INDEX described Numerics 6-16 802.1X authentication, configuring 1000 series access points antennas models 802.1X dynamic key settings 7-6 to 7-7 configuring 7-4 1030 remote edge access points illustrated overview 6-14 802.3 bridging 7-6 overview 6-14 7-5 using the CLI 4-18 using the GUI 4-17 to 4-18 802.3 Bridging parameter 7-5 to 7-6 802.3 frames, described 1500 series access points 4-18 4-17 802.3x flow control, enabling 4-14 See AP1510 7920 support mode configuring described A 6-25 6-24 AAA override 802.11a (or 802.11b) > Client Roaming page 4-23 configuring 802.11a (or 802.11b) > Video Parameters page 4-30 using the CLI 5-62 802.11a (or 802.11b) > Voice Parameters page 4-28 using the GUI 5-62 802.11a (or 802.11b/g) Cisco APs > Configure page 5-52, 6-32, 10-29 802.11a (or 802.11b/g) Global Parameters > Auto RF page 10-9 802.11a (or 802.11b/g) Global Parameters page 802.11a (or 802.11b/g) Network Status parameter 4-30, 4-31 802.11a (or 802.11b/g) Radios page 802.11a > Pico Cell page 10-38 802.11a > RRM > DCA page 802.1X configuring described 6-17 6-15 802.1X+CCKM configuring 6-17 3-5 4-29, 5-60 Access Control List Name parameter 5-38 access control lists (ACLs) and identity networking 5-58 applying to an interface using the CLI 5-46 using the GUI 5-41 to 5-42 applying to a WLAN 10-23 802.11 bands, enabling and disabling 802.1Q VLAN trunk port 4-35, 10-27 10-33 described 4-7 using the CLI 5-46 using the GUI 5-43 to 5-44 applying to the controller CPU using the CLI 5-46 using the GUI 5-42 to 5-43 configuring using the CLI 5-45 to 5-46 using the GUI 5-38 to 5-41 Book Title 78-xxxxx-xx IN-1 described rules connectors 5-37, 5-39, 5-45 5-37 7-8 Access Control Lists > Edit page 5-40 guidelines for operating in Japan Access Control Lists > New page 5-38 LEDs Access Control Lists > Rules > New page Access Control Lists page Access Mode parameter 5-39 4-22 access point groups assigning access points to 6-37 using the GUI 6-37 7-7 interpreting 4-10, 4-12 using the CLI 7-76 described 5-38 access point assisted roaming, described configuring -2 migrating from -J regulatory domain to -U regulatory domain 7-64 mounting options 7-9 number supported per controller physical security using the CLI 6-36 using the GUI 6-35 to 6-36 power supply priming 7-8 7-9 7-2 regulatory information described 6-33 illustrated 6-34 access points 1000 series supported for use with hybrid REAP VCI strings models overview 7-47 6-41 accounting servers, disabling per WLAN 7-6 ACL Name parameter 7-4 adding MAC address to controller filter list 12-2 7-9 Accounting Server parameters 7-4 B-7 to B-8 See also LWAPP-enabled access points using monitor mode B domain B-2 to B-8 rules for operating in Taiwan access point manager interface, configuring using the configuration wizard 4-5 3-4 7-9 power requirements creating B-6 6-41 5-42, 5-43 ACS server configuration page 6-39 using the CLI 7-13 Action parameter using the GUI 7-12 to 7-13 Adaptive Wireless Path Protocol (AWPP), described antennas 5-40 Add AAA Client page (on CiscoSecure ACS) 7-6 to 7-7 AP1030 overview 7-5 to 7-6 Add Interface-Mapping button AP1510 overview 7-9 Add New Rule button authorizing 5-6 6-36 5-38 Add Web Server button 9-17 using MICs 7-47 administrator access using SSCs 7-47 administrator usernames and passwords, configuring configuring 4400 series controller to support more than 48 3-36 to 3-41 7-10 4-7 Admin Status parameter 4-7 3-22 Book Title 78-xxxxx-xx IN-2 Index Admission Control (ACM) parameter AP Group Name parameter 4-29, 4-30 AES AP Groups VLAN Feature Enable parameter configuring parameter 6-35, 6-37 AP Groups VLAN page 6-17, 6-18 6-35, 6-36 AP-manager interface 6-17 AES-CCMP, described configuring 6-15 AES key wrap configuring using the CLI 5-77 configuring using the GUI 5-75 to 5-76 Aironet IE parameter using the CLI 3-14 to 3-15 using the GUI 3-10 to 3-12 creating multiple interfaces described 6-19, 6-29 Aironet IEs 3-39 to 3-40 3-7 illustration configuring using the CLI 6-32 of four AP-manager interfaces configuring using the GUI 6-29 of three AP-manager interfaces Alarm Trigger Threshold parameter of two AP-manager interfaces 10-13 All APs > Access Point Name > Link Details > Neighbor Name page 7-36 All APs > Access Point Name > Mesh Neighbor Stats page 7-36 All APs > Access Point Name > Neighbor Info page All APs > Access Point Name > Statistics page 7-34 7-29 All APs > Details page 4-45, 6-37, 7-19, 7-60, 7-69, 7-74, 10-12, 12-11 using multiple Allow AAA Override parameter anchor controller, in inter-subnet roaming AP Role parameter Anonymous Provision parameter antenna connectors, external antennas, for access points antenna sectorization 5-28 Assignment Method parameter 10-29 asymmetric tunneling, illustrated audience of document 11-17 1-20 authentication information element (IE) 10-11 5-11 4-12 6-17 Authority ID Information parameter Authority ID parameter 7-6 to 7-7 5-28 5-27 auto-anchor mobility 7-6 to 7-7 configuring 7-7 AP > Clients > Traffic Stream Metrics page 4-36 using the CLI 11-15 to 11-16 using the GUI 11-13 to 11-15 AP > Clients page 4-36 guidelines AP1010, described 7-6 overview AP1020, described 7-6 AP1030, described 7-6 11-12 11-11 to 11-12 autonomous access points converted to lightweight mode See LWAPP-enabled access points AP1510 auto RF, configuring using the configuration wizard configuring and deploying overview 7-19 Auth Key Mgmt parameter 11-4 3-37 7-45 Authentication Protocol parameter 5-62, 12-7 3-38 7-19, 10-12, 12-11 Authentication Priority parameter 7-27, 7-34, 10-11, 12-11 3-39 3-37 to 3-40 AP Mode parameter AP Policies page All APs > Access Point Name > VLAN Mappings page 12-12 All APs page 6-35 7-12 to 7-21 7-9 AP Authentication Policy page AP Group Description paremeter Average Data Rate parameter 6-27 Average Real-Time Rate parameter 5-49, 10-13 6-35 4-6 Avoid Cisco AP Load parameter 6-27 10-18 Avoid Foreign AP Interference parameter 10-17 Book Title 78-xxxxx-xx IN-3 Index Avoid Non-802.11a (802.11b) Noise parameter using the GUI 10-18 in mesh networks 4-30 7-21 viewing in mesh networks B viewing using the CLI scenarios 7-40 described 7-38 Backhaul Client Access parameter Backhaul Interface parameter 7-19 ports 3-3, 3-4 caution, defined 4-26 1-21 CCA Sensitivity Threshold parameter enabling 10-40 CCKM using the CLI 4-37 using the GUI 4-29 for mesh networks 7-21 configuring described 3-27 4-4 Bridge Data Rate parameter 7-20 bridge group name, described using the CLI 6-32 using the GUI 6-29 described 7-11 Bridge Group Name parameter 6-28 viewing a client’s version 7-20 bridge protocol data units (BPDUs) Bridge Type parameter 6-16 configuring Aironet IEs 7-4 bootup script 6-17 CCX Base MAC Address parameter B domain 1-11 logical connectivity diagram and associated software commands E-6 7-16 bandwidth-based CAC described B-3 Catalyst 3750G Integrated Wireless LAN Controller Switch 7-38 to 7-40 enabling using the CLI 4-39 Canadian compliance statement background scanning in mesh networks described 7-23 to 7-24 3-24 7-19 using the CLI 6-32 using the GUI 6-30 to 6-31 CCX Layer 2 client roaming bridging parameters configuring configuring using the CLI 7-20 to 7-21 configuring using the GUI 7-18 to 7-20 broadcasting, configuring using the CLI Burst Data Rate parameter 6-27 Burst Real-Time Rate parameter 4-20 using the CLI 4-24 using the GUI 4-23 to 4-24 debugging using the CLI described 6-27 4-25 4-22 obtaining information using the CLI CCX link test 4-25 7-70 CCX radio management C configuring CAC configuring for 7920 phones described 4-26 6-25 using the CLI 10-35 using the GUI 10-33 to 10-34 debugging using the CLI enabling features using the CLI 4-38 10-37 10-32 hybrid-REAP considerations 10-32 Book Title IN-4 78-xxxxx-xx Index obtaining information using the CLI CCX Version parameter 10-35 to 10-36 CDP > AP Neighbors > Detail page network connections 4-48 ports 4-48 CDP > Global Configuration page CDP > Interface Neighbors page 4-44 8-9 8-7 Channel List parameter 10-17 10-21 10-22 to 10-23 statically assigning using the CLI 10-30 using the GUI 10-27 to 10-30 Check Against CA Certificates parameter Check Certificate Date Validity parameter models B-9 3-4 1-18 to 1-19 3-2, 3-3, 3-4 Cisco Aironet 1510 Series Lightweight Outdoor Mesh Access Point See AP1510 Cisco AV-pairs 5-27 5-27 4-52 6-38, 6-39 Cisco Client Extensions (CCX) See CCX Cisco Discovery Protocol (CDP) CIDS Sensor Add page 5-63 CIDS Sensors List page 5-63 CIDS Shun List page 5-66 ciphers configuring 1-10 FCC statement ports specifying for RRM scanning 1-10 network connections channels configuring using the CLI 4-49 to 4-50 using the GUI 4-43 to 4-45 debugging using the CLI 6-17, 6-18 6-16 Cisco 2000 Series Wireless LAN Controllers described 4-56 to 4-57 described 10-18 Channel Assignment Method parameter described using configuring to support more than 48 access points 3-36 to 3-41 5-27 Channel Assignment Leader parameter chokepoints 3-3, 3-4, 4-57 Cisco 4400 Series Wireless LAN Controllers 5-24, 5-29 Certificate Password parameter 1-10 ports versions 8-8 Certificate Issuer parameter 1-17 to 1-18 logical connectivity diagram and associated software commands E-5 downloading using the GUI 1-9 3-2, 3-3, 3-4 described 8-9 to 8-10 B-8 Cisco 28/37/38xx Integrated Services Router 4-44 4-45 using with local EAP 1-9 network connections ports Certificate Authority (CA) certificates overview described features not supported 4-47 using the CLI 1-17 to 1-18 3-2, 3-3, 3-4 FCC statement 4-49 CDP Protocol Status parameter CDP State parameter 4-46 4-46 CDP Advertisement Version parameter CDP AP Neighbors page 1-9 Cisco 2100 Series Wireless LAN Controllers 4-44 CDP > Interface Neighbors > Detail page CDP > Traffic Metrics page B-8 features not supported 6-31 CDP > AP Neighbors page FCC statement 1-9 described 4-51 4-41 enabling on an access point, using the GUI 4-44 to 4-45 sample network 4-43 Book Title 78-xxxxx-xx IN-5 Index supported devices client roaming, configuring 4-42 viewing neighbors 4-20 to 4-25 clients using the CLI 4-50 to 4-51 viewing CCX version using the CLI 6-32 using the GUI 4-45 to 4-49 viewing CCX version using the GUI 6-30 to 6-31 viewing traffic information Clients > AP > Traffic Stream Metrics page using the CLI 4-51 Clients > AP page using the GUI 4-49 Clients > Detail page Cisco Discovery Protocol parameter Cisco high-power switches Cisco Logo parameter Clients page 4-45 4-34 4-33, 6-31, 7-55, 7-56 4-32, 7-55, 7-71 Clients threshold parameter 7-74 Client Type parameter 9-10 Cisco Unified Wireless Network (UWN) Solution Commands > Reset to Factory Defaults page 1-2 to 1-5 Community Name parameter illustrated 1-3 conditional web redirect 1-2 Cisco WiSM configuring the Supervisor 720 described 4-55 to 4-56 logical connectivity diagram and associated software commands E-3 ports configuring using the CLI 6-40 using the GUI 6-39 to 6-40 described 4-55 3-3, 3-4 Conditional Web Redirect parameter 6-20 using the GUI 6-19 to 6-20 described 4-2 4-4 to 4-6 Configure option using the CLI 6-40 configuration wizard running configuring 6-38 to 6-39 6-38 described CKIP 4-3 4-10 configuring the RADIUS server 1-10 guidelines 10-20 7-56 described Cisco Wireless Control System (WCS), described 4-34 10-28 controller network module baud rate 6-18 versions clearing the controller configuration 8-12 3-3 3-4 controllers CLI configuration basic commands 2-8 clearing enabling wireless connections logging into logging out navigating using 2-8 erasing 2-6 to 2-7 1-11 to 1-12 discovery process 7-2 multiple-controller deployment Client Certificate Required parameter 5-27 1-8 client MFP, described 8-12 connections 2-8 2-6 to 2-8 client location 8-13 saving 2-7 8-12 5-47 1-7 to 1-8 platforms 1-8 to 1-11 primary, secondary, and tertiary Client Min Exception Level threshold parameter Client Protection parameter overview 5-51 10-20 1-4 to 1-5 1-8 resetting factory default settings using the CLI 4-3 Book Title IN-6 78-xxxxx-xx Index using the GUI configuring through NTP server 4-3 single-controller deployment types of memory DCA channels 1-3 to 1-4 upgrading software guidelines using the CLI 8-5 to 8-6 using the GUI 8-4 Default Mobility Group parameter Description parameter Controller Spanning Tree Configuration page Controller Time Source Valid parameter country channels 3-27 Designated Root parameter 7-61 using the GUI 8-6 to 8-7 8-6 5-24, 5-29 DHCP 7-61 to 7-64 using the configuration wizard 4-6 7-59 to 7-61 configuring using the CLI 6-8 configuring using the GUI 6-7 DHCP option 43 7-58 in controller discovery process 7-65 using See also multiple country codes viewing using the CLI Country page 8-7 to 8-8 using with local EAP configuring Japanese using the CLI overview 7-58 using the GUI 5-40 downloading country codes described 5-39 device certificates 1-21 to 1-23 Country Code parameter using the CLI 3-27 Destination Port parameter 10-21 commonly used 11-8 5-18, 7-13 Destination parameter 5-51 11-14 conventions of document 10-23 debug commands, sending from controller to LWAPP-enabled access points 7-48 8-2 to 8-3 Control Path parameter 10-21 DCA Channels parameter 1-16 4-6 7-47 DHCP option 82 7-63 configuring 7-59 Coverage Exception Level threshold parameter coverage hole, detection 10-21 10-4 Coverage Measurement parameter Coverage threshold parameter CPU ACL Mode parameter 10-22 10-20 CPU Access Control Lists page 5-43 5-43 5-35 to 5-36 described 5-35 illustrated 5-35 DHCP server discovery 7-2 DHCP servers configuring using the configuration wizard external 6-6 to 6-7 internal 6-6 crash information, sending from LWAPP-enabled access points to controller 7-48 directed roam request Custom Signatures page Direction parameter 5-69 7-2 4-22 5-40 disabled clients, configuring a timeout distribution system ports, described D 4-5 6-13 3-4 to 3-5 document Data Path parameter audience 11-14 date configuring manually 4-7 1-20 conventions 1-21 to 1-23 organization 1-20 to 1-21 Book Title 78-xxxxx-xx IN-7 Index purpose EoIP port 1-20 domain name server (DNS) discovery Download button epings 7-2 DSCP parameter 5-68, 8-7, 8-9, 9-18 Ethernet Bridging parameter Ethernet connection 5-40 dynamic channel allocation, specifying the channel set 10-24 dynamic channel assignment 10-3 2-7 European declaration of conformity event reporting 7-67 to 7-68 8-13 7-20 B-4 to B-5 5-48 Expedited Bandwidth parameter dynamic frequency selection, described 4-29 expedited bandwidth requests dynamic interface described configuring 4-27 enabling using the CLI 3-18 to 3-19 using the GUI 3-16 to 3-18 described 11-14, 11-20 erasing the controller configuration 5-68, 8-7, 8-9, 9-19 Download File to Controller page 11-14, 11-20 3-8 using the CLI 4-38 using the GUI 4-29 Extensible Authentication Protocol (EAP), configuring 6-14 dynamic RRM See radio resource management (RRM) dynamic transmit power control configuring described F 4-18 10-4 factory default settings dynamic WEP, configuring 6-14 E EAP-FAST Method Parameters page EAP-FAST parameter Edit QoS Profile page 4-3 resetting using the GUI 4-3 failover protection 1-16 to 1-17 Fast Ethernet port 3-4 FCC declaration of conformity 5-27 5-28 5-26 6-26 2000 series controllers B-8 2100 series controllers B-8 4400 series controllers B-9 Enable Check for All Standard and Custom Signatures parameter 5-70 File Name parameter Enable Controller Management to be accessible from Wireless Clients parameter 2-9, 5-34 file transfers Enable CPU ACL parameter B-2 to B-3 FCC statement 5-26 EAP Profile Name parameter EAP-TLS parameter resetting using the CLI Enable Dynamic AP Management parameter Fingerprint parameter 5-68, 8-7, 8-9, 8-11, 9-19 5-64 flashing LEDs, configuring 5-21 7-76 foreign controller, in inter-subnet roaming Encryption Key parameter 6-20 end user license agreement C-2 to C-4 enhanced neighbor list, described 3-40 5-68, 8-7, 8-9, 8-11, 9-19 1-14 File Type parameter 5-43 Enable Server Status parameter File Path parameter 5-68, 8-7, 8-9, 8-11, 9-19 Forward Delay parameter 11-4 3-28, 3-29 4-22 enhanced neighbor list request (E2E), described 4-22 Book Title IN-8 78-xxxxx-xx Index authentication process G bandwidth restriction General page 3-33, 4-17, 5-17, 5-77, 10-7 Generate Password parameter gigabit Ethernet port configuring 9-5 3-4 Group Mode parameter 10-10, 10-16 12-2 12-5 to 12-14 guidelines 12-4 illustrated 12-2 number of access points supported Group Setup page (on CiscoSecure ACS) guest N+1 redundancy 12-2 to 12-4 5-8 11-12 overview 12-2 12-2 Hysteresis parameter 4-23 guest user accounts creating 9-2 to 9-7 creating as a lobby ambassador 9-4 to 9-6 viewing I identity networking using the CLI 9-7 configuring using the GUI 9-6 described 1-12 to 1-14 Guest User parameter 5-18 overview 5-57 guest WLAN, creating 9-5 RADIUS attributes guest WLAN mobility configuring GUI described 2-5 opening using 5-62 to 5-74 5-62 IDS sensors enabling wireless connections guidelines 5-57 to 5-60 IDS See auto-anchor mobility disabling 5-56 to 5-60 2-8 2-2 2-2 2-2 configuring using the CLI 5-65 to 5-66 using the GUI 5-63 to 5-65 described 5-63 IDS signature events H Headline parameter Hello Time parameter help, obtaining 9-10 illustrated overview 3-28, 3-29 viewing using the GUI 5-71 to 5-72 configuring 2-5 10-37 10-37 10-37 using the CLI 5-72 to 5-73 using the GUI 5-67 to 5-72 described 5-67 frequency 5-70 MAC frequency See also pico cell mode Holdtime parameter 5-73 to 5-74 IDS signatures high-density network benefits viewing using the CLI measurement interval 3-28, 4-44 H-REAP Local Switching parameter hybrid REAP access points supported 5-71 pattern 12-8 5-71 quiet time 5-71 tracking method 12-2 5-70 5-70 uploading or downloading using the GUI 5-67 to 5-68 Book Title 78-xxxxx-xx IN-9 Index Index parameter 5-64 J infrastructure MFP components described Japanese country codes 5-48 5-47 Infrastructure MFP Protection parameter Infrastructure Protection parameter 5-51 Infrastructure Validation parameter 5-51 5-50 Injector Switch MAC Address parameter inline power, described 7-75 Keep Alive Count parameter 7-74 illustrated 11-3 Keep Alive Interval parameter Key Format parameter configuring and identity networking described 5-58 to 5-59 6-20 6-20 6-18 Key Permutation parameter configuring Key Size parameter using the CLI 3-12 to 3-16 using the GUI 3-10 to 3-12 Key Wrap parameter 3-5 3-17, 3-39, 5-42 Interfaces > New page 3-17, 3-39 6-20 6-20 Key Wrap Format parameter Interfaces > Edit page 5-76 key permutation 6-36, 7-13 interfaces Interfaces page 11-13 6-20 Key Index parameter Interface Name parameter overview 11-13 Key Encryption Key (KEK) parameter inter-controller roaming 4-21 Japanese regulations for migrating access points from -J to -U regulatory domain 7-64 K 7-73 intelligent power management (IPM) described 7-65 5-76 5-75 L 3-11 LAG interference defined See link aggregation (LAG) 10-3 routing around in mesh networks Interference threshold parameter 7-40 10-20 LAG Mode on Next Reboot parameter Last Auto Channel Assignment parameter Last Power Level Assignment parameter inter-subnet roaming described 4-21 Layer 1 security illustrated 11-3 to 11-4 Layer 2 Interval parameter operation 4-20 illustrated 11-2 Inventory page 10-20 7-2 1-6 security configuring described 7-69 Invoke Channel Update Now button Invoke Power Update Now button IP Address parameter IP Mask parameter 10-18 5-2 LWAPP discovery 10-34 intra-controller roaming described 3-34 10-17 10-19 4-10, 5-68, 8-7, 8-9, 8-11, 9-19 4-10 6-13 to 6-21 5-2 Layer 2 Security parameter 6-17, 6-19, 6-39 Layer 3 LWAPP discovery operation 7-2 1-6 Book Title IN-10 78-xxxxx-xx Index security link test configuring described described 6-21 to 6-23 7-70 performing 5-3 Layer 3 Security parameter 6-22, 6-23, 6-40 LDAP choosing server priority order 5-21 configuring using the CLI 7-72 using the GUI 7-34 to 7-35, 7-71 to 7-72 types of packets 7-70 Link Trap parameter 3-22 using the CLI 5-22 to 5-23 load balancing using the GUI 5-19 to 5-22 Load-based AC parameter local EAP methods supported LDAP Servers > New page LDAP Servers page LEAP parameter described 5-22 4-26 to 4-27 enabling 5-20 5-20 LDAP Servers parameter 4-29 load-based CAC 5-19 LDAP servers, assigning to WLANs 10-4 5-28 using the CLI 4-37 using the GUI 4-29 Load Measurement parameter 5-26 LEDs 10-21 lobby ambassador account configuring 7-76 for access points 7-7 license agreement C-2 to C-4 Lifetime parameter 5-18, 9-5 lightweight mode, reverting to autonomous mode 3-36 Lobby Ambassador Guest Management > Guest Users List page 9-4, 9-6 7-46 Local Auth Active Timeout parameter using the CLI 3-34 using the GUI 3-33 to 3-34 guidelines 3-32 to 3-33 illustrated 3-30, 3-32 verifying settings using the CLI 3-21 choosing server priority order using the CLI 5-29 to 5-32 using the GUI 5-24 to 5-28 debugging button 7-71 option 7-34, 7-71 7-72 window 7-35 5-26 5-24 described 5-32 5-24 viewing information using the CLI 3-35 with mesh 5-31 7-16 Local EAP Authentication parameter Local EAP Profiles > Edit page Link Test 5-25 configuring 3-30 to 3-31 enabling page 9-2 to 9-3 local EAP configuring neighboring devices Link Status parameter creating using the GUI Local Certificate Required parameter C-4 to C-7 link aggregation (LAG) described 9-3 Lobby Ambassador Guest Management > Guest Users List > New page 9-4 Lightweight Access Point Protocol (LWAPP), described 7-2 limited warranty creating using the CLI Local EAP Profiles page 5-28 5-26 5-25 Local Management Users > New page Local Management Users page Local Net Users > New page 9-3 9-2 5-17, 12-9 Book Title 78-xxxxx-xx IN-11 Index Local Net Users page using the GUI 5-17, 9-6 local network users 7-12 to 7-13, 7-21 displayed on controller GUI 7-50 configuring using the CLI 5-19 MAC Address parameter configuring using the GUI 5-16 to 5-18 MAC filtering, configuring on WLANs local user database, capacity location-based services location calibration 10-33 10-33 location information, viewing LOCP, described MAC Filtering page 9-2 Cisco 28/37/38xx Integrated Services Router E-5 E-3 7-11 MAC Filters > New page 7-13 using the CLI 5-52 to 5-53 using the GUI 5-49 to 5-50 debugging described types 5-32 5-56 5-47 to 5-48 5-48 5-47 viewing settings enabling on SpectraLink NetLink phones using the CLI 5-33 to 5-34 using the GUI 5-32 5-53 to 5-55 using the GUI 5-50 to 5-52 5-51 Management Frame Protection Settings page configuring a static IP address disabling the reset button using the CLI Management Frame Protection parameter LWAPP-enabled access points 7-50 management frame validation 7-50 enabling memory core dumps 5-48 configuring 7-45 7-50 7-45 using the CLI 3-12 using the GUI 3-10 to 3-12 described receiving debug commands from controller reverting to autonomous mode 7-46 to 7-47 sending crash information to controller 7-48 sending radio core dumps to controller 7-48 sending SSCs to controller 5-51 management interface 7-49 MAC addresses displayed on controller GUI overview MAC filter list, described guidelines long preambles guidelines 7-12 configuring 4-52 Catalyst 3750G Integrated Wireless LAN Controller Switch E-6 described 6-12 to 6-13 management frame protection (MFP) 4-55 logical connectivity diagram Cisco WiSM 7-13 7-47 LWAPP transport mode, configuring using the configuration wizard 4-5 7-48 3-6 management over wireless described 5-34 enabling using the CLI 5-35 using the GUI 5-34 Max Age parameter 3-27 Maximum Age parameter 3-28 maximum local database entries M MAC address of access point adding to controller filter list using the CLI 7-13 configuring using the CLI 5-78 configuring using the GUI 5-77 Maximum Local Database Entries parameter Maximum Retries parameter 5-17, 5-77 5-68, 8-7, 8-9, 9-19 Maximum RF Usage Per AP parameter 6-27 Book Title IN-12 78-xxxxx-xx Index Max RF Bandwidth parameter 4-29, 4-31 memory Minimum RSSI parameter 4-23 mirror mode core dumps, enabling for LWAPP-enabled access points 7-49 types 1-16 See port mirroring MMH MIC configuring mesh 6-20 described described 7-10 to 7-12 high-speed roaming illustrated MMH Mode parameter 4-20, 4-23, 4-24 7-11 mobility, overview 6-20 11-2 to 11-5 Mobility Anchor Config page network example 7-22, 7-26 7-16 configuring using the GUI 7-15 to 7-16 statistics See auto-anchor mobility viewing 11-14 Mobility Anchors option viewing for an access point using the CLI 7-32 to 7-33 viewing for an access point using the GUI 7-27 to 7-32 Mesh > LinkTest Results page 7-35 11-14 Mobility Anchors page mobility failover 11-14, 11-17, 11-18 11-12 Mobility Group Member > New page 11-9 mobility group members, sending ping requests Mobility Group Members > Edit All page mesh access points (MAPs) selecting 11-14 mobility anchors configuring using the CLI described 11-13, 11-18 Mobility Anchor Create button parameters mobility group name, entering 7-10 mesh node statistics 7-31 to 7-32 11-10 11-9 configuring using the CLI 7-30 11-11 using the configuration wizard 7-15 using the GUI 4-5 11-8 to 11-10 Message Authentication Code Key (MACK) parameter 5-76 detecting failed members Message Log Level parameter determining when to include controllers 4-15 message logs 11-12 difference from RF groups viewing examples using the CLI 4-16 illustrated using the GUI 4-15 to 4-16 overview Message Logs page 4-16 Message parameter 9-10 Metrics Collection parameter 10-5 11-5 11-5 to 11-7 11-7 to 11-8 mobility ping tests, running 4-29 11-7 11-6 prerequisites 11-20 mode button MFP Client Protection parameter 5-50 MFP Frame Validation parameter 5-50 MIC, described 11-12 mobility groups 7-19 mesh node security statistics Mesh page 6-18 6-15, 6-18 migrating access points from -J to -U regulatory domain 7-64 See reset button Mode parameter 4-23, 10-34 monitor mode, described mpings 7-9 11-14, 11-20 Multicast Appliance Mode parameter 3-22 Book Title 78-xxxxx-xx IN-13 Index multicast mode Override Interface ACL parameter configuring described over-the-air provisioning (OTAP) 4-20 5-44 7-2 4-18 guidelines 4-19, 7-52 P multiple country codes configuration guidelines 7-58 Password parameter 5-18, 8-11 configuring using the CLI 7-62 password recovery mechanism configuring using the GUI 7-60 to 7-61 Physical Mode parameter 3-22 Physical Status parameter 3-21 multiple country support, configuring using the configuration wizard 4-6 4-7 pico cell mode configuring N Native VLAN ID parameter 12-12 10-41 using the GUI 10-38 to 10-40 debugging using the CLI neighbor information guidelines viewing for an access point using the CLI 7-37 viewing for an access point using the GUI 7-33 to 7-36 Neighbor Information option 7-34 overview versions 10-37 to 10-38 10-39 ping link test, described Port > Configure page neighbor statistics viewing for an access point using the CLI 7-37 viewing for an access point using the GUI 7-33 to 7-36 network, described Noise Measurement parameter Noise threshold parameter 10-39 7-70 3-21 port mirroring, configuring Port Number parameter Port parameter 7-10 10-41 10-38 Pico Cell Mode parameter neighboring access points and channels, viewing using the CLI 7-40 note, defined using the CLI 3-23 to 3-24 3-21, 5-10, 5-21 5-64 ports 10-21 comparison table 10-20 configuring 1-21 3-3 3-19 to 3-30 connecting additional ports to support more than 48 access points 3-41 NTP server configuring to obtain time and date setting in the configuration wizard 4-6 4-6 on 2000 series controllers 3-2, 3-3, 3-4 on 2100 series controllers 3-2, 3-3, 3-4 on 4400 series controllers 3-2, 3-3, 3-4 on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-4 O online help, using 2-5 open source terms C-7 on Cisco 28/37/38xx Series Integrated Services Router 3-3, 3-4, 4-52, 4-57 on Cisco WiSM operating system security software overview 1-5 to 1-6 Ports page 1-5 organization of document 1-20 to 1-21 3-3, 3-4 3-2 3-19 Power Assignment Leader parameter 10-20 Book Title IN-14 78-xxxxx-xx Index Power Injector Selection parameter Power Injector State parameter PSK Format parameter 7-75 purpose of document 7-75 Power Level Assignment Method parameter Power Neighbor Count parameter 10-20 6-17 1-20 10-19 Q power over Ethernet (PoE) configuring QBSS using the CLI 7-75 configuring using the GUI 7-73 to 7-75 information elements described 1-14, 7-73 Power Threshold parameter 3-22 and identity networking 10-20 10-20 preauthentication access control list (ACL) applying to a WLAN using the CLI 6-27 to 6-28 using the GUI 6-26 to 6-27 levels 6-24 using the CLI 5-46 settings using the GUI 5-44 to 5-45 with CAC for external web server 9-16, 12-8 Preauthentication ACL parameter Pre-Standard State parameter 5-45, 6-40 7-2 5-21, 5-24 3-28 Queue Depth parameter 5-64 6-27 7-30 R 10-20 8-10 radio core dumps, sending from LWAPP-enabled access points to controller 7-48 radio measurement requests using the CLI 8-11 to 8-12 using the GUI 8-11 using with local EAP Protection Type parameter Protocol parameter 5-24, 5-28, 5-29 5-49, 10-13 configuring on the CLI 10-35 on the GUI 10-34 overview 10-33 viewing status using the CLI 5-39 Protocol Type parameter 6-27 radio preamble, described 10-36 5-32 radio resource management (RRM) PSK with mesh Query Interval parameter 5-26, 6-4 uploading described 5-11 3-18 4-12 protected access credentials (PACs) configuring 12-7 queue statistics Profile Name parameter 3-18 Quarantine parameter Privacy Protocol parameter overview 4-26 configuring using Priority Order > Management User page profile thresholds 7-21 quarantined VLAN 7-74 Priority Order > Local-Auth page 5-57 to 5-58 configuring Power Update Contribution parameter Priority parameter 6-26 QoS Power Over Ethernet (PoE) parameter priming access points 6-24 6-17 6-15 7-16 benefits 10-5 CCX features See CCX radio management Book Title 78-xxxxx-xx IN-15 Index configuring RF domain using the CLI See RF groups 10-23 to 10-25 using the configuration wizard using the GUI debugging RF exposure declaration of conformity 4-6 RF group leader 10-15 to 10-23 described 10-26 disabling dynamic channel and power assignment using the CLI 10-31 using the GUI 10-31 entering 10-26 to 10-31 10-30 using the GUI 10-27 to 10-30 10-32 5-76 5-75 Refresh-time Interval parameter 7-16 10-10 using the GUI 10-8 to 10-10 4-52 formats supported 9-10 4-52 number supported per controller 4-44 configuring using the CLI for 1000 series access points B-2 to B-8 for 2000 series controllers B-8 for 4400 series controllers B-9 reset button 7-50 using to revert LWAPP-enabled access points to autonomous mode 7-46 to 7-47 10-7 roam reason report, described 4-22 Retransmit Timeout parameter 5-11, 5-21 10-13 to 10-15 enabling using the GUI 10-11 to 10-13 rogue access points 5-3 1-19 tagging, location, and containment 1-19, 5-3 root access points (RAPs) 11-17 RF Channel Assignment parameter 10-13 enabling using the CLI overview 5-66 4-53 to 4-54 rogue access point detection challenges 8-13 reverse path filtering (RPF) RF-Network Name parameter rogue access point alarm 4-29, 4-31 disabling on LWAPP-enabled access points 4-53 viewing information using the CLI 1-23 Reserved Roaming Bandwidth parameter 4-52 RFID tag tracking regulatory information Re-sync button using the CLI described Redirect URL After Login parameter 10-5 to 10-6 RFID tags 4-8 Range (RootAP to MeshAP) parameter 10-5 viewing status RADIUS Authentication Servers > New page RADIUS Authentication Servers page 4-5 10-7 difference from mobility groups 10-2 RADIUS settings, configuring 10-8 using the configuration wizard overview viewing settings using the CLI radio resource monitoring using the CLI using the GUI 10-6, 10-10 resetting the controller 10-7 configuring 10-22 to 10-23 using the CLI related publications 10-6 RF groups statically assigning channel and transmit power settings update interval 10-10 described 10-2 to 10-5 specifying channels viewing 10-6 RF group name overriding dynamic RRM overview B-5 10-31 described selecting 7-10 7-20 Book Title IN-16 78-xxxxx-xx Index root bridge using the GUI 3-24 Root Cost parameter 3-27 Root Port parameter 3-27 described 3-10 to 3-12 3-8 Set to Factory Default button routing around interference in mesh networks 7-40 RRM Shared Secret Format parameter Shared Secret parameter See radio resource management (RRM) Rx Sensitivity Threshold parameter 10-15 5-10 5-10 Short Preamble Enabled parameter 10-40 short preambles, described 5-32 Show Wired Clients option 7-56 5-32 shunned clients S described safety warnings viewing A-1 Save and Reboot button 8-7, 8-9 saving configuration settings Scan Threshold parameter 8-12 using the CLI 5-67 using the GUI 5-66 Signal Strength Contribution parameter 4-24 secondary backhaul, configuring using the CLI sector, described 5-66 7-41 Signature > Detail page 5-70 Signature Events Detail page 7-10, 7-11 secure web mode, enabling 5-71 Signature Events Summary page 2-2 5-71 Signature Events Track Detail page security overview 5-2 SNMP, configuring solutions 5-2 to 5-4 SNMP alert Security Mode parameter 5-39 4-8 to 4-9 10-20 changing default values using the CLI 4-10 to 4-11 changing default values using the GUI 4-9 to 4-10 snmp traps serial port 4-9 SNMP v1 / v2c Community > New page baudrate setting connecting timeout 5-72 SNMP community string 7-16 self-signed certificate (SSC), LWAPP-enabled access points sending to controller 7-47 Sequence parameter 10-18 2-7 SNMP v1 / v2c Community page 2-6 Server Address parameter 5-64 Server Index (Priority) parameter Server IP Address parameter 5-10, 5-20 5-10, 5-20 5-21 Server Status parameter 5-10 4-12 to 4-13 changing default values using the GUI 4-11 to 4-12 SNMP V3 Users > New page 4-11 upgrading guidelines 3-5 configuring 8-2 to 8-3 using the CLI 8-5 to 8-6 using the GUI 8-4 Source parameter 3-15 using the configuration wizard 4-12 software service-port interface using the CLI changing default values using the CLI SNMP V3 Users page 5-27 Server Mode parameter service port, described 4-9 SNMP v3 users 2-7 Server Key parameter 4-10 5-39 Source Port parameter 4-4 5-40 Spanning Tree Algorithm parameter 3-28 Book Title 78-xxxxx-xx IN-17 Index using the CLI Spanning Tree Protocol (STP) configuring 11-19 using the configuration wizard using the CLI 3-29 to 3-30 using the GUI 3-25 to 3-29 described using the GUI illustrated overview 3-24 spanning-tree root 11-18 to 11-19 11-18 11-17 to 11-18 Symmetric Mobility Tunneling Mode parameter 3-24 Spanning Tree Specification parameter Syslog Configuration page 3-27 SpectraLink NetLink phones Syslog parameter 4-15 5-33 to 5-34 Syslog Server IP Address parameter enabling long preambles using the GUI 5-32 system logging SSID configuring using the CLI 6-5 using the GUI 6-4 Standard Signatures page using the CLI 4-16 using the GUI 4-14 to 4-15 T 6-2 State parameter 4-15 enabling 5-32 described 5-69 TACACS+ 5-64, 5-71 accounting Static Mobility Group Members page 11-8 5-5 authentication 5-4 Statistics option 7-28 authorization Status parameter 4-10 choosing authentication priority order STP Mode parameter 3-26 3-25 STP Port Designated Cost parameter 3-25 STP Port Designated Port parameter 3-25 STP Port Designated Root parameter 3-25 3-26 described 3-26 5-9 to 5-11 roles 5-5 to 5-9 5-4 to 5-5 5-4, 5-8 TACACS+ (Cisco) page (on CiscoSecure ACS) 5-7 TACACS+ Administration .csv page (on CiscoSecure ACS) 5-14, 5-16 4-55 to 4-56 4-55 Switch IP Address (Anchor) parameter 5-14 to 5-16 TACACS+ (Authentication, Authorization, or Accounting) Servers page 5-9 3-26 3-25 telemetry 11-14 SX/LC/T small form-factor plug-in (SFP) modules symmetric mobility tunneling 5-11 TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 5-10 Supervisor 720 configuring using the GUI viewing administration server logs STP Port Path Cost Mode parameter STP State parameter 5-12 to 5-14 described 3-25 STP Port Priority parameter using the CLI configuring on ACS 3-25 STP Port Forward Transitions Count parameter STP Port Path Cost parameter 5-4 configuring STP Port Designated Bridge parameter STP Port ID parameter 11-18 4-15 enabling long preambles using the CLI overview 4-5 4-52 terminal emulator, settings 3-4 TFTP server, guidelines 2-6 2-3, 5-67, 8-2, 8-6, 8-8, 8-10 time configuring Book Title IN-18 78-xxxxx-xx Index configuring manually 4-7 configuring through NTP server 4-6 time-length-values (TLVs), supported for CDP 4-41 to 4-42 5-68, 8-7, 8-9, 9-19 3-27 described 5-27 6-17 examples 4-27 7-70 using the GUI 7-69 5-68, 8-11 URL parameter 5-75 User Access Mode parameter 4-28 enabling 4-38 using the GUI 4-29 9-1 to 9-21 User Attribute parameter 5-21 User Base DN parameter 5-21 User Name parameter 5-21, 5-25 5-18 User Object Type parameter viewing statistics User parameter using the CLI 4-40 to 4-41 using the GUI 4-33 to 4-37 Transition Time parameter 9-3 user accounts, managing User Credentials parameter using the CLI 8-11 9-17 Use AES Key Wrap parameter traffic stream metrics (TSM) described using the CLI Upload File from Controller page 3-27 traffic specifications (TSPEC) request 4-27 7-4 7-68 Upload button Topology Change Count parameter described 4-18 retrieving 6-17, 6-18 parameter 11-14, 11-20 UNII-2 band, and 1000 series access points TKIP 6-15 4-33 unique device identifier (UDI) Time to Live for the PAC parameter described using the GUI unicast mode, described 6-13 Time Since Topology Changed parameter configuring 4-40 UDP port timeout, configuring for disabled clients Timeout parameter using the CLI 5-21 8-11 User Profile Name parameter 4-12 Utilization threshold parameter 10-20 4-24 transmit power statically assigning using the CLI 10-30 statically assigning using the GUI 10-27 to 10-30 transmit power levels, described Transmit Power parameter 10-29 U 8-11 7-47 Verify Certificate CN Identity parameter 10-25 tunnel attributes, and identity networking Tx Power Level Assignment parameter Validity parameter VCI strings 10-40 transmit power threshold, decreasing V 5-59 to 5-60 10-31 5-27 video information, viewing for mesh networks using the CLI 7-22 to 7-24 video parameters configuring using the CLI 4-38 to 4-39 configuring using the GUI 4-30 to 4-31 video settings U-APSD described 4-28 viewing status viewing using the CLI 4-39 to 4-41 viewing using the GUI 4-31 to 4-37 virtual interface Book Title 78-xxxxx-xx IN-19 Index configuring defined using the CLI translated 3-15 using the configuration wizard using the GUI described warranty 4-5 described for AP-manager interface for dynamic interface process 3-11 9-7 9-7 to 9-9 9-9 Web Authentication Login window 3-11 choosing 12-12 VLAN interface 9-9 to 9-21 choosing the default See dynamic interface VLAN Mappings using the CLI 9-11 to 9-12 using the GUI 9-9 to 9-10 customized example 12-12 9-20 customizing from an external web server 12-12 VLANs and identity networking assigning WLANs to described 9-18 successful login window 3-17, 3-18 for management interface page C-4 to C-7 web authentication VLAN Identifier parameter button A-1 webauth bundle 3-10 to 3-12 3-7 to 3-8 VLAN ID parameter 1-22 to 1-23 5-58 to 5-59 using the GUI 9-16 to 9-17 9-8 downloading a customized login window 3-10 VLAN Support parameter 9-17 default 6-13 3-8 guidelines using the CLI 12-12 VLAN tag, and identity networking 5-59 voice information, viewing for mesh networks using the CLI 7-22 to 7-24 voice-over-IP (VoIP) telephone roaming, described voice parameters 4-21 using the CLI 9-19 using the GUI 9-18 to 9-19 guidelines for downloading customized login window 9-18 modified default example previewing 9-13 9-10, 9-19 verifying settings using the CLI 9-21 configuring using the CLI 4-37 to 4-38 Web Authentication Type parameter configuring using the GUI 4-28 to 4-30 web-based authentication, configuring voice settings web-browser security alert viewing using the CLI 4-39 to 4-41 Web Login page viewing using the GUI 4-31 to 4-37 Web Policy parameter VPN Gateway Address parameter 6-22 VPN passthrough 6-23 9-7 9-10, 9-16 5-45, 6-40 Web Server IP Address parameter WEP keys, configuring 9-17 6-14 configuring using the CLI 6-22 WGB parameter configuring using the GUI 6-21 to 6-22 WGB Wired Clients page wired security 9-10, 9-17, 9-19 7-55 7-56 1-6 wireless mesh W See mesh WLAN ID parameter warnings 5-18, 6-4, 7-13 Book Title IN-20 78-xxxxx-xx Index WLAN override world mode configuring using the CLI 6-33 configuring using the GUI 6-32 WLAN Override parameter WPA1+WPA2 configuring 6-32 WLANs checking security settings 4-18 using the CLI 6-18 using the GUI 6-16 to 6-17 described 6-14 configuring both static and dynamic WEP 6-15 creating 6-15 WPA2 Policy parameter WPA Policy parameter using the CLI 6-5 using the GUI 6-3 to 6-5 6-17 6-17 deleting using the CLI 6-5 using the GUI 6-3 described 1-12, 3-9 to 3-10, 6-2 to 6-3 using the same SSID 6-3 WLANs > Edit (Advanced) page 5-44, 5-49, 5-62, 6-29 WLANs > Edit (Security > AAA Servers) page 5-22, 5-28, 6-41 WLANs > Edit (Security > Layer 2) page 6-17, 6-19 WLANs > Edit (Security > Layer 3) page 5-44, 6-22, 6-40 WLANs > Edit page 6-4, 12-7 WLANs > New page 6-4, 12-7 WLANs page 6-3, 11-13 WLAN SSID parameter 6-4, 6-36, 9-5 WLAN Status parameter 6-5 WMM configuring 6-25 described 6-24 with CAC 4-26 workgroup bridges (WGBs) debugging described 7-57 7-50 guidelines 7-52 to 7-54 illustrated 7-51 in mesh network 7-51 sample configuration 7-54 viewing status using the CLI 7-57 using the GUI 7-54 to 7-56 Book Title 78-xxxxx-xx IN-21 Index Book Title IN-22 78-xxxxx-xx
© Copyright 2026 Paperzz