Cisco Wireless LAN Controller Configuration Guide, Release 4.1
Index
Downloads: This chapterpdf (PDF - 858.0KB) The complete bookPDF (PDF - 11.99MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

1000 series access points

antennas7-6to 7-7

models 7-6

overview 7-4

1030 remote edge access points

illustrated 7-5

overview7-5to 7-6

1500 series access points

See AP1510

7920 support mode

configuring 6-25

described 6-24

802.11a (or 802.11b) > Client Roaming page 4-23

802.11a (or 802.11b) > Video Parameters page 4-30

802.11a (or 802.11b) > Voice Parameters page 4-28

802.11a (or 802.11b/g) Cisco APs > Configure page 5-52, 6-32, 10-29

802.11a (or 802.11b/g) Global Parameters > Auto RF page 10-9

802.11a (or 802.11b/g) Global Parameters page 10-33

802.11a (or 802.11b/g) Network Status parameter 4-29, 4-30, 4-31

802.11a (or 802.11b/g) Radios page 4-35, 10-27

802.11a > Pico Cell page 10-38

802.11a > RRM > DCA page 10-23

802.11 bands, enabling and disabling 4-7

802.1Q VLAN trunk port 3-5

802.1X

configuring 6-17

described 6-15

802.1X+CCKM

configuring 6-17

described 6-16

802.1X authentication, configuring 6-14

802.1X dynamic key settings 6-14

802.3 bridging

configuring

using the CLI 4-18

using the GUI4-17to 4-18

802.3 Bridging parameter 4-18

802.3 frames, described 4-17

802.3x flow control, enabling 4-14

A

AAA override

configuring

using the CLI 5-62

using the GUI 5-62

described 5-60

Access Control List Name parameter 5-38

access control lists (ACLs)

and identity networking 5-58

applying to an interface

using the CLI 5-46

using the GUI5-41to 5-42

applying to a WLAN

using the CLI 5-46

using the GUI5-43to 5-44

applying to the controller CPU

using the CLI 5-46

using the GUI5-42to 5-43

configuring

using the CLI5-45to 5-46

using the GUI5-38to 5-41

described 5-37

rules 5-37, 5-39, 5-45

Access Control Lists > Edit page 5-40

Access Control Lists > New page 5-38

Access Control Lists > Rules > New page 5-39

Access Control Lists page 5-38

Access Mode parameter 4-10, 4-12

access point assisted roaming, described 4-22

access point groups

assigning access points to

using the CLI 6-37

using the GUI 6-37

creating

using the CLI 6-36

using the GUI6-35to 6-36

described 6-33

illustrated 6-34

access point manager interface, configuring using the configuration wizard 4-5

access points

1000 series

B domain 7-4

models 7-6

overview 7-4

adding MAC address to controller filter list

using the CLI 7-13

using the GUI7-12to 7-13

antennas7-6to 7-7

AP1030 overview7-5to 7-6

AP1510 overview 7-9

authorizing

using MICs 7-47

using SSCs 7-47

configuring 4400 series controller to support more than 483-36to 3-41

connectors 7-8

guidelines for operating in Japan B-6

LEDs

configuring 7-76

described 7-7

interpreting -2

migrating from -J regulatory domain to -U regulatory domain 7-64

mounting options 7-9

number supported per controller 3-4

physical security 7-9

power requirements 7-8

power supply 7-9

priming 7-2

regulatory informationB-2to B-8

rules for operating in TaiwanB-7to B-8

See also LWAPP-enabled access points

supported for use with hybrid REAP 12-2

using monitor mode 7-9

VCI strings 7-47

Accounting Server parameters 6-41

accounting servers, disabling per WLAN 6-41

ACL Name parameter 5-42, 5-43

ACS server configuration page 6-39

Action parameter 5-40

Adaptive Wireless Path Protocol (AWPP), described 7-10

Add AAA Client page (on CiscoSecure ACS) 5-6

Add Interface-Mapping button 6-36

Add New Rule button 5-38

Add Web Server button 9-17

administrator access 4-7

administrator usernames and passwords, configuring 4-7

Admin Status parameter 3-22

Admission Control (ACM) parameter 4-29, 4-30

AES

configuring 6-17, 6-18

parameter 6-17

AES-CCMP, described 6-15

AES key wrap

configuring using the CLI 5-77

configuring using the GUI5-75to 5-76

Aironet IE parameter 6-19, 6-29

Aironet IEs

configuring using the CLI 6-32

configuring using the GUI 6-29

Alarm Trigger Threshold parameter 10-13

All APs > Access Point Name > Link Details > Neighbor Name page 7-36

All APs > Access Point Name > Mesh Neighbor Stats page 7-36

All APs > Access Point Name > Neighbor Info page 7-34

All APs > Access Point Name > Statistics page 7-29

All APs > Access Point Name > VLAN Mappings page 12-12

All APs > Details page 4-45, 6-37, 7-19, 7-60, 7-69, 7-74, 10-12, 12-11

All APs page 7-27, 7-34, 10-11, 12-11

Allow AAA Override parameter 5-62, 12-7

anchor controller, in inter-subnet roaming 11-4

Anonymous Provision parameter 5-28

antenna connectors, external7-6to 7-7

antennas, for access points7-6to 7-7

antenna sectorization 7-7

AP > Clients > Traffic Stream Metrics page 4-36

AP > Clients page 4-36

AP1010, described 7-6

AP1020, described 7-6

AP1030, described 7-6

AP1510

configuring and deploying7-12to 7-21

overview 7-9

AP Authentication Policy page 5-49, 10-13

AP Group Description paremeter 6-35

AP Group Name parameter 6-35, 6-37

AP Groups VLAN Feature Enable parameter 6-35

AP Groups VLAN page 6-35, 6-36

AP-manager interface

configuring

using the CLI3-14to 3-15

using the GUI3-10to 3-12

creating multiple interfaces3-39to 3-40

described 3-7

illustration

of four AP-manager interfaces 3-39

of three AP-manager interfaces 3-38

of two AP-manager interfaces 3-37

using multiple3-37to 3-40

AP Mode parameter 7-19, 10-12, 12-11

AP Policies page 7-45

AP Role parameter 7-19

Assignment Method parameter 10-29

asymmetric tunneling, illustrated 11-17

audience of document 1-20

authentication information element (IE) 10-11

Authentication Priority parameter 5-11

Authentication Protocol parameter 4-12

Auth Key Mgmt parameter 6-17

Authority ID Information parameter 5-28

Authority ID parameter 5-27

auto-anchor mobility

configuring

using the CLI11-15to 11-16

using the GUI11-13to 11-15

guidelines 11-12

overview11-11to 11-12

autonomous access points converted to lightweight mode

See LWAPP-enabled access points

auto RF, configuring using the configuration wizard 4-6

Average Data Rate parameter 6-27

Average Real-Time Rate parameter 6-27

Avoid Cisco AP Load parameter 10-18

Avoid Foreign AP Interference parameter 10-17

Avoid Non-802.11a (802.11b) Noise parameter 10-18

B

background scanning in mesh networks

described7-38to 7-40

enabling using the CLI 7-40

scenarios 7-38

Backhaul Client Access parameter 7-16

Backhaul Interface parameter 7-19

bandwidth-based CAC

described 4-26

enabling

using the CLI 4-37

using the GUI 4-29

for mesh networks 7-21

Base MAC Address parameter 3-27

B domain 7-4

bootup script 4-4

Bridge Data Rate parameter 7-20

bridge group name, described 7-11

Bridge Group Name parameter 7-20

bridge protocol data units (BPDUs) 3-24

Bridge Type parameter 7-19

bridging parameters

configuring using the CLI7-20to 7-21

configuring using the GUI7-18to 7-20

broadcasting, configuring using the CLI 4-20

Burst Data Rate parameter 6-27

Burst Real-Time Rate parameter 6-27

C

CAC

configuring for 7920 phones 6-25

described 4-26

enabling

using the CLI 4-38

using the GUI 4-30

in mesh networks 7-21

viewing in mesh networks7-23to 7-24

viewing using the CLI 4-39

Canadian compliance statement B-3

Catalyst 3750G Integrated Wireless LAN Controller Switch

described 1-11

logical connectivity diagram and associated software commands E-6

ports 3-3, 3-4

caution, defined 1-21

CCA Sensitivity Threshold parameter 10-40

CCKM

configuring 6-17

described 6-16

CCX

configuring Aironet IEs

using the CLI 6-32

using the GUI 6-29

described 6-28

viewing a client's version

using the CLI 6-32

using the GUI6-30to 6-31

CCX Layer 2 client roaming

configuring

using the CLI 4-24

using the GUI4-23to 4-24

debugging using the CLI 4-25

described 4-22

obtaining information using the CLI 4-25

CCX link test 7-70

CCX radio management

configuring

using the CLI 10-35

using the GUI10-33to 10-34

debugging using the CLI 10-37

features 10-32

hybrid-REAP considerations 10-32

obtaining information using the CLI10-35to 10-36

CCX Version parameter 6-31

CDP > AP Neighbors > Detail page 4-48

CDP > AP Neighbors page 4-48

CDP > Global Configuration page 4-44

CDP > Interface Neighbors > Detail page 4-46

CDP > Interface Neighbors page 4-46

CDP > Traffic Metrics page 4-49

CDP Advertisement Version parameter 4-44

CDP AP Neighbors page 4-47

CDP Protocol Status parameter 4-44

CDP State parameter 4-45

Certificate Authority (CA) certificates

downloading

using the CLI8-9to 8-10

using the GUI 8-9

overview 8-8

using with local EAP 5-24, 5-29

Certificate Issuer parameter 5-27

Certificate Password parameter 8-7

Channel Assignment Leader parameter 10-18

Channel Assignment Method parameter 10-17

Channel List parameter 10-21

channels

specifying for RRM scanning10-22to 10-23

statically assigning

using the CLI 10-30

using the GUI10-27to 10-30

Check Against CA Certificates parameter 5-27

Check Certificate Date Validity parameter 5-27

chokepoints 4-52

CIDS Sensor Add page 5-63

CIDS Sensors List page 5-63

CIDS Shun List page 5-66

ciphers

configuring 6-17, 6-18

described 6-16

Cisco 2000 Series Wireless LAN Controllers

described 1-9

FCC statement B-8

features not supported 1-9

network connections1-17to 1-18

ports 3-2, 3-3, 3-4

Cisco 2100 Series Wireless LAN Controllers

described 1-9

FCC statement B-8

features not supported 1-9

network connections1-17to 1-18

ports 3-2, 3-3, 3-4

Cisco 28/37/38xx Integrated Services Router

described 1-10

logical connectivity diagram and associated software commands E-5

ports 3-3, 3-4, 4-57

using4-56to 4-57

versions 1-10

Cisco 4400 Series Wireless LAN Controllers

configuring to support more than 48 access points3-36to 3-41

described 1-10

FCC statement B-9

models 3-4

network connections1-18to 1-19

ports 3-2, 3-3, 3-4

Cisco Aironet 1510 Series Lightweight Outdoor Mesh Access Point

See AP1510

Cisco AV-pairs 6-38, 6-39

Cisco Client Extensions (CCX)

See CCX

Cisco Discovery Protocol (CDP)

configuring

using the CLI4-49to 4-50

using the GUI4-43to 4-45

debugging using the CLI 4-51

described 4-41

enabling on an access point, using the GUI4-44to 4-45

sample network 4-43

supported devices 4-42

viewing neighbors

using the CLI4-50to 4-51

using the GUI4-45to 4-49

viewing traffic information

using the CLI 4-51

using the GUI 4-49

Cisco Discovery Protocol parameter 4-45

Cisco high-power switches 7-74

Cisco Logo parameter 9-10

Cisco Unified Wireless Network (UWN) Solution

described1-2to 1-5

illustrated 1-3

Cisco Wireless Control System (WCS), described 1-2

Cisco WiSM

configuring the Supervisor 7204-55to 4-56

described 1-10

guidelines 4-55

logical connectivity diagram and associated software commands E-3

ports 3-3, 3-4

CKIP

configuring

using the CLI 6-20

using the GUI6-19to 6-20

described 6-18

clearing the controller configuration 8-12

CLI

basic commands 2-8

enabling wireless connections 2-8

logging into2-6to 2-7

logging out 2-7

navigating 2-8

using2-6to 2-8

Client Certificate Required parameter 5-27

client location 1-8

client MFP, described 5-47

Client Min Exception Level threshold parameter 10-20

Client Protection parameter 5-51

client roaming, configuring4-20to 4-25

clients

viewing CCX version using the CLI 6-32

viewing CCX version using the GUI6-30to 6-31

Clients > AP > Traffic Stream Metrics page 4-34

Clients > AP page 4-34

Clients > Detail page 4-33, 6-31, 7-55, 7-56

Clients page 4-32, 7-55, 7-71

Clients threshold parameter 10-20

Client Type parameter 7-56

Commands > Reset to Factory Defaults page 4-3

Community Name parameter 4-10

conditional web redirect

configuring

using the CLI 6-40

using the GUI6-39to 6-40

configuring the RADIUS server6-38to 6-39

described 6-38

Conditional Web Redirect parameter 6-40

configuration wizard

described 4-2

running4-4to 4-6

Configure option 10-28

controller network module

baud rate 3-3

versions 3-4

controllers

configuration

clearing 8-12

erasing 8-13

saving 8-12

connections1-11to 1-12

discovery process 7-2

multiple-controller deployment1-4to 1-5

overview1-7to 1-8

platforms1-8to 1-11

primary, secondary, and tertiary 1-8

resetting factory default settings

using the CLI 4-3

using the GUI 4-3

single-controller deployment1-3to 1-4

types of memory 1-16

upgrading software

guidelines8-2to 8-3

using the CLI8-5to 8-6

using the GUI 8-4

Controller Spanning Tree Configuration page 3-27

Controller Time Source Valid parameter 5-51

Control Path parameter 11-14

conventions of document1-21to 1-23

country channels 10-21

Country Code parameter 7-61

country codes

commonly used 7-58

configuring

using the CLI7-61to 7-64

using the configuration wizard 4-6

using the GUI7-59to 7-61

described 7-58

Japanese 7-65

See also multiple country codes

viewing using the CLI 7-63

Country page 7-59

Coverage Exception Level threshold parameter 10-21

coverage hole, detection 10-4

Coverage Measurement parameter 10-22

Coverage threshold parameter 10-20

CPU Access Control Lists page 5-43

CPU ACL Mode parameter 5-43

crash information, sending from LWAPP-enabled access points to controller 7-48

Custom Signatures page 5-69

D

Data Path parameter 11-14

date

configuring manually 4-7

configuring through NTP server 4-6

DCA channels 10-21

DCA Channels parameter 10-23

debug commands, sending from controller to LWAPP-enabled access points 7-48

Default Mobility Group parameter 11-8

Description parameter 5-18, 7-13

Designated Root parameter 3-27

Destination parameter 5-39

Destination Port parameter 5-40

device certificates

downloading

using the CLI8-7to 8-8

using the GUI8-6to 8-7

overview 8-6

using with local EAP 5-24, 5-29

DHCP

configuring using the CLI 6-8

configuring using the GUI 6-7

DHCP option 43

in controller discovery process 7-2

using 7-47

DHCP option 82

configuring5-35to 5-36

described 5-35

illustrated 5-35

DHCP server discovery 7-2

DHCP servers

configuring using the configuration wizard 4-5

external6-6to 6-7

internal 6-6

directed roam request 4-22

Direction parameter 5-40

disabled clients, configuring a timeout 6-13

distribution system ports, described3-4to 3-5

document

audience 1-20

conventions1-21to 1-23

organization1-20to 1-21

purpose 1-20

domain name server (DNS) discovery 7-2

Download button 5-68, 8-7, 8-9, 9-19

Download File to Controller page 5-68, 8-7, 8-9, 9-18

DSCP parameter 5-40

dynamic channel allocation, specifying the channel set 10-24

dynamic channel assignment 10-3

dynamic frequency selection, described7-67to 7-68

dynamic interface

configuring

using the CLI3-18to 3-19

using the GUI3-16to 3-18

described 3-8

dynamic RRM

See radio resource management (RRM)

dynamic transmit power control

configuring 4-18

described 10-4

dynamic WEP, configuring 6-14

E

EAP-FAST Method Parameters page 5-27

EAP-FAST parameter 5-26

EAP Profile Name parameter 5-28

EAP-TLS parameter 5-26

Edit QoS Profile page 6-26

Enable Check for All Standard and Custom Signatures parameter 5-70

Enable Controller Management to be accessible from Wireless Clients parameter 2-9, 5-34

Enable CPU ACL parameter 5-43

Enable Dynamic AP Management parameter 3-40

Enable Server Status parameter 5-21

Encryption Key parameter 6-20

end user license agreementC-2to C-4

enhanced neighbor list, described 4-22

enhanced neighbor list request (E2E), described 4-22

EoIP port 11-14, 11-20

epings 11-14, 11-20

erasing the controller configuration 8-13

Ethernet Bridging parameter 7-20

Ethernet connection 2-7

European declaration of conformityB-4to B-5

event reporting 5-48

Expedited Bandwidth parameter 4-29

expedited bandwidth requests

described 4-27

enabling

using the CLI 4-38

using the GUI 4-29

Extensible Authentication Protocol (EAP), configuring 6-14

F

factory default settings

resetting using the CLI 4-3

resetting using the GUI 4-3

failover protection1-16to 1-17

Fast Ethernet port 3-4

FCC declaration of conformityB-2to B-3

FCC statement

2000 series controllers B-8

2100 series controllers B-8

4400 series controllers B-9

File Name parameter 5-68, 8-7, 8-9, 8-11, 9-19

File Path parameter 5-68, 8-7, 8-9, 8-11, 9-19

file transfers 1-14

File Type parameter 5-68, 8-7, 8-9, 8-11, 9-19

Fingerprint parameter 5-64

flashing LEDs, configuring 7-76

foreign controller, in inter-subnet roaming 11-4

Forward Delay parameter 3-28, 3-29

G

General page 3-33, 4-17, 5-17, 5-77, 10-7

Generate Password parameter 9-5

gigabit Ethernet port 3-4

Group Mode parameter 10-10, 10-16

Group Setup page (on CiscoSecure ACS) 5-8

guest N+1 redundancy 11-12

guest user accounts

creating9-2to 9-7

creating as a lobby ambassador9-4to 9-6

viewing

using the CLI 9-7

using the GUI 9-6

Guest User parameter 5-18

guest WLAN, creating 9-5

guest WLAN mobility

See auto-anchor mobility

GUI

disabling 2-5

enabling wireless connections 2-8

guidelines 2-2

opening 2-2

using 2-2

H

Headline parameter 9-10

Hello Time parameter 3-28, 3-29

help, obtaining 2-5

high-density network

benefits 10-37

illustrated 10-37

overview 10-37

See also pico cell mode

Holdtime parameter 3-28, 4-44

H-REAP Local Switching parameter 12-8

hybrid REAP

access points supported 12-2

authentication process12-2to 12-4

bandwidth restriction 12-2

configuring12-5to 12-14

guidelines 12-4

illustrated 12-2

number of access points supported 12-2

overview 12-2

Hysteresis parameter 4-23

I

identity networking

configuring5-56to 5-60

described1-12to 1-14

overview 5-57

RADIUS attributes5-57to 5-60

IDS

configuring5-62to 5-74

described 5-62

IDS sensors

configuring

using the CLI5-65to 5-66

using the GUI5-63to 5-65

described 5-63

IDS signature events

viewing using the CLI5-73to 5-74

viewing using the GUI5-71to 5-72

IDS signatures

configuring

using the CLI5-72to 5-73

using the GUI5-67to 5-72

described 5-67

frequency 5-70

MAC frequency 5-71

measurement interval 5-70

pattern 5-71

quiet time 5-71

tracking method 5-70

uploading or downloading using the GUI5-67to 5-68

Index parameter 5-64

infrastructure MFP

components 5-48

described 5-47

Infrastructure MFP Protection parameter 5-50

Infrastructure Protection parameter 5-51

Infrastructure Validation parameter 5-51

Injector Switch MAC Address parameter 7-75

inline power, described 7-73

intelligent power management (IPM) 7-74

inter-controller roaming

described 4-21

illustrated 11-3

Interface Name parameter 6-36, 7-13

interfaces

and identity networking5-58to 5-59

configuring

using the CLI3-12to 3-16

using the GUI3-10to 3-12

overview 3-5

Interfaces > Edit page 3-17, 3-39, 5-42

Interfaces > New page 3-17, 3-39

Interfaces page 3-11

interference

defined 10-3

routing around in mesh networks 7-40

Interference threshold parameter 10-20

inter-subnet roaming

described 4-21

illustrated11-3to 11-4

Interval parameter 10-34

intra-controller roaming

described 4-20

illustrated 11-2

Inventory page 7-69

Invoke Channel Update Now button 10-17

Invoke Power Update Now button 10-19

IP Address parameter 4-10, 5-68, 8-7, 8-9, 8-11, 9-19

IP Mask parameter 4-10

J

Japanese country codes 7-65

Japanese regulations for migrating access points from -J to -U regulatory domain 7-64

K

Keep Alive Count parameter 11-13

Keep Alive Interval parameter 11-13

Key Encryption Key (KEK) parameter 5-76

Key Format parameter 6-20

Key Index parameter 6-20

key permutation

configuring 6-20

described 6-18

Key Permutation parameter 6-20

Key Size parameter 6-20

Key Wrap Format parameter 5-76

Key Wrap parameter 5-75

L

LAG

See link aggregation (LAG)

LAG Mode on Next Reboot parameter 3-34

Last Auto Channel Assignment parameter 10-18

Last Power Level Assignment parameter 10-20

Layer 1 security 5-2

Layer 2

LWAPP discovery 7-2

operation 1-6

security

configuring6-13to 6-21

described 5-2

Layer 2 Security parameter 6-17, 6-19, 6-39

Layer 3

LWAPP discovery 7-2

operation 1-6

security

configuring6-21to 6-23

described 5-3

Layer 3 Security parameter 6-22, 6-23, 6-40

LDAP

choosing server priority order 5-21

configuring

using the CLI5-22to 5-23

using the GUI5-19to 5-22

local EAP methods supported 5-19

LDAP servers, assigning to WLANs 5-22

LDAP Servers > New page 5-20

LDAP Servers page 5-20

LDAP Servers parameter 5-28

LEAP parameter 5-26

LEDs

configuring 7-76

for access points 7-7

license agreementC-2to C-4

Lifetime parameter 5-18, 9-5

Lightweight Access Point Protocol (LWAPP), described 7-2

lightweight mode, reverting to autonomous mode 7-46

limited warrantyC-4to C-7

link aggregation (LAG)

configuring neighboring devices 3-36

described3-30to 3-31

enabling

using the CLI 3-34

using the GUI3-33to 3-34

guidelines3-32to 3-33

illustrated 3-30, 3-32

verifying settings using the CLI 3-35

Link Status parameter 3-21

Link Test

button 7-71

option 7-34, 7-71

page 7-72

window 7-35

link test

described 7-70

performing

using the CLI 7-72

using the GUI7-34to7-35, 7-71to 7-72

types of packets 7-70

Link Trap parameter 3-22

load balancing 10-4

Load-based AC parameter 4-29

load-based CAC

described4-26to 4-27

enabling

using the CLI 4-37

using the GUI 4-29

Load Measurement parameter 10-21

lobby ambassador account

creating using the CLI 9-3

creating using the GUI9-2to 9-3

Lobby Ambassador Guest Management > Guest Users List > New page 9-4

Lobby Ambassador Guest Management > Guest Users List page 9-4, 9-6

Local Auth Active Timeout parameter 5-25

Local Certificate Required parameter 5-26

local EAP

choosing server priority order 5-24

configuring

using the CLI5-29to 5-32

using the GUI5-24to 5-28

debugging 5-32

described 5-24

viewing information using the CLI 5-31

with mesh 7-16

Local EAP Authentication parameter 5-28

Local EAP Profiles > Edit page 5-26

Local EAP Profiles page 5-25

Local Management Users > New page 9-3

Local Management Users page 9-2

Local Net Users > New page 5-17, 12-9

Local Net Users page 5-17, 9-6

local network users

configuring using the CLI 5-19

configuring using the GUI5-16to 5-18

local user database, capacity 9-2

location-based services 10-33

location calibration 10-33

location information, viewing 4-55

LOCP, described 4-52

logical connectivity diagram

Catalyst 3750G Integrated Wireless LAN Controller Switch E-6

Cisco 28/37/38xx Integrated Services Router E-5

Cisco WiSM E-3

long preambles

described 5-32

enabling on SpectraLink NetLink phones

using the CLI5-33to 5-34

using the GUI 5-32

LWAPP-enabled access points

configuring a static IP address 7-50

disabling the reset button 7-50

enabling memory core dumps 7-49

guidelines 7-45

MAC addresses displayed on controller GUI 7-50

overview 7-45

receiving debug commands from controller 7-48

reverting to autonomous mode7-46to 7-47

sending crash information to controller 7-48

sending radio core dumps to controller 7-48

sending SSCs to controller 7-47

LWAPP transport mode, configuring using the configuration wizard 4-5

M

MAC address of access point

adding to controller filter list

using the CLI 7-13

using the GUI7-12to 7-13, 7-21

displayed on controller GUI 7-50

MAC Address parameter 7-13

MAC filtering, configuring on WLANs6-12to 6-13

MAC Filtering page 7-12

MAC filter list, described 7-11

MAC Filters > New page 7-13

management frame protection (MFP)

configuring

using the CLI5-52to 5-53

using the GUI5-49to 5-50

debugging 5-56

described5-47to 5-48

guidelines 5-48

types 5-47

viewing settings

using the CLI5-53to 5-55

using the GUI5-50to 5-52

Management Frame Protection parameter 5-51

Management Frame Protection Settings page 5-51

management frame validation 5-48

management interface

configuring

using the CLI 3-12

using the GUI3-10to 3-12

described 3-6

management over wireless

described 5-34

enabling

using the CLI 5-35

using the GUI 5-34

Max Age parameter 3-27

Maximum Age parameter 3-28

maximum local database entries

configuring using the CLI 5-78

configuring using the GUI 5-77

Maximum Local Database Entries parameter 5-17, 5-77

Maximum Retries parameter 5-68, 8-7, 8-9, 9-19

Maximum RF Usage Per AP parameter 6-27

Max RF Bandwidth parameter 4-29, 4-31

memory

core dumps, enabling for LWAPP-enabled access points 7-49

types 1-16

mesh

described7-10to 7-12

high-speed roaming 4-20, 4-23, 4-24

illustrated 7-11

network example 7-22, 7-26

parameters

configuring using the CLI 7-16

configuring using the GUI7-15to 7-16

statistics

viewing for an access point using the CLI7-32to 7-33

viewing for an access point using the GUI7-27to 7-32

Mesh > LinkTest Results page 7-35

mesh access points (MAPs)

described 7-10

selecting 7-19

mesh node security statistics7-31to 7-32

mesh node statistics 7-30

Mesh page 7-15

Message Authentication Code Key (MACK) parameter 5-76

Message Log Level parameter 4-15

message logs

viewing

using the CLI 4-16

using the GUI4-15to 4-16

Message Logs page 4-16

Message parameter 9-10

Metrics Collection parameter 4-29

MFP Client Protection parameter 5-50

MFP Frame Validation parameter 5-50

MIC, described 6-15, 6-18

migrating access points from -J to -U regulatory domain 7-64

Minimum RSSI parameter 4-23

mirror mode

See port mirroring

MMH MIC

configuring 6-20

described 6-18

MMH Mode parameter 6-20

mobility, overview11-2to 11-5

Mobility Anchor Config page 11-13, 11-18

Mobility Anchor Create button 11-14

mobility anchors

See auto-anchor mobility

viewing 11-14

Mobility Anchors option 11-14

Mobility Anchors page 11-14, 11-17, 11-18

mobility failover 11-12

Mobility Group Member > New page 11-9

mobility group members, sending ping requests 11-12

Mobility Group Members > Edit All page 11-10

mobility group name, entering 11-9

mobility groups

configuring

using the CLI 11-11

using the configuration wizard 4-5

using the GUI11-8to 11-10

detecting failed members 11-12

determining when to include controllers 11-7

difference from RF groups 10-5

examples 11-6

illustrated 11-5

overview11-5to 11-7

prerequisites11-7to 11-8

mobility ping tests, running 11-20

mode button

See reset button

Mode parameter 4-23, 10-34

monitor mode, described 7-9

mpings 11-14, 11-20

Multicast Appliance Mode parameter 3-22

multicast mode

configuring 4-20

described 4-18

guidelines 4-19, 7-52

multiple country codes

configuration guidelines 7-58

configuring using the CLI 7-62

configuring using the GUI7-60to 7-61

multiple country support, configuring using the configuration wizard 4-6

N

Native VLAN ID parameter 12-12

neighbor information

viewing for an access point using the CLI 7-37

viewing for an access point using the GUI7-33to 7-36

Neighbor Information option 7-34

neighboring access points and channels, viewing using the CLI 7-40

neighbor statistics

viewing for an access point using the CLI 7-37

viewing for an access point using the GUI7-33to 7-36

network, described 7-10

Noise Measurement parameter 10-21

Noise threshold parameter 10-20

note, defined 1-21

NTP server

configuring to obtain time and date 4-6

setting in the configuration wizard 4-6

O

online help, using 2-5

open source terms C-7

operating system

security1-5to 1-6

software 1-5

organization of document1-20to 1-21

Override Interface ACL parameter 5-44

over-the-air provisioning (OTAP) 7-2

P

Password parameter 5-18, 8-11

password recovery mechanism 4-7

Physical Mode parameter 3-22

Physical Status parameter 3-21

pico cell mode

configuring

using the CLI 10-41

using the GUI10-38to 10-40

debugging using the CLI 10-41

guidelines 10-38

overview10-37to 10-38

versions 10-39

Pico Cell Mode parameter 10-39

ping link test, described 7-70

Port > Configure page 3-21

port mirroring, configuring3-23to 3-24

Port Number parameter 3-21, 5-10, 5-21

Port parameter 5-64

ports

comparison table 3-3

configuring3-19to 3-30

connecting additional ports to support more than 48 access points 3-41

on 2000 series controllers 3-2, 3-3, 3-4

on 2100 series controllers 3-2, 3-3, 3-4

on 4400 series controllers 3-2, 3-3, 3-4

on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-4

on Cisco 28/37/38xx Series Integrated Services Router 3-3, 3-4, 4-52, 4-57

on Cisco WiSM 3-3, 3-4

overview 3-2

Ports page 3-19

Power Assignment Leader parameter 10-20

Power Injector Selection parameter 7-75

Power Injector State parameter 7-75

Power Level Assignment Method parameter 10-19

Power Neighbor Count parameter 10-20

power over Ethernet (PoE)

configuring

using the CLI 7-75

using the GUI7-73to 7-75

described 1-14, 7-73

Power Over Ethernet (PoE) parameter 3-22

Power Threshold parameter 10-20

Power Update Contribution parameter 10-20

preauthentication access control list (ACL)

applying to a WLAN

using the CLI 5-46

using the GUI5-44to 5-45

for external web server 9-16, 12-8

Preauthentication ACL parameter 5-45, 6-40

Pre-Standard State parameter 7-74

priming access points 7-2

Priority Order > Local-Auth page 5-21, 5-24

Priority Order > Management User page 5-11

Priority parameter 3-28

Privacy Protocol parameter 4-12

Profile Name parameter 5-26, 6-4

profile thresholds 10-20

protected access credentials (PACs)

overview 8-10

uploading

using the CLI8-11to 8-12

using the GUI 8-11

using with local EAP 5-24, 5-28, 5-29

Protection Type parameter 5-49, 10-13

Protocol parameter 5-39

Protocol Type parameter 6-27

PSK

configuring 6-17

described 6-15

with mesh 7-16

PSK Format parameter 6-17

purpose of document 1-20

Q

QBSS

configuring 6-24

information elements 6-26

QoS

and identity networking5-57to 5-58

configuring

using the CLI6-27to 6-28

using the GUI6-26to 6-27

levels 6-24

settings 7-21

with CAC 4-26

quarantined VLAN

configuring 3-18

using 12-7

Quarantine parameter 3-18

Query Interval parameter 5-64

Queue Depth parameter 6-27

queue statistics 7-30

R

radio core dumps, sending from LWAPP-enabled access points to controller 7-48

radio measurement requests

configuring

on the CLI 10-35

on the GUI 10-34

overview 10-33

viewing status using the CLI 10-36

radio preamble, described 5-32

radio resource management (RRM)

benefits 10-5

CCX features

See CCX radio management

configuring

using the CLI10-23to 10-25

using the configuration wizard 4-6

using the GUI10-15to 10-23

debugging 10-26

disabling dynamic channel and power assignment

using the CLI 10-31

using the GUI 10-31

overriding dynamic RRM10-26to 10-31

overview10-2to 10-5

specifying channels10-22to 10-23

statically assigning channel and transmit power settings

using the CLI 10-30

using the GUI10-27to 10-30

update interval 10-6, 10-10

viewing settings using the CLI 10-32

radio resource monitoring 10-2

RADIUS Authentication Servers > New page 5-76

RADIUS Authentication Servers page 5-75

RADIUS settings, configuring 4-8

Range (RootAP to MeshAP) parameter 7-16

Redirect URL After Login parameter 9-10

Refresh-time Interval parameter 4-44

regulatory information

for 1000 series access pointsB-2to B-8

for 2000 series controllers B-8

for 4400 series controllers B-9

related publications 1-23

Reserved Roaming Bandwidth parameter 4-29, 4-31

reset button

disabling on LWAPP-enabled access points 7-50

using to revert LWAPP-enabled access points to autonomous mode7-46to 7-47

resetting the controller 8-13

Re-sync button 5-66

Retransmit Timeout parameter 5-11, 5-21

reverse path filtering (RPF) 11-17

RF Channel Assignment parameter 10-31

RF domain

See RF groups

RF exposure declaration of conformity B-5

RF group leader

described 10-6

viewing 10-10

RF group name

described 10-6

entering 10-7

RF groups

configuring

using the CLI 10-8

using the configuration wizard 4-5

using the GUI 10-7

difference from mobility groups 10-5

overview10-5to 10-6

viewing status

using the CLI 10-10

using the GUI10-8to 10-10

RFID tags

described 4-52

formats supported 4-52

number supported per controller 4-52

RFID tag tracking

configuring using the CLI 4-53

viewing information using the CLI4-53to 4-54

RF-Network Name parameter 10-7

roam reason report, described 4-22

rogue access point alarm 10-13

rogue access point detection

enabling using the CLI10-13to 10-15

enabling using the GUI10-11to 10-13

rogue access points

challenges 5-3

overview 1-19

tagging, location, and containment 1-19, 5-3

root access points (RAPs)

described 7-10

selecting 7-20

root bridge 3-24

Root Cost parameter 3-27

Root Port parameter 3-27

routing around interference in mesh networks 7-40

RRM

See radio resource management (RRM)

Rx Sensitivity Threshold parameter 10-40

S

safety warnings A-1

Save and Reboot button 8-7, 8-9

saving configuration settings 8-12

Scan Threshold parameter 4-24

secondary backhaul, configuring using the CLI 7-41

sector, described 7-10, 7-11

secure web mode, enabling 2-2

security

overview 5-2

solutions5-2to 5-4

Security Mode parameter 7-16

self-signed certificate (SSC), LWAPP-enabled access points sending to controller 7-47

Sequence parameter 5-39

serial port

baudrate setting 2-7

connecting 2-6

timeout 2-7

Server Address parameter 5-64

Server Index (Priority) parameter 5-10, 5-20

Server IP Address parameter 5-10, 5-20

Server Key parameter 5-27

Server Mode parameter 5-21

Server Status parameter 5-10

service port, described 3-5

service-port interface

configuring

using the CLI 3-15

using the configuration wizard 4-4

using the GUI3-10to 3-12

described 3-8

Set to Factory Default button 10-15

Shared Secret Format parameter 5-10

Shared Secret parameter 5-10

Short Preamble Enabled parameter 5-32

short preambles, described 5-32

Show Wired Clients option 7-56

shunned clients

described 5-66

viewing

using the CLI 5-67

using the GUI 5-66

Signal Strength Contribution parameter 10-18

Signature > Detail page 5-70

Signature Events Detail page 5-71

Signature Events Summary page 5-71

Signature Events Track Detail page 5-72

SNMP, configuring4-8to 4-9

SNMP alert 10-20

SNMP community string

changing default values using the CLI4-10to 4-11

changing default values using the GUI4-9to 4-10

snmp traps 4-9

SNMP v1 / v2c Community > New page 4-10

SNMP v1 / v2c Community page 4-9

SNMP v3 users

changing default values using the CLI4-12to 4-13

changing default values using the GUI4-11to 4-12

SNMP V3 Users > New page 4-12

SNMP V3 Users page 4-11

software

upgrading

guidelines8-2to 8-3

using the CLI8-5to 8-6

using the GUI 8-4

Source parameter 5-39

Source Port parameter 5-40

Spanning Tree Algorithm parameter 3-28

Spanning Tree Protocol (STP)

configuring

using the CLI3-29to 3-30

using the GUI3-25to 3-29

described 3-24

spanning-tree root 3-24

Spanning Tree Specification parameter 3-27

SpectraLink NetLink phones

enabling long preambles using the CLI5-33to 5-34

enabling long preambles using the GUI 5-32

overview 5-32

SSID

configuring

using the CLI 6-5

using the GUI 6-4

described 6-2

Standard Signatures page 5-69

State parameter 5-64, 5-71

Static Mobility Group Members page 11-8

Statistics option 7-28

Status parameter 4-10

STP Mode parameter 3-26

STP Port Designated Bridge parameter 3-25

STP Port Designated Cost parameter 3-25

STP Port Designated Port parameter 3-25

STP Port Designated Root parameter 3-25

STP Port Forward Transitions Count parameter 3-25

STP Port ID parameter 3-25

STP Port Path Cost Mode parameter 3-26

STP Port Path Cost parameter 3-26

STP Port Priority parameter 3-26

STP State parameter 3-25

Supervisor 720

configuring4-55to 4-56

described 4-55

Switch IP Address (Anchor) parameter 11-14

SX/LC/T small form-factor plug-in (SFP) modules 3-4

symmetric mobility tunneling

configuring

using the CLI 11-19

using the configuration wizard 4-5

using the GUI11-18to 11-19

illustrated 11-18

overview11-17to 11-18

Symmetric Mobility Tunneling Mode parameter 11-18

Syslog Configuration page 4-15

Syslog parameter 4-15

Syslog Server IP Address parameter 4-15

system logging

enabling

using the CLI 4-16

using the GUI4-14to 4-15

T

TACACS+

accounting 5-5

authentication 5-4

authorization 5-4

choosing authentication priority order 5-11

configuring

using the CLI5-12to 5-14

using the GUI5-9to 5-11

configuring on ACS5-5to 5-9

described5-4to 5-5

roles 5-4, 5-8

viewing administration server logs5-14to 5-16

TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 5-10

TACACS+ (Authentication, Authorization, or Accounting) Servers page 5-9

TACACS+ (Cisco) page (on CiscoSecure ACS) 5-7

TACACS+ Administration .csv page (on CiscoSecure ACS) 5-14, 5-16

telemetry 4-52

terminal emulator, settings 2-6

TFTP server, guidelines 2-3, 5-67, 8-2, 8-6, 8-8, 8-10

time

configuring manually 4-7

configuring through NTP server 4-6

time-length-values (TLVs), supported for CDP4-41to 4-42

timeout, configuring for disabled clients 6-13

Timeout parameter 5-68, 8-7, 8-9, 9-19

Time Since Topology Changed parameter 3-27

Time to Live for the PAC parameter 5-27

TKIP

configuring 6-17, 6-18

described 6-15

parameter 6-17

Topology Change Count parameter 3-27

traffic specifications (TSPEC) request

described 4-27

examples 4-27

traffic stream metrics (TSM)

described 4-28

enabling

using the CLI 4-38

using the GUI 4-29

viewing statistics

using the CLI4-40to 4-41

using the GUI4-33to 4-37

Transition Time parameter 4-24

transmit power

statically assigning using the CLI 10-30

statically assigning using the GUI10-27to 10-30

transmit power levels, described 10-29

Transmit Power parameter 10-40

transmit power threshold, decreasing 10-25

tunnel attributes, and identity networking5-59to 5-60

Tx Power Level Assignment parameter 10-31

U

U-APSD

described 4-28

viewing status

using the CLI 4-40

using the GUI 4-33

UDP port 11-14, 11-20

unicast mode, described 4-18

UNII-2 band, and 1000 series access points 7-4

unique device identifier (UDI)

described 7-68

retrieving

using the CLI 7-70

using the GUI 7-69

Upload button 5-68, 8-11

Upload File from Controller page 8-11

URL parameter 9-17

Use AES Key Wrap parameter 5-75

User Access Mode parameter 9-3

user accounts, managing9-1to 9-21

User Attribute parameter 5-21

User Base DN parameter 5-21

User Credentials parameter 5-21, 5-25

User Name parameter 5-18

User Object Type parameter 5-21

User parameter 8-11

User Profile Name parameter 4-12

Utilization threshold parameter 10-20

V

Validity parameter 8-11

VCI strings 7-47

Verify Certificate CN Identity parameter 5-27

video information, viewing for mesh networks using the CLI7-22to 7-24

video parameters

configuring using the CLI4-38to 4-39

configuring using the GUI4-30to 4-31

video settings

viewing using the CLI4-39to 4-41

viewing using the GUI4-31to 4-37

virtual interface

configuring

using the CLI 3-15

using the configuration wizard 4-5

using the GUI3-10to 3-12

described3-7to 3-8

VLAN Identifier parameter

for AP-manager interface 3-11

for dynamic interface 3-17, 3-18

for management interface 3-11

VLAN ID parameter 12-12

VLAN interface

See dynamic interface

VLAN Mappings

button 12-12

page 12-12

VLANs

and identity networking5-58to 5-59

assigning WLANs to 6-13

described 3-8

guidelines 3-10

VLAN Support parameter 12-12

VLAN tag, and identity networking 5-59

voice information, viewing for mesh networks using the CLI7-22to 7-24

voice-over-IP (VoIP) telephone roaming, described 4-21

voice parameters

configuring using the CLI4-37to 4-38

configuring using the GUI4-28to 4-30

voice settings

viewing using the CLI4-39to 4-41

viewing using the GUI4-31to 4-37

VPN Gateway Address parameter 6-22

VPN passthrough

configuring using the CLI 6-22

configuring using the GUI6-21to 6-22

W

warnings

defined1-22to 1-23

translated A-1

warrantyC-4to C-7

webauth bundle 9-18

web authentication

described 9-7

process9-7to 9-9

successful login window 9-9

Web Authentication Login window

choosing9-9to 9-21

choosing the default

using the CLI9-11to 9-12

using the GUI9-9to 9-10

customized example 9-20

customizing from an external web server

using the CLI 9-17

using the GUI9-16to 9-17

default 9-8

downloading a customized login window

using the CLI 9-19

using the GUI9-18to 9-19

guidelines for downloading customized login window 9-18

modified default example 9-13

previewing 9-10, 9-19

verifying settings using the CLI 9-21

Web Authentication Type parameter 9-10, 9-17, 9-19

web-based authentication, configuring 6-23

web-browser security alert 9-7

Web Login page 9-10, 9-16

Web Policy parameter 5-45, 6-40

Web Server IP Address parameter 9-17

WEP keys, configuring 6-14

WGB parameter 7-55

WGB Wired Clients page 7-56

wired security 1-6

wireless mesh

See mesh

WLAN ID parameter 5-18, 6-4, 7-13

WLAN override

configuring using the CLI 6-33

configuring using the GUI 6-32

WLAN Override parameter 6-32

WLANs

checking security settings 6-14

configuring both static and dynamic WEP 6-15

creating

using the CLI 6-5

using the GUI6-3to 6-5

deleting

using the CLI 6-5

using the GUI 6-3

described1-12, 3-9to3-10, 6-2to 6-3

using the same SSID 6-3

WLANs > Edit (Advanced) page 5-44, 5-49, 5-62, 6-29

WLANs > Edit (Security > AAA Servers) page 5-22, 5-28, 6-41

WLANs > Edit (Security > Layer 2) page 6-17, 6-19

WLANs > Edit (Security > Layer 3) page 5-44, 6-22, 6-40

WLANs > Edit page 6-4, 12-7

WLANs > New page 6-4, 12-7

WLANs page 6-3, 11-13

WLAN SSID parameter 6-4, 6-36, 9-5

WLAN Status parameter 6-5

WMM

configuring 6-25

described 6-24

with CAC 4-26

workgroup bridges (WGBs)

debugging 7-57

described 7-50

guidelines7-52to 7-54

illustrated 7-51

in mesh network 7-51

sample configuration 7-54

viewing status

using the CLI 7-57

using the GUI7-54to 7-56

world mode 4-18

WPA1+WPA2

configuring

using the CLI 6-18

using the GUI6-16to 6-17

described 6-15

WPA2 Policy parameter 6-17

WPA Policy parameter 6-17