Cisco Wireless LAN Controller Configuration Guide, Release 5.0
Index
Downloads: This chapterpdf (PDF - 824.0KB) The complete bookPDF (PDF - 14.11MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

11n Mode parameter 4-18

3DES, IPSec data encryption, described 5-9

7920 AP CAC parameter 6-34

7920 Client CAC parameter 6-34

7920 support mode

configuring 6-32

described 6-32

7921 support mode, described 6-33

802.11a (or 802.11b) > Client Roaming page 4-41

802.11a (or 802.11b) > Video Parameters page 4-54

802.11a (or 802.11b) > Voice Parameters page 4-53

802.11a (or 802.11b/g) > EDCA Parameters page 4-64

802.11a (or 802.11b/g) Global Parameters > Auto RF page 10-9

802.11a (or 802.11b/g) Global Parameters page 4-14, 10-33

802.11a (or 802.11 b/g) Network Status parameter 10-40

802.11a (or 802.11b/g) Network Status parameter 4-14, 4-54, 4-55, 4-64, 4-65

802.11a/n (or 802.11b/g/n) Cisco APs > Configure page 6-41, 10-26

802.11a/n (or 802.11b/g/n) Radios page 4-58, 10-25

802.11a > Pico Cell Page 10-39

802.11a > Pico Cell page 10-38

802.11a > Pico Cell Page with Pico Cell Mode V2 Parameters 10-39

802.11a > RRM > DCA page 10-11, 10-13, 10-15, 10-16

802.11a > RRM > Dynamic Channel Assignment (DCA) Page 10-13

802.11b/g/n Cisco APs > Configure Page 7-40, D-35

802.11 bands

configuring using the CLI4-15to 4-17

configuring using the GUI4-14to 4-15

802.11g Support parameter 4-14

802.11n

clients 7-50

configuring using the CLI4-20to 4-24

configuring using the GUI4-17to 4-19

devices 4-17

802.11n (2.4 GHz) High Throughput page 4-18

802.1Q VLAN trunk port 3-5

802.1X

authentication, configuring 6-21

configuring 6-23

described 6-22

dynamic key settings 6-21

802.1X+CCKM

configuring 6-23

described 6-22

802.3 bridging

configuring using the CLI 4-32

configuring using the GUI4-31to 4-32

802.3 Bridging parameter 4-32

802.3 frames, described 4-31

802.3X

flow control, enabling 4-31

A

AAA override

configuring

using the CLI 5-77

using the GUI5-76to 5-77

described 5-75

Access Control List Name parameter 5-53

access control lists (ACLs)

applying to an interface

using the CLI 5-62

using the GUI5-56to 5-57

applying to a WLAN

using the CLI 5-62

using the GUI5-58to 5-59

applying to the controller CPU

using the CLI 5-62

using the GUI5-57to 5-58

configuring

using the CLI5-60to 5-62

using the GUI5-52to 5-56

described 5-52

identity networking 5-72

rules 5-52, 5-54, 5-61

Access Control Lists > Edit page 5-55

Access Control Lists > New page 5-53

Access Control Lists > Rules > New page 5-54

Access Control Lists page 5-52

Access Mode parameter 4-27, 4-29

access point

assisted roaming, described 4-40

access point groups

assigning access points to

using the CLI 6-46

using the GUI 6-46

creating

using the CLI 6-45

using the GUI6-44to 6-45

described 6-42

illustrated 6-43

access point manager interface, configuring using the configuration wizard 4-5

access points

authorization list 7-11

authorizing

using MICs 7-10

using SSCs 7-10

using the CLI 7-11

using the GUI 7-10

configure global credentials

using the CLI7-6to 7-7

using the GUI7-4to 7-6

configuring hybrid REAP using the CLI12-14to 12-15

global credentials, setting 7-4

guidelines for operating in Japan B-6

LEDs

configuring 7-49

interpreting D-2

migrating from -J regulatory domain to -U regulatory domain 7-34

priming 7-2

regulatory informationB-2to B-8

rules for operating in TaiwanB-7to B-8

supported for use with hybrid REAP 12-2

supporting oversized images 7-19

troubleshooting

using Telnet or SSH D-37

troubleshooting the join process7-13to 7-16

VCI strings 7-12

verifying that they join the controller 7-3

accounting defined 5-3

Accounting Server parameters 6-51

accounting servers, disabling per WLAN 6-50

ACL counters

configuring using the CLI 5-61

configuring using the GUI 5-53

ACL Name parameter 5-57, 5-58

ACLs

using with the debug facilityD-29to D-30

ACS server configuration page 6-48

Action parameter 5-55

Add AAA Client page (on CiscoSecure ACS) 5-5, 5-20

Add AP button 12-18

Add Interface-Mapping button 6-45

Add New Rule button 5-53

Add Web Server button 9-17

administrator access 4-25

administrator usernames and passwords, configuring 4-25

Admin Status parameter 3-20

Admission Control (ACM) parameter 4-53, 4-54

AES

AES-CCMP, described 6-21

AES CBS, IPSec data encryption, described 5-9

AES parameter 6-23

Aggregated MAC Protocol Data Unit (A-MPDU) 4-20

Aggregated MAC Service Data Unit (A-MSDU) 4-20

aggregation method, specifying 4-20

AirMagnet Enterprise Analyzer

See also network analyzer D-34

Aironet IE parameter 6-25, 6-39

Aironet IEs

configuring using the CLI 6-41

configuring using the GUI 6-39

Airopeek

See also network analyzer D-34

Alarm Trigger Threshold parameter 10-31

All APs > Access Point Name > VLAN Mappings page 12-13

All APs > Details (Advanced) page 7-47

All APs > Details (General) page 12-11

All APs > Details (H-REAP) page 12-12

All APs > Details (Inventory) page 7-43

All APs > Details Page 7-5, D-35

All APs > Details page 4-69, 6-46, 7-30, 10-30

All APs page 10-29, 12-11

Allow AAA Override parameter 5-77, 12-8

Allowable Classification Type and Rogue State Transitions (table)

See also rogue access points

Anonymous Provision parameter, for EAP 5-42

AP > Clients > Traffic Stream Metrics page 4-59

AP > Clients page 4-59

AP Authentication Policy page 5-65, 10-31

AP Configuration > AP Credentials Page 7-5

AP Group Description parameter 6-44

AP Group Name parameter 6-44, 6-46

AP Groups VLAN Feature Enable parameter 6-44

AP Groups VLAN page 6-44, 6-45

AP-manager interface

configuring

using the CLI 3-13

using the GUI3-10to 3-12

creating multiple interfaces3-38to 3-39

described 3-6

illustration

of four AP-manager interfaces 3-38

of three AP-manager interfaces 3-37

of two AP-manager interfaces 3-36

using multiple3-35to 3-39

AP Mode parameter 10-30, 12-12

Apply to All APs parameter 7-5

AP Policies page 7-11

Assignment Method parameter 10-26

asymmetric tunneling, illustrated 11-27

audience of document iii-xx

authentication defined 5-3

authentication information element (IE) 10-29

Authentication Priority parameter 5-11, 5-25

Authentication Protocol parameter 4-29

Auth Key Mgmt parameter 6-23

Authority ID Information parameter 5-42, 12-20, 12-22

Authority ID parameter 5-42, 12-20

Authorize APs Against AAA parameter 7-11

Authorize Self Signed Certificate (SSC) parameter 7-11

authorizing access points

using the CLI 7-11

using the GUI 7-10

auto-anchor mobility

configuring

using the CLI11-24to 11-25

using the GUI11-22to 11-24

guidelines 11-22

overview11-21to 11-22

AutoInstall

example operation 4-9

obtaining DHCP addresses for interfaces 4-7

obtaining TFTP server information 4-7

overview 4-6

selecting configuration file 4-8

controllers

using AutoInstall 4-6

configuration files

using AutoInstall 4-6

AutoInstall Feature4-6to 4-9

autonomous access points converted to lightweight mode. See LWAPP-enabled access points

auto-provisioning. See AutoInstall

auto RF, configuring using the configuration wizard 4-6

Average Data Rate parameter 4-44, 4-48

Average Real-Time Rate parameter 4-45, 4-48

Avoid Cisco AP Load parameter 10-14

Avoid Foreign AP Interference parameter 10-14, 11-19

Avoid Non-802.11a (802.11b) Noise parameter 10-14

B

backup controllers

configuring using the CLI7-26to 7-28

described 7-26

backup controllers, configuring7-26to 7-28

bandwidth-based CAC

described 4-50

enabling

using the CLI 4-60

using the GUI 4-53

Base MAC Address parameter 3-26

Beacon Period parameter 4-14

bootup script, for Configuration Wizard 4-4

bridge protocol data units (BPDUs) 3-23

Buffered Log Level parameter D-9

Burst Data Rate parameter 4-44, 4-48

Burst Real-Time Rate parameter 4-45, 4-48

C

CAC

configuring for 7920 phones 6-32

described 4-50

enabling

using the CLI 4-61

using the GUI 4-54

viewing using the CLI 4-62

Canadian compliance statement B-3

Catalyst 3750G Integrated Wireless LAN Controller Switch

described 1-12

logical connectivity diagram and associated software commandsE-4to E-6

ports 3-3, 3-4

caution, defined iii-xxi

CCA Sensitivity Threshold parameter 10-40

CCKM

configuring 6-23

described 6-22

hybrid-REAP groups 12-16

CCX

configuring Aironet IEs

using the CLI 6-41

using the GUI 6-39

described 6-38

viewing a client's version

using the CLI 6-41

using the GUI6-39to 6-41

CCX Layer 2 client roaming

configuring

using the CLI 4-42

using the GUI4-41to 4-42

debugging using the CLI 4-43

described 4-40

obtaining information using the CLI 4-42

CCX link test 7-44

CCX radio management

configuring

using the CLI 10-35

using the GUI10-33to 10-34

debugging using the CLI 10-37

features 10-32

hybrid-REAP considerations 10-32

obtaining information using the CLI10-35to 10-36

CCXv5 clients

location presence enabled 4-83

CCXv5 clients, troubleshootingD-14to D-29

CCXv5 Req button D-21

CCX Version parameter 6-40

CDP > AP Neighbors > Detail page 4-72

CDP > AP Neighbors page 4-72

CDP > Global Configuration page 4-69

CDP > Interface Neighbors > Detail page 4-71

CDP > Interface Neighbors page 4-70

CDP > Traffic Metrics page 4-73

CDP Advertisement Version parameter 4-69

CDP AP Neighbors page 4-71

CDP Protocol Status parameter 4-69

CDP State parameter 4-70

Certificate Authority (CA) certificates

downloading

using the CLI 8-11

using the GUI 8-10

overview 8-10

using with local EAP 5-38, 5-44

Certificate Issuer parameter 5-41

Certificate Password parameter 8-9

Certificate Type parameter 7-11

Change Rules Priority parameter 5-86

Channel Assignment Leader parameter 10-14

Channel Assignment Method parameter 10-13

channel bandwidth, changing from 20 to 40 MHz4-21to 4-22

channels

statically assigning

using the CLI 10-27

using the GUI10-25to 10-26

Channel Scan Duration parameter 10-18

Check Against CA Certificates parameter 5-41

Check Certificate Date Validity parameter 5-42

chokepoints, for RFID tag tracking 4-77

CIDS Sensor Add page 5-100

CIDS Sensors List page 5-99

CIDS Shun List page 5-102

ciphers

configuring 6-23, 6-24

described 6-22

Cisco 2100 Series Wireless LAN Controllers

AutoInstall interfaces 4-7

described 1-9

FCC statement B-8

features not supported 1-9

network connections1-17to 1-18

ports 3-2, 3-3, 3-4

Cisco 28/37/38xx Integrated Services Router

described 1-11

logical connectivity diagram and associated software commands E-3

ports 3-3, 3-4, 4-87

using4-86to 4-87

versions 1-11

Cisco 4400 Series Wireless LAN Controllers

AutoInstall interfaces 4-7

described 1-9

FCC statement B-9

models 3-4

network connections1-18to 1-19

ports 3-2, 3-3, 3-4

supporting more than 48 access points3-35to 3-39

Cisco 7920 Wireless IP Phone, guidelines 6-33

Cisco 7921 Wireless IP Phone, guidelines 6-33

Cisco AV-pairs 6-47, 6-48

Cisco Client Extensions (CCX). See CCX

Cisco Discovery Protocol (CDP)

configuring

using the CLI 4-74

using the GUI4-68to 4-70

debugging using the CLI 4-76

described 4-66

enabling using the GUI4-69to 4-70

sample network 4-68

supported devices 4-66

viewing neighbors

using the CLI4-75to 4-76

using the GUI4-70to 4-74

viewing traffic information

using the CLI 4-75

using the GUI 4-73

Cisco Discovery Protocol parameter 4-70

Cisco high-power switches 7-47

Cisco Logo parameter 9-10

CiscoSecure Access Control Server, using RADIUS 5-4

Cisco Unified Wireless Network (UWN) Solution

described1-2to 1-5

illustrated 1-3

Cisco Wireless Control System (WCS), described 1-2

Cisco WiSM

configuring the Supervisor 7204-85to 4-86

described1-10to 1-11

guidelines 4-85

logical connectivity diagram and associated software commandsE-2to E-3

ports 3-3, 3-4

SSC key-hash 7-8

support maximums

router chassis 1-10

switch chassis 1-10

CKIP

configuring

using the CLI 6-26

using the GUI6-25to 6-26

described 6-25

clearing the controller configuration 8-17

Clear Stats button 11-20

CLI

basic commands 2-9

enabling wireless connections 2-9

logging into2-7to 2-8

logging out 2-8

navigating 2-9

troubleshooting commandsD-5to D-7

using2-7to 2-9

Client Certificate Required parameter 5-41

client location, using WCS 1-8

client MFP, described 5-63

Client Protection parameter 5-67

client reporting

configuring using the CLID-23to D-26

configuring using the GUID-20to D-23

described D-14

Client Reporting page D-22

client roaming, configuring4-39to 4-43

clients

connecting to WLANs 12-15

viewing CCX version using the CLI 6-41

viewing CCX version using the GUI6-39to 6-41

viewing using the CLI7-53to 7-54

viewing using the GUI7-49to 7-53

Clients > AP > Traffic Stream Metrics page 4-57

Clients > AP page 4-57

Clients > Detail page 4-56, 6-40, 7-23, 7-24, 7-52, D-21

Clients page 4-55, 7-23, 7-45, 7-50

Client Type parameter 7-24

Commands > Reset to Factory Defaults page 4-3

Community Name parameter 4-27

conditional web redirect 6-47

configuring

using the CLI 6-50

using the GUI 6-49

described 6-47

Conditional Web Redirect parameter 6-49, 6-50

Configuration File Encryption Key parameter 8-16

Configuration File Encryption parameter 8-14

configuration files

downloading

using the CLI8-16to 8-17

using the GUI8-15to 8-16

uploading

using the CLI 8-15

using the GUI8-14to 8-15

configuration wizard

described 4-2

running4-4to 4-6

configure global credentials

using the CLI7-6to 7-7

using the GUI7-4to 7-6

Configure option, for RRM override 10-25

Confirm Password parameter 12-10

Console Log Level parameter D-9

controller failure detection time, reducing 7-26

controller network module

baud rate 3-3

versions 3-4

controllers

configuration

clearing 8-17

erasing 8-18

saving 8-17

connections 1-12

discovery process 7-2

multiple-controller deployment1-4to 1-5

overview1-7to 1-8

platforms1-8to 1-12

primary, secondary, and tertiary 1-8

resetting factory default settings

using the CLI 4-3

using the GUI 4-3

single-controller deployment1-3to 1-4

synchronizing with location appliance 4-82

types of memory 1-16

upgrading software

guidelines8-2to 8-3

using the CLI8-5to 8-7

using the GUI8-4to 8-5

Controller Spanning Tree Configuration page 3-26

Controller Time Source Valid parameter 5-67

Control Path parameter 11-24

conventions of documentiii-xxito iii-xxiii

Country Code parameter 7-31

country codes

commonly used 7-28

configuring

using the CLI7-31to 7-34

using the configuration wizard 4-5

using the GUI7-29to 7-31

described 7-28

Japanese 7-35

viewing using the CLI 7-33

See also multiple country codes

Country page 7-29

Coverage Exception Level per AP parameter 10-16

coverage hole detection and correction 10-4

CPU Access Control Lists page 5-58

CPU ACL Mode parameter 5-58

Custom Signatures page 5-108

D

Data Path parameter 11-24

Data Rates parameters 4-15

date

configuring manually 4-10

configuring through NTP server 4-10

setting

using the CLI 4-11

using the GUI 4-10

DCA algorithm default value 10-13

DCA Channels parameter 10-14

DCA Sensitivity Level parameter 10-14

debug commands, sending 7-16

debug facility

configuringD-30to D-33

describedD-29to D-30

Default Mobility Group parameter 11-12

Default Routers parameter 6-11

Delivery Traffic Indication Map (DTIM). See DTIM period

Deny Counters parameter 5-56

DES, IPSec data encryption, described 5-9

Description parameter 5-31, 12-10

Designated Root parameter 3-26

Destination parameter 5-54

Destination Port parameter 5-55

device certificates

downloading

using the CLI 8-9

using the GUI8-8to 8-9

overview 8-8

using with local EAP 5-38, 5-44

DHCP

configuring using the CLI 6-9

configuring using the GUI 6-8

DHCP Addr. Assignment Required parameter 6-9

DHCP option 43, in controller discovery process 7-2

DHCP option 82

configuring5-51to 5-52

described 5-51

example 5-51

DHCP proxy, configuring 4-24

DHCP Scope > Edit page 6-11

DHCP scopes

configuring using the CLI6-12to 6-13

configuring using the GUI6-10to 6-11

described 6-10

DHCP Scopes page 6-10

DHCP server discovery 7-2

DHCP Server IP Addr parameter 6-9

DHCP Server Override parameter 6-9

DHCP servers

configuring using the configuration wizard 4-5

external6-7to 6-8

internal 6-7

diagnostic channel

configuring using the CLID-16to D-20

configuring using the GUI D-15

described D-14

Diagnostic Channel parameter D-15

directed roam request, for controller 4-40

Direction parameter 5-55

disabled clients, configuring a timeout 6-14

discovery request timer, configuring 7-27

distribution system ports, described3-4to 3-5

DNS Domain Name parameter 6-11

DNS Servers parameter 6-11

document

audience iii-xx

conventionsiii-xxito iii-xxiii

organizationiii-xxto iii-xxi

purpose iii-xx

domain name server (DNS) discovery 7-2

Download button 5-107, 8-9, 8-11, 9-19

Download File to Controller page 5-107, 8-8, 8-10, 8-15, 9-18

DSCP parameter 5-55

DTIM period, configuring for MAC filtering 6-14

DTPC Support parameter 4-15

dynamic channel assignment 10-3

dynamic frequency selection, described7-37to 7-38

dynamic interface

configuring

using the CLI3-17to 3-18

using the GUI3-15to 3-17

described 3-8

dynamic transmit power control

configuring 4-15

described 10-3

dynamic WEP, configuring 6-21

E

EAP

setting local timers5-44to 5-45

EAP-FAST Method Parameters page 5-42

EAP-FAST parameter 5-41

EAP Profile Name parameter 5-43

EAP-TLS parameter 5-41

EDCA Profile parameter 4-65

Edit QoS Profile page 4-44

Edit QoS Role Data Rates page 4-47

Egress Interface parameter 9-26

Email Input parameter 9-27

Enable AP Local Authentication parameter 12-19

Enable Check for All Standard and Custom Signatures parameter 5-109

Enable Controller Management to be accessible from Wireless Clients parameter 2-10, 5-50

Enable Counters parameter 5-53

Enable Coverage Hole Detection check box 10-15

Enable CPU ACL parameter 5-58

Enable Dynamic AP Management parameter 3-39

Enable EAP-FAST Authentication parameter 12-20

Enable IGMP Snooping parameter 4-36

Enable LEAP Authentication parameter 12-20

Enable Low Latency MAC parameter 4-65

Enable Server Status parameter 5-34

Encryption Key parameter, for WLANs 6-26

end user license agreementC-2to C-4

enhanced distributed channel access (EDCA) parameters

configuring using the CLI4-65to 4-66

configuring using the GUI4-64to 4-65

enhanced neighbor list

described 4-40

request (E2E), described 4-40

EoIP port 11-24, 11-30

epings 11-24, 11-30

erasing the controller configuration 8-18

Ethernet connection, connecting remotely to CLI 2-8

Ethernet Multicast Mode parameter 4-35

European declaration of conformityB-4to B-5

event reporting, for MFP 5-64

Expedited Bandwidth parameter 4-54

expedited bandwidth requests

described 4-51

enabling

using the CLI 4-60

using the GUI 4-54

Extensible Authentication Protocol (EAP), configuring 6-21

F

factory default settings

resetting using the CLI 4-3

resetting using the GUI 4-3

failover protection1-16to 1-17

Fast Ethernet port 3-4

fast heartbeat timer, enable 7-27

FCC declaration of conformityB-2to B-3

FCC statement

2100 series controllers B-8

4400 series controllers B-9

Federal Information Processing Standards (FIPS). See RADIUS

File Name parameter 8-9, 8-11, 8-13, 8-14, 8-16, 9-19

File Path parameter 8-9, 8-11, 8-13, 8-14, 8-16, 9-19

file transfers 1-14

File Type parameter 8-8, 8-10, 8-12, 8-14, 8-16, 9-18

filter, using to view clients7-50to 7-51

Fingerprint parameter 5-101

flashing LEDs, configuring 7-49

Forward Delay parameter 3-27, 3-28

Fragmentation Threshold parameter 4-14

Friendly Rogue > Create Page 5-86

G

General page 3-32, 4-32, 4-35, 5-30, 5-115, 10-7

Generate Password parameter 9-5

gigabit Ethernet port 3-4

global credentials, override using the CLI 7-6

global credentials, override using the GUI 7-5

global credentials, verify 7-7

Group Mode parameter 10-9, 11-18

Group Name parameter 11-13, 12-17

Group Name parameter, for mobility group 11-13

Group Setup page (on CiscoSecure ACS) 5-22

Guest LAN parameter 9-26

guest N+1 redundancy 11-21

guest user accounts

creating9-2to 9-7

creating as a lobby ambassador9-4to 9-6

viewing

using the CLI 9-7

using the GUI 9-6

Guest User parameter 5-31, 12-10

Guest User Role parameter 5-31, 12-10

guest WLAN, creating 9-5

GUI

enabling wireless connections 2-9

guidelines 2-2

opening 2-2

using 2-2

H

Headline parameter 9-10

Hello Time parameter 3-27, 3-28

help, obtaining 2-2

hex2pcap, sample output D-32

high-density network

benefits 10-37

example 10-37

overview 10-37

See also pico cell mode

Holdtime parameter 3-27, 4-69

HREAP Group Name parameter 12-13

HREAP Groups > Edit page 12-18, 12-19, 12-20

HREAP Groups page 12-17

H-REAP Local Switching parameter 12-8

HTTP Access parameter 2-3

HTTP Configuration page 2-3

HTTPS Access parameter 2-3

hybrid REAP

access points supported 12-2

authentication process12-2to 12-4

bandwidth restriction 12-2

configuring

access points using the CLI12-14to 12-15

access points using the GUI12-11to 12-14

controller using the GUI12-6to 12-10

guidelines 12-4

illustrated 12-2

number of access points supported 12-2

overview 12-2

hybrid-REAP groups

backup RADIUS server 12-16

CCKM 12-16

configuring using the CLI 12-21

configuring using the GUI12-17to 12-21

described 12-15

example 12-16

local authentication 12-17

Hysteresis parameter 4-41

I

identity networking

configuring5-71to 5-74

described1-13to 1-14

overview 5-71

RADIUS attributes5-72to 5-74

IDS

described 5-99

IDS sensors

configuring

using the CLI5-101to 5-102

using the GUI5-99to 5-101

described 5-99

IDS signature events

viewing using the CLI5-113to 5-115

viewing using the GUI5-110to 5-111

IDS signatures

configuring using the CLI5-112to 5-113

configuring using the GUI5-106to 5-110

described 5-103

frequency 5-110

MAC frequency 5-110, 5-112

measurement interval 5-110

pattern 5-109

quiet time 5-110, 5-113

tracking method 5-109

uploading or downloading using the GUI5-106to 5-107

viewing using the CLI5-113to 5-115

viewing using the GUI5-110to 5-111

IGMP Timeout parameter 4-36

IKE

Diffie Hellman Group 5-10

IKE Phase 1 parameter 5-10

Index parameter, for IDS 5-100

infrastructure MFP

components 5-64

described 5-63

Infrastructure MFP Protection parameter 5-66

Infrastructure Protection parameter 5-67

Infrastructure Validation parameter 5-67

Ingress Interface parameter 9-26

Injector Switch MAC Address parameter 7-48

inline power, described 7-46

intelligent power management (IPM) 7-47

inter-controller roaming

described 4-39

example 11-3

Interface Name parameter 6-45

Interface parameter 6-9

interfaces

and identity networking 5-73

assigning WLANs 6-14

configuring

using the CLI3-12to 3-14

using the GUI3-10to 3-12

overview3-5to 3-8

Interfaces > Edit page 3-16, 3-38, 5-57

Interfaces > New page 3-15, 3-38

Interfaces page 3-10

interference

defined 10-3

Interference threshold parameter 10-17

Internet Group Management Protocol (IGMP)

configuring using the CLI 4-37

configuring using the GUI 4-36

snooping, described 4-33

inter-subnet mobility 11-7

inter-subnet roaming

described 4-39

illustrated11-3to 11-4

Interval parameter 10-34

Intra-Controller Roaming 11-2

intra-controller roaming

described 4-39

illustrated 11-2

Inventory page 7-42

Invoke Channel Update Now button 10-13

Invoke Power Update Now button 10-11

IP Address parameter 4-27, 8-9, 8-10, 8-13, 8-14, 8-16, 9-18

IP Mask parameter 4-27

IPSec parameter 5-9

IPv6 bridging

configuring using the CLI 6-38

configuring using the GUI6-37to 6-38

described 6-36

guidelines 6-36

IPv6 bridging and IPv4 web authentication, example 6-37

IPv6 Enable parameter 6-38

J

Japanese country codes 7-35

Japanese regulations for migrating access points from -J to -U regulatory domain 7-34, 7-37

K

Keep Alive Count parameter 11-23

Keep Alive Interval parameter 11-23

Key Encryption Key (KEK) parameter 5-8

Key Format parameter 6-26

Key Index parameter 6-26

key permutation

configuring 6-26, 6-27

described 6-25

Key Permutation parameter 6-26

Key Size parameter 6-26

Key Wrap Format parameter 5-8

Key Wrap parameter 5-8

L

LAG. See link aggregation (LAG)

LAG Mode on Next Reboot parameter 3-33

Last Auto Channel Assignment parameter 10-14

Last Power Level Assignment parameter 10-12

Layer 1 security 5-2

Layer 2

LWAPP discovery 7-2

operation 1-6

security

configuring6-20to 6-27

described 5-2

Layer 2 Security parameter 6-23, 6-26, 6-49

Layer 3

LWAPP discovery 7-2

operation 1-6

security

configuring6-28to 6-30

described 5-3

Layer 3 Security parameter 6-29, 6-30, 6-49, 9-27

LDAP

choosing server priority order 5-34

configuring

using the CLI5-36to 5-37

using the GUI5-33to 5-36

local EAP methods supported 5-33, 5-37

LDAP servers, assigning to WLANs5-35to 5-36

LDAP Servers > New page 5-33

LDAP Servers page 5-33

LDAP Servers parameter 5-43

LEAP parameter 5-41

Lease Time parameter 6-11

LEDs

configuring 7-49

for controllers D-2

license agreementC-2to C-4

Lifetime parameter 5-31, 9-5, 12-10

Lightweight Access Point Protocol (LWAPP), described. See LWAPP-enabled access points

lightweight mode, reverting to autonomous mode 7-9

limited warrantyC-4to C-6

link aggregation (LAG)

configuring neighboring devices 3-34

described3-29to 3-30

enabling

using the CLI 3-33

using the GUI3-32to 3-33

example 3-29

guidelines3-31to 3-32

illustrated 3-31

verifying settings using the CLI 3-34

Link Status parameter 3-20

Link Test

button 7-45

option 7-45

page 7-45

link test

described 7-43

performing

using the CLI 7-46

using the GUI7-44to 7-45

types of packets 7-43

Link Trap parameter 3-21

Load-based AC parameter 4-53

load-based CAC

described 4-51

enabling

using the CLI 4-60

using the GUI 4-53

Load Measurement parameter 10-17

lobby ambassador account

creating using the CLI 9-3

creating using the GUI9-2to 9-3

Lobby Ambassador Guest Management > Guest Users List > New page 9-4

Lobby Ambassador Guest Management > Guest Users List page 9-4, 9-6

local EAP

configuring

using the CLI5-43to 5-47

using the GUI5-38to 5-43

debugging 5-47

described5-37to 5-38

example 5-38

viewing information using the CLI 5-46

Local EAP Authentication parameter 5-43

Local EAP Profiles > Edit Page 5-41

Local EAP Profiles Page 5-40

Local Management Users > New page 9-3

Local Management Users page 9-2

Local Net Users > New page 5-31, 12-9

Local Net Users page 5-30, 9-6

local network users

configuring using the CLI 5-32

configuring using the GUI5-29to 5-32

local user database, capacity 9-2

location

calibration 10-33

settings, viewing using the CLI4-82to 4-84

location appliance

certificate, installing4-81to 4-82

synchronizing with controller 4-82

location-based services 10-33

location presence 4-83

logical connectivity diagram

Catalyst 3750G Integrated Wireless LAN Controller Switch E-4

Cisco 28/37/38xx Integrated Services Router E-3

Cisco WiSM E-2

logs

roamingD-14, D-26to D-27

RSNAD-14, D-26to D-28

syslogD-15, D-26to D-28

long preambles

described 5-48

enabling on SpectraLink NetLink phones

using the CLI 5-49

using the GUI 5-48

LWAPP-enabled access points

configuring a static IP address 7-18

debug commands 7-16

disabling the reset button 7-18

enabling memory core dumps 7-18

guidelines 7-8

Layer 2 discovery 7-2

MAC addresses displayed on controller GUI 7-18

receiving debug commands from controller 7-16

reverting to autonomous mode7-9to 7-10

sending crash information to controller 7-17

sending radio core dumps to controller 7-17

sending SSCs to controller 7-10

LWAPP hybrid-REAP, migrating to 12-17

M

MAC address of access point

displayed on controller GUI 7-18

MAC filtering

DTIM period 6-14

MAC filtering, configuring on WLANs6-13to 6-14

management frame protection (MFP)

configuring

using the CLI5-67to 5-68

using the GUI5-65to 5-66

debugging 5-70

described5-63to 5-64

guidelines 5-64

types 5-63

viewing settings5-68to 5-70

Management Frame Protection parameter 5-67

Management Frame Protection Settings page 5-67

management frame validation 5-64

management interface

described 3-6

management interface, overview

configuring

using the CLI 3-12

using the GUI3-10to 3-12

Management over Wireless feature

described 5-50

enabling

using the CLI 5-50

using the GUI 5-50

Master Controller Configuration page 7-3

Master Controller Mode parameter 7-3

Max Age parameter 3-26

Maximum Age parameter 3-27

maximum local database entries

configuring using the CLI 5-116

configuring using the GUI 5-115

Maximum Local Database Entries parameter 5-30, 5-115

Maximum Retries parameter 9-18

Maximum RF Usage Per AP parameter 4-45

Max RF Bandwidth parameter 4-53, 4-55

MCS data rates 4-18

Member MAC Address parameter 11-13

memory

core dumps from converted APs 7-18

types 1-16

Message Authentication Code Key (MACK) parameter 5-8

Message Authentication Code Key (MACK) parameter. See RADIUS

message logs

configuring

using the CLID-10to D-13

using the GUI D-7

viewing

using the CLI D-13

using the GUID-9to D-10

See also system logging

Message Logs page D-10

Message parameter, for web authentication 9-10

Metrics Collection parameter 4-54

MFP Client Protection parameter 5-66

MFP Frame Validation parameter 5-66

MIC, described 6-21, 6-25

migrating access points from -J to -U regulatory domain 7-34

Min Failed Client Count per AP parameter 10-15

Minimum RSSI parameter 4-41

mirror mode. See port mirroring, configuring

MMH MIC

configuring 6-26, 6-27

described 6-25

MMH Mode parameter 6-26

Mobile Announce messages 11-7

mobility, overview11-2to 11-5

Mobility Anchor Config page 11-23, 11-28

Mobility Anchor Create button 11-24

mobility anchors

viewing 11-24

See also auto-anchor mobility

Mobility Anchors option 11-23

Mobility Anchors page 11-23, 11-27

Mobility Group Member > New page 11-12

Mobility Group Members > Edit All page 11-14

mobility groups

configuring

using the CLI 11-16

using the configuration wizard 4-5

using the GUI11-12to 11-14

with one NAT device 11-8

with two NAT devices 11-9

detecting failed members 11-21

determining when to include controllers 11-7

difference from RF groups 10-5

examples 11-6

failover 11-21

illustrated 11-5

messaging among 11-7

overview11-5to 11-9

ping requests to members 11-21

prerequisites11-9to 11-10

using with NAT devices11-7to 11-9

mobility group statistics

types 11-17

viewing using the CLI 11-20

viewing using the GUI11-17to 11-20

Mobility Multicast Messaging > Edit Page 11-15

Mobility Multicast Messaging Page 11-14

mobility ping tests, running 11-30

Mobility Statistics page 11-18

mode button. See reset button

Mode parameter 4-41, 10-34

monitor intervals, configuring using the GUI 10-17

mpings 11-24, 11-30

Multicast Appliance Mode parameter 3-21

multicast groups

viewing using the CLI 4-37

viewing using the GUI 4-36

Multicast Groups page 4-36

multicast mode

configuring using the GUI4-35to 4-36

described4-33to 4-34

enabling using the CLI 4-37

guidelines4-34to 4-35, 7-20

Multicast page 4-36

multiple country codes

configuration guidelines 7-29

configuring using the CLI 7-31

configuring using the GUI7-30to 7-31

multiple country support, using the configuration wizard 4-5

N

NAT devices, in mobility groups11-7to 11-9

Native VLAN ID parameter 12-13

Neighbor Packet Frequency parameter 10-17

Netbios Name Servers parameter 6-11

Netmask parameter 6-11

network analyzer supported software

AirMagnet D-34

Airopeek D-34

Omnipeek D-34

Wireshark D-34

Network Mobility Services Protocol (NMSP) 4-77, 4-84

Network parameter 6-11

Noise Measurement parameter 10-17

note, defined iii-xxi

NTP server

configuring to obtain time and date 4-10

setting in the configuration wizard 4-6

Number of Hits parameter 5-56

O

Omnipeek

See also network analyzer

online help, using 2-2

OpenSSL license issuesC-6to C-8

operating system

security1-5to 1-6

software 1-5

organization of documentiii-xxto iii-xxi

Override Global Config parameter 9-21, 9-27

Override Global Credentials check box 7-6

override global credentials CLI command 7-6

Override Interface ACL parameter 5-59

oversized access point images 7-19

over-the-air provisioning (OTAP) 7-2

P

P2P Blocking parameter 6-19

password, default enable 7-4

password, setting global 7-4

Password parameter 5-31, 8-12, 12-10

password recovery mechanism 4-25

PEAP parameter 5-41

peer-to-peer blocking

configuring using the CLI6-19to 6-20

configuring using the GUI6-18to 6-19

described 6-17

examples 6-16, 6-18

guidelines 6-18

Physical Mode parameter 3-21

Physical Status parameter 3-20

pico cell mode

configuring

using the CLI10-40to 10-41

using the GUI10-38to 10-40

debugging using the CLI 10-41

guidelines 10-38

overview10-37to 10-38

versions 10-39

Pico Cell Mode parameter 10-39

ping link test, described 7-43

ping tests, described 11-30

PMK cache lifetime timer 6-24

PMKID caching 6-24

Pool End Address parameter 6-11

Pool Start Address parameter 6-11

Port > Configure page 3-19

port mirroring, configuring 3-22

Port Number parameter 3-20, 5-8, 5-24, 5-34

Port parameter, for IDS 5-100

ports

configuring3-18to 3-29

on 2100 series controllers 3-2, 3-3, 3-4

on 4400 series controllers 3-2, 3-3, 3-4

on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-4

on Cisco 28/37/38xx Series Integrated Services Router 3-3, 3-4, 4-87, 7-13

on Cisco WiSM 3-3, 3-4

overview3-2to 3-5

Ports page 3-18

Power Assignment Leader parameter 10-12

Power Injector Selection parameter 7-47

Power Injector State parameter 7-47

Power Neighbor Count parameter 10-12

power over Ethernet (PoE)

configuring

using the CLI 7-48

using the GUI7-46to 7-48

described 1-14, 7-46

Power Over Ethernet (PoE) parameter 3-20

Power Threshold parameter 10-12

preauthentication access control list (ACL)

applying to a WLAN

using the CLI 5-62

using the GUI5-59to 5-60

for external web server 9-16, 12-9

Preauthentication ACL parameter 5-60, 6-49

Pre-Standard State parameter 7-47

Primary RADIUS Server parameter 12-18

priming access points 7-2

Priority Order > Local-Auth page 5-35

Priority Order > Management User page 5-11, 5-25

Priority parameter 3-27

Privacy Protocol parameter 4-29

Profile Details page D-23

Profile Name parameter 6-4, 9-26, 12-7

protected access credentials (PACs)

overview 8-12

uploading

using the CLI 8-13

using the GUI 8-12

using with local EAP 5-38, 5-42, 5-44, 12-20, 12-21

Protection Type parameter 5-65, 10-31

Protocol parameter 5-54

Protocol Type parameter 4-45

PSK

configuring 6-23

described 6-22

PSK Format parameter 6-23

purpose of document iii-xx

Q

QBSS

configuring using the CLI 6-35

configuring using the GUI6-33to 6-34

described 6-32

guidelines 6-33

QoS

identity networking 5-72

levels 4-43, 6-30

with CAC 4-50

QoS profiles

assigning to a WLAN using the CLI 6-31

assigning to a WLAN using the GUI 6-31

configuring using the CLI4-45to 4-46

configuring using the GUI4-44to 4-45

QoS roles

assigning for use with hybrid-REAP 12-10

configuring using the CLI4-49to 4-50

configuring using the GUI4-46to 4-48

QoS Roles for Guest Users page 4-47

Quality of Service (QoS) parameter 6-31

quarantined VLAN

configuring 3-16

using 12-8

Quarantine parameter 3-16

Query Interval parameter 5-100

Queue Depth parameter 4-45

R

radio core dumps, to controller 7-17

radio measurement requests

configuring

on the CLI 10-35

on the GUI 10-34

overview 10-33

viewing status using the CLI 10-36

radio preamble, described 5-48

radio resource management (RRM)

benefits 10-5

CCX features. SeeCCX radio management

configuring

using the CLI10-18to 10-21

using the configuration wizard 4-6

using the GUI10-10to 10-18

configuring monitor intervals

using the GUI 10-17

coverage hole detection

using the GUI10-15to 10-16

coverage hole detection and correction 10-4

debugging 10-23

disabling dynamic channel and power assignment

using the CLI 10-28

using the GUI 10-28

overriding RRM10-24to 10-28

overview10-2to 10-5

specifying channels10-12to 10-14

statically assigning channel and transmit power settings

using the CLI 10-27

using the GUI10-25to 10-26

update interval 10-6, 10-9

view using the CLI10-21to 10-23

Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC parameter 10-11

radio resource monitoring 10-2

RADIUS

configured on ACS 5-4

configuring

using the CLI5-11to 5-14

using the GUI5-6to 5-11

configuring on ACS 5-4

FIPS standard 5-11

KEK parameter 5-12

MACK parameter 5-12

server fallback behavior 5-10

using with hybrid REAP 12-16

RADIUS accounting attributes5-17to 5-18

RADIUS settings, configuring 5-3

Redirect URL After Login parameter 9-10

Refresh-time Interval parameter 4-69

regulatory information

for 1000 series access pointsB-2to B-8

for 4400 series controllers B-9

related publications iii-xxiii

Remote Authentication Dial-In User Service. SeeRADIUS

Reserved Roaming Bandwidth parameter 4-54, 4-55

reset button

disabling on LWAPP-enabled access points 7-18

using to revert LWAPP-enabled access points to autonomous mode7-9to 7-10

resetting the controller 8-18

Re-sync button 5-103

reverse path filtering (RPF) 11-27

RF Channel Assignment parameter 10-28

RF domain. See RF groups

RF exposure declaration of conformity B-5

RF group leader

described 10-6

viewing 10-9

RF group name

described 10-6

entering 10-7

RF groups

configuring

using the CLI 10-8

using the configuration wizard 4-5

using the GUI 10-7

difference from mobility groups 10-5

overview10-5to 10-6

viewing status

using the CLI 10-9

using the GUI10-8to 10-9

RFID tags

described 4-76

formats supported 4-76

number supported per controller 4-77

tracking

configuring using the CLI 4-78

debugging using the CLI 4-80

viewing information using the CLI4-79to 4-80

RF-Network Name parameter 10-7

RLDP

configuring

using the GUI5-81to 5-82

configuring using the CLI5-82to 5-83

roaming and real-time diagnostics

configuring using the CLID-26to D-29

described D-14

logs

described D-14

viewingD-26to D-27

roam reason report, described 4-40

rogue access point alarm 10-31

rogue access point detection

enabling using the CLI10-31to 10-32

enabling using the GUI10-29to 10-31

rogue access points

Allowable Classification Type and Rogue State Transitions (table)

Classification Mapping (table) 5-79

classifying 5-78

configuring RLDP5-81to 5-83

managing 5-77

RLDP support 5-78

rule-based classification support 5-78

tagging, location, and containment 5-78

viewing and classifying

using the CLI5-95to 5-99

using the GUI5-89to 5-94

WCS support for rule-based classification 5-81

Rogue AP Detail Page 5-90

Rogue AP Ignore-List Page 5-94

rogue classification rules, configuring

using the CLI5-86to 5-89

using the GUI5-83to 5-86

Rogue Client Detail Page 5-92

Rogue Location Discovery Protocol (RLDP) 5-81

defined 5-78

See Also rogue access points

Rogue Rule > Edit Page 5-85

Rogue Rules > Priority Page 5-86

Rogue States (table)

See also rogue access points

Role Name parameter 4-47

Role parameter 5-31, 12-10

root bridge 3-23

Root Cost parameter 3-26

Root Port parameter 3-26

RRM. See radio resource management (RRM)

RSNA logs

configuringD-26to D-28

described D-14

Rx Sensitivity Threshold parameter 10-40

S

safety warningsA-1to ??

Save and Reboot button 8-9, 8-11

saving configuration settings 8-17

Scan Threshold parameter 4-41

Scope Name parameter 6-10

Search Clients page 7-51

Secondary RADIUS Server parameter 12-18

Secure Shell Protocol. See SSH

secure web mode

described 2-2

enabling using the CLI 2-3

enabling using the GUI 2-2

security

overview 5-2

solutions5-2to 5-3

Security Policy Completed parameter 6-37

Select APs from Current Controller parameter 12-19

self-signed certificate (SSC) 7-10

self-signed certificate (SSC), LWAPP-enabled access points sending to controller 7-10

Sequence parameter 5-54

serial port

baudrate setting 2-8

connecting 2-7

timeout 2-8

Server Address parameter 5-100

Server Index (Priority) parameter 5-8, 5-24, 5-34

Server IP Address parameter 5-8, 5-24, 5-34

Server Key parameter 5-42, 12-20

Server Mode parameter 5-34

Server Status parameter 5-9, 5-24

Server Timeout parameter 5-9, 5-25, 5-34

service port, described 3-5

service-port interface

configuring

using the CLI 3-14

using the configuration wizard 4-4

using the GUI3-10to 3-12

described 3-8

session timeout

configuring

using the CLI 6-28

using the GUI 6-27

described 6-27

Set to Factory Default button 10-18

Severity Level Filtering parameter D-8

Shared Secret Format parameter 5-8, 5-24

Shared Secret parameter 5-8, 5-24

Short Preamble Enabled parameter 5-48

short preambles, described 5-48

show advanced backup-controller command 7-28

show location

using CLI 4-82

Show Wired Clients option 7-24

shunned clients

described 5-102

viewing5-102to 5-103

viewing using the CLI 5-103

viewing using the GUI 5-102

Signature Events Detail page 5-111

Signature Events Summary page 5-110

Signature Events Track Detail Page 5-111

sniffing

configuringD-34to D-36

using the GUID-34to D-36

described D-34

enable

using the CLI D-36

using the GUI D-34

prerequisites D-34

supported software D-34

SNMP

configuring4-25to 4-26

traps, using the CLI 4-25

SNMP community string

changing default values using the CLI4-27to 4-28

changing default values using the GUI4-26to 4-27

SNMP v1 / v2c Community > New page 4-27

SNMP v1 / v2c Community page 4-26

SNMP v3 users

changing default values

using the CLI 4-29

using the GUI4-28to 4-29

SNMP V3 Users > New page 4-29

SNMP V3 Users page 4-28

software

upgrading

guidelines8-2to 8-3

using the CLI 8-5

using the GUI 8-4

software, upgrading

using the CLI 8-7

using the GUI 8-5

Source parameter, ACLs 5-54

Source Port parameter 5-55

Spanning Tree Algorithm parameter 3-27

Spanning Tree Protocol (STP)

configuring

using the CLI3-28to 3-29

using the GUI3-23to 3-28

described 3-23

spanning-tree root 3-23

Spanning Tree Specification parameter 3-26

SpectraLink NetLink phones

enabling long preambles

using the CLI 5-49

enabling long preambles using the GUI 5-48

overview 5-48

Spectralink Voice Priority parameter 4-65

splash page web redirect 6-47

Splash Page Web Redirect parameter 6-49, 6-50

SSC key-hash, on Cisco WiSM 7-8

SSH, troubleshooting using D-37

SSID

configuring

using the CLI 6-6

using the GUI 6-4

described 6-2

SSL certificate

loading using the CLI2-5to 2-7

loading using the GUI??to 2-5

Standard Signature > Detail Page 5-109

Standard Signatures page 5-108

State parameter 5-100, 5-110

Static Mobility Group Members page 11-12

Status parameter 4-27, 6-5, 6-11, 9-26

STP Mode parameter 3-25

STP Port Designated Bridge parameter 3-24

STP Port Designated Cost parameter 3-24

STP Port Designated Port parameter 3-24

STP Port Designated Root parameter 3-24

STP Port Forward Transitions Count parameter 3-24

STP Port ID parameter 3-24

STP Port Path Cost Mode parameter 3-25

STP Port Path Cost parameter 3-25

STP Port Priority parameter 3-25

STP State parameter 3-24

Supervisor 720

configuring4-85to 4-86

described 4-85

switch, configuring at the remote site12-5to 12-6

Switch IP Address (Anchor) parameter 11-24

SX/LC/T small form-factor plug-in (SFP) modules 3-4

symmetric mobility tunneling

configuring

using the CLI 11-29

using the configuration wizard 4-5

using the GUI11-28to 11-29

illustrated 11-27

overview11-26to 11-28

Symmetric Mobility Tunneling Mode parameter 11-28

syslog

described D-15

levels D-9

logsD-26to D-28

Syslog Facility parameter D-8

syslog server

number supported by controller D-8

remove from controller D-8

severity level filtering D-8

Syslog Server IP Address parameter D-8

system logging

configuring

using the CLID-10to D-13

enabling

using the CLI D-10

using the GUID-7to D-9

setting severity level D-9

system logs

viewing

using the CLI D-13

T

TACACS+

accounting 5-19

authentication 5-18

authorization 5-18

choosing authentication priority order 5-11, 5-25

configuring

using the CLI5-25to 5-27

using the GUI5-23to 5-25

configuring on ACS5-4to5-6, 5-19to 5-23

described5-18to 5-19

roles 5-18, 5-22

viewing administration server logs5-27to 5-29

TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 5-24

TACACS+ (Authentication, Authorization, or Accounting) Servers page 5-23

TACACS+ (Cisco) page (on CiscoSecure ACS) 5-21

TACACS+ Administration .csv page (on CiscoSecure ACS) 5-28, 5-29

telemetry 4-76

Telnet, troubleshooting using D-37

terminal emulator, settings 2-8

text2pcap, sample output D-32

TFTP server, guidelines 2-4, 5-106, 8-2, 8-8, 8-10, 8-12

time

configuring manually 4-10

configuring through NTP server 4-10

setting

using the CLI 4-11

using the GUI 4-10

time-length-values (TLVs), supported for CDP4-66to 4-67

timeout, configuring for disabled clients 6-14

Timeout parameter 9-19

Time Since Topology Changed parameter 3-26

Time to Live for the PAC parameter 5-42, 12-20

time zone, setting

from the CLI 4-12

from the GUI 4-11

TKIP

configuring 6-23, 6-24

described 6-21

parameter 6-23

Topology Change Count parameter 3-26

traffic specifications (TSPEC) request

described 4-51

examples 4-51

traffic stream metrics (TSM)

described 4-52

enabling

using the CLI 4-61

using the GUI 4-54

viewing statistics

using the CLI4-63to 4-64

using the GUI4-57to 4-60

Transition Time parameter 4-42

transmit power

statically assigning using the CLI 10-27

statically assigning using the GUI10-25to 10-26

transmit power levels, described 10-26

Transmit Power parameter 10-40

transmit power threshold, decreasing 10-18

troubleshooting

access point join process7-13to 7-16

CCXv5 clientsD-14to D-29

problemsD-5to D-7

using Telnet or SSH D-37

tunnel attributes, and identity networking 5-74

Tx Power Level Assignment parameter 10-28

Type parameter 6-4, 9-26, 12-7

U

U-APSD

described 4-52

viewing status

using the CLI 4-62

using the GUI 4-56

UDP, use in RADIUS 5-4

UDP port 11-24, 11-30

unicast mode, described 4-33

unique device identifier (UDI)

described 7-42

retrieving

using the CLI 7-43

using the GUI7-42to 7-43

Upload button 5-107, 8-13

Upload File from Controller page 8-12, 8-14

URL parameter 9-17

Use AES Key Wrap parameter 5-7

User Access Mode parameter 9-3

user accounts, managing9-1to 9-20

User Attribute parameter 5-34

User Base DN parameter 5-34

User Credentials parameter 5-35

User Datagram Protocol. See UDP

username, setting global 7-4

User Name parameter 5-31, 12-10

User Object Type parameter 5-34

User parameter 8-12

User Profile Name parameter 4-29

V

Validity parameter 8-12

VCI strings 7-12

Verify Certificate CN Identity parameter 5-42

video settings

configuring

using the CLI 4-61

using the GUI4-54to 4-55

viewing using the CLI4-62to 4-64

viewing using the GUI4-55to 4-60

virtual interface

configuring

using the CLI 3-14

using the configuration wizard 4-5

using the GUI3-10to 3-12

described 3-7

VLAN Identifier parameter

for AP-manager interface 3-11

for dynamic interface 3-15, 3-16

for management interface 3-11

VLAN ID parameter 12-13

VLAN interface. See dynamic interface

VLAN Mappings

button 12-13

page 12-13

VLANs

described 3-8

guidelines 3-10

VLAN Support parameter 12-13

VLAN tag, and identity networking 5-73

Voice & Video Optimized parameter 4-65

Voice Optimized parameter 4-65

voice-over-IP (VoIP) telephone roaming, described 4-39

Voice RSSI parameter 10-15

voice settings

configuring

using the CLI4-60to 4-61

using the GUI4-53to 4-54

viewing

using the CLI4-62to 4-64

using the GUI4-55to 4-60

VPN Gateway Address parameter 6-29

VPN passthrough

configuring using the CLI 6-29

configuring using the GUI6-28to 6-29

W

warnings

definediii-xxiito iii-xxiii

translatedA-1to ??

warrantyC-4to C-6

webauth.tar files 9-21

webauth bundle 9-17

web authentication

described 9-7

process9-7to 9-9

successful login page 9-9

web authentication, WLAN methods9-21to 9-23

Web Authentication Login page

assigning per WLAN

using the CLI 9-22

using the GUI 9-21

choosing the default

using the CLI9-11to 9-12

using the GUI9-9to 9-10

customized example 9-20

customizing from an external web server

using the CLI 9-17

using the GUI9-16to 9-17

default 9-8

downloading a customized login page

guidelines 9-17

using the CLI 9-19

using the GUI9-18to 9-19

modified default example 9-13

previewing 9-10, 9-19

verifying settings using the CLI 9-20

Web Authentication option 9-27

Web Authentication Type parameter 9-10, 9-17, 9-19

Web Auth Type parameter 9-21, 9-27

web-based authentication, configuring 6-29

web-browser security alert 9-7

Web Login page 9-10, 9-16

web mode

described 2-2

enabling using the CLI 2-3

enabling using the GUI 2-2

Web Passthrough option 9-27

Web Policy parameter 5-60, 6-49

Web Redirect. See WLANs

web redirect feature 6-47

Web Server IP Address parameter 9-17

WEP keys, configuring 6-20

WGB parameter 7-23

WGB Wired Clients page 7-24

wired guest access

configuration overview 9-25

configuring using the CLI9-28to 9-34

configuring using the GUI9-25to 9-28

described9-23to 9-25

guidelines 9-25

one-controller example 9-24

two-controller example 9-24

troubleshooting

using wireless sniffing D-34

Wireless > 802.11a/n (or 802.11b/g/n) > Network parameter 10-38

Wireless > 802.11a/n (or 802.11b/g/n) > Pico Cell parameter 10-38

Wireless > 802.11a/n or 802.11b/g/n > RRM > Coverage parameter 10-15

Wireless > 802.11a/n or 802.11b/g/n > RRM > DCA parameter 10-12

Wireless > 802.11a/n or 802.11b/g/n > RRM > General parameter 10-16

wireless sniffing, prerequisites D-34

Wireshark

See also network analyzer D-34

WLAN

assign web login, login failure, and logout pages

using the CLI 9-22

using the GUI 9-21

web authentication methods9-21to 9-23

wired guest access9-28to 9-34

wired security solution 1-6

WLAN override

configuring using the CLI 6-42

configuring using the GUI6-41to 6-42

WLAN Override parameter 6-41

WLAN Profile parameter 5-31, 12-10

WLANS

conditional web redirect 6-47

WLANs

checking security settings 6-21

configuring conditional web redirect6-47to 6-50

configuring static and dynamic WEP 6-21

connecting clients to 12-15

creating

using the CLI 6-6

using the GUI6-3to 6-6

deleting

using the CLI 6-6

using the GUI 6-4

described1-13, 3-8to3-10, 6-2to 6-3

MAC filtering

DTIM period, setting6-14to 6-17

session timeout

configuring 6-27

described 6-27

splash page web redirect 6-47

using the same SSID 6-3

WLANs > Edit (Advanced) page 5-59, 5-66, 5-77, 6-38, D-15

WLANs > Edit (QoS) page 6-34

WLANs > Edit (Security > AAA Servers) page 5-35, 5-43, 6-50, 9-21

WLANs > Edit (Security > Layer 2) page 6-23, 6-26

WLANs > Edit (Security > Layer 3) Page 6-49

WLANs > Edit (Security > Layer 3) page 5-60, 6-29, 6-49, 9-27

WLANs > Edit page 6-4, 9-26, 12-7

WLANs > New page 6-4, 9-26, 12-7

WLANs page 6-3, 11-23

WLAN SSID parameter 6-4, 6-45, 9-5, 9-26, 12-7

WMM

configuring 4-19, 6-34, 6-35

described 6-32

with CAC 4-50

WMM parameter 4-65

WMM Policy parameter 6-34

workgroup bridges (WGBs)

debugging 7-25

described 7-19

guidelines 7-20

illustrated 7-20

sample configuration 7-22

viewing status

using the CLI 7-25

using the GUI7-23to 7-24

world mode 4-15, 4-16

WPA1+WPA2

configuring

using the CLI 6-23

using the GUI6-22to 6-23

described 6-21

WPA2 Policy parameter 6-23

WPA Policy parameter 6-23