the GUI
6-29
described
7-11
Bridge Group Name parameter
6-28
viewing a client’s version
7-20
bridge protocol data units (BPDUs)
Bridge Type parameter
6-16
configuring Aironet IEs
7-4
bootup script
6-17
CCX
Base MAC Address parameter
B domain
1-11
logical connectivity diagram and associated software
commands E-6
7-16
bandwidth-based CAC
described
B-3
Catalyst 3750G Integrated Wireless LAN Controller
Switch
7-38 to 7-40
enabling using the CLI
4-39
Canadian compliance statement
background scanning in mesh networks
described
7-23 to 7-24
3-24
7-19
using the CLI
6-32
using the GUI
6-30 to 6-31
CCX Layer 2 client roaming
bridging parameters
configuring
configuring using the CLI
7-20 to 7-21
configuring using the GUI
7-18 to 7-20
broadcasting, configuring using the CLI
Burst Data Rate parameter
6-27
Burst Real-Time Rate parameter
4-20
using the CLI
4-24
using the GUI
4-23 to 4-24
debugging using the CLI
described
6-27
4-25
4-22
obtaining information using the CLI
CCX link test
4-25
7-70
CCX radio management
C
configuring
CAC
configuring for 7920 phones
described
4-26
6-25
using the CLI
10-35
using the GUI
10-33 to 10-34
debugging using the CLI
enabling
features
using the CLI
4-38
10-37
10-32
hybrid-REAP considerations
10-32
Book Title
IN-4
78-xxxxx-xx
Index
obtaining information using the CLI
CCX Version parameter
10-35 to 10-36
CDP > AP Neighbors > Detail page
network connections
4-48
ports
4-48
CDP > Global Configuration page
CDP > Interface Neighbors page
4-44
8-9
8-7
Channel List parameter
10-17
10-21
10-22 to 10-23
statically assigning
using the CLI
10-30
using the GUI
10-27 to 10-30
Check Against CA Certificates parameter
Check Certificate Date Validity parameter
models
B-9
3-4
1-18 to 1-19
3-2, 3-3, 3-4
Cisco Aironet 1510 Series Lightweight Outdoor Mesh
Access Point
See AP1510
Cisco AV-pairs
5-27
5-27
4-52
6-38, 6-39
Cisco Client Extensions (CCX)
See CCX
Cisco Discovery Protocol (CDP)
CIDS Sensor Add page
5-63
CIDS Sensors List page
5-63
CIDS Shun List page
5-66
ciphers
configuring
1-10
FCC statement
ports
specifying for RRM scanning
1-10
network connections
channels
configuring
using the CLI
4-49 to 4-50
using the GUI
4-43 to 4-45
debugging using the CLI
6-17, 6-18
6-16
Cisco 2000 Series Wireless LAN Controllers
described
4-56 to 4-57
described
10-18
Channel Assignment Method parameter
described
using
configuring to support more than 48 access
points 3-36 to 3-41
5-27
Channel Assignment Leader parameter
chokepoints
3-3, 3-4, 4-57
Cisco 4400 Series Wireless LAN Controllers
5-24, 5-29
Certificate Password parameter
1-10
ports
versions
8-8
Certificate Issuer parameter
1-17 to 1-18
logical connectivity diagram and associated software
commands E-5
downloading
using the GUI
1-9
3-2, 3-3, 3-4
described
8-9 to 8-10
B-8
Cisco 28/37/38xx Integrated Services Router
4-44
4-45
using with local EAP
1-9
network connections
ports
Certificate Authority (CA) certificates
overview
described
features not supported
4-47
using the CLI
1-17 to 1-18
3-2, 3-3, 3-4
FCC statement
4-49
CDP Protocol Status parameter
CDP State parameter
4-46
4-46
CDP Advertisement Version parameter
CDP AP Neighbors page
1-9
Cisco 2100 Series Wireless LAN Controllers
4-44
CDP > Interface Neighbors > Detail page
CDP > Traffic Metrics page
B-8
features not supported
6-31
CDP > AP Neighbors page
FCC statement
1-9
described
4-51
4-41
enabling on an access point, using the
GUI 4-44 to 4-45
sample network
4-43
Book Title
78-xxxxx-xx
IN-5
Index
supported devices
client roaming, configuring
4-42
viewing neighbors
4-20 to 4-25
clients
using the CLI
4-50 to 4-51
viewing CCX version using the CLI
6-32
using the GUI
4-45 to 4-49
viewing CCX version using the GUI
6-30 to 6-31
viewing traffic information
Clients > AP > Traffic Stream Metrics page
using the CLI
4-51
Clients > AP page
using the GUI
4-49
Clients > Detail page
Cisco Discovery Protocol parameter
Cisco high-power switches
Cisco Logo parameter
Clients page
4-45
4-34
4-33, 6-31, 7-55, 7-56
4-32, 7-55, 7-71
Clients threshold parameter
7-74
Client Type parameter
9-10
Cisco Unified Wireless Network (UWN) Solution
Commands > Reset to Factory Defaults page
1-2 to 1-5
Community Name parameter
illustrated
1-3
conditional web redirect
1-2
Cisco WiSM
configuring the Supervisor 720
described
4-55 to 4-56
logical connectivity diagram and associated software
commands E-3
ports
configuring
using the CLI
6-40
using the GUI
6-39 to 6-40
described
4-55
3-3, 3-4
Conditional Web Redirect parameter
6-20
using the GUI
6-19 to 6-20
described
4-2
4-4 to 4-6
Configure option
using the CLI
6-40
configuration wizard
running
configuring
6-38 to 6-39
6-38
described
CKIP
4-3
4-10
configuring the RADIUS server
1-10
guidelines
10-20
7-56
described
Cisco Wireless Control System (WCS), described
4-34
10-28
controller network module
baud rate
6-18
versions
clearing the controller configuration
8-12
3-3
3-4
controllers
CLI
configuration
basic commands
2-8
clearing
enabling wireless connections
logging into
logging out
navigating
using
2-8
erasing
2-6 to 2-7
1-11 to 1-12
discovery process
7-2
multiple-controller deployment
Client Certificate Required parameter
5-27
1-8
client MFP, described
8-12
connections
2-8
2-6 to 2-8
client location
8-13
saving
2-7
8-12
5-47
1-7 to 1-8
platforms
1-8 to 1-11
primary, secondary, and tertiary
Client Min Exception Level threshold parameter
Client Protection parameter
overview
5-51
10-20
1-4 to 1-5
1-8
resetting factory default settings
using the CLI
4-3
Book Title
IN-6
78-xxxxx-xx
Index
using the GUI
configuring through NTP server
4-3
single-controller deployment
types of memory
DCA channels
1-3 to 1-4
upgrading software
guidelines
using the CLI
8-5 to 8-6
using the GUI
8-4
Default Mobility Group parameter
Description parameter
Controller Spanning Tree Configuration page
Controller Time Source Valid parameter
country channels
3-27
Designated Root parameter
7-61
using the GUI
8-6 to 8-7
8-6
5-24, 5-29
DHCP
7-61 to 7-64
using the configuration wizard
4-6
7-59 to 7-61
configuring using the CLI
6-8
configuring using the GUI
6-7
DHCP option 43
7-58
in controller discovery process
7-65
using
See also multiple country codes
viewing using the CLI
Country page
8-7 to 8-8
using with local EAP
configuring
Japanese
using the CLI
overview
7-58
using the GUI
5-40
downloading
country codes
described
5-39
device certificates
1-21 to 1-23
Country Code parameter
using the CLI
3-27
Destination Port parameter
10-21
commonly used
11-8
5-18, 7-13
Destination parameter
5-51
11-14
conventions of document
10-23
debug commands, sending from controller to
LWAPP-enabled access points 7-48
8-2 to 8-3
Control Path parameter
10-21
DCA Channels parameter
1-16
4-6
7-47
DHCP option 82
7-63
configuring
7-59
Coverage Exception Level threshold parameter
coverage hole, detection
10-21
10-4
Coverage Measurement parameter
Coverage threshold parameter
CPU ACL Mode parameter
10-22
10-20
CPU Access Control Lists page
5-43
5-43
5-35 to 5-36
described
5-35
illustrated
5-35
DHCP server discovery
7-2
DHCP servers
configuring using the configuration wizard
external
6-6 to 6-7
internal
6-6
crash information, sending from LWAPP-enabled access
points to controller 7-48
directed roam request
Custom Signatures page
Direction parameter
5-69
7-2
4-22
5-40
disabled clients, configuring a timeout
distribution system ports, described
D
4-5
6-13
3-4 to 3-5
document
Data Path parameter
audience
11-14
date
configuring manually
4-7
1-20
conventions
1-21 to 1-23
organization
1-20 to 1-21
Book Title
78-xxxxx-xx
IN-7
Index
purpose
EoIP port
1-20
domain name server (DNS) discovery
Download button
epings
7-2
DSCP parameter
5-68, 8-7, 8-9, 9-18
Ethernet Bridging parameter
Ethernet connection
5-40
dynamic channel allocation, specifying the channel
set 10-24
dynamic channel assignment
10-3
2-7
European declaration of conformity
event reporting
7-67 to 7-68
8-13
7-20
B-4 to B-5
5-48
Expedited Bandwidth parameter
dynamic frequency selection, described
4-29
expedited bandwidth requests
dynamic interface
described
configuring
4-27
enabling
using the CLI
3-18 to 3-19
using the GUI
3-16 to 3-18
described
11-14, 11-20
erasing the controller configuration
5-68, 8-7, 8-9, 9-19
Download File to Controller page
11-14, 11-20
3-8
using the CLI
4-38
using the GUI
4-29
Extensible Authentication Protocol (EAP),
configuring 6-14
dynamic RRM
See radio resource management (RRM)
dynamic transmit power control
configuring
described
F
4-18
10-4
factory default settings
dynamic WEP, configuring
6-14
E
EAP-FAST Method Parameters page
EAP-FAST parameter
Edit QoS Profile page
4-3
resetting using the GUI
4-3
failover protection
1-16 to 1-17
Fast Ethernet port
3-4
FCC declaration of conformity
5-27
5-28
5-26
6-26
2000 series controllers
B-8
2100 series controllers
B-8
4400 series controllers
B-9
Enable Check for All Standard and Custom Signatures
parameter 5-70
File Name parameter
Enable Controller Management to be accessible from
Wireless Clients parameter 2-9, 5-34
file transfers
Enable CPU ACL parameter
B-2 to B-3
FCC statement
5-26
EAP Profile Name parameter
EAP-TLS parameter
resetting using the CLI
Enable Dynamic AP Management parameter
Fingerprint parameter
5-68, 8-7, 8-9, 8-11, 9-19
5-64
flashing LEDs, configuring
5-21
7-76
foreign controller, in inter-subnet roaming
Encryption Key parameter
6-20
end user license agreement
C-2 to C-4
enhanced neighbor list, described
3-40
5-68, 8-7, 8-9, 8-11, 9-19
1-14
File Type parameter
5-43
Enable Server Status parameter
File Path parameter
5-68, 8-7, 8-9, 8-11, 9-19
Forward Delay parameter
11-4
3-28, 3-29
4-22
enhanced neighbor list request (E2E), described
4-22
Book Title
IN-8
78-xxxxx-xx
Index
authentication process
G
bandwidth restriction
General page
3-33, 4-17, 5-17, 5-77, 10-7
Generate Password parameter
gigabit Ethernet port
configuring
9-5
3-4
Group Mode parameter
10-10, 10-16
12-2
12-5 to 12-14
guidelines
12-4
illustrated
12-2
number of access points supported
Group Setup page (on CiscoSecure ACS)
guest N+1 redundancy
12-2 to 12-4
5-8
11-12
overview
12-2
12-2
Hysteresis parameter
4-23
guest user accounts
creating
9-2 to 9-7
creating as a lobby ambassador
9-4 to 9-6
viewing
I
identity networking
using the CLI
9-7
configuring
using the GUI
9-6
described
1-12 to 1-14
Guest User parameter
5-18
overview
5-57
guest WLAN, creating
9-5
RADIUS attributes
guest WLAN mobility
configuring
GUI
described
2-5
opening
using
5-62 to 5-74
5-62
IDS sensors
enabling wireless connections
guidelines
5-57 to 5-60
IDS
See auto-anchor mobility
disabling
5-56 to 5-60
2-8
2-2
2-2
2-2
configuring
using the CLI
5-65 to 5-66
using the GUI
5-63 to 5-65
described
5-63
IDS signature events
H
Headline parameter
Hello Time parameter
help, obtaining
9-10
illustrated
overview
3-28, 3-29
viewing using the GUI
5-71 to 5-72
configuring
2-5
10-37
10-37
10-37
using the CLI
5-72 to 5-73
using the GUI
5-67 to 5-72
described
5-67
frequency
5-70
MAC frequency
See also pico cell mode
Holdtime parameter
5-73 to 5-74
IDS signatures
high-density network
benefits
viewing using the CLI
measurement interval
3-28, 4-44
H-REAP Local Switching parameter
hybrid REAP
access points supported
5-71
pattern
12-8
5-71
quiet time
5-71
tracking method
12-2
5-70
5-70
uploading or downloading using the GUI
5-67 to 5-68
Book Title
78-xxxxx-xx
IN-9
Index
Index parameter
5-64
J
infrastructure MFP
components
described
Japanese country codes
5-48
5-47
Infrastructure MFP Protection parameter
Infrastructure Protection parameter
5-51
Infrastructure Validation parameter
5-51
5-50
Injector Switch MAC Address parameter
inline power, described
7-75
Keep Alive Count parameter
7-74
illustrated
11-3
Keep Alive Interval parameter
Key Format parameter
configuring
and identity networking
described
5-58 to 5-59
6-20
6-20
6-18
Key Permutation parameter
configuring
Key Size parameter
using the CLI
3-12 to 3-16
using the GUI
3-10 to 3-12
Key Wrap parameter
3-5
3-17, 3-39, 5-42
Interfaces > New page
3-17, 3-39
6-20
6-20
Key Wrap Format parameter
Interfaces > Edit page
5-76
key permutation
6-36, 7-13
interfaces
Interfaces page
11-13
6-20
Key Index parameter
Interface Name parameter
overview
11-13
Key Encryption Key (KEK) parameter
inter-controller roaming
4-21
Japanese regulations for migrating access points from -J to
-U regulatory domain 7-64
K
7-73
intelligent power management (IPM)
described
7-65
5-76
5-75
L
3-11
LAG
interference
defined
See link aggregation (LAG)
10-3
routing around in mesh networks
Interference threshold parameter
7-40
10-20
LAG Mode on Next Reboot parameter
Last Auto Channel Assignment parameter
Last Power Level Assignment parameter
inter-subnet roaming
described
4-21
Layer 1 security
illustrated
11-3 to 11-4
Layer 2
Interval parameter
operation
4-20
illustrated
11-2
Inventory page
10-20
7-2
1-6
security
configuring
described
7-69
Invoke Channel Update Now button
Invoke Power Update Now button
IP Address parameter
IP Mask parameter
10-18
5-2
LWAPP discovery
10-34
intra-controller roaming
described
3-34
10-17
10-19
4-10, 5-68, 8-7, 8-9, 8-11, 9-19
4-10
6-13 to 6-21
5-2
Layer 2 Security parameter
6-17, 6-19, 6-39
Layer 3
LWAPP discovery
operation
7-2
1-6
Book Title
IN-10
78-xxxxx-xx
Index
security
link test
configuring
described
described
6-21 to 6-23
7-70
performing
5-3
Layer 3 Security parameter
6-22, 6-23, 6-40
LDAP
choosing server priority order
5-21
configuring
using the CLI
7-72
using the GUI
7-34 to 7-35, 7-71 to 7-72
types of packets
7-70
Link Trap parameter
3-22
using the CLI
5-22 to 5-23
load balancing
using the GUI
5-19 to 5-22
Load-based AC parameter
local EAP methods supported
LDAP Servers > New page
LDAP Servers page
LEAP parameter
described
5-22
4-26 to 4-27
enabling
5-20
5-20
LDAP Servers parameter
4-29
load-based CAC
5-19
LDAP servers, assigning to WLANs
10-4
5-28
using the CLI
4-37
using the GUI
4-29
Load Measurement parameter
5-26
LEDs
10-21
lobby ambassador account
configuring
7-76
for access points
7-7
license agreement
C-2 to C-4
Lifetime parameter
5-18, 9-5
lightweight mode, reverting to autonomous mode
3-36
Lobby Ambassador Guest Management > Guest Users List
page 9-4, 9-6
7-46
Local Auth Active Timeout parameter
using the CLI
3-34
using the GUI
3-33 to 3-34
guidelines
3-32 to 3-33
illustrated
3-30, 3-32
verifying settings using the CLI
3-21
choosing server priority order
using the CLI
5-29 to 5-32
using the GUI
5-24 to 5-28
debugging
button
7-71
option
7-34, 7-71
7-72
window
7-35
5-26
5-24
described
5-32
5-24
viewing information using the CLI
3-35
with mesh
5-31
7-16
Local EAP Authentication parameter
Local EAP Profiles > Edit page
Link Test
5-25
configuring
3-30 to 3-31
enabling
page
9-2 to 9-3
local EAP
configuring neighboring devices
Link Status parameter
creating using the GUI
Local Certificate Required parameter
C-4 to C-7
link aggregation (LAG)
described
9-3
Lobby Ambassador Guest Management > Guest Users List
> New page 9-4
Lightweight Access Point Protocol (LWAPP),
described 7-2
limited warranty
creating using the CLI
Local EAP Profiles page
5-28
5-26
5-25
Local Management Users > New page
Local Management Users page
Local Net Users > New page
9-3
9-2
5-17, 12-9
Book Title
78-xxxxx-xx
IN-11
Index
Local Net Users page
using the GUI
5-17, 9-6
local network users
7-12 to 7-13, 7-21
displayed on controller GUI
7-50
configuring using the CLI
5-19
MAC Address parameter
configuring using the GUI
5-16 to 5-18
MAC filtering, configuring on WLANs
local user database, capacity
location-based services
location calibration
10-33
10-33
location information, viewing
LOCP, described
MAC Filtering page
9-2
Cisco 28/37/38xx Integrated Services Router
E-5
E-3
7-11
MAC Filters > New page
7-13
using the CLI
5-52 to 5-53
using the GUI
5-49 to 5-50
debugging
described
types
5-32
5-56
5-47 to 5-48
5-48
5-47
viewing settings
enabling on SpectraLink NetLink phones
using the CLI
5-33 to 5-34
using the GUI
5-32
5-53 to 5-55
using the GUI
5-50 to 5-52
5-51
Management Frame Protection Settings page
configuring a static IP address
disabling the reset button
using the CLI
Management Frame Protection parameter
LWAPP-enabled access points
7-50
management frame validation
7-50
enabling memory core dumps
5-48
configuring
7-45
7-50
7-45
using the CLI
3-12
using the GUI
3-10 to 3-12
described
receiving debug commands from controller
reverting to autonomous mode
7-46 to 7-47
sending crash information to controller
7-48
sending radio core dumps to controller
7-48
sending SSCs to controller
5-51
management interface
7-49
MAC addresses displayed on controller GUI
overview
MAC filter list, described
guidelines
long preambles
guidelines
7-12
configuring
4-52
Catalyst 3750G Integrated Wireless LAN Controller
Switch E-6
described
6-12 to 6-13
management frame protection (MFP)
4-55
logical connectivity diagram
Cisco WiSM
7-13
7-47
LWAPP transport mode, configuring using the
configuration wizard 4-5
7-48
3-6
management over wireless
described
5-34
enabling
using the CLI
5-35
using the GUI
5-34
Max Age parameter
3-27
Maximum Age parameter
3-28
maximum local database entries
M
MAC address of access point
adding to controller filter list
using the CLI
7-13
configuring using the CLI
5-78
configuring using the GUI
5-77
Maximum Local Database Entries parameter
Maximum Retries parameter
5-17, 5-77
5-68, 8-7, 8-9, 9-19
Maximum RF Usage Per AP parameter
6-27
Book Title
IN-12
78-xxxxx-xx
Index
Max RF Bandwidth parameter
4-29, 4-31
memory
Minimum RSSI parameter
4-23
mirror mode
core dumps, enabling for LWAPP-enabled access
points 7-49
types
1-16
See port mirroring
MMH MIC
configuring
mesh
6-20
described
described
7-10 to 7-12
high-speed roaming
illustrated
MMH Mode parameter
4-20, 4-23, 4-24
7-11
mobility, overview
6-20
11-2 to 11-5
Mobility Anchor Config page
network example
7-22, 7-26
7-16
configuring using the GUI
7-15 to 7-16
statistics
See auto-anchor mobility
viewing
11-14
Mobility Anchors option
viewing for an access point using the
CLI 7-32 to 7-33
viewing for an access point using the
GUI 7-27 to 7-32
Mesh > LinkTest Results page
7-35
11-14
Mobility Anchors page
mobility failover
11-14, 11-17, 11-18
11-12
Mobility Group Member > New page
11-9
mobility group members, sending ping requests
Mobility Group Members > Edit All page
mesh access points (MAPs)
selecting
11-14
mobility anchors
configuring using the CLI
described
11-13, 11-18
Mobility Anchor Create button
parameters
mobility group name, entering
7-10
mesh node statistics
7-31 to 7-32
11-10
11-9
configuring
using the CLI
7-30
11-11
using the configuration wizard
7-15
using the GUI
4-5
11-8 to 11-10
Message Authentication Code Key (MACK)
parameter 5-76
detecting failed members
Message Log Level parameter
determining when to include controllers
4-15
message logs
11-12
difference from RF groups
viewing
examples
using the CLI
4-16
illustrated
using the GUI
4-15 to 4-16
overview
Message Logs page
4-16
Message parameter
9-10
Metrics Collection parameter
10-5
11-5
11-5 to 11-7
11-7 to 11-8
mobility ping tests, running
4-29
11-7
11-6
prerequisites
11-20
mode button
MFP Client Protection parameter
5-50
MFP Frame Validation parameter
5-50
MIC, described
11-12
mobility groups
7-19
mesh node security statistics
Mesh page
6-18
6-15, 6-18
migrating access points from -J to -U regulatory
domain 7-64
See reset button
Mode parameter
4-23, 10-34
monitor mode, described
mpings
7-9
11-14, 11-20
Multicast Appliance Mode parameter
3-22
Book Title
78-xxxxx-xx
IN-13
Index
multicast mode
Override Interface ACL parameter
configuring
described
over-the-air provisioning (OTAP)
4-20
5-44
7-2
4-18
guidelines
4-19, 7-52
P
multiple country codes
configuration guidelines
7-58
Password parameter
5-18, 8-11
configuring using the CLI
7-62
password recovery mechanism
configuring using the GUI
7-60 to 7-61
Physical Mode parameter
3-22
Physical Status parameter
3-21
multiple country support, configuring using the
configuration wizard 4-6
4-7
pico cell mode
configuring
N
Native VLAN ID parameter
12-12
10-41
using the GUI
10-38 to 10-40
debugging using the CLI
neighbor information
guidelines
viewing for an access point using the CLI
7-37
viewing for an access point using the GUI
7-33 to 7-36
Neighbor Information option
7-34
overview
versions
10-37 to 10-38
10-39
ping link test, described
Port > Configure page
neighbor statistics
viewing for an access point using the CLI
7-37
viewing for an access point using the GUI
7-33 to 7-36
network, described
Noise Measurement parameter
Noise threshold parameter
10-39
7-70
3-21
port mirroring, configuring
Port Number parameter
Port parameter
7-10
10-41
10-38
Pico Cell Mode parameter
neighboring access points and channels, viewing using the
CLI 7-40
note, defined
using the CLI
3-23 to 3-24
3-21, 5-10, 5-21
5-64
ports
10-21
comparison table
10-20
configuring
1-21
3-3
3-19 to 3-30
connecting additional ports to support more than 48
access points 3-41
NTP server
configuring to obtain time and date
setting in the configuration wizard
4-6
4-6
on 2000 series controllers
3-2, 3-3, 3-4
on 2100 series controllers
3-2, 3-3, 3-4
on 4400 series controllers
3-2, 3-3, 3-4
on Catalyst 3750G Integrated Wireless LAN
Controller Switch 3-3, 3-4
O
online help, using
2-5
open source terms
C-7
on Cisco 28/37/38xx Series Integrated Services
Router 3-3, 3-4, 4-52, 4-57
on Cisco WiSM
operating system
security
software
overview
1-5 to 1-6
Ports page
1-5
organization of document
1-20 to 1-21
3-3, 3-4
3-2
3-19
Power Assignment Leader parameter
10-20
Book Title
IN-14
78-xxxxx-xx
Index
Power Injector Selection parameter
Power Injector State parameter
PSK Format parameter
7-75
purpose of document
7-75
Power Level Assignment Method parameter
Power Neighbor Count parameter
10-20
6-17
1-20
10-19
Q
power over Ethernet (PoE)
configuring
QBSS
using the CLI
7-75
configuring
using the GUI
7-73 to 7-75
information elements
described
1-14, 7-73
Power Threshold parameter
3-22
and identity networking
10-20
10-20
preauthentication access control list (ACL)
applying to a WLAN
using the CLI
6-27 to 6-28
using the GUI
6-26 to 6-27
levels
6-24
using the CLI
5-46
settings
using the GUI
5-44 to 5-45
with CAC
for external web server
9-16, 12-8
Preauthentication ACL parameter
Pre-Standard State parameter
5-45, 6-40
7-2
5-21, 5-24
3-28
Queue Depth parameter
5-64
6-27
7-30
R
10-20
8-10
radio core dumps, sending from LWAPP-enabled access
points to controller 7-48
radio measurement requests
using the CLI
8-11 to 8-12
using the GUI
8-11
using with local EAP
Protection Type parameter
Protocol parameter
5-24, 5-28, 5-29
5-49, 10-13
configuring
on the CLI
10-35
on the GUI
10-34
overview
10-33
viewing status using the CLI
5-39
Protocol Type parameter
6-27
radio preamble, described
10-36
5-32
radio resource management (RRM)
PSK
with mesh
Query Interval parameter
5-26, 6-4
uploading
described
5-11
3-18
4-12
protected access credentials (PACs)
configuring
12-7
queue statistics
Profile Name parameter
3-18
Quarantine parameter
Privacy Protocol parameter
overview
4-26
configuring
using
Priority Order > Management User page
profile thresholds
7-21
quarantined VLAN
7-74
Priority Order > Local-Auth page
5-57 to 5-58
configuring
Power Update Contribution parameter
Priority parameter
6-26
QoS
Power Over Ethernet (PoE) parameter
priming access points
6-24
6-17
6-15
7-16
benefits
10-5
CCX features
See CCX radio management
Book Title
78-xxxxx-xx
IN-15
Index
configuring
RF domain
using the CLI
See RF groups
10-23 to 10-25
using the configuration wizard
using the GUI
debugging
RF exposure declaration of conformity
4-6
RF group leader
10-15 to 10-23
described
10-26
disabling dynamic channel and power assignment
using the CLI
10-31
using the GUI
10-31
entering
10-26 to 10-31
10-30
using the GUI
10-27 to 10-30
10-32
5-76
5-75
Refresh-time Interval parameter
7-16
10-10
using the GUI
10-8 to 10-10
4-52
formats supported
9-10
4-52
number supported per controller
4-44
configuring using the CLI
for 1000 series access points
B-2 to B-8
for 2000 series controllers
B-8
for 4400 series controllers
B-9
reset button
7-50
using to revert LWAPP-enabled access points to
autonomous mode 7-46 to 7-47
10-7
roam reason report, described
4-22
Retransmit Timeout parameter
5-11, 5-21
10-13 to 10-15
enabling using the GUI
10-11 to 10-13
rogue access points
5-3
1-19
tagging, location, and containment
1-19, 5-3
root access points (RAPs)
11-17
RF Channel Assignment parameter
10-13
enabling using the CLI
overview
5-66
4-53 to 4-54
rogue access point detection
challenges
8-13
reverse path filtering (RPF)
RF-Network Name parameter
rogue access point alarm
4-29, 4-31
disabling on LWAPP-enabled access points
4-53
viewing information using the CLI
1-23
Reserved Roaming Bandwidth parameter
4-52
RFID tag tracking
regulatory information
Re-sync button
using the CLI
described
Redirect URL After Login parameter
10-5 to 10-6
RFID tags
4-8
Range (RootAP to MeshAP) parameter
10-5
viewing status
RADIUS Authentication Servers > New page
RADIUS Authentication Servers page
4-5
10-7
difference from mobility groups
10-2
RADIUS settings, configuring
10-8
using the configuration wizard
overview
viewing settings using the CLI
radio resource monitoring
using the CLI
using the GUI
10-6, 10-10
resetting the controller
10-7
configuring
10-22 to 10-23
using the CLI
related publications
10-6
RF groups
statically assigning channel and transmit power
settings
update interval
10-10
described
10-2 to 10-5
specifying channels
viewing
10-6
RF group name
overriding dynamic RRM
overview
B-5
10-31
described
selecting
7-10
7-20
Book Title
IN-16
78-xxxxx-xx
Index
root bridge
using the GUI
3-24
Root Cost parameter
3-27
Root Port parameter
3-27
described
3-10 to 3-12
3-8
Set to Factory Default button
routing around interference in mesh networks
7-40
RRM
Shared Secret Format parameter
Shared Secret parameter
See radio resource management (RRM)
Rx Sensitivity Threshold parameter
10-15
5-10
5-10
Short Preamble Enabled parameter
10-40
short preambles, described
5-32
Show Wired Clients option
7-56
5-32
shunned clients
S
described
safety warnings
viewing
A-1
Save and Reboot button
8-7, 8-9
saving configuration settings
Scan Threshold parameter
8-12
using the CLI
5-67
using the GUI
5-66
Signal Strength Contribution parameter
4-24
secondary backhaul, configuring using the CLI
sector, described
5-66
7-41
Signature > Detail page
5-70
Signature Events Detail page
7-10, 7-11
secure web mode, enabling
5-71
Signature Events Summary page
2-2
5-71
Signature Events Track Detail page
security
overview
5-2
SNMP, configuring
solutions
5-2 to 5-4
SNMP alert
Security Mode parameter
5-39
4-8 to 4-9
10-20
changing default values using the CLI
4-10 to 4-11
changing default values using the GUI
4-9 to 4-10
snmp traps
serial port
4-9
SNMP v1 / v2c Community > New page
baudrate setting
connecting
timeout
5-72
SNMP community string
7-16
self-signed certificate (SSC), LWAPP-enabled access
points sending to controller 7-47
Sequence parameter
10-18
2-7
SNMP v1 / v2c Community page
2-6
Server Address parameter
5-64
Server Index (Priority) parameter
Server IP Address parameter
5-10, 5-20
5-10, 5-20
5-21
Server Status parameter
5-10
4-12 to 4-13
changing default values using the GUI
4-11 to 4-12
SNMP V3 Users > New page
4-11
upgrading
guidelines
3-5
configuring
8-2 to 8-3
using the CLI
8-5 to 8-6
using the GUI
8-4
Source parameter
3-15
using the configuration wizard
4-12
software
service-port interface
using the CLI
changing default values using the CLI
SNMP V3 Users page
5-27
Server Mode parameter
service port, described
4-9
SNMP v3 users
2-7
Server Key parameter
4-10
5-39
Source Port parameter
4-4
5-40
Spanning Tree Algorithm parameter
3-28
Book Title
78-xxxxx-xx
IN-17
Index
using the CLI
Spanning Tree Protocol (STP)
configuring
11-19
using the configuration wizard
using the CLI
3-29 to 3-30
using the GUI
3-25 to 3-29
described
using the GUI
illustrated
overview
3-24
spanning-tree root
11-18 to 11-19
11-18
11-17 to 11-18
Symmetric Mobility Tunneling Mode parameter
3-24
Spanning Tree Specification parameter
Syslog Configuration page
3-27
SpectraLink NetLink phones
Syslog parameter
4-15
5-33 to 5-34
Syslog Server IP Address parameter
enabling long preambles using the GUI
5-32
system logging
SSID
configuring
using the CLI
6-5
using the GUI
6-4
Standard Signatures page
using the CLI
4-16
using the GUI
4-14 to 4-15
T
6-2
State parameter
4-15
enabling
5-32
described
5-69
TACACS+
5-64, 5-71
accounting
Static Mobility Group Members page
11-8
5-5
authentication
5-4
Statistics option
7-28
authorization
Status parameter
4-10
choosing authentication priority order
STP Mode parameter
3-26
3-25
STP Port Designated Cost parameter
3-25
STP Port Designated Port parameter
3-25
STP Port Designated Root parameter
3-25
3-26
described
3-26
5-9 to 5-11
roles
5-5 to 5-9
5-4 to 5-5
5-4, 5-8
TACACS+ (Cisco) page (on CiscoSecure ACS)
5-7
TACACS+ Administration .csv page (on CiscoSecure
ACS) 5-14, 5-16
4-55 to 4-56
4-55
Switch IP Address (Anchor) parameter
5-14 to 5-16
TACACS+ (Authentication, Authorization, or
Accounting) Servers page 5-9
3-26
3-25
telemetry
11-14
SX/LC/T small form-factor plug-in (SFP) modules
symmetric mobility tunneling
5-11
TACACS+ (Authentication, Authorization, or
Accounting) Servers > New page 5-10
Supervisor 720
configuring
using the GUI
viewing administration server logs
STP Port Path Cost Mode parameter
STP State parameter
5-12 to 5-14
described
3-25
STP Port Priority parameter
using the CLI
configuring on ACS
3-25
STP Port Forward Transitions Count parameter
STP Port Path Cost parameter
5-4
configuring
STP Port Designated Bridge parameter
STP Port ID parameter
11-18
4-15
enabling long preambles using the CLI
overview
4-5
4-52
terminal emulator, settings
3-4
TFTP server, guidelines
2-6
2-3, 5-67, 8-2, 8-6, 8-8, 8-10
time
configuring
Book Title
IN-18
78-xxxxx-xx
Index
configuring manually
4-7
configuring through NTP server
4-6
time-length-values (TLVs), supported for
CDP 4-41 to 4-42
5-68, 8-7, 8-9, 9-19
3-27
described
5-27
6-17
examples
4-27
7-70
using the GUI
7-69
5-68, 8-11
URL parameter
5-75
User Access Mode parameter
4-28
enabling
4-38
using the GUI
4-29
9-1 to 9-21
User Attribute parameter
5-21
User Base DN parameter
5-21
User Name parameter
5-21, 5-25
5-18
User Object Type parameter
viewing statistics
User parameter
using the CLI
4-40 to 4-41
using the GUI
4-33 to 4-37
Transition Time parameter
9-3
user accounts, managing
User Credentials parameter
using the CLI
8-11
9-17
Use AES Key Wrap parameter
traffic stream metrics (TSM)
described
using the CLI
Upload File from Controller page
3-27
traffic specifications (TSPEC) request
4-27
7-4
7-68
Upload button
Topology Change Count parameter
described
4-18
retrieving
6-17, 6-18
parameter
11-14, 11-20
UNII-2 band, and 1000 series access points
TKIP
6-15
4-33
unique device identifier (UDI)
Time to Live for the PAC parameter
described
using the GUI
unicast mode, described
6-13
Time Since Topology Changed parameter
configuring
4-40
UDP port
timeout, configuring for disabled clients
Timeout parameter
using the CLI
5-21
8-11
User Profile Name parameter
4-12
Utilization threshold parameter
10-20
4-24
transmit power
statically assigning using the CLI
10-30
statically assigning using the GUI
10-27 to 10-30
transmit power levels, described
Transmit Power parameter
10-29
U
8-11
7-47
Verify Certificate CN Identity parameter
10-25
tunnel attributes, and identity networking
Tx Power Level Assignment parameter
Validity parameter
VCI strings
10-40
transmit power threshold, decreasing
V
5-59 to 5-60
10-31
5-27
video information, viewing for mesh networks using the
CLI 7-22 to 7-24
video parameters
configuring using the CLI
4-38 to 4-39
configuring using the GUI
4-30 to 4-31
video settings
U-APSD
described
4-28
viewing status
viewing using the CLI
4-39 to 4-41
viewing using the GUI
4-31 to 4-37
virtual interface
Book Title
78-xxxxx-xx
IN-19
Index
configuring
defined
using the CLI
translated
3-15
using the configuration wizard
using the GUI
described
warranty
4-5
described
for AP-manager interface
for dynamic interface
process
3-11
9-7
9-7 to 9-9
9-9
Web Authentication Login window
3-11
choosing
12-12
VLAN interface
9-9 to 9-21
choosing the default
See dynamic interface
VLAN Mappings
using the CLI
9-11 to 9-12
using the GUI
9-9 to 9-10
customized example
12-12
9-20
customizing from an external web server
12-12
VLANs
and identity networking
assigning WLANs to
described
9-18
successful login window
3-17, 3-18
for management interface
page
C-4 to C-7
web authentication
VLAN Identifier parameter
button
A-1
webauth bundle
3-10 to 3-12
3-7 to 3-8
VLAN ID parameter
1-22 to 1-23
5-58 to 5-59
using the GUI
9-16 to 9-17
9-8
downloading a customized login window
3-10
VLAN Support parameter
9-17
default
6-13
3-8
guidelines
using the CLI
12-12
VLAN tag, and identity networking
5-59
voice information, viewing for mesh networks using the
CLI 7-22 to 7-24
voice-over-IP (VoIP) telephone roaming, described
voice parameters
4-21
using the CLI
9-19
using the GUI
9-18 to 9-19
guidelines for downloading customized login
window 9-18
modified default example
previewing
9-13
9-10, 9-19
verifying settings using the CLI
9-21
configuring using the CLI
4-37 to 4-38
Web Authentication Type parameter
configuring using the GUI
4-28 to 4-30
web-based authentication, configuring
voice settings
web-browser security alert
viewing using the CLI
4-39 to 4-41
Web Login page
viewing using the GUI
4-31 to 4-37
Web Policy parameter
VPN Gateway Address parameter
6-22
VPN passthrough
6-23
9-7
9-10, 9-16
5-45, 6-40
Web Server IP Address parameter
WEP keys, configuring
9-17
6-14
configuring using the CLI
6-22
WGB parameter
configuring using the GUI
6-21 to 6-22
WGB Wired Clients page
wired security
9-10, 9-17, 9-19
7-55
7-56
1-6
wireless mesh
W
See mesh
WLAN ID parameter
warnings
5-18, 6-4, 7-13
Book Title
IN-20
78-xxxxx-xx
Index
WLAN override
world mode
configuring using the CLI
6-33
configuring using the GUI
6-32
WLAN Override parameter
WPA1+WPA2
configuring
6-32
WLANs
checking security settings
4-18
using the CLI
6-18
using the GUI
6-16 to 6-17
described
6-14
configuring both static and dynamic WEP
6-15
creating
6-15
WPA2 Policy parameter
WPA Policy parameter
using the CLI
6-5
using the GUI
6-3 to 6-5
6-17
6-17
deleting
using the CLI
6-5
using the GUI
6-3
described
1-12, 3-9 to 3-10, 6-2 to 6-3
using the same SSID
6-3
WLANs > Edit (Advanced) page
5-44, 5-49, 5-62, 6-29
WLANs > Edit (Security > AAA Servers) page
5-22, 5-28,
6-41
WLANs > Edit (Security > Layer 2) page
6-17, 6-19
WLANs > Edit (Security > Layer 3) page
5-44, 6-22, 6-40
WLANs > Edit page
6-4, 12-7
WLANs > New page
6-4, 12-7
WLANs page
6-3, 11-13
WLAN SSID parameter
6-4, 6-36, 9-5
WLAN Status parameter
6-5
WMM
configuring
6-25
described
6-24
with CAC
4-26
workgroup bridges (WGBs)
debugging
described
7-57
7-50
guidelines
7-52 to 7-54
illustrated
7-51
in mesh network
7-51
sample configuration
7-54
viewing status
using the CLI
7-57
using the GUI
7-54 to 7-56
Book Title
78-xxxxx-xx
IN-21
Index
Book Title
IN-22
78-xxxxx-xx