Cisco Wireless LAN Controller Configuration Guide, Release 5.1
Index
Downloads: This chapterpdf (PDF - 845.0KB) The complete bookPDF (PDF - 16.29MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

11n Mode parameter 4-18

1250 series access points

and PoE Status field 7-62

operating modes when using PoE 7-61

transmit power settings when using PoE 7-61

3DES IPSec data encryption 5-9

7920 AP CAC parameter 6-35

7920 Client CAC parameter 6-35

7920 support mode

configuring 6-33

described 6-33

7921 support mode 6-33

802.11a (or 802.11b) > Client Roaming page 4-41

802.11a (or 802.11b) > Video Parameters page 4-54

802.11a (or 802.11b) > Voice Parameters page 4-53

802.11a (or 802.11b/g) > EDCA Parameters page 4-64

802.11a (or 802.11b/g) Global Parameters > Auto RF page 10-8

802.11a (or 802.11b/g) Global Parameters page 4-14, 10-37

802.11a (or 802.11b/g) Network Status parameter 4-14

802.11a/n (or 802.11b/g/n) Cisco APs > Configure page 6-42, 10-26

802.11a/n (or 802.11b/g/n) Radios page 4-58, 10-25

802.11a > Pico Cell page 10-42

802.11a > Pico Cell page with pico cell mode V2 parameters 10-42

802.11a > RRM > Coverage page 10-15

802.11a > RRM > DCA page 10-12

802.11a > RRM > Dynamic Channel Assignment (DCA) page 10-12

802.11a > RRM > General page 10-17

802.11a > RRM > Tx Power Control (TPC) page 10-10

802.11b/g/n Cisco APs > Configure page 7-51, D-36

802.11 bands

configuring using the CLI4-15to 4-17

configuring using the GUI4-14to 4-15

802.11g Support parameter 4-14

802.11n

clients 7-66

configuring

using the CLI4-20to 4-22

using the GUI4-17to 4-19

devices 4-17

802.11n (2.4 GHz) High Throughput page 4-18

802.1Q VLAN trunk port 3-5

802.1X

configuring 6-20

described 6-21

dynamic key settings 6-20

802.1X+CCKM

configuring 6-22

described 6-21

802.1X authentication for access points

configuring

the switch 7-12

using the CLI7-10to 7-12

using the GUI7-9to 7-10

described 7-7

802.1x Authentication parameter 7-9

802.3 bridging

configuring using the CLI 4-33

configuring using the GUI4-32to 4-33

802.3 Bridging parameter 4-33

802.3 frames 4-32

802.3X flow control, enabling 4-31

A

AAA override

configuring

using the CLI 5-79

using the GUI5-78to 5-79

described 5-77

Access Control List Name parameter 5-55

access control lists (ACLs)

applying to an interface

using the CLI 5-64

using the GUI5-58to 5-59

applying to a WLAN

using the CLI 5-64

using the GUI5-60to 5-61

applying to the controller CPU

using the CLI 5-64

using the GUI5-59to 5-60

configuring

using the CLI5-62to 5-64

using the GUI5-54to 5-58

counters

configuring using the CLI 5-63

configuring using the GUI 5-55

described 5-54

identity networking 5-74

rules 5-54, 5-56, 5-63

using with the debug facilityD-30to D-31

Access Control Lists > Edit page 5-57

Access Control Lists > New page 5-55

Access Control Lists > Rules > New page 5-56

Access Control Lists page 5-54

Access Mode parameter 4-27, 4-28

access point event logs, viewing D-14

access point groups

assigning access points to

using the CLI 6-47

using the GUI 6-47

creating

using the CLI 6-46

using the GUI6-45to 6-46

described 6-43

illustrated 6-44

access point manager interface, configuring using the configuration wizard 4-5

access points

20-MHz channelization 10-26

40-MHz channelization 10-26

assisted roaming 4-40

authorization list 7-17

authorizing

using MICs 7-16

using SSCs 7-16

using the CLI 7-17

using the GUI 7-16

configuring hybrid REAP using the CLI12-13to 12-14

embedded 7-13

guidelines for operating in Japan B-6

LEDs

configuring 7-65

interpreting D-2

migrating from the -J regulatory domain to the -U regulatory domain7-46to ??

number supported per controller 3-4

priming 7-2

regulatory informationB-2to B-8

rules for operating in TaiwanB-7to B-8

supported for use with hybrid REAP 12-2

supporting oversized images 7-25

troubleshooting

the join process7-19to 7-22

using Telnet or SSH D-38

VCI strings 7-18

verifying that they join the controller 7-3

Accounting Server parameters 6-52

accounting servers, disabling per WLAN 6-51

ACL. See access control lists (ACLs)

ACL Name parameter 5-59, 5-60

ACS server configuration page 6-49

Action parameter 5-57

active exploits 5-117

Add AAA Client page (on CiscoSecure ACS) 5-5, 5-20

Add AP button 12-17

Add Interface-Mapping button 6-46

Add New Rule button 5-55

Add Web Server button 9-17

administrator access 4-24

administrator usernames and passwords, configuring 4-24

Admin Status parameter 3-22

Admission Control (ACM) parameter 4-53, 4-54

AES CBS IPSec data encryption 5-9

AES-CCMP 6-21

AES parameter 6-22

Aggregated MAC Protocol Data Unit (A-MPDU) 4-20

Aggregated MAC Service Data Unit (A-MSDU) 4-20

aggregation method, specifying 4-20

AirMagnet Enterprise Analyzer D-35

Aironet IE parameter 6-25, 6-40

Aironet IEs

configuring using the CLI 6-42

configuring using the GUI 6-40

Airopeek D-35

Alarm Trigger Threshold parameter 10-34

All APs > Access Point Name > VLAN Mappings page 12-13

All APs > Details (Advanced) page

assigning access point groups 6-47

configuring CDP 4-69

configuring country codes 7-43

configuring link latency 7-58

configuring PoE 7-62

All APs > Details (Credentials) page 7-9

All APs > Details (General) page 12-11

All APs > Details (High Availability) page 7-34, 7-38

All APs > Details (H-REAP) page 12-12

All APs > Details (Inventory) page 7-54

All APs > Details page 10-34, D-36

All APs page 10-33, 12-11

Allow AAA Override parameter 5-79

anchor controller in inter-subnet roaming 11-4

AnchorTime parameter 10-13

anonymous local authentication bind method 5-34, 5-37

Anonymous Provision parameter 5-44

Antenna Gain parameter 10-27

Antenna parameter 10-27

Antenna Type parameter 10-27

AP > Clients > Traffic Stream Metrics page 4-58

AP > Clients page 4-58

AP801 access point 7-13

AP Authentication Policy page 5-67, 10-34

AP Failover Priority parameter 7-39

AP Group Description parameter 6-45

AP Group Name parameter 6-45, 6-47

AP Groups VLAN Feature Enable parameter 6-45

AP Groups VLAN page 6-45, 6-46, 6-56

AP-manager interface

configuring

using the CLI 3-15

using the GUI3-11to 3-13

creating multiple interfaces3-39to 3-40

described 3-7

illustration

of four AP-manager interfaces 3-39

of three AP-manager interfaces 3-38

of two AP-manager interfaces 3-37

using multiple3-36to 3-40

AP Mode parameter 10-34, 12-12, D-36

AP Policies page 7-17

AP Primary Discovery Timeout parameter 7-34

ASLEAP detection 5-117

Assignment Method parameter 10-26, 10-28

asymmetric tunneling 11-26

authenticated local authentication bind method 5-34, 5-37

Authentication Priority parameter 5-11, 5-25

Authentication Protocol parameter 4-29

Auth Key Mgmt parameter 6-22

Authority ID Information parameter 5-44, 12-20, 12-21

Authority ID parameter 5-44, 12-20

Authorize APs Against AAA parameter 7-17

Authorize Self Signed Certificate (SSC) parameter 7-17

authorizing access points

using the CLI 7-17

using the GUI 7-16

auto-anchor mobility

configuring

using the CLI11-23to 11-24

using the GUI11-21to 11-23

guidelines 11-21

overview11-20to 11-21

AutoInstall

described 4-6, 4-9

example operation 4-9

obtaining

DHCP addresses for interfaces 4-7

TFTP server information 4-7

overview 4-6

selecting configuration file 4-8

using 4-6

auto RF, configuring using the configuration wizard 4-6

Average Data Rate parameter 4-44, 4-48

Average Real-Time Rate parameter 4-45, 4-48

Avoid Cisco AP Load parameter 10-13

Avoid Foreign AP Interference parameter 10-13, 11-18

Avoid Non-802.11a (802.11b) Noise parameter 10-13

B

backup controllers

configuring

using the CLI7-35to 7-37

using the GUI7-33to 7-35

described 7-32

Back-up Primary Controller IP Address parameter 7-34

Back-up Primary Controller Name field 7-34

Back-up Secondary Controller IP Address parameter 7-34

Back-up Secondary Controller Name parameter 7-34

bandwidth-based CAC

described 4-50

enabling

using the CLI 4-60

using the GUI 4-53

Base MAC Address parameter 3-28

Beacon Period parameter 4-14

Bind Password parameter 5-34

Bind Username parameter 5-34

bootup script for configuration wizard 4-4

bridge protocol data units (BPDUs) 3-24

Buffered Log Level parameter D-9

Burst Data Rate parameter 4-45, 4-48

Burst Real-Time Rate parameter 4-45, 4-48

C

CAC

configuring for 7920 phones 6-33

described 4-50

enabling

using the CLI 4-61

using the GUI 4-54

viewing using the CLI 4-62

Canadian compliance statement B-3

Catalyst 3750G Integrated Wireless LAN Controller Switch

described 1-11

logical connectivity diagram and associated software commandsE-4to E-5

ports 3-3, 3-5

CCA Sensitivity Threshold parameter 10-43

CCKM

configuring 6-22

described 6-21

hybrid-REAP groups 12-15

with mobility 11-7

CCX

configuring Aironet IEs

using the CLI 6-42

using the GUI 6-40

described 6-39

link test 7-55

viewing a client's version

using the CLI 6-42

using the GUI6-40to 6-42

CCX Layer 2 client roaming

configuring

using the CLI 4-42

using the GUI4-41to 4-42

debugging using the CLI 4-43

described4-40to 4-41

obtaining information using the CLI 4-43

CCX radio management

configuring

using the CLI 10-38

using the GUI10-37to 10-38

debugging using the CLI 10-40

features 10-36

hybrid-REAP considerations 10-36

obtaining information using the CLI10-39to 10-40

CCXv5 clients

enabling location presence 4-84

troubleshootingD-15to D-30

CCXv5 Req button D-22

CCX Version parameter 6-41

CDP > AP Neighbors > Detail page 4-72

CDP > AP Neighbors page 4-72

CDP > Global Configuration page 4-69

CDP > Interface Neighbors > Detail page 4-71

CDP > Interface Neighbors page 4-70

CDP > Traffic Metrics page 4-73

CDP Advertisement Version parameter 4-69

CDP AP Neighbors page 4-71

CDP Protocol Status parameter 4-69

CDP State parameter 4-70

Certificate Authority (CA) certificates

downloading

using the CLI8-13to 8-14

using the GUI 8-12

overview 8-12

using with local EAP 5-40, 5-45

Certificate Issuer parameter 5-43

Certificate Password parameter 8-10

Certificate Type parameter 7-17

Change Rules Priority parameter 5-88

Channel Assignment Leader parameter 10-14

Channel Assignment Method parameter 10-13

channel bonding in the 5-GHz band 10-27

Channel parameter 10-25, D-37

channels

statically assigning using the CLI 10-29

statically assigning using the GUI10-25to 10-29

Channel Scan Duration parameter 10-18

Channel Width parameter 10-14, 10-26

Check Against CA Certificates parameter 5-43

Check Certificate Date Validity parameter 5-43

chokepoints for RFID tag tracking 4-77

CIDS Sensor Add page 5-101

CIDS Sensors List page 5-100

CIDS Shun List page 5-104

ciphers

configuring 6-22, 6-24

described 6-22

Cisco 2100 Series Wireless LAN Controllers

AutoInstall interfaces 4-7

described 1-8

FCC statement B-8

features not supported 1-8

network connections1-16to 1-17

ports 3-2, 3-3, 3-4

Cisco 28/37/38xx Integrated Services Router

described 1-11

logical connectivity diagram and associated software commands E-3

ports 3-3, 3-4, 4-87

using 4-87

versions 1-11

Cisco 4400 Series Wireless LAN Controllers

AutoInstall interfaces 4-7

described 1-9

FCC statement B-9

models 3-4

network connections1-17to 1-18

ports 3-2, 3-3, 3-4

supporting more than 48 access points3-35to 3-40

Cisco 7920 Wireless IP Phones 6-33

Cisco 7921 Wireless IP Phones 6-33

Cisco AV-pairs 6-48, 6-49

Cisco Centralized Key Management (CCKM). See CCKM

Cisco Clean Access (CCA) 6-52

Cisco Client Extensions (CCX). See CCX

Cisco Discovery Protocol (CDP)

configuring

using the CLI 4-74

using the GUI4-68to 4-70

debugging using the CLI 4-76

described 4-66

enabling using the GUI4-69to 4-70

sample network 4-68

supported devices 4-66

viewing neighbors

using the CLI4-75to 4-76

using the GUI4-70to 4-74

viewing traffic information

using the CLI 4-75

using the GUI 4-73

Cisco Discovery Protocol parameter 4-70

Cisco high-power switches 7-63

Cisco Logo parameter 9-10

Cisco NAC Appliance 6-52

CiscoSecure Access Control Server (ACS) 5-4

Cisco Unified Wireless Network (UWN) Solution

described1-2to 1-5

illustrated 1-3

Cisco Wireless Control System (WCS) 1-2

Cisco WiSM

configuring the Supervisor 7204-86to ??

described1-9to 1-11

guidelines 4-86

logical connectivity diagram and associated software commandsE-2to E-3

maximum number supported by router chassis 1-10

ports 3-3, 3-4

SSC key-hash 7-14

CKIP

configuring

using the CLI 6-27

using the GUI6-25to 6-26

described 6-25

clearing the controller configuration 8-22

Clear Stats button 11-19

CLI

basic commands 2-9

enabling wireless connections 2-9

logging into2-7to 2-8

logging out 2-8

navigating 2-9

troubleshooting commandsD-5to D-7

using2-7to 2-9

Client Certificate Required parameter 5-43

client location, using WCS 1-8

client MFP 5-65

Client Protection parameter 5-69

client reporting

configuring using the CLID-24to D-27

configuring using the GUID-21to D-24

described D-15

Client Reporting page D-23

client roaming, configuring4-39to 4-43

clients

connecting to WLANs 12-14

viewing

using the CLI7-69to 7-70

using the GUI7-65to 7-69

viewing CCX version

using the CLI 6-42

using the GUI6-40to 6-42

Clients > AP > Traffic Stream Metrics page 4-57

Clients > AP page 4-57

Clients > Detail page

configuring client reporting D-22

viewing a client's CCX version 6-41

viewing client details 7-30, 7-68

viewing the status of workgroup bridges 7-30

viewing voice and video settings 4-56

Clients page

performing a link test 7-56

viewing clients 7-66

viewing the status of workgroup bridges 7-29

viewing voice and video settings 4-55

Client Type parameter 7-30, 7-31

Commands > Reset to Factory Defaults page 4-3

Community Name parameter 4-26

conditional web redirect 6-48

configuring

using the CLI 6-51

using the GUI 6-50

described 6-48

Conditional Web Redirect parameter 6-50, 6-51

Configuration File Encryption parameter 8-17, 8-19

configuration files

downloading

using the CLI8-20to 8-21

using the GUI8-19to 8-20

uploading

using the CLI8-18to 8-19

using the GUI8-17to 8-18

configuration wizard

described 4-2

running4-4to 4-6

Configure option for RRM override 10-25

Confirm Password parameter 12-10

Console Log Level parameter D-9

controller failure detection time, reducing 7-32

controller network module

baud rate 3-3

versions 3-4

controllers

configuration

clearing 8-22

erasing 8-22

saving 8-21

connections 1-12

discovery process 7-2

multiple-controller deployment1-4to 1-5

overview1-7to 1-8

platforms1-8to 1-11

resetting factory default settings

using the CLI 4-3

using the GUI 4-3

single-controller deployment1-3to 1-4

synchronizing with location appliance 4-83

types of memory 1-15

upgrading software

guidelines8-2to 8-3

using the CLI8-6to 8-8

using the GUI8-4to 8-5

Controller Spanning Tree Configuration page 3-27

Controller Time Source Valid parameter 5-69

Control Path parameter 11-23

Country Code parameter 7-43

country codes

commonly used 7-40

configuring

using the CLI7-43to 7-46

using the configuration wizard 4-5

using the GUI7-41to 7-43

described 7-40

Japanese 7-47

viewing using the CLI 7-45

Country page 7-41

Coverage Exception Level per AP parameter 10-16

coverage hole detection and correction 10-4

CPU Access Control Lists page 5-60

CPU ACL Mode parameter 5-60

Current Channel parameter 10-28

Custom Signatures page 5-109

D

Data Path parameter 11-23

Data Rates parameter 4-15

date

configuring manually 4-10

configuring through NTP server 4-10

setting

using the CLI 4-11

using the GUI 4-10

DCA Channel Sensitivity parameter 10-13

DCA Channels parameter 10-14

debug commands, sending 7-22

debug facility

configuringD-31to D-34

describedD-30to D-31

default enable password 7-4

Default Mobility Group parameter 11-11

Default Routers parameter 6-11

Delivery Traffic Indication Map (DTIM). See DTIM period

Deny Counters parameter 5-58

Description parameter 5-31, 12-10

Designated Root parameter 3-28

DES IPSec data encryption 5-9

Destination parameter 5-56

Destination Port parameter 5-57

device certificates

downloading

using the CLI8-10to 8-11

using the GUI8-9to 8-10

overview 8-9

using with local EAP 5-40, 5-45

DHCP

configuring using the CLI 6-9

configuring using the GUI 6-8

DHCP Addr. Assignment Required parameter 6-9

DHCP option 43, in controller discovery process 7-2

DHCP option 82

configuring5-52to 5-54

described 5-52

example 5-53

DHCP proxy, configuring4-22to 4-23

DHCP Scope > Edit page 6-11

DHCP scopes

configuring

using the CLI6-12to 6-13

using the GUI6-10to 6-11

described 6-10

DHCP Scopes page 6-10

DHCP server discovery 7-2

DHCP Server IP Addr parameter 6-9

DHCP Server Override parameter 6-9

DHCP servers

configuring using the configuration wizard 4-5

external6-6to 6-8

internal 6-6

diagnostic channel

configuring

using the CLID-17to D-21

using the GUID-16to D-17

described D-15

Diagnostic Channel parameter D-16

directed roam request 4-41

Direction parameter 5-57

disabled clients, configuring a timeout 6-14

discovery request timer, configuring 7-36

distribution system ports3-4to 3-5

Diversity parameter 10-28

DNS Domain Name parameter 6-11

DNS Servers parameter 6-11

document

Download button

downloading a CA certificate 8-13

downloading a configuration file 8-20

downloading a customized web authentication login page 9-19

downloading a device certificate 8-10

downloading a signature file 5-109

Download File to Controller page

downloading a customized web authentication login page 9-18

downloading CA certificates 8-12

downloading configuration files 8-19

downloading device certificates 8-10

downloading IDS signatures 5-108

DSCP parameter 5-57

DTIM period, configuring for MAC filtering 6-14

DTPC Support parameter 4-15

dynamic channel assignment (DCA)

20-MHz channelization 10-4, 10-14

40-MHz channelization 10-4, 10-14

configuring

using the CLI10-19to 10-20

using the GUI10-12to 10-15

described 10-3

sensitivity thresholds 10-14

dynamic frequency selection7-49to 7-50

dynamic interface

configuring

using the CLI 3-19

using the GUI3-17to 3-18

described 3-9

dynamic transmit power control, configuring 4-15

dynamic WEP, configuring 6-20

E

EAP-FAST Method Parameters page 5-43

EAP-FAST parameter 5-42

EAP Profile Name parameter 5-44

EAP-TLS parameter 5-42

EDCA Profile parameter 4-65

Edit QoS Profile page 4-44

Edit QoS Role Data Rates page 4-48

Egress Interface parameter 9-27

Email Input parameter 9-28

Enable AP Local Authentication parameter 12-18

Enable Check for All Standard and Custom Signatures parameter 5-110

Enable Controller Management to be accessible from Wireless Clients parameter 2-10, 5-52

Enable Counters parameter 5-55

Enable Coverage Hole Detection parameter 10-15

Enable CPU ACL parameter 5-60

Enable Dynamic AP Management parameter 3-40

Enable EAP-FAST Authentication parameter 12-20

Enable IGMP Snooping parameter 4-36

Enable LEAP Authentication parameter 12-19

Enable Link Latency parameter 7-59

Enable Low Latency MAC parameter 4-65

Enable Password parameter 7-5

Enable Server Status parameter 5-34

Encryption Key parameter 6-26

end user license agreementC-2to C-4

enhanced distributed channel access (EDCA) parameters

configuring using the CLI4-65to 4-66

configuring using the GUI4-64to 4-65

enhanced neighbor list

described 4-40

request (E2E) 4-40

EoIP port 11-23, 11-29

epings 11-23, 11-29

erasing the controller configuration 8-22

Ethernet connection, using remotely 2-8

Ethernet Multicast Mode parameter 4-36

European declaration of conformityB-4to B-5

event reporting for MFP 5-66

Expedited Bandwidth parameter 4-54

expedited bandwidth requests

described 4-51

enabling

using the CLI 4-60

using the GUI 4-54

Extensible Authentication Protocol (EAP)

configuring 6-20

setting local timers5-45to 5-46

timeout and failure counters

per access point 5-49

per client 5-49

extension channel 10-28

F

factory default settings

resetting using the CLI 4-3

resetting using the GUI 4-3

failover priority for access points

configuring

using the CLI 7-39

using the GUI7-38to 7-39

described 7-37

viewing using the CLI 7-39

failover protection1-15to 1-16

fake access point detection 5-117

Fast Ethernet port 3-4

fast heartbeat timer

configuring

using the CLI 7-36

using the GUI 7-34

described 7-32

fast SSID changing

configuring using the CLI 4-31

configuring using the GUI 4-31

FCC declaration of conformityB-2to B-3

FCC statement

2100 series controllers B-8

4400 series controllers B-9

Federal Information Processing Standards (FIPS) 5-11

file transfers 1-14

File Type parameter

downloading a CA certificate 8-12

downloading a configuration file 8-19

downloading a customized web authentication login page 9-18

downloading a device certificate 8-10

upgrading controller software 8-5

uploading a configuration file 8-17

uploading PACs 8-15

filter, using to view clients7-66to 7-67

Fingerprint parameter 5-102

flashing LEDs, configuring 7-65

foreign controller in inter-subnet roaming 11-4

Forward Delay parameter 3-28, 3-29

Fragmentation Threshold parameter 4-14

Friendly Rogue > Create page 5-88

FTP server guidelines 8-2

G

General (controller) page

configuring 802.3 bridging 4-32

configuring an RF group 10-7

enabling link aggregation 3-34

enabling multicast mode 4-35

General (security) page 5-30, 5-117

Generate Password parameter 9-5

gigabit Ethernet port 3-4

Global AP Failover Priority parameter 7-38

Global Configuration page

configuring authentication for access points 7-9

configuring backup controllers 7-33

configuring failover priority for access points 7-38

configuring global credentials for access points 7-5

global credentials for access points

configuring

using the CLI7-6to 7-7

using the GUI7-4to 7-6

described 7-4

overriding

using the CLI 7-6

using the GUI 7-5

Group Mode parameter 10-8, 11-17

Group Name parameter 11-12, 12-17

Group Setup page (on CiscoSecure ACS) 5-22

Guest LAN parameter 9-26

guest N+1 redundancy 11-20

guest user accounts

creating9-2to 9-7

creating as a lobby ambassador9-4to 9-6

viewing

using the CLI 9-7

using the GUI 9-6

Guest User parameter 5-31, 12-10

Guest User Role parameter 5-31, 12-10

guest WLAN, creating 9-5

GUI

enabling wireless connections 2-9

guidelines 2-2

opening 2-2

using 2-2

H

Headline parameter 9-10

Hello Time parameter 3-28, 3-29

help, obtaining 2-2

hex2pcap sample output D-33

high-density network

benefits 10-41

example 10-41

overview 10-40

Holdtime parameter 3-28, 4-69

Honeypot access point detection 5-117

HREAP Group Name parameter 12-12

HREAP Groups > Edit page 12-17, 12-18, 12-19

HREAP Groups page 12-17

H-REAP Local Switching parameter 12-8

H-REAP Mode AP Fast Heartbeat Timeout parameter 7-34

H-REAP Mode AP Fast Heartbeat Timer State parameter 7-34

HTTP Access parameter 2-3

HTTP Configuration page 2-3

HTTPS Access parameter 2-3

hybrid REAP

access points supported 12-2

authentication process12-2to 12-4

bandwidth restriction 12-2

configuring

access points using the CLI12-13to 12-14

access points using the GUI12-11to 12-13

controller using the GUI12-6to 12-10

guidelines 12-4

illustrated 12-2

number of access points supported 12-2

overview 12-2

hybrid-REAP groups

backup RADIUS server 12-15

CCKM 12-15

configuring

using the CLI 12-20

using the GUI12-16to 12-20

described 12-15

example 12-15

local authentication 12-16

Hysteresis parameter 4-42

I

identity networking

configuring5-73to 5-76

described1-12to 1-14

overview 5-73

RADIUS attributes5-74to 5-76

IDS 5-100

IDS sensors

configuring

using the CLI5-102to 5-103

using the GUI5-100to 5-102

described 5-100

IDS signature events

viewing using the CLI5-115to 5-116

viewing using the GUI5-111to 5-113

IDS signatures

configuring

using the CLI5-113to 5-115

using the GUI5-107to 5-111

described 5-105

frequency 5-111

MAC frequency 5-111, 5-114

measurement interval 5-111

pattern 5-111

quiet time 5-111, 5-114

tracking method 5-111

uploading or downloading using the GUI5-107to 5-109

viewing

using the CLI5-115to 5-116

using the GUI5-111to 5-113

IGMP Timeout parameter 4-36

IKE Diffie Hellman Group parameter 5-10

IKE Phase 1 parameter 5-10

Index parameter for IDS 5-101

infrastructure MFP

components 5-66

described 5-65

Infrastructure MFP Protection parameter 5-68

Infrastructure Protection parameter 5-69

Infrastructure Validation parameter 5-69

Ingress Interface parameter 9-27

Injector Switch MAC Address parameter 7-63

inline power 7-61

intelligent power management (IPM) 7-63

inter-controller roaming

described 4-39

example 11-3

Interface Name parameter 6-46, 6-54, 6-56

Interface parameter 6-9

interfaces

and identity networking 5-75

assigning WLANs 6-14

configuring

using the CLI3-14to 3-16

using the GUI3-12to 3-13

overview3-6to 3-9

Interfaces > Edit page

applying an ACL to an interface 5-59

configuring dynamic interfaces 3-18

configuring NAC out-of-band integration 6-55

creating multiple AP-manager interfaces 3-39

Interfaces > New page 3-17, 3-39

Interfaces page 3-12

interference 10-3

Interference threshold parameter 10-17

Internet Group Management Protocol (IGMP)

configuring

using the CLI 4-37

using the GUI 4-36

snooping 4-33

inter-subnet mobility 11-7

inter-subnet roaming

described 4-40

illustrated11-3to 11-4

Interval parameter 10-13, 10-37

intra-controller roaming

described 4-39

illustrated 11-2

Inventory page 7-53

Invoke Channel Update Now button 10-13

Invoke Power Update Now button 10-11

IP Mask parameter 4-26

IPSec parameter 5-9

IPv6 bridging

configuring

using the CLI 6-39

using the GUI6-38to 6-39

described 6-37

guidelines 6-37

IPv6 bridging and IPv4 web authentication example 6-38

IPv6 Enable parameter 6-39

J

Japanese country codes 7-47

Japanese regulations for migrating access points from the -J to the -U regulatory domain7-46to ??

K

Keep Alive Count parameter 11-22

Keep Alive Interval parameter 11-22

Key Encryption Key (KEK) parameter 5-8

Key Format parameter 6-26

Key Index parameter 6-26

key permutation

configuring 6-26, 6-27

described 6-25

Key Permutation parameter 6-26

Key Size parameter 6-26

Key Wrap Format parameter 5-8

Key Wrap parameter 5-8

L

LAG. See link aggregation (LAG)

LAG Mode on Next Reboot parameter 3-34

Last Auto Channel Assignment parameter 10-14

Last Power Level Assignment parameter 10-11

Layer 1 security 5-2

Layer 2

LWAPP discovery 7-2

operation 1-6

security

configuring6-19to 6-27

described 5-2

Layer 2 Security parameter 6-22, 6-26, 6-50

Layer 3

LWAPP discovery 7-2

operation 1-6

security

configuring6-28to 6-30

described 5-3

Layer 3 Security parameter

for VPN passthrough 6-29

for web authentication 6-30

for web redirect 6-50

for wired guest access 9-27

LDAP

choosing server priority order 5-35

configuring

using the CLI5-36to 5-38

using the GUI5-33to 5-36

local EAP methods supported 5-33, 5-39

LDAP server

assigning to WLANs5-35to 5-36

choosing local authentication bind method

using the CLI 5-37

using the GUI 5-34

LDAP Servers > New page 5-33

LDAP Servers page 5-33

LDAP Servers parameter 5-45

LEAP parameter 5-42

Lease Time parameter 6-11

LEDs

configuring 7-65

interpreting D-2

license agreementC-2to C-4

Lifetime parameter 5-31, 9-5, 12-10

Lightweight Access Point Protocol (LWAPP) 7-2

lightweight mode, reverting to autonomous mode 7-15

limited warrantyC-4to C-6

link aggregation (LAG)

configuring neighboring devices 3-35

described3-30to 3-31

enabling

using the CLI 3-35

using the GUI 3-34

example 3-31

guidelines 3-33

illustrated 3-32

verifying settings using the CLI 3-35

link latency

configuring

using the CLI 7-60

using the GUI7-58to 7-59

described 7-58

Link Status parameter 3-21

Link Test

button 7-56

option 7-56

page 7-57

link test

described 7-55

performing

using the CLI 7-57

using the GUI7-56to 7-57

types of packets 7-55

Link Trap parameter 3-23

Load-based AC parameter 4-53

load-based CAC

described 4-51

enabling

using the CLI 4-60

using the GUI 4-53

lobby ambassador account

creating using the CLI 9-3

creating using the GUI9-2to 9-3

Lobby Ambassador Guest Management > Guest Users List > New page 9-4

Lobby Ambassador Guest Management > Guest Users List page 9-4, 9-6

local EAP

configuring

using the CLI5-45to 5-49

using the GUI5-40to 5-45

debugging 5-49

described5-38to 5-40

example 5-39

viewing information using the CLI 5-48

Local EAP Authentication parameter 5-44

Local EAP Profiles > Edit page 5-42

Local EAP Profiles page 5-41

Local Management Users > New page 9-3

Local Management Users page 9-2

Local Mode AP Fast Heartbeat Timeout parameter 7-34

Local Mode AP Fast Heartbeat Timer parameter 7-33

Local Net Users > New page 5-31, 12-9

Local Net Users page 5-30, 9-6

local network users

configuring using the CLI 5-32

configuring using the GUI5-29to 5-32

local user database, capacity 9-2

location

calibration 10-37

viewing settings using the CLI4-83to 4-86

location appliance

installing certificate4-81to 4-82

synchronizing with controller 4-83

location-based services 10-36

location presence 4-84

logical connectivity diagram

Catalyst 3750G Integrated Wireless LAN Controller Switch E-4

Cisco 28/37/38xx Integrated Services Router E-3

Cisco WiSM E-2

logs

roamingD-16, D-27to D-28

RSNAD-16, D-27to D-29

syslogD-16, D-27to D-29

long preambles

described 5-50

enabling on SpectraLink NetLink phones

using the CLI 5-51

using the GUI 5-50

LWAPP-enabled access points

configuring a static IP address 7-25

debug commands 7-22

disabling the reset button 7-24

enabling memory core dumps 7-24

guidelines 7-14

Layer 2 discovery 7-2

MAC addresses displayed on controller GUI 7-24

receiving debug commands from controller 7-22

reverting to autonomous mode7-15to 7-16

sending crash information to controller 7-23

sending radio core dumps to controller 7-23

sending SSCs to controller 7-16

M

MAC address of access point, displayed on controller GUI 7-24

MAC filtering

configuring on WLANs6-13to 6-14

DTIM period 6-14

management frame protection (MFP)

configuring

using the CLI5-69to 5-70

using the GUI5-67to 5-68

debugging 5-72

described5-65to 5-66

guidelines 5-66

types 5-65

viewing settings5-70to 5-72

Management Frame Protection parameter 5-69

Management Frame Protection Settings page 5-69

management frame validation 5-66

management interface

configuring

using the CLI 3-14

using the GUI3-12to 3-13

described3-6to 3-7

management over wireless

described 5-52

enabling

using the CLI 5-52

using the GUI 5-52

Master Controller Configuration page 7-3

Master Controller Mode parameter 7-3

Max Age parameter 3-28

Maximum Age parameter 3-29

maximum local database entries

configuring using the CLI 5-117

configuring using the GUI 5-117

Maximum Local Database Entries parameter 5-30, 5-117

Maximum RF Usage Per AP parameter 4-45

Max RF Bandwidth parameter 4-53, 4-55

MCS data rates 4-18

Member MAC Address parameter 11-12

memory

core dumps from converted access points 7-24

types 1-15

mesh access points 7-12

Message Authentication Code Key (MACK) parameter 5-8, 5-12

message logs

configuring

using the CLID-10to D-13

using the GUI D-7

viewing

using the CLI D-13

using the GUID-9to D-10

See also system logging

Message Logs page D-10

Message parameter for web authentication 9-10

Metrics Collection parameter 4-54

MFP Client Protection parameter 5-68

MFP Frame Validation parameter 5-68

MIC 6-21, 6-25

migrating access points from the -J to the -U regulatory domain7-46to ??

Min Failed Client Count per AP parameter 10-16

Minimum RSSI parameter 4-42

mirror mode. See port mirroring, configuring

MMH MIC

configuring 6-26, 6-27

described 6-25

MMH Mode parameter 6-26

Mobile Announce messages 11-7

mobility

failover 11-20

overview 11-2

Mobility Anchor Config page 11-22, 11-27

Mobility Anchor Create button 11-23

mobility anchors. See auto-anchor mobility

Mobility Anchors option 11-22

Mobility Anchors page 11-22, 11-26

Mobility Group Member > New page 11-11

Mobility Group Members > Edit All page 11-13

mobility groups

configuring

using the CLI 11-14

using the configuration wizard 4-5

using the GUI11-11to 11-13

with one NAT device 11-8

with two NAT devices 11-9

determining when to include controllers 11-7

difference from RF groups 10-5

examples 11-7

illustrated 11-5

messaging among 11-7

number of access points supported 11-5, 11-6

number of controllers supported 11-5

prerequisites11-9to 11-10

using with NAT devices11-8to 11-9

mobility group statistics

types 11-16

viewing

using the CLI 11-19

using the GUI11-16to 11-19

mobility list

described 11-6

detecting failed members 11-20

number of controllers supported 11-7

ping requests to members 11-20

Mobility Multicast Messaging > Edit page 11-14

Mobility Multicast Messaging page 11-13

mobility ping tests, running 11-29

mobility services information, viewing 4-86

Mobility Statistics page 11-17

MODE access point button 7-15, 7-24

Mode parameter 4-41, 10-37

monitor intervals, configuring using the GUI 10-18

mpings 11-23, 11-29

Multicast Appliance Mode parameter 3-23

multicast groups

viewing using the CLI 4-38

viewing using the GUI 4-36

Multicast Groups page 4-36

multicast mode

configuring

using the CLI 4-37

using the GUI4-35to 4-36

described4-33to 4-34

guidelines 4-35, 7-26

Multicast page 4-36

multiple country codes

configuration guidelines 7-41

configuring

using the CLI 7-44

using the GUI7-42to 7-43

multiple country support, using the configuration wizard 4-5

N

NAC in-band mode 6-52

NAC out-of-band integration

and hybrid REAP 12-5

configuring

using the CLI6-57to 6-58

using the GUI6-54to 6-57

described6-52to 6-53

diagram 6-53

guidelines6-53to 6-54

NAC State parameter 6-56

NAT devices in mobility groups11-8to 11-9

Native VLAN ID parameter 12-12

Neighbor Packet Frequency parameter 10-18

Netbios Name Servers parameter 6-11

Netmask parameter 6-11

network analyzer supported software

AirMagnet D-35

Airopeek D-35

Omnipeek D-35

Wireshark D-35

Network Mobility Services Protocol (NMSP) 4-77

active connections 4-85

modifying the notification interval for clients, RFID tags, and rogues 4-82

viewing counters 4-85

Network parameter 6-11

NTP server

configuring to obtain time and date 4-10

setting in the configuration wizard 4-6

Number of Hits parameter 5-58

O

online help, using 2-2

open source terms C-8

OpenSSL license issuesC-6to C-8

operating system

security1-5to 1-6

software 1-5

Override Global Config parameter 9-21, 9-28

Over-ride Global Credentials parameter 7-6, 7-10

Override Interface ACL parameter 5-61

oversized access point images 7-25

over-the-air provisioning (OTAP) 7-2

P

P2P Blocking parameter 6-18

password guidelines 7-9

Password parameter

for access point authentication 7-9

for access points 7-5

for local net users 5-31, 12-10

for PACs 8-15

PEAP parameter 5-42

peer-to-peer blocking

configuring

using the CLI6-18to 6-19

using the GUI6-17to 6-18

described 6-16

examples 6-17

guidelines 6-17, 6-53

Physical Mode parameter 3-22

Physical Status parameter 3-21

pico cell mode

configuring

using the CLI 10-44

using the GUI10-42to 10-43

debugging using the CLI 10-45

guidelines 10-41

overview10-40to 10-41

versions 10-42

Pico Cell Mode parameter 10-42

ping link test 7-55

ping tests 11-29

PMK cache lifetime timer 6-24

PMKID caching 6-24

PoE Status parameter 7-62

Pool End Address parameter 6-11

Pool Start Address parameter 6-11

Port > Configure page 3-21

port mirroring, configuring3-23to 3-24

Port Number parameter

for controller 3-21

for LDAP server 5-34

for RADIUS server 5-8

for TACACS+ server 5-24

for wired guest access 9-26

Port parameter for IDS 5-101

ports

configuring3-20to 3-30

on 2100 series controllers 3-2, 3-3, 3-4

on 4400 series controllers 3-2, 3-3, 3-4

on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-5

on Cisco 28/37/38xx Series Integrated Services Router3-3to 3-4, 4-87, 7-19

on Cisco WiSM 3-3, 3-4

overview3-2to 3-5

Ports page 3-20

Power Assignment Leader parameter 10-11

Power Injector Selection parameter 7-63

Power Injector State parameter 7-63

Power Neighbor Count parameter 10-11

Power over Ethernet (PoE)

configuring

using the CLI 7-64

using the GUI7-62to 7-63

described 1-14, 7-61

Power Over Ethernet (PoE) parameter 3-22

Power Threshold parameter 10-11

preauthentication access control list (ACL)

applying to a WLAN

using the CLI 5-64

using the GUI5-61to 5-62

for external web server 9-16, 12-9

Preauthentication ACL parameter 5-62, 6-50

Pre-Standard State parameter 7-63

Primary Controller parameters 7-35

Primary RADIUS Server parameter 12-17

priming access points 7-2

Priority Order > Local-Auth page 5-35

Priority Order > Management User page 5-11, 5-25

Priority parameter 3-29

Privacy Protocol parameter 4-29

Profile Details page D-24

Profile Name parameter 6-4, 9-26, 12-7

protected access credentials (PACs)

overview 8-14

uploading

using the CLI 8-16

using the GUI 8-15

using with local EAP 5-40, 12-20

Protection Type parameter 5-67, 10-34

Protocol parameter 5-56

Protocol Type parameter 4-45

PSK

configuring 6-23

described 6-21

PSK Format parameter 6-23

public key cryptography (PKC), with mobility 11-7

Q

QBSS

configuring

using the CLI 6-35

using the GUI6-34to 6-35

described 6-33

guidelines 6-33

QoS

identity networking 5-74

levels 4-43, 6-31

translation values 6-31

with CAC 4-50

QoS profiles

assigning to a WLAN

using the CLI 6-32

using the GUI6-31to 6-32

configuring

using the CLI 4-46

using the GUI4-44to 4-45

QoS roles

assigning for use with hybrid REAP 12-10

configuring

using the CLI4-49to 4-50

using the GUI4-47to 4-48

QoS Roles for Guest Users page 4-47

Quality of Service (QoS) parameter 6-32

quarantined VLAN

configuring 3-12, 3-18

using 12-8

with hybrid REAP 12-4

with NAC out-of-band integration 6-55

Quarantine parameter

for dynamic interface 3-18

for management interface 3-12

NAC out-of-band integration 6-55

Query Interval parameter 5-102

Queue Depth parameter 4-45

R

radio core dumps 7-23

radio measurement requests

configuring

on the CLI 10-38

on the GUI 10-37

overview 10-36

viewing status using the CLI 10-39

radio preamble 5-50

radio resource management (RRM)

benefits 10-5

CCX features. SeeCCX radio management

configuring

monitor intervals using the GUI 10-18

using the CLI10-18to 10-21

using the configuration wizard 4-6

using the GUI10-9to 10-18

coverage hole detection

configuring using the CLI 10-21

configuring using the GUI10-15to 10-16

described 10-4

debugging 10-24

disabling dynamic channel and power assignment

using the CLI 10-32

using the GUI 10-32

overriding RRM10-24to 10-32

overview 10-2

specifying channels10-12to 10-14

statically assigning channel and transmit power settings

using the CLI 10-29

using the GUI10-25to 10-29

update interval 10-6, 10-9

viewing using the CLI10-22to 10-23

Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC parameter 10-10

radio resource monitoring 10-2

RADIUS

accounting 5-3

authentication 5-3

configuring

using the CLI5-11to 5-14

using the GUI5-6to 5-11

configuring on ACS 5-4

described 5-3

FIPS standard 5-11

KEK parameter 5-12

MACK parameter 5-12

server fallback behavior 5-10

using with hybrid REAP 12-15

RADIUS accounting attributes5-17to 5-18

Redirect URL After Login parameter 9-10

Refresh-time Interval parameter 4-69

regulatory information

for 2100 series controllers B-8

for 4400 series controllers B-9

for lightweight access pointsB-2to B-8

Remote Authentication Dial-In User Service. See RADIUS

Reserved Roaming Bandwidth parameter 4-54, 4-55

Reset Link Latency button 7-59

resetting the controller 8-22

Re-sync button 5-104

reverse path filtering (RPF) 11-26

RF Channel Assignment parameter 10-32

RF domain. See RF groups

RF exposure declaration of conformity B-5

RF group leader

described 10-6

viewing 10-8

RF group name

described 10-6

entering 10-7

RF groups

configuring

using the CLI 10-7

using the configuration wizard 4-5

using the GUI 10-7

difference from mobility groups 10-5

overview10-5to 10-6

viewing status

using the CLI 10-9

using the GUI 10-8

RFID tags

described 4-76

formats supported 4-76

number supported per controller 4-77

tracking

configuring using the CLI 4-78

debugging using the CLI 4-80

viewing information using the CLI4-79to 4-80

RF-Network Name parameter 10-7

RLDP. See Rogue Location Discovery Protocol (RLDP)

roaming and real-time diagnostics

configuring using the CLID-27to D-30

described D-15

logs

described D-16

viewingD-27to D-28

roam reason report 4-41

rogue access points

alarm 10-34

classification mapping table 5-81

classifying 5-80

configuring RLDP5-83to 5-84

detecting

using the CLI 10-35

using the GUI10-33to 10-35

managing 5-79

rule-based classification support 5-80

tagging, location, and containment 5-80

viewing and classifying

using the CLI5-96to 5-100

using the GUI5-91to 5-95

WCS support for rule-based classification 5-83

Rogue AP Detail page 5-92

Rogue AP Ignore-List page 5-95

rogue classification rules

configuring using the CLI5-88to 5-91

configuring using the GUI5-85to 5-88

Rogue Client Detail page 5-93

Rogue Location Discovery Protocol (RLDP)

configuring

using the CLI 5-84

using the GUI5-83to 5-84

defined 5-80

Rogue Location Discovery Protocol parameter 5-83

Rogue Rule > Edit page 5-87

Rogue Rules > Priority page 5-88

rogue states 5-81, 5-82

Role Name parameter 4-47

Role parameter 5-31, 12-10

root bridge 3-24

Root Cost parameter 3-28

Root Port parameter 3-28

RRM. See radio resource management (RRM)

RSNA logs

configuringD-27to D-29

described D-16

Rx Sensitivity Threshold parameter 10-43

S

safety warningsA-1to ??

Save and Reboot button 8-10, 8-13

saving configuration settings 8-21

Scan Threshold parameter 4-42

Scope Name parameter 6-10

Search Clients page 7-67

Secondary Controller parameters 7-35

Secondary RADIUS Server parameter 12-17

secure web mode

described 2-2

enabling

using the CLI 2-3

using the GUI 2-2

security

overview 5-2

solutions5-2to 5-3

Security Policy Completed parameter 6-38

Select APs from Current Controller parameter 12-18

self-signed certificate (SSC)

LWAPP-enabled access points sending to controller 7-16

used to authorize access points 7-16

Sequence parameter 5-56

serial port

baud rate setting 2-8

connecting 2-7

timeout 2-8

Server Address parameter 5-101

Server Index (Priority) parameter 5-8, 5-24, 5-34

Server IP Address parameter

for LDAP server 5-34

for RADIUS server 5-8

for TACACS+ server 5-24

for wireless sniffer D-37

Server Key parameter 5-44, 12-20

Server Status parameter 5-9, 5-24

Server Timeout parameter 5-9, 5-25, 5-35

service port 3-5

service-port interface

configuring

using the CLI 3-16

using the configuration wizard 4-4

using the GUI3-11to 3-13

described 3-9

session timeout

configuring

using the CLI 6-28

using the GUI 6-27

described 6-27

Set to Factory Default button 10-18

Severity Level Filtering parameter D-8

Shared Secret Format parameter 5-8, 5-24

Shared Secret parameter 5-8, 5-24

Short Preamble Enabled parameter 5-50

short preambles 5-50

Show Wired Clients option 7-30

shunned clients

described 5-103

viewing

using the CLI 5-104

using the GUI 5-104

Signature Events Detail page 5-112

Signature Events Summary page 5-111

Signature Events Track Detail page 5-113

Simple Bind parameter 5-34

sniffing. See wireless sniffing D-35

Sniff parameter D-36

SNMP, configuring 4-25

SNMP community string

changing default values using the CLI 4-27

changing default values using the GUI4-26to 4-27

SNMP v1 / v2c Community > New page 4-26

SNMP v1 / v2c Community page 4-26

SNMP v3 users

changing default values using the CLI 4-29

changing default values using the GUI4-27to 4-29

SNMP V3 Users > New page 4-28

SNMP V3 Users page 4-28

software, upgrading

guidelines8-2to 8-3

using the CLI8-6to 8-8

using the GUI8-4to 8-5

Source parameter for ACLs 5-56

Source Port parameter 5-57

Spanning Tree Algorithm parameter 3-29

Spanning Tree Protocol (STP)

configuring

using the CLI3-29to 3-30

using the GUI3-25to 3-29

described 3-24

spanning-tree root 3-24

Spanning Tree Specification parameter 3-28

SpectraLink NetLink phones

enabling long preambles

using the CLI 5-51

using the GUI 5-50

overview 5-50

Spectralink Voice Priority parameter 4-65

splash page web redirect 6-48

Splash Page Web Redirect parameter 6-50, 6-51

SSC key-hash on Cisco WiSM 7-14

SSH, troubleshooting access points D-38

SSID

configuring

using the CLI 6-5

using the GUI 6-4

described 6-3

SSL certificate

loading

using the CLI2-5to 2-7

using the GUI??to 2-5

Standard Signature > Detail page 5-110

Standard Signatures page 5-109

State parameter 5-102, 5-111

Static Mobility Group Members page 11-11

Status parameter

for DHCP scopes 6-11

for guest LANs 9-27

for SNMP community 4-27

for WLANs 6-5

STP Mode parameter 3-26

STP Port Designated Bridge parameter 3-25

STP Port Designated Cost parameter 3-25

STP Port Designated Port parameter 3-26

STP Port Designated Root parameter 3-25

STP Port Forward Transitions Count parameter 3-26

STP Port ID parameter 3-25

STP Port Path Cost Mode parameter 3-26

STP Port Path Cost parameter 3-27

STP Port Priority parameter 3-26

STP State parameter 3-25

strong passwords 7-9

Supervisor 720

configuring4-86to ??

described 4-86

switch, configuring at the remote site12-5to 12-6

Switch IP Address (Anchor) parameter 11-23

SX/LC/T small form-factor plug-in (SFP) modules 3-4

symmetric mobility tunneling

configuring

using the CLI 11-28

using the configuration wizard 4-5

using the GUI11-27to 11-28

illustrated 11-26

overview11-25to 11-27

Symmetric Mobility Tunneling Mode parameter 11-27

syslog

described D-16

levels D-9

logsD-27to D-29

Syslog Facility parameter D-8

syslog server

number supported by controller D-8

removing from controller D-8

severity level filtering D-8

Syslog Server IP Address parameter D-8

system logging

configuring

using the CLID-10to D-13

using the GUID-7to D-9

setting severity level D-9

system logs, viewing using the CLI D-13

T

TACACS+

accounting 5-19

authentication 5-18

authorization 5-18

choosing authentication priority order 5-11, 5-25

configuring

using the CLI5-25to 5-27

using the GUI5-23to 5-25

configuring on ACS5-19to 5-23

described5-18to 5-19

roles 5-18, 5-22

viewing administration server logs5-27to 5-29

TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 5-24

TACACS+ (Authentication, Authorization, or Accounting) Servers page 5-23

TACACS+ (Cisco) page (on CiscoSecure ACS) 5-21

TACACS+ Administration .csv page (on CiscoSecure ACS) 5-28, 5-29

telemetry 4-76

Telnet, troubleshooting access points D-38

terminal emulator settings 2-8

Tertiary Controller parameters 7-35

text2pcap sample output D-33

TFTP server guidelines 8-2

time, configuring

using the CLI 4-11

using the GUI 4-10

using the NTP server 4-10

time-length-values (TLVs), supported for CDP4-66to 4-67

timeout, configuring for disabled clients 6-14

Time Since Topology Changed parameter 3-28

timestamps, enabling or disabling in log and debug messages D-13

Time to Live for the PAC parameter 5-44, 12-20

time zone

configuring using the CLI 4-12

configuring using the GUI 4-11

TKIP

configuring 6-22, 6-24

described 6-21

parameter 6-22

Topology Change Count parameter 3-28

traffic specifications (TSPEC) request

described 4-51

examples 4-51

traffic stream metrics (TSM)

configuring

using the CLI 4-60

using the GUI 4-54

described 4-52

viewing statistics

using the CLI4-62to 4-64

using the GUI4-57to 4-59

Transfer Mode parameter

downloading a CA certificate 8-13

downloading a configuration file 8-19

downloading a customized web authentication login page 9-18

downloading a device certificate 8-10

upgrading controller software 8-5

uploading a configuration file 8-17

uploading a PAC 8-15

Transition Time parameter 4-42

transmit power

statically assigning using the CLI 10-29

statically assigning using the GUI10-25to 10-29

transmit power levels 10-28

Transmit Power parameter 10-43

transmit power threshold, decreasing 10-19

troubleshooting

access point join process7-19to 7-22

CCXv5 clientsD-15to D-30

problemsD-5to D-7

using Telnet or SSH D-38

tunnel attributes and identity networking 5-76

Tx Power Level Assignment parameter 10-32

Type parameter 6-4, 9-26, 12-7

U

U-APSD

described 4-52

viewing status

using the CLI 4-62

using the GUI 4-56

UDP, use in RADIUS 5-4

UDP port 11-23, 11-29

unicast mode 4-33

unique device identifier (UDI)

described 7-53

retrieving

using the CLI 7-55

using the GUI7-53to 7-54

Upload button 5-109, 8-15

Upload File from Controller page 8-15, 8-17

URL parameter 9-17

Use AES Key Wrap parameter 5-7

User Access Mode parameter 9-3

user accounts, managing9-1to 9-20

User Attribute parameter 5-34

User Base DN parameter 5-34

User Credentials parameter 5-35

User Name parameter 5-31, 12-10

Username parameter 7-5, 7-9, 7-10

User Object Type parameter 5-34

User parameter 8-15

User Profile Name parameter 4-28

V

Validity parameter 8-15

VCI strings 7-18

Verify Certificate CN Identity parameter 5-43

video settings

configuring

using the CLI 4-61

using the GUI4-54to 4-55

viewing

using the CLI4-62to 4-64

using the GUI4-55to 4-59

virtual interface

configuring

using the CLI 3-15

using the configuration wizard 4-5

using the GUI3-11to 3-13

described3-7to 3-9

VLAN Identifier parameter

for AP-manager interface 3-13

for dynamic interface 3-17, 3-18

for management interface 3-12

VLAN ID parameter 6-54, 12-13

VLAN interface. See dynamic interface

VLAN Mappings

button 12-13

page 12-13

VLANs

described 3-9

guidelines 3-11

VLAN Support parameter 12-12

VLAN tag, and identity networking 5-75

Voice & Video Optimized parameter 4-65

Voice Optimized parameter 4-65

voice-over-IP (VoIP) telephone roaming 4-40

Voice RSSI parameter 10-16

voice settings

configuring

using the CLI4-59to 4-60

using the GUI4-53to 4-54

viewing

using the CLI4-62to 4-64

using the GUI4-55to 4-59

VPN Gateway Address parameter 6-29

VPN passthrough

configuring using the CLI 6-29

configuring using the GUI 6-29

W

warnings

translatedA-1to ??

warrantyC-4to C-6

webauth.tar files 9-21

webauth bundle 9-17

web authentication

configuring a WLAN for

using the CLI 6-30

using the GUI 6-30

described 9-7

process9-7to 9-9

successful login page 9-9

web authentication login page

assigning per WLAN

using the CLI 9-22

using the GUI 9-21

choosing the default

using the CLI9-11to 9-12

using the GUI9-10to 9-11

customized example 9-20

customizing from an external web server

using the CLI 9-17

using the GUI9-16to 9-17

default 9-8

downloading a customized login page

guidelines 9-17

using the CLI 9-19

using the GUI9-18to 9-19

modified default example 9-13

previewing 9-10, 9-19

verifying settings using the CLI 9-20

Web Authentication option 9-27

Web Authentication Type parameter 9-10, 9-17, 9-19

Web Auth Type parameter 9-21, 9-28

web-browser security alert 9-7

Web Login page 9-10, 9-16

web mode

configuring

using the CLI 2-3

using the GUI 2-2

described 2-2

Web Passthrough option 9-27

Web Policy parameter 5-62, 6-50

web redirect 6-48

Web Server IP Address parameter 9-17

WEP keys, configuring 6-19

WGB parameter 7-29

WGB Wired Clients page 7-30

wired guest access

configuration overview 9-25

configuring

using the CLI9-28to 9-34

using the GUI9-26to 9-28

described9-23to 9-25

guidelines 9-25

one-controller example 9-24

two-controller example 9-25

wireless sniffing

configuring

using the GUID-35to D-37

prerequisites D-35

supported software D-35

WLAN override

configuring using the CLI 6-43

configuring using the GUI6-42to 6-43

WLAN Override parameter 6-42

WLAN Profile parameter 5-31, 12-10

WLANs

assigning web login, login failure, and logout pages

using the CLI 9-22

using the GUI 9-21

checking security settings 6-20

configuring

conditional web redirect6-48to 6-51

static and dynamic WEP 6-20

connecting clients to 12-14

creating

using the CLI 6-5

using the GUI6-3to 6-5

deleting

using the CLI 6-6

using the GUI 6-4

described1-12, 3-10to 3-11, 6-3

session timeout

configuring 6-27

described 6-27

splash page web redirect 6-48

using the same SSID 6-4

wired security solution 1-6

WLANs > Edit (Advanced) page

applying an ACL to a WLAN 5-61

configuring AAA override 5-79

configuring infrastructure MFP for a WLAN 5-68

configuring IPv6 bridging 6-39

configuring NAC out-of-band integration 6-56

configuring the diagnostic channel D-16

WLANs > Edit (QoS) page 6-34

WLANs > Edit (Security > AAA Servers) page

assigning LDAP servers to a WLAN 5-36

choosing RADIUS or LDAP servers for external authentication 9-21

disabling accounting servers on a WLAN 6-51

enabling local EAP on a WLAN 5-44

WLANs > Edit (Security > Layer 2) page 6-22, 6-26

WLANs > Edit (Security > Layer 3) page

applying a preauthentication ACL to a WLAN 5-62

configuring a WLAN for VPN Passthrough 6-29

configuring web redirect 6-50

configuring wired guest access 9-27

WLANs > Edit page 6-4, 9-26, 12-7

WLANs > New page 6-4, 9-26, 12-7

WLANs page 6-3, 11-22

WLAN SSID parameter

configuring for guest user 9-5

creating a centrally switched WLAN 12-7

creating WLANs 6-4

identifying the guest LAN 9-26

mapping an access point group to a WLAN 6-46

WMM

configuring 4-19, 6-34, 6-35

described 6-33

with CAC 4-50

WMM parameter 4-65

WMM Policy parameter 6-34

workgroup bridges (WGBs)

debugging 7-32

described 7-26

guidelines 7-26

illustrated 7-26

sample configuration 7-29

viewing status

using the CLI 7-31

using the GUI7-29to 7-31

world mode 4-15, 4-16

WPA1+WPA2

configuring

using the CLI 6-23

using the GUI6-22to 6-23

described 6-20

WPA2 Policy parameter 6-22

WPA Policy parameter 6-22