Cisco IOS Software Configuration Guide for Cisco Aironet Access Points, 12.2(15)JA
Index
Downloads: This chapterpdf (PDF - 433.0KB) The complete bookPDF (PDF - 5.04MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - W -

Index

A

abbreviating commands4-3

access point image22-8

access point security settings, matching client devices10-17

accounting

with RADIUS12-12

with TACACS+12-21, 12-26

AES-CCMP9-2

antenna

gainsA-5

Apply button3-4

ARP caching5-21

associations, limiting by MAC address16-5

attributes, RADIUS

sent by the access point12-18

vendor-proprietary12-15

vendor-specific12-14

authentication

local mode with AAA5-16

NTP associations5-25

RADIUS

key12-5

login5-8, 12-7

TACACS+

defined12-21

key12-23

login5-13, 12-24

authentication server

configuring access point as local server8-2

EAP10-4, 12-3

authentication types

Network-EAP10-3

open10-2

shared key10-3

authoritative time source, described5-23

authorization

with RADIUS5-11, 12-11

with TACACS+5-14, 12-21, 12-25

AVVID priority mapping14-10

B

Back button3-4

backup authenticator, local8-1

banners

configuring

login5-42

message-of-the-day login5-40

default configuration5-40

when displayed5-40

basic settings

checking22-5

blocking communication between clients6-15

broadcast key rotation9-1

C

caching MAC authentications10-15

Cancel button3-4

carrier busy test6-18

CCKM10-6

CCK modulation6-7

CDP

disabling for routing device17-4

enabling and disabling

on an interface17-4

monitoring17-4

Cisco Centralized Key Management

See CCKM

Cisco TAC22-1

CiscoWorks 200018-4

CLI

abbreviating commands4-3

command modes4-2

editing features

enabling and disabling4-6

keystroke editing4-6

wrapped lines4-7

error messages4-4

filtering command output4-8

getting help4-3

history

changing the buffer size4-4

described4-4

disabling4-5

recalling commands4-5

no and default forms of commands4-3

terminal emulator settings2-4, 2-6

client ARP caching5-21

client communication, blocking6-15

client power level, limiting6-7

clock

See system clock

command-line interface

See CLI

command modes4-2

commands

abbreviating4-3

no and default4-3

setting privilege levels5-6

community strings

configuring18-5

overview18-3

configuration files

creating using a text editor20-10

deleting a stored configuration20-18

downloading

preparing20-10, 20-13, 20-16

reasons for20-8

using FTP20-13

using RCP20-16

using TFTP20-11

guidelines for creating and using20-9

invalid combinations when copying20-5

system contact and location information18-9

types and location20-9

uploading

preparing20-10, 20-13, 20-16

reasons for20-8

using FTP20-14

using RCP20-17

using TFTP20-11

connections, secure remote5-20

crypto software image5-20

CSID format, selecting12-13

D

daylight saving time5-35

default

configuration, resetting22-5

default commands4-3

default configuration

banners5-40

DNS5-38

NTP5-25

password and privilege level5-2

RADIUS5-8, 12-4

SNMP18-5

system message logging21-3

system name and prompt5-37

TACACS+5-13, 12-23

DHCP server

configuring access point as5-18

receiving IP settings from2-9

directories

changing20-4

creating and removing20-4

displaying the working20-4

DNS

default configuration5-38

displaying the configuration5-40

overview5-38

setting up5-39

domain names

DNS5-38

Domain Name System

See DNS

downloading

configuration files

preparing20-10, 20-13, 20-16

reasons for20-8

using FTP20-13

using RCP20-16

using TFTP20-11

image files

deleting old image20-22

preparing20-20, 20-23, 20-27

reasons for20-18

using FTP20-24

using RCP20-29

using TFTP20-21

DTIM6-16

duplex, Ethernet port5-15

E

EAP authentication

overview10-3

EAP-FAST authentication10-17

EAP-MD5 authentication

setting on client and access point10-19

EAP-SIM authentication

setting on client and access point10-20

EAP-TLS authentication

setting on client and access point10-19

editing features

enabling and disabling4-6

keystrokes used4-6

wrapped lines4-7

EIRP, maximumA-5, A-6, A-7

enable password5-4

enable secret password5-4

encrypted software image5-20

encryption for passwords5-4

error messages

during command entry4-4

setting the display destination device21-5

severity levels21-7

system message format21-2

Ethernet indicator22-3

Ethernet speed and duplex settings5-15

Ethertype filters16-11

Express Security page2-11

F

fallback role6-3

fast secure roaming11-1

files

copying20-5

deleting20-5

displaying the contents of20-8

tar

creating20-6

displaying the contents of20-6

extracting20-7

image file format20-19

file system

displaying available file systems20-2

displaying file information20-3

local file system names20-2

network file system names20-5

setting the default20-3

filtering

configuring filters16-1

Ethertype filters16-11

IP filters16-8

MAC address filters16-3

show and more command output4-8

Flash device, number of20-2

fragmentation threshold6-17

frequenciesA-2, A-3, A-4

FTP

accessing MIB filesC-2

configuration files

downloading20-13

overview20-12

preparing the server20-13

uploading20-14

image files

deleting old image20-26

downloading20-24

preparing the server20-23

uploading20-26

G

get-bulk-request operation18-3

get-next-request operation18-3, 18-4

get-request operation18-3, 18-4

get-response operation18-3

global configuration mode4-2

GRE encapsulation15-6

GRE tunnel11-12

group key updates10-14

H

help, for the command line4-3

history

changing the buffer size4-4

described4-4

disabling4-5

recalling commands4-5

history table, level and number of syslog messages21-8

Home button3-4

I

IGMP snooping helper14-10

indicators22-2

inter-client communication, blocking6-15

interface configuration mode4-2

IP address, finding and setting2-20

IP filters16-8

IPSU2-19

ISO designators for protocolsB-1

K

key features1-2

L

Layer 3 mobility11-12

LEAP authentication

setting on client and access point10-17

LED indicators

Ethernet22-3

radio traffic22-3

status22-3

limiting associations by MAC address16-5

limiting client associations by MAC address16-5

limiting client power level6-7

local authenticator, access point as8-1

login authentication

with RADIUS5-8, 12-7

with TACACS+5-13, 12-24

login banners5-40

log messages

See system message logging

M

MAC2-21, 2-22

MAC address ACLs, blocking association with16-5

MAC address filters16-3

MAC authentication caching10-15

management options

CLI4-1

Message Integrity Check9-1

messages

to users through banners5-40

MIBs

accessing files with FTPC-2

location of filesC-2

overview18-2

SNMP interaction with18-4

MIC9-1

Microsoft IAS servers10-2

migration mode, WPA10-13

mobility, Layer 311-12

Mode button22-8

monitoring

CDP17-4

N

Network-EAP10-3

Network Time Protocol

See NTP

no commands4-3

NTP

associations

authenticating5-25

defined5-23

enabling broadcast messages5-28

peer5-27

server5-27

default configuration5-25

displaying the configuration5-32

overview5-23

restricting access

creating an access group5-30

disabling NTP services per interface5-31

source IP address, configuring5-31

stratum5-23

synchronizing devices5-27

time

services5-23

synchronizing5-23

O

OFDM modulation6-7

OK button3-4

optional ARP caching5-22

P

password reset22-5

passwords

default configuration5-2

encrypting5-4

overview5-2

setting

enable5-3

enable secret5-4

with usernames5-5

PEAP authentication

setting on client and access point10-19

ports, protected6-15

power level

on client devices6-7

power level, maximumA-5

preferential treatment of traffic

See QoS

pre-shared key10-14

preventing unauthorized access5-2

privileged EXEC mode4-2

privilege levels

exiting5-7

logging into5-7

overview5-2, 5-6

setting a command with5-6

Public Secure Packet Forwarding6-15

Q

QoS

configuration guidelines14-4

overview14-2

quality of service

See QoS

R

radio

indicator22-3

radio management11-1

RADIUS

attributes

CSID format, selecting12-13

sent by the access point12-18

vendor-proprietary12-15

vendor-specific12-14

WISPr12-16

configuring

access point as local server8-2

accounting12-12

authentication5-8, 12-7

authorization5-11, 12-11

communication, global12-5, 12-13

communication, per-server12-4, 12-5

multiple UDP ports12-5

default configuration5-8, 12-4

defining AAA server groups5-9, 12-9

displaying the configuration5-12, 12-17

identifying the server12-4

limiting the services to the user5-11, 12-11

method list, defined12-4

operation of12-3

overview12-2

suggested network environments12-2

tracking services accessed by user12-12

rate limit, logging21-9

RCP

configuration files

downloading20-16

overview20-15

preparing the server20-16

uploading20-17

image files

deleting old image20-31

downloading20-29

preparing the server20-27

uploading20-31

reauthentication requests10-2

regulatory

domainsA-2, A-3, A-4

reloading access point image22-8

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

repeater

as a LEAP client19-6

as a WPA client19-7

chain of access points19-2

restricting access

NTP services5-29

overview5-2

passwords and privilege levels5-2

RADIUS5-7, 12-1

TACACS+5-12

reverse tunnels15-6

RFC

1157, SNMPv118-2

1305, NTP5-23

1901, SNMPv2C18-2

1902 to 1907, SNMPv218-2

roaming1-4

fast secure roaming using CCKM11-1

role in radio network6-3

rotation, broadcast key9-1

RTS threshold6-16

S

scanner mode1-7

secure remote connections5-20

Secure Shell

See SSH

security features

synchronizing10-17

security settings, Express Security page2-11

self-healing wireless LAN11-4

sequence numbers in log messages21-6

service-type attribute10-2

set-request operation18-4

severity levels, defining in system messages21-7

shared key10-6

show cdp traffic command17-5

Simple Network Management Protocol

See SNMP

slot time, short6-18

SNMP

accessing MIB variables with18-4

agent

described18-3

disabling18-5

community strings

configuring18-5

overview18-3

configuration examples18-9

default configuration18-5

limiting system log messages to NMS21-8

manager functions18-3

MIBs

location ofC-2

overview18-2, 18-4

snmp-server view18-9

status, displaying18-10

system contact and location18-9

trap manager, configuring18-8

traps

described18-3

enabling18-7

overview18-2, 18-4

types of18-7

versions supported18-2

snooping helper, IGMP14-10

software images

location in Flash20-19

tar file format, described20-19

spaces in an SSID7-4

speed, Ethernet port5-15

SSH4-9

configuring5-21

crypto software image5-20

described5-20

displaying settings5-21

SSH Communications Security, Ltd.4-9

SSID

multiple SSIDs7-1

troubleshooting22-5

using spaces in7-4

static WEP

with open authentication, setting on client and access point10-17

with shared key authentication, setting on client and access point10-17

statistics

CDP17-4

SNMP input and output18-10

status indicators22-3

stratum, NTP5-23

summer time5-35

switchport protected command6-16

syslog

See system message logging

system clock

configuring

daylight saving time5-35

manually5-33

summer time5-35

time zones5-34

displaying the time and date5-33

overview5-23

See also NTP

system message logging

default configuration21-3

defining error message severity levels21-7

disabling21-4

displaying the configuration21-12

enabling21-4

facility keywords, described21-11

level keywords, described21-8

limiting messages21-8

message format21-2

overview21-2

rate limit21-9

sequence numbers, enabling and disabling21-6

setting the display destination device21-5

timestamps, enabling and disabling21-6

UNIX syslog servers

configuring the daemon21-10

configuring the logging facility21-10

facilities supported21-11

system name

default configuration5-37

manual configuration5-37

See also DNS

system prompt

default setting5-37

T

TAC22-1

TACACS+

accounting, defined12-21

authentication, defined12-21

authorization, defined12-21

configuring

accounting12-26

authentication key12-23

authorization5-14, 12-25

login authentication5-13, 12-24

default configuration5-13, 12-23

displaying the configuration5-15, 12-27

identifying the server12-23

limiting the services to the user5-14, 12-25

operation of12-22

overview12-21

tracking services accessed by user12-26

tar files

creating20-6

displaying the contents of20-6

extracting20-7

image file format20-19

Telnet2-23

Temporal Key Integrity Protocol9-1

Terminal Access Controller Access Control System Plus

See TACACS+

terminal emulator2-4, 2-6

TFTP

configuration files

downloading20-11

preparing the server20-10

uploading20-11

image files

deleting20-22

downloading20-21

preparing the server20-20

uploading20-22

TFTP server22-8

time

See NTP and system clock

timestamps in log messages21-6

time zones5-34

TKIP9-1

traps

configuring managers18-7

defined18-3

enabling18-7

notification types18-7

overview18-2, 18-4

troubleshooting22-1

with CiscoWorks18-4

with system message logging21-2

U

UNIX syslog servers

daemon configuration21-10

facilities supported21-11

message logging configuration21-10

upgrading software images

See downloading

uploading

configuration files

preparing20-10, 20-13, 20-16

reasons for20-8

using FTP20-14

using RCP20-17

using TFTP20-11

image files

preparing20-20, 20-23, 20-27

reasons for20-18

using FTP20-26

using RCP20-31

using TFTP20-22

user EXEC mode4-2

username-based authentication5-5

W

WDS11-1, 11-6

Web-based interface

common buttons3-4

compatible browsers3-1

web site

Cisco Software Center2-20, 22-12

WEP

key example9-5

with EAP10-3

WEP key22-5

Wi-Fi Protected Access

See WPA

Wireless LAN Services Module11-2

WISPr RADIUS attributes12-16

world-mode6-10

802.11d standard6-10

Cisco legacy6-10

WPA10-7

WPA migration mode10-13