Cisco Wireless LAN Controller Configuration Guide, Release 4.2
Index
Downloads: This chapterpdf (PDF - 827.0KB) The complete bookPDF (PDF - 13.44MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

1000 series access points

antennas7-6to 7-7

models 7-6

overview 7-4

1030 remote edge access points

illustrated 7-5

overview7-5to 7-6

11n Mode parameter 4-12

1500 series access points

See AP1510

7920 AP CAC parameter 6-32

7920 Client CAC parameter 6-32

7920 support mode

configuring 6-30

described 6-30

7921 support mode, described 6-30

802.11a (or 802.11b) > Client Roaming page 4-39

802.11a (or 802.11b) > Video Parameters page 4-52

802.11a (or 802.11b) > Voice Parameters page 4-51

802.11a (or 802.11b/g) > EDCA Parameters page 4-64

802.11a (or 802.11b/g) Global Parameters > Auto RF page 10-9

802.11a (or 802.11b/g) Global Parameters page 4-8, 10-30

802.11a (or 802.11b/g) Network Status parameter 4-8, 4-52, 4-53, 4-64, 4-65

802.11a/n (or 802.11b/g/n) Cisco APs > Configure page 6-38, 10-26

802.11a/n (or 802.11b/g/n) Radios page 4-57, 10-25

802.11a > Pico Cell page 10-35

802.11 bands

configuring using the CLI4-9to 4-11

configuring using the GUI4-8to 4-9

802.11g Support parameter 4-8

802.11n (2.4 GHz) High Throughput page 4-12

802.11n clients 7-75

802.11n devices 4-11

802.11n parameters

configuring using the CLI4-14to 4-18

configuring using the GUI4-11to 4-13

802.1Q VLAN trunk port 3-5

802.1X

configuring 6-20

described 6-19

802.1X+CCKM

configuring 6-20

described 6-19

802.1X authentication, configuring 6-18

802.1X dynamic key settings 6-18

802.3 bridging

configuring using the CLI 4-30

configuring using the GUI4-29to 4-30

802.3 Bridging parameter 4-30

802.3 frames, described 4-29

802.3x flow control, enabling 4-26

A

AAA override

configuring

using the CLI 5-63

using the GUI 5-63

described 5-61

Access Control List Name parameter 5-39

access control lists (ACLs)

and identity networking 5-59

applying to an interface

using the CLI 5-48

using the GUI5-42to 5-43

applying to a WLAN

using the CLI 5-48

using the GUI5-44to 5-45

applying to the controller CPU

using the CLI 5-48

using the GUI5-43to 5-44

configuring

using the CLI5-46to 5-48

using the GUI5-38to 5-42

described 5-38

rules 5-38, 5-40, 5-47

Access Control Lists > Edit page 5-41

Access Control Lists > New page 5-39

Access Control Lists > Rules > New page 5-39

Access Control Lists page 5-38

Access Mode parameter 4-22, 4-24

access point assisted roaming, described 4-38

access point authorization list 7-41

access point groups

assigning access points to

using the CLI 6-43

using the GUI 6-43

creating

using the CLI 6-42

using the GUI6-41to 6-42

described 6-39

illustrated 6-40

access point manager interface, configuring using the configuration wizard 4-5

access points

1000 series

B domain 7-4

models 7-6

overview 7-4

adding MAC address to controller filter list

using the CLI 7-13

using the GUI7-12to 7-13

antennas7-6to 7-7

AP1030 overview7-5to 7-6

AP1510 overview 7-9

authorizing

using MICs 7-40

using SSCs 7-39

using the CLI 7-41

using the GUI 7-40

configuring 4400 series controller to support more than 483-36to 3-41

configuring hybrid REAP using the CLI12-14to 12-15

connectors 7-8

guidelines for operating in Japan B-6

LEDs

configuring 7-74

described 7-7

interpreting D-2

migrating from -J regulatory domain to -U regulatory domain 7-63

mounting options 7-9

number supported per controller 3-4

physical security 7-9

power requirements 7-8

power supply 7-9

priming 7-2

regulatory informationB-2to B-8

rules for operating in TaiwanB-7to B-8

See also LWAPP-enabled access points

supported for use with hybrid REAP 12-2

supporting oversized images7-48to 7-49

troubleshooting the join process7-42to 7-46

using monitor mode 7-9

VCI strings 7-41

verifying that they join the controller 7-3

Accounting Server parameters 6-47

accounting servers, disabling per WLAN 6-47

ACL counters

configuring using the CLI 5-47

configuring using the GUI 5-39

ACL Name parameter 5-43, 5-44

ACLs

configuring for debug facilityD-28to D-29

using with the debug facilityD-27to D-28

ACS server configuration page 6-45

Action parameter 5-41

Adaptive Wireless Path Protocol (AWPP), described 7-10

Add AAA Client page (on CiscoSecure ACS) 5-6

Add AP button 12-18

Add Interface-Mapping button 6-42

Add New Rule button 5-39

Add Web Server button 9-17

AdHoc Rogue AP parameter 5-69

administrator access 4-19

administrator usernames and passwords, configuring 4-19

Admin Status parameter 3-21

Admission Control (ACM) parameter 4-51, 4-53

AES

configuring 6-20, 6-21

parameter 6-20

AES-CCMP, described 6-19

AES key wrap

configuring using the CLI 5-102

configuring using the GUI5-100to 5-102

Aggregated MAC Protocol Data Unit (A-MPDU) 4-14

Aggregated MAC Service Data Unit (A-MSDU) 4-14

aggregation method, specifying 4-14

Aironet IE parameter 6-22, 6-36

Aironet IEs

configuring using the CLI 6-38

configuring using the GUI 6-36

Alarm Trigger Threshold parameter 10-13

All APs > Access Point Name > Link Details > Neighbor Name page 7-31

All APs > Access Point Name > Mesh Neighbor Stats page 7-32

All APs > Access Point Name > Neighbor Info page 7-30

All APs > Access Point Name > Statistics page 7-25

All APs > Access Point Name > VLAN Mappings page 12-13

All APs > Details (Advanced) page 7-72

All APs > Details (General) page 12-12

All APs > Details (H-REAP) page 12-13

All APs > Details (Inventory) page 7-68

All APs > Details (Mesh) page 7-18

All APs > Details page 4-69, 6-43, 7-18, 7-60, 10-12

All APs page 7-24, 7-30, 10-11, 12-12

Allow AAA Override parameter 5-63, 12-9

anchor controller, in inter-subnet roaming 11-4

Anonymous Provision parameter 5-28

antenna connectors, external7-6to 7-7

antennas, for access points7-6to 7-7

antenna sectorization 7-7

AP > Clients > Traffic Stream Metrics page 4-58

AP > Clients page 4-58

AP1010, described 7-6

AP1020, described 7-6

AP1030, described 7-6

AP1510

configuring and deploying7-12to 7-20

overview 7-9

AP Authentication Policy page 5-51, 10-13

AP Group Description parameter 6-41

AP Group Name parameter 6-41, 6-43

AP Groups VLAN Feature Enable parameter 6-41

AP Groups VLAN page 6-41, 6-42

AP-manager interface

configuring

using the CLI 3-14

using the GUI3-10to 3-13

creating multiple interfaces3-39to 3-40

described 3-6

illustration

of four AP-manager interfaces 3-39

of three AP-manager interfaces 3-38

of two AP-manager interfaces 3-37

using multiple3-36to 3-40

AP Mode parameter 7-18, 10-12, 12-13

AP Policies page 7-40

AP Role parameter 7-19

Assignment Method parameter 10-26

asymmetric tunneling, illustrated 11-23

audience of document 1-22

authentication information element (IE) 10-11

Authentication Priority parameter 5-11

Authentication Protocol parameter 4-24

Auth Key Mgmt parameter 6-20

Authority ID Information parameter 5-28

Authority ID parameter 5-28

Authorize APs Against AAA parameter 7-40

Authorize Self Signed Certificate (SSC) parameter 7-40

authorizing access points

using the CLI 7-41

using the GUI 7-40

auto-anchor mobility

configuring

using the CLI11-20to 11-21

using the GUI11-18to 11-20

guidelines 11-18

overview11-17to 11-18

autonomous access points converted to lightweight mode

See LWAPP-enabled access points

auto RF, configuring using the configuration wizard 4-6

Average Data Rate parameter 4-42, 4-46

Average Real-Time Rate parameter 4-43, 4-46

Avoid Cisco AP Load parameter 10-17

Avoid Foreign AP Interference parameter 10-16, 11-15

Avoid Non-802.11a (802.11b) Noise parameter 10-17

B

background scanning in mesh networks

described7-33to 7-35

enabling using the CLI 7-36

enabling using the GUI 7-35

scenarios7-34to 7-35

Background Scan parameter 7-15, 7-35

Backhaul Client Access parameter 7-15

backhaul interface 7-19

Backhaul Interface parameter 7-19

backup controllers, configuring7-56to 7-57

bandwidth-based CAC

described 4-48

enabling

using the CLI 4-60

using the GUI 4-51

for mesh networks 7-20

Base MAC Address parameter 3-27

B domain 7-4

Beacon Period parameter 4-8

bootup script 4-4

Bridge Data Rate parameter 7-19

bridge group name, described 7-11

Bridge Group Name parameter 7-19

bridge protocol data units (BPDUs) 3-24

bridge type 7-19

Bridge Type parameter 7-19

bridging parameters

configuring using the CLI7-19to 7-20

configuring using the GUI7-17to 7-19

broadcasting, configuring using the CLI 4-35

Burst Data Rate parameter 4-42, 4-46

Burst Real-Time Rate parameter 4-43, 4-46

C

CAC

configuring for 7920 phones 6-30

described 4-48

enabling

using the CLI 4-61

using the GUI 4-53

in mesh networks 7-20

viewing in mesh networks7-21to 7-23

viewing using the CLI 4-62

Canadian compliance statement B-3

Catalyst 3750G Integrated Wireless LAN Controller Switch

described 1-12

logical connectivity diagram and associated software commandsE-4to E-6

ports 3-3, 3-4

caution, defined 1-23

CCA Sensitivity Threshold parameter 10-37

CCKM

and hybrid-REAP groups 12-16

configuring 6-20

described 6-19

CCX

configuring Aironet IEs

using the CLI 6-38

using the GUI 6-36

described 6-36

viewing a client's version

using the CLI 6-38

using the GUI6-36to 6-38

CCX Layer 2 client roaming

configuring

using the CLI 4-40

using the GUI4-39to 4-40

debugging using the CLI 4-41

described4-38to 4-39

obtaining information using the CLI 4-40

CCX link test 7-69

CCX radio management

configuring

using the CLI 10-32

using the GUI10-30to 10-31

debugging using the CLI 10-34

features 10-29

hybrid-REAP considerations 10-29

obtaining information using the CLI10-32to 10-33

CCXv5 Req button D-19

CCX Version parameter 6-37

CDP > AP Neighbors > Detail page 4-72

CDP > AP Neighbors page 4-71

CDP > Global Configuration page 4-68

CDP > Interface Neighbors > Detail page 4-70

CDP > Interface Neighbors page 4-70

CDP > Traffic Metrics page 4-72

CDP Advertisement Version parameter 4-68

CDP AP Neighbors page 4-71

CDP Protocol Status parameter 4-68

CDP State parameter 4-69

Certificate Authority (CA) certificates

downloading

using the CLI8-11to 8-12

using the GUI 8-11

overview 8-10

using with local EAP 5-24, 5-29

Certificate Issuer parameter 5-27

Certificate Password parameter 8-9

Certificate Type parameter 7-40

Change Rules Priority parameter 5-74

Channel Assignment Leader parameter 10-17

Channel Assignment Method parameter 10-16

channel bandwidth, changing from 20 to 40 MHz 4-16

Channel List parameter 10-20

channels

specifying for RRM scanning10-21to 10-22

statically assigning

using the CLI 10-27

using the GUI10-25to 10-26

Check Against CA Certificates parameter 5-27

Check Certificate Date Validity parameter 5-27

chokepoints 4-76

CIDS Sensor Add page 5-88

CIDS Sensors List page 5-88

CIDS Shun List page 5-91

ciphers

configuring 6-20, 6-21

described 6-20

Cisco 2000 Series Wireless LAN Controllers

described 1-9

FCC statement B-8

features not supported 1-9

network connections1-17to 1-18

ports 3-2, 3-3, 3-4

Cisco 2100 Series Wireless LAN Controllers

described 1-9

FCC statement B-8

features not supported 1-9

network connections1-17to 1-18

ports 3-2, 3-3, 3-4

Cisco 28/37/38xx Integrated Services Router

described 1-11

logical connectivity diagram and associated software commands E-3

ports 3-3, 3-4, 4-85

using 4-85

versions 1-11

Cisco 4400 Series Wireless LAN Controllers

configuring to support more than 48 access points3-36to 3-41

described 1-10

FCC statement B-9

models 3-4

network connections1-18to 1-19

ports 3-2, 3-3, 3-4

Cisco 7920 Wireless IP Phone, guidelines for using 6-31

Cisco 7921 Wireless IP Phone, guidelines for using 6-31

Cisco Aironet 1510 Series Lightweight Outdoor Mesh Access Point

See AP1510

Cisco AV-pairs 6-44, 6-45

Cisco Client Extensions (CCX)

See CCX

Cisco Discovery Protocol (CDP)

configuring

using the CLI4-73to 4-74

using the GUI4-68to 4-69

debugging using the CLI 4-75

described 4-66

enabling on an access point, using the GUI4-68to 4-69

sample network 4-67

supported devices 4-66

viewing neighbors

using the CLI4-74to 4-75

using the GUI4-69to 4-73

viewing traffic information

using the CLI 4-74

using the GUI 4-72

Cisco Discovery Protocol parameter 4-69

Cisco high-power switches 7-73

Cisco Logo parameter 9-10

Cisco Unified Wireless Network (UWN) Solution

described1-2to 1-5

illustrated 1-3

Cisco Wireless Control System (WCS), described 1-2

Cisco WiSM

configuring the Supervisor 7204-83to 4-84

described1-10to 1-11

guidelines 4-83

logical connectivity diagram and associated software commandsE-2to E-3

ports 3-3, 3-4

SSC key-hash 7-38

CKIP

configuring

using the CLI 6-24

using the GUI6-22to 6-23

described 6-22

clearing the controller configuration 8-18

Clear Stats button 11-16

CLI

basic commands 2-9

enabling wireless connections 2-9

logging into2-7to 2-8

logging out 2-8

navigating 2-9

troubleshooting commandsD-5to D-7

using2-7to 2-9

Client Certificate Required parameter 5-27

client location 1-8

client MFP, described 5-49

Client Min Exception Level threshold parameter 10-19

Client Protection parameter 5-53

client reporting

configuring using the CLID-21to D-24

configuring using the GUID-18to D-21

described D-12

Client Reporting page D-20

client roaming, configuring4-36to 4-41

clients

connecting to WLANs 12-15

viewing CCX version using the CLI 6-38

viewing CCX version using the GUI6-36to 6-38

viewing using the CLI7-78to 7-79

viewing using the GUI7-75to 7-78

Clients > AP > Traffic Stream Metrics page 4-56

Clients > AP page 4-56

Clients > Detail page 4-55, 6-37, 7-53, 7-54, 7-77, D-19

Clients page 4-54, 7-53, 7-70, 7-75

Clients threshold parameter 10-19

Client Type parameter 7-54, 7-55

Commands > Reset to Factory Defaults page 4-3

Community Name parameter 4-22

conditional web redirect

configuring

using the CLI 6-46

using the GUI6-45to 6-46

configuring the RADIUS server6-44to 6-45

described 6-44

Conditional Web Redirect parameter 6-46

Configuration File Encryption Key parameter 8-16

Configuration File Encryption parameter 8-15

configuration files

downloading

using the CLI 8-17

using the GUI8-16to 8-17

uploading

using the CLI8-15to 8-16

using the GUI 8-14, 8-15, 8-16, 8-17

configuration wizard

described 4-2

running4-4to 4-6

Configure option 10-25

Confirm Password parameter 12-10

controller network module

baud rate 3-3

versions 3-4

controllers

configuration

clearing 8-18

erasing 8-18

saving 8-18

connections 1-12

discovery process 7-2

multiple-controller deployment1-4to 1-5

overview1-7to 1-8

platforms1-8to 1-12

primary, secondary, and tertiary 1-8

resetting factory default settings

using the CLI 4-3

using the GUI 4-3

single-controller deployment1-3to 1-4

synchronizing with location appliance 4-81

types of memory 1-16

upgrading software

guidelines8-2to 8-3

using the CLI8-6to 8-7

using the GUI8-4to 8-5

Controller Spanning Tree Configuration page 3-27

controller subnet service set, described 7-10

Controller Time Source Valid parameter 5-53

Control Path parameter 11-20

conventions of document1-23to 1-25

country channels 10-20

Country Code parameter 7-60

country codes

commonly used 7-58

configuring

using the CLI7-60to 7-63

using the configuration wizard 4-6

using the GUI7-58to 7-60

described 7-58

Japanese 7-64

See also multiple country codes

viewing using the CLI 7-62

Country page 7-59

Coverage Exception Level threshold parameter 10-20

coverage hole, detection 10-4

Coverage Measurement parameter 10-21

Coverage threshold parameter 10-19

CPU Access Control Lists page 5-44

CPU ACL Mode parameter 5-44

crash information, sending from LWAPP-enabled access points to controller 7-46

Custom Signatures page 5-94

D

Data Path parameter 11-20

Data Rates parameters 4-9

date

configuring manually 4-7

configuring through NTP server 4-6

DCA channels 10-20

DCA Channels parameter 10-22

DCA Sensitivity Level parameter 10-17

debug commands, sending from controller to LWAPP-enabled access points 7-46

debug facility

configuringD-28to D-31

describedD-27to D-28

Default Mobility Group parameter 11-10

Default Routers parameter 6-11

Deny Counters parameter 5-41

Description parameter 5-17, 7-13, 12-11

Designated Root parameter 3-27

Destination parameter 5-40

Destination Port parameter 5-41

Detect and Report Ad-Hoc Networks parameter 5-69

device certificates

downloading

using the CLI8-9to 8-10

using the GUI8-8to 8-9

overview 8-8

using with local EAP 5-24, 5-29

DHCP

configuring using the CLI 6-9

configuring using the GUI 6-8

DHCP Addr. Assignment Required parameter 6-9

DHCP option 43

in controller discovery process 7-2

using 7-41

DHCP option 82

configuring5-36to 5-37

described 5-36

illustrated 5-36

DHCP proxy, configuring4-18to 4-19

DHCP Scope > Edit page 6-11

DHCP scopes

configuring using the CLI6-12to 6-13

configuring using the GUI6-10to 6-11

described 6-10

DHCP Scopes page 6-10

DHCP server discovery 7-2

DHCP Server IP Addr parameter 6-9

DHCP Server Override parameter 6-9

DHCP servers

configuring using the configuration wizard 4-5

external6-7to 6-8

internal 6-7

diagnostic channel

configuring using the GUI D-13

described D-12

Diagnostic Channel parameter D-13

directed roam request 4-38

Direction parameter 5-41

disabled clients, configuring a timeout 6-14

distribution system ports, described3-4to 3-5

DNS Domain Name parameter 6-11

DNS Servers parameter 6-11

document

audience 1-22

conventions1-23to 1-25

organization1-22to 1-23

purpose 1-22

domain name server (DNS) discovery 7-2

Download button 5-94, 8-9, 8-11, 9-19

Download File to Controller page 5-93, 8-9, 8-11, 8-16, 9-18

DSCP parameter 5-41

DTPC Support parameter 4-9

dynamic channel allocation, specifying the channel set 10-23

dynamic channel assignment 10-3

dynamic frequency selection, described7-66to 7-67

dynamic interface

configuring

using the CLI3-18to 3-19

using the GUI3-16to 3-18

described 3-8

dynamic RRM

See radio resource management (RRM)

dynamic transmit power control

configuring 4-9

described 10-4

dynamic WEP, configuring 6-18

E

EAP-FAST Method Parameters page 5-28

EAP-FAST parameter 5-26

EAP Profile Name parameter 5-29

EAP-TLS parameter 5-26

EDCA Profile parameter 4-64

Edit QoS Profile page 4-42

Edit QoS Role Data Rates page 4-45

Egress Interface parameter 9-27

Email Input parameter 9-28

Enable Check for All Standard and Custom Signatures parameter 5-95

Enable Controller Management to be accessible from Wireless Clients parameter 2-10, 5-35

Enable Counters parameter 5-39

Enable CPU ACL parameter 5-44

Enable Dynamic AP Management parameter 3-40

Enable IGMP Snooping parameter 4-34

Enable Low Latency MAC parameter 4-65

Enable Server Status parameter 5-20

Enable Syslog parameter 4-27

Encryption Key parameter 6-23

end user license agreementC-2to C-4

enhanced distributed channel access (EDCA) parameters

configuring using the CLI4-65to 4-66

configuring using the GUI4-64to 4-65

enhanced neighbor list, described 4-38

enhanced neighbor list request (E2E), described 4-38

EoIP port 11-20, 11-26

epings 11-20, 11-26

erasing the controller configuration 8-18

Ethernet Bridging parameter 7-19

Ethernet connection 2-8

Ethernet Multicast Mode parameter 4-33

European declaration of conformityB-4to B-5

event reporting 5-50

Expedited Bandwidth parameter 4-52

expedited bandwidth requests

described 4-49

enabling

using the CLI 4-60

using the GUI 4-52

Expiration Timeout for Rogue AP and Rogue Client Entries parameter 5-69

Extensible Authentication Protocol (EAP), configuring 6-18

F

factory default settings

resetting using the CLI 4-3

resetting using the GUI 4-3

failover protection1-16to 1-17

Fast Ethernet port 3-4

FCC declaration of conformityB-2to B-3

FCC statement

2000 series controllers B-8

2100 series controllers B-8

4400 series controllers B-9

File Name parameter 5-94, 8-9, 8-11, 8-13, 8-15, 8-17, 9-19

File Path parameter 5-94, 8-9, 8-11, 8-13, 8-15, 8-17, 9-19

file transfers 1-14

File Type parameter 5-93, 8-9, 8-11, 8-13, 8-15, 8-16, 9-18

filter, using to view clients 7-76

Fingerprint parameter 5-90

flashing LEDs, configuring 7-74

foreign controller, in inter-subnet roaming 11-4

Forward Delay parameter 3-28, 3-29

Fragmentation Threshold parameter 4-8

Friendly Rogue > Create page 5-74

G

General page 3-33, 4-30, 4-33, 5-16, 5-102, 10-7

Generate Password parameter 9-5

gigabit Ethernet port 3-4

Group Mode parameter 10-10, 10-15, 11-14

Group Name parameter 11-11, 12-17

Group Setup page (on CiscoSecure ACS) 5-8

Guest LAN parameter 9-26

guest N+1 redundancy 11-17

guest user accounts

creating9-2to 9-7

creating as a lobby ambassador9-4to 9-6

viewing

using the CLI 9-7

using the GUI 9-6

Guest User parameter 5-17, 12-10

Guest User Role parameter 5-17, 12-10

guest WLAN, creating 9-5

GUI

enabling wireless connections 2-9

guidelines 2-2

opening 2-2

using 2-2

H

Headline parameter 9-10

Hello Time parameter 3-28, 3-29

help, obtaining 2-2

hex2pcap, sample output D-30

high-density network

benefits 10-34

illustrated 10-34

overview 10-34

See also pico cell mode

Holdtime parameter 3-28, 4-68

HREAP Group Name parameter 12-13

HREAP Groups > Edit page 12-17, 12-18

HREAP Groups page 12-17

H-REAP Local Switching parameter 12-9

HTTP Access parameter 2-3

HTTP Configuration page 2-3

HTTPS Access parameter 2-3

hybrid REAP

access points supported 12-2

authentication process12-2to 12-4

bandwidth restriction 12-2

configuring12-5to 12-15

configuring access points for using the CLI12-14to 12-15

configuring access points for using the GUI12-11to 12-14

configuring the controller using the GUI12-6to 12-11

guidelines 12-4

illustrated 12-2

number of access points supported 12-2

overview 12-2

hybrid-REAP groups

and CCKM 12-16

configuring using the CLI 12-19

configuring using the GUI12-17to 12-19

described 12-16

illustrated 12-16

Hysteresis parameter 4-39

I

identity networking

configuring5-57to 5-61

described1-13to 1-14

overview 5-58

RADIUS attributes5-58to 5-61

IDS

configuring5-88to 5-100

described 5-88

IDS sensors

configuring

using the CLI5-90to 5-91

using the GUI5-88to 5-90

described 5-88

IDS signature events

viewing using the CLI5-99to 5-100

viewing using the GUI5-96to 5-97

IDS signatures

configuring

using the CLI5-98to 5-99

using the GUI5-92to 5-97

described 5-92

frequency 5-96

MAC frequency 5-96

measurement interval 5-96

pattern 5-96

quiet time 5-96

tracking method 5-96

uploading or downloading using the GUI5-93to 5-94

IGMP Timeout parameter 4-34

Index parameter 5-89

infrastructure MFP

components 5-50

described 5-49

Infrastructure MFP Protection parameter 5-52

Infrastructure Protection parameter 5-53

Infrastructure Validation parameter 5-53

Ingress Interface parameter 9-27

Injector Switch MAC Address parameter 7-73

inline power, described 7-72

intelligent power management (IPM) 7-73

inter-controller roaming

described 4-37

illustrated 11-3

Interface Name parameter 6-42, 7-13

Interface parameter 6-9

interfaces

and identity networking5-59to 5-60

configuring

using the CLI3-13to 3-15

using the GUI3-10to 3-13

overview3-5to 3-8

Interfaces > Edit page 3-17, 3-39, 5-43, 9-25

Interfaces > New page 3-16, 3-39

Interfaces page 3-11

interference

defined 10-3

routing around in mesh networks 7-36

Interference threshold parameter 10-19

Internet Group Management Protocol (IGMP)

configuring using the CLI 4-35

configuring using the GUI 4-34

Internet Group Management Protocol (IGMP) snooping, described4-31to 4-32

inter-subnet roaming

described 4-37

illustrated11-3to 11-4

Interval parameter 10-31

intra-controller roaming

described 4-37

illustrated 11-2

Inventory page 7-67

Invoke Channel Update Now button 10-16

Invoke Power Update Now button 10-18

IP Address parameter 4-22, 5-93, 8-9, 8-11, 8-13, 8-15, 8-16, 9-18

IP Mask parameter 4-22

IPv6 bridging

configuring using the CLI 6-35

configuring using the GUI 6-35

described 6-33

guidelines 6-33

IPv6 bridging and IPv4 web authentication, example 6-34

IPv6 Enable parameter 6-35

J

Japanese country codes 7-64

Japanese regulations for migrating access points from -J to -U regulatory domain 7-63

K

Keep Alive Count parameter 11-19

Keep Alive Interval parameter 11-19

Key Encryption Key (KEK) parameter 5-102

Key Format parameter 6-23

Key Index parameter 6-23

key permutation

configuring 6-23, 6-24

described 6-22

Key Permutation parameter 6-23

Key Size parameter 6-23

Key Wrap Format parameter 5-102

Key Wrap parameter 5-101

L

LAG

See link aggregation (LAG)

LAG Mode on Next Reboot parameter 3-34

Last Auto Channel Assignment parameter 10-17

Last Power Level Assignment parameter 10-19

Layer 1 security 5-2

Layer 2

LWAPP discovery 7-2

operation 1-6

security

configuring6-17to 6-24

described 5-2

Layer 2 Security parameter 6-20, 6-23, 6-45

Layer 3

LWAPP discovery 7-2

operation 1-6

security

configuring6-25to 6-27

described 5-3

Layer 3 Security parameter 6-26, 6-27, 6-46, 9-28

LDAP

choosing server priority order 5-20

configuring

using the CLI5-22to 5-23

using the GUI5-19to 5-22

local EAP methods supported 5-19, 5-23

LDAP servers, assigning to WLANs5-21to 5-22

LDAP Servers > New page 5-19

LDAP Servers page 5-19

LDAP Servers parameter 5-29

LEAP parameter 5-26

Lease Time parameter 6-11

LEDs

configuring 7-74

for access points 7-7

for controllers D-2

license agreementC-2to C-4

Lifetime parameter 5-17, 9-5, 12-10

Lightweight Access Point Protocol (LWAPP), described 7-2

lightweight mode, reverting to autonomous mode 7-38

limited warrantyC-4to C-7

link aggregation (LAG)

configuring neighboring devices 3-35

described3-30to 3-31

enabling

using the CLI 3-34

using the GUI3-33to 3-34

guidelines3-32to 3-33

illustrated 3-30, 3-32

verifying settings using the CLI 3-35

Link Status parameter 3-21

Link Test

button 7-70

option 7-30, 7-70

page 7-71

window 7-31

link test

described 7-69

performing

using the CLI 7-71

using the GUI7-30to7-31, 7-70to 7-71

types of packets 7-69

Link Trap parameter 3-22

Load-based AC parameter 4-51

load-based CAC

described 4-49

enabling

using the CLI 4-60

using the GUI 4-51

Load Measurement parameter 10-20

lobby ambassador account

creating using the CLI 9-3

creating using the GUI9-2to 9-3

Lobby Ambassador Guest Management > Guest Users List > New page 9-4

Lobby Ambassador Guest Management > Guest Users List page 9-4, 9-6

Local Auth Active Timeout parameter 5-25

Local Certificate Required parameter 5-27

local EAP

choosing server priority order 5-25

configuring

using the CLI5-29to 5-33

using the GUI5-24to 5-29

debugging 5-33

described5-23to 5-24

example 5-24

viewing information using the CLI 5-32

with mesh 7-15

Local EAP Authentication parameter 5-29

Local EAP Profiles > Edit page 5-26

Local EAP Profiles page 5-25

Local Management Users > New page 9-3

Local Management Users page 9-2

Local Net Users > New page 5-17, 12-10

Local Net Users page 5-16, 9-6

local network users

configuring using the CLI 5-18

configuring using the GUI5-15to 5-18

local user database, capacity 9-2

location appliance, synchronizing with controller 4-81

location appliance certificate, installing4-80to 4-81

location-based services 10-30

location calibration 10-30

location settings, viewing using the CLI4-81to 4-83

logical connectivity diagram

Catalyst 3750G Integrated Wireless LAN Controller Switch E-4

Cisco 28/37/38xx Integrated Services Router E-3

Cisco WiSM E-2

long preambles

described 5-33

enabling on SpectraLink NetLink phones

using the CLI 5-34

using the GUI 5-33

LWAPP-enabled access points

configuring a static IP address 7-48

disabling the reset button 7-48

enabling memory core dumps 7-47

guidelines 7-37

MAC addresses displayed on controller GUI 7-47

overview 7-38

receiving debug commands from controller 7-46

reverting to autonomous mode7-38to 7-39

sending crash information to controller 7-46

sending radio core dumps to controller 7-46

sending SSCs to controller 7-39

LWAPP transport mode, configuring using the configuration wizard 4-5

M

MAC address of access point

adding to controller filter list

using the CLI 7-13

using the GUI7-12to 7-13, 7-20

displayed on controller GUI 7-47

MAC Address parameter 7-13

MAC filtering, configuring on WLANs6-13to 6-14

MAC Filtering page 7-12

MAC filter list, described 7-10

MAC Filter List parameter 7-15

MAC Filters > New page 7-12

management frame protection (MFP)

configuring

using the CLI5-53to 5-54

using the GUI5-51to 5-52

debugging 5-57

described5-49to 5-50

guidelines 5-50

types 5-49

viewing settings5-54to 5-56

Management Frame Protection parameter 5-53

Management Frame Protection Settings page 5-53

management frame validation 5-50

management interface

configuring

using the CLI 3-13

using the GUI3-10to 3-13

described 3-6

management over wireless

described 5-35

enabling

using the CLI 5-36

using the GUI 5-35

Master Controller Configuration page 7-3

Master Controller Mode parameter 7-3

Max Age parameter 3-27

Maximum Age parameter 3-28

maximum local database entries

configuring using the CLI 5-103

configuring using the GUI 5-102

Maximum Local Database Entries parameter 5-16, 5-103

Maximum Retries parameter 5-93, 9-18

Maximum RF Usage Per AP parameter 4-43

Max RF Bandwidth parameter 4-51, 4-53

MCS data rates 4-12

Member MAC Address parameter 11-11

memory

core dumps, enabling for LWAPP-enabled access points 7-47

core dumps from converted access points D-9

types 1-16

mesh

described7-10to 7-12

high-speed roaming 4-36, 4-39, 4-40

illustrated 7-11

network example 7-21

parameters

configuring using the CLI 7-16

configuring using the GUI7-14to 7-16

statistics

viewing for an access point using the CLI7-28to 7-29

viewing for an access point using the GUI7-23to 7-28

Mesh > LinkTest Results page 7-31

mesh access points (MAPs)

described 7-10

selecting 7-19

mesh node security statistics7-27to 7-28

mesh node statistics 7-26

Mesh page 7-14, 7-35

Message Authentication Code Key (MACK) parameter 5-102

Message Log Level parameter 4-27

message logs

viewing

using the CLI 4-29

using the GUI 4-28

Message Logs page 4-28

Message parameter 9-10

Metrics Collection parameter 4-52

MFP Client Protection parameter 5-52

MFP Frame Validation parameter 5-52

MIC, described 6-19, 6-22

migrating access points from -J to -U regulatory domain 7-63

Minimum RSSI parameter 4-39

mirror mode

See port mirroring

MMH MIC

configuring 6-23, 6-24

described 6-22

MMH Mode parameter 6-23

mobility, overview11-2to 11-5

Mobility Anchor Config page 11-19, 11-24

Mobility Anchor Create button 11-20

mobility anchors

See auto-anchor mobility

viewing 11-20

Mobility Anchors option 11-19

Mobility Anchors page 11-19, 11-23

mobility failover 11-17

mobility group, default 11-10

mobility group configuration

with one NAT device 11-8

with two NAT devices 11-8

Mobility Group Member > New page 11-11

mobility group members, sending ping requests 11-17

Mobility Group Members > Edit All page 11-12

mobility group name, entering 11-11

mobility groups

configuring

using the CLI 11-13

using the configuration wizard 4-5

using the GUI11-10to 11-12

detecting failed members 11-17

determining when to include controllers 11-7

difference from RF groups 10-5

examples 11-6

illustrated 11-5

overview11-5to 11-7

prerequisites11-8to 11-9

using with NAT devices11-7to 11-8

mobility group statistics

types 11-13

viewing using the CLI 11-16

viewing using the GUI11-13to 11-16

mobility ping tests, running 11-26

Mobility Statistics page 11-14

mode button

See reset button

Mode parameter 4-39, 10-31

monitor mode, described 7-9

mpings 11-20, 11-26

Multicast Appliance Mode parameter 3-22

multicast groups

viewing using the CLI 4-35

viewing using the GUI 4-34

Multicast Groups page 4-34

multicast mode

configuring using the GUI4-33to 4-34

described4-31to 4-32

enabling using the CLI 4-34

guidelines4-32to 4-33, 7-50

Multicast page 4-33

multiple country codes

configuration guidelines 7-58

configuring using the CLI 7-60

configuring using the GUI7-59to 7-60

multiple country support, configuring using the configuration wizard 4-6

N

Native VLAN ID parameter 12-13

neighbor information

viewing for an access point using the CLI 7-32

viewing for an access point using the GUI7-29to 7-32

Neighbor Information option 7-30

neighboring access points and channels, viewing using the CLI 7-36

neighbor statistics

viewing for an access point using the CLI 7-32

viewing for an access point using the GUI7-29to 7-32

Netbios Name Servers parameter 6-11

Netmask parameter 6-11

network, described 7-10

network address translation (NAT) devices, using in mobility groups11-7to 11-8

Network Mobility Services Protocol (NMSP) 4-76, 4-82

Network parameter 6-11

Noise Measurement parameter 10-20

Noise threshold parameter 10-19

note, defined 1-23

NTP server

configuring to obtain time and date 4-6

setting in the configuration wizard 4-6

Number of Hits parameter 5-41

O

online help, using 2-2

open source terms C-7

operating system

security1-5to 1-6

software 1-5

organization of document1-22to 1-23

Override Global Config parameter 9-21, 9-28

Override Interface ACL parameter 5-45

oversized access point images7-48to 7-49

over-the-air provisioning (OTAP) 7-2

P

P2P Blocking parameter 6-16

Password parameter 5-17, 8-13, 12-10

password recovery mechanism 4-19

PEAP parameter 5-26

peer-to-peer blocking

configuring using the CLI6-16to 6-17

configuring using the GUI6-15to 6-16

described 6-14

examples 6-15

guidelines 6-15

Physical Mode parameter 3-22

Physical Status parameter 3-21

pico cell mode

configuring

using the CLI 10-38

using the GUI10-35to 10-37

debugging using the CLI 10-38

guidelines 10-35

overview10-34to 10-35

versions 10-36

Pico Cell Mode parameter 10-36

ping link test, described 7-69

PMK cache lifetime timer 6-21

PMKID caching 6-22

Pool End Address parameter 6-11

Pool Start Address parameter 6-11

Port > Configure page 3-20

port mirroring, configuring 3-23

Port Number parameter 3-21, 5-10, 5-20, 9-26

Port parameter 5-89

ports

comparison table 3-3

configuring3-19to 3-30

connecting additional ports to support more than 48 access points 3-41

on 2000 series controllers 3-2, 3-3, 3-4

on 2100 series controllers 3-2, 3-3, 3-4

on 4400 series controllers 3-2, 3-3, 3-4

on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-4

on Cisco 28/37/38xx Series Integrated Services Router 3-3, 3-4, 4-85, 7-43

on Cisco WiSM 3-3, 3-4

overview3-2to 3-5

Ports page 3-19

Power Assignment Leader parameter 10-19

Power Injector Selection parameter 7-73

Power Injector State parameter 7-73

Power Level Assignment Method parameter 10-18

Power Neighbor Count parameter 10-19

power over Ethernet (PoE)

configuring

using the CLI 7-74

using the GUI7-72to 7-73

described 1-14, 7-72

Power Over Ethernet (PoE) parameter 3-21

Power Threshold parameter 10-19

Power Update Contribution parameter 10-19

preauthentication access control list (ACL)

applying to a WLAN

using the CLI 5-48

using the GUI5-45to 5-46

for external web server 9-16, 12-10

Preauthentication ACL parameter 5-46, 6-46

Pre-Standard State parameter 7-73

Primary RADIUS Server parameter 12-17

priming access points 7-2

Priority Order > Local-Auth page 5-21, 5-25

Priority Order > Management User page 5-11

Priority parameter 3-28

Privacy Protocol parameter 4-24

Profile Details page D-21

Profile Name parameter 5-26, 6-4, 7-13, 9-27, 12-8

profile thresholds10-19to 10-20

protected access credentials (PACs)

overview 8-12

uploading

using the CLI8-13to 8-14

using the GUI 8-13

using with local EAP 5-24, 5-28, 5-29

Protection Type parameter 5-51, 10-13

Protocol parameter 5-40

Protocol Type parameter 4-43

PSK

configuring 6-21

described 6-19

with mesh 7-15

PSK Format parameter 6-21

purpose of document 1-22

Q

QBSS

configuring using the CLI 6-32

configuring using the GUI6-31to 6-32

described 6-30

guidelines 6-30

information elements 6-30

QoS

and identity networking5-58to 5-59

levels 4-41, 6-27

settings 7-20

with CAC 4-48

QoS profiles

assigning to a WLAN using the CLI 6-29

assigning to a WLAN using the GUI6-28to 6-29

configuring using the CLI4-43to 4-44

configuring using the GUI4-42to 4-43

QoS roles

assigning for use with hybrid-REAP 12-10

configuring using the CLI4-47to 4-48

configuring using the GUI4-44to 4-46

QoS Roles for Guest Users page 4-45

Quality of Service (QoS) parameter 6-29

quarantined VLAN

configuring 3-17

using 12-9

Quarantine parameter 3-17

Query Interval parameter 5-89

Queue Depth parameter 4-43

queue statistics 7-26

R

radio core dumps, sending from LWAPP-enabled access points to controller 7-46

radio measurement requests

configuring

on the CLI 10-32

on the GUI 10-31

overview 10-30

viewing status using the CLI 10-33

radio preamble, described 5-33

radio resource management (RRM)

benefits 10-5

CCX features

See CCX radio management

configuring

using the CLI10-22to 10-23

using the configuration wizard 4-6

using the GUI10-15to 10-22

debugging 10-23

disabling dynamic channel and power assignment

using the CLI 10-28

using the GUI 10-28

overriding dynamic RRM10-24to 10-28

overview10-2to 10-5

specifying channels10-21to 10-22

statically assigning channel and transmit power settings

using the CLI 10-27

using the GUI10-25to 10-26

update interval 10-6, 10-10

viewing settings using the CLI 10-29

radio resource monitoring 10-2

RADIUS Authentication Servers > New page 5-101

RADIUS Authentication Servers page 5-100

RADIUS settings, configuring 4-19

Range (RootAP to MeshAP) parameter 7-14

Redirect URL After Login parameter 9-10

Refresh-time Interval parameter 4-68

regulatory information

for 1000 series access pointsB-2to B-8

for 2000 series controllers B-8

for 4400 series controllers B-9

related publications 1-25

Reserved Roaming Bandwidth parameter 4-52, 4-53

reset button

disabling on LWAPP-enabled access points 7-48

using to revert LWAPP-enabled access points to autonomous mode 7-39

resetting the controller 8-19

Re-sync button 5-92

reverse path filtering (RPF) 11-23

RF Channel Assignment parameter 10-28

RF domain

See RF groups

RF exposure declaration of conformity B-5

RF group leader

described 10-6

viewing 10-10

RF group name

described 10-6

entering 10-7

RF groups

configuring

using the CLI 10-8

using the configuration wizard 4-5

using the GUI 10-7

difference from mobility groups 10-5

overview10-5to 10-6

viewing status

using the CLI 10-10

using the GUI10-8to 10-10

RFID tags

described 4-75

formats supported 4-75

number supported per controller 4-76

RFID tag tracking

configuring using the CLI 4-77

debugging using the CLI 4-79

viewing information using the CLI4-78to 4-79

RF-Network Name parameter 10-7

RLDP. See Rogue Location Discovery Protocol (RLDP)

roaming and real-time diagnostics

configuring using the CLID-24to D-27

described D-12

roam reason report, described 4-38

rogue access point alarm 10-13

rogue access point detection

enabling using the CLI 10-14

enabling using the GUI10-11to 10-13

rogue access points

automatically containing

using the CLI 5-70

using the GUI 5-69

challenges 5-3

classification mapping table 5-66

classifying 5-64

managing 5-64

overview 1-19

rule-based classification support 5-65

tagging, location, and containment 1-19, 5-3, 5-64

viewing and classifying

using the CLI5-82to 5-87

using the GUI5-77to 5-82

WCS support for rule-based classification 5-67

Rogue AP Detail page 5-78

Rogue AP Ignore-List page 5-82

rogue classification rules

configuring using the CLI5-75to 5-77

configuring using the GUI5-71to 5-75

Rogue Client Detail page 5-80

rogue detection 5-68, 5-69

Rogue Detection parameter 5-68

Rogue Location Discovery Protocol (RLDP)

configuring

using the CLI 5-69

using the GUI5-68to 5-69

defined 5-64

Rogue Location Discovery Protocol parameter 5-69

Rogue on Wire parameter 5-69

Rogue Policies page 5-68

Rogue Rule > Edit page 5-73

Rogue Rules > Priority page 5-74

rogue states 5-66, 5-67

Role Name parameter 4-45

Role parameter 5-17, 12-10

root access points (RAPs)

described 7-10

selecting 7-19

root bridge 3-24

Root Cost parameter 3-27

Root Port parameter 3-27

routing around interference in mesh networks 7-36

RRM

See radio resource management (RRM)

RSNA logs

configuringD-24to D-26

described D-12

Rx Sensitivity Threshold parameter 10-37

S

safety warningsA-1to A-26

Save and Reboot button 8-9, 8-11

saving configuration settings 8-18

Scan Threshold parameter 4-40

Scope Name parameter 6-10

Search Clients page 7-76

secondary backhaul, configuring using the CLI 7-37

Secondary RADIUS Server parameter 12-17

sector, described 7-10, 7-11

secure web mode

described 2-2

enabling using the CLI 2-3

enabling using the GUI 2-2

security

overview 5-2

solutions5-2to 5-4

Security Mode parameter 7-15

Security Policy Completed parameter 6-35

Select APs from Current Controller parameter 12-18

self-signed certificate (SSC), LWAPP-enabled access points sending to controller 7-39

Sequence parameter 5-40

serial port

baudrate setting 2-8

connecting 2-7

timeout 2-8

Server Address parameter 5-89

Server Index (Priority) parameter 5-10, 5-20

Server IP Address parameter 5-10, 5-20

Server Key parameter 5-28

Server Mode parameter 5-20

Server Status parameter 5-10

Server Timeout parameter 5-11, 5-20

service port, described 3-5

service-port interface

configuring

using the CLI 3-15

using the configuration wizard 4-4

using the GUI3-10to 3-13

described 3-8

session timeout

configuring

using the CLI 6-25

using the GUI 6-24

described 6-24

Set to Factory Default button 10-15

Shared Secret Format parameter 5-10

Shared Secret parameter 5-10

Short Preamble Enabled parameter 5-33

short preambles, described 5-33

Show Wired Clients option 7-54

shunned clients

described 5-91

viewing

using the CLI 5-92

using the GUI 5-91

Signal Strength Contribution parameter 10-17

Signature > Detail page 5-95

Signature Events Detail page 5-97

Signature Events Summary page 5-96

Signature Events Track Detail page 5-97

SNMP, configuring4-20to 4-21

SNMP alert 10-19

SNMP community string

changing default values using the CLI4-22to 4-23

changing default values using the GUI4-21to 4-22

snmp traps 4-20

SNMP v1 / v2c Community > New page 4-22

SNMP v1 / v2c Community page 4-21

SNMP v3 users

changing default values using the CLI4-24to 4-25

changing default values using the GUI4-23to 4-24

SNMP V3 Users > New page 4-24

SNMP V3 Users page 4-23

software

upgrading

guidelines8-2to 8-3

using the CLI8-6to 8-7

using the GUI8-4to 8-5

Source parameter 5-40

Source Port parameter 5-41

Spanning Tree Algorithm parameter 3-28

Spanning Tree Protocol (STP)

configuring

using the CLI3-29to 3-30

using the GUI3-24to 3-29

described 3-24

spanning-tree root 3-24

Spanning Tree Specification parameter 3-27

SpectraLink NetLink phones

enabling long preambles using the CLI 5-34

enabling long preambles using the GUI 5-33

overview 5-33

Spectralink Voice Priority parameter 4-64

SSC key-hash, on Cisco WiSM 7-38

SSID

configuring

using the CLI 6-6

using the GUI 6-4

described 6-2

SSL certificate

loading using the CLI 2-5

Standard Signatures page 5-94

State parameter 5-89, 5-96

Static Mobility Group Members page 11-10

Statistics option 7-24

Status parameter 4-22, 6-5, 6-11, 9-27

STP Mode parameter 3-26

STP Port Designated Bridge parameter 3-25

STP Port Designated Cost parameter 3-25

STP Port Designated Port parameter 3-25

STP Port Designated Root parameter 3-25

STP Port Forward Transitions Count parameter 3-25

STP Port ID parameter 3-25

STP Port Path Cost Mode parameter 3-26

STP Port Path Cost parameter 3-26

STP Port Priority parameter 3-26

STP State parameter 3-25

Supervisor 720

configuring4-83to 4-84

described 4-83

switch, configuring at the remote site12-5to 12-6

Switch IP Address (Anchor) parameter 11-20

SX/LC/T small form-factor plug-in (SFP) modules 3-4

symmetric mobility tunneling

configuring

using the CLI 11-25

using the configuration wizard 4-5

using the GUI11-24to 11-25

illustrated 11-23

overview11-22to 11-24

Symmetric Mobility Tunneling Mode parameter 11-24

syslog

described D-12

logsD-24to D-26

Syslog Configuration page 4-27

syslog facility, configuringD-7to D-9

syslog levels D-8

Syslog Server IP Address parameter 4-27

system logging

enabling

using the CLI 4-28

using the GUI4-26to 4-27

T

TACACS+

accounting 5-5

authentication 5-4

authorization 5-4

choosing authentication priority order 5-11

configuring

using the CLI5-11to 5-13

using the GUI5-9to 5-11

configuring on ACS5-5to 5-9

described5-4to 5-5

roles 5-4, 5-8

viewing administration server logs5-13to 5-15

TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 5-10

TACACS+ (Authentication, Authorization, or Accounting) Servers page 5-9

TACACS+ (Cisco) page (on CiscoSecure ACS) 5-7

TACACS+ Administration .csv page (on CiscoSecure ACS) 5-14, 5-15

telemetry 4-75

terminal emulator, settings 2-8

TFTP server, guidelines 2-4, 5-93, 8-2, 8-8, 8-10, 8-12

time

configuring manually 4-7

configuring through NTP server 4-6

time-length-values (TLVs), supported for CDP4-66to 4-67

timeout, configuring for disabled clients 6-14

Timeout parameter 5-93, 9-19

Time Since Topology Changed parameter 3-27

Time to Live for the PAC parameter 5-28

TKIP

configuring 6-20, 6-21

described 6-19

parameter 6-20

Topology Change Count parameter 3-27

traffic specifications (TSPEC) request

described 4-49

examples 4-49

traffic stream metrics (TSM)

described 4-50

enabling

using the CLI 4-60

using the GUI 4-52

viewing statistics

using the CLI4-62to 4-64

using the GUI4-56to 4-59

Transition Time parameter 4-40

transmit power

statically assigning using the CLI 10-27

statically assigning using the GUI10-25to 10-26

transmit power levels, described 10-26

Transmit Power parameter 10-37

transmit power threshold, decreasing 10-23

troubleshooting

access point join process7-42to 7-46

problemsD-5to D-7

tunnel attributes, and identity networking5-60to 5-61

Tx Power Level Assignment parameter 10-28

Type parameter 6-4, 9-26, 12-8

U

U-APSD

described 4-50

viewing status

using the CLI 4-62

using the GUI 4-55

UDP port 11-20, 11-26

unicast mode, described 4-31

UNII-2 band, and 1000 series access points 7-4

unique device identifier (UDI)

described 7-67

retrieving

using the CLI 7-69

using the GUI7-67to 7-68

Upload button 5-94, 8-13

Upload File from Controller page 8-13, 8-14

URL parameter 9-17

Use AES Key Wrap parameter 5-101

User Access Mode parameter 9-3

user accounts, managing9-1to 9-20

User Attribute parameter 5-20

User Base DN parameter 5-20

User Credentials parameter 5-21, 5-25

User Name parameter 5-17, 12-10

User Object Type parameter 5-20

User parameter 8-13

User Profile Name parameter 4-24

Using Our SSID parameter 5-69

Utilization threshold parameter 10-19

V

Validate Rogue Clients Against AAA parameter 5-69

Valid Client on Rogue AP parameter 5-69

Validity parameter 8-13

VCI strings 7-41

Verify Certificate CN Identity parameter 5-27

video information, viewing for mesh networks using the CLI7-21to 7-23

video parameters

configuring using the CLI 4-61

configuring using the GUI4-52to 4-53

video settings

viewing using the CLI4-62to 4-64

viewing using the GUI4-54to 4-59

virtual interface

configuring

using the CLI 3-15

using the configuration wizard 4-5

using the GUI3-10to 3-13

described3-7to 3-8

VLAN Identifier parameter

for AP-manager interface 3-11

for dynamic interface 3-16, 3-17

for management interface 3-11

VLAN ID parameter 12-14

VLAN interface

See dynamic interface

VLAN Mappings

button 12-13

page 12-13

VLANs

and identity networking5-59to 5-60

assigning WLANs to 6-14

described 3-8

guidelines 3-10

VLAN Support parameter 12-13

VLAN tag, and identity networking 5-60

Voice & Video Optimized parameter 4-64

voice information, viewing for mesh networks using the CLI7-21to 7-23

Voice Optimized parameter 4-64

voice-over-IP (VoIP) telephone roaming, described 4-37

voice parameters

configuring using the CLI4-59to 4-60

configuring using the GUI4-51to 4-52

voice settings

viewing using the CLI4-62to 4-64

viewing using the GUI4-54to 4-59

VPN Gateway Address parameter 6-26

VPN passthrough

configuring using the CLI 6-26

configuring using the GUI 6-26

W

warnings

defined1-24to 1-25

translatedA-1to A-26

warrantyC-4to C-7

webauth bundle 9-17

web authentication

described 9-7

process9-7to 9-9

successful login window 9-9

Web Authentication Login window

assigning per WLAN

using the CLI 9-22

using the GUI 9-21

choosing9-9to 9-20

choosing the default

using the CLI9-11to 9-12

using the GUI9-9to 9-10

customized example 9-20

customizing from an external web server

using the CLI 9-17

using the GUI9-16to 9-17

default 9-8

downloading a customized login window

using the CLI 9-19

using the GUI9-18to 9-19

guidelines for downloading customized login window9-17to 9-18

modified default example 9-13

previewing 9-10, 9-19

verifying settings using the CLI 9-20

Web Authentication option 9-28

Web Authentication Type parameter 9-10, 9-17, 9-19

Web Auth Type parameter 9-21, 9-28

web-based authentication, configuring 6-26

web-browser security alert 9-7

Web Login page 9-10, 9-16

web mode

enabling using the CLI 2-3

enabling using the GUI 2-2

Web Passthrough option 9-28

Web Policy parameter 5-46, 6-46

Web Server IP Address parameter 9-17

WEP keys, configuring 6-17

WGB clients 7-75

WGB parameter 7-53

WGB Wired Clients page 7-54

wired guest access

configuration overview 9-24

configuring using the CLI9-28to 9-32

configuring using the GUI9-25to 9-28

described9-23to 9-24

guidelines 9-25

one-controller example 9-23

two-controller example 9-24

wired security 1-6

wireless mesh

See mesh

WLAN override

configuring using the CLI 6-39

configuring using the GUI6-38to 6-39

WLAN Override parameter 6-38

WLAN Profile parameter 5-17, 12-10

WLANs

checking security settings 6-18

configuring both static and dynamic WEP 6-19

connecting clients to 12-15

creating

using the CLI 6-6

using the GUI6-3to 6-6

deleting

using the CLI 6-6

using the GUI 6-4

described1-13, 3-9to3-10, 6-2to 6-3

session timeout

configuring 6-24

described 6-24

using the same SSID 6-3

WLANs > Edit (Advanced) page 5-45, 5-52, 5-63, 6-35

WLANs >Edit (Advanced) page D-13

WLANs > Edit (QoS) page 6-31

WLANs > Edit (Security > AAA Servers) page 5-21, 5-29, 6-47

WLANs > Edit (Security > Layer 2) page 6-20, 6-23

WLANs > Edit (Security > Layer 3) page 5-46, 6-26, 6-46, 9-27

WLANs > Edit page 6-4, 9-27, 12-8

WLANs > New page 6-4, 9-26, 12-8

WLANs page 6-3, 11-19

WLAN SSID parameter 6-4, 6-42, 9-5, 9-27, 12-8

WMM

configuring 4-13, 6-31, 6-32

described 6-30

with CAC 4-48

WMM parameter 4-64

WMM Policy parameter 6-31

workgroup bridges (WGBs)

debugging 7-56

described 7-49

guidelines 7-50

illustrated 7-49

in mesh network 7-49

sample configuration 7-52

viewing status

using the CLI 7-55

using the GUI7-53to 7-55

world mode 4-9, 4-10

WPA1+WPA2

configuring

using the CLI 6-21

using the GUI6-20to 6-21

described 6-19

WPA2 Policy parameter 6-20

WPA Policy parameter 6-20