Cisco Wireless LAN Controller Configuration Guide, Release 7.0
Index
Downloads: This chapterpdf (PDF - 1.29MB) The complete bookPDF (PDF - 34.93MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

11n Mode parameter 4-35

1250 series access points

and PoE Status field 8-119

operating modes when using PoE 8-117

transmit power settings when using PoE 8-118

3DES IPSec data encryption 6-9

7920 AP CAC parameter 7-38

7920 Client CAC parameter 7-38

7920 support mode

configuring 7-37

described 7-37

7921 support mode 7-37

802.11a (or 802.11b) > Client Roaming page 4-65

802.11a (or 802.11b) > Voice Parameters page 4-78, 4-81, 4-86

802.11a (or 802.11b/g) > EDCA Parameters page 4-93

802.11a (or 802.11b/g) Global Parameters > Auto RF page 12-9

802.11a (or 802.11b/g) Global Parameters page 4-29, 12-44

802.11a (or 802.11b/g) Network Status parameter 4-30, 4-39, 4-40

802.11a/n (4.9 GHz) > Configure page 9-66

802.11a/n (or 802.11b/g/n) Cisco APs > Configure page 12-30

802.11a/n (or 802.11b/g/n) Radios page 4-85, 12-30, 12-42

802.11a/n Radios page (from Monitor Menu) 8-32

802.11a/n Radios page (from Wireless Menu) 8-32

802.11a > RRM > Coverage page 12-19

802.11a > RRM > DCA page 12-15

802.11a > RRM > Dynamic Channel Assignment (DCA) page 12-15

802.11a > RRM > General page 12-21

802.11a > RRM > Tx Power Control (TPC) page 12-11

802.11a Global Parameters page 12-41

802.11b/g/n Cisco APs > Configure page 8-106, D-50

802.11 bands

configuring using the CLI4-32to 4-34

configuring using the GUI4-29to 4-32

802.11g Support parameter 4-30

802.11h, described 4-39

802.11h Global Parameters page 4-39

802.11h parameters, configuring

using the CLI 4-40

using the GUI4-39to 4-40

802.11n

clients 8-123

configuring

using the CLI4-36to 4-39

using the GUI4-34to 4-36

devices 4-34

802.11n (2.4 GHz) High Throughput page 4-35

802.1Q VLAN trunk port 3-6

802.1X

configuring 7-23

described 7-25

dynamic key settings 7-23

802.1X+CCKM

configuring 7-26

described 7-25

802.1X authentication for access points

configuring

the switch 8-42

using the CLI8-40to 8-42

using the GUI8-38to 8-40

described 8-37

802.1x Authentication parameter 8-39

802.3 bridging

configuring using the CLI 4-57

configuring using the GUI4-55to 4-57

802.3 Bridging parameter 4-56

802.3 frames 4-55

802.3X flow control, enabling 4-55

A

AAA override

configuring

using the CLI 6-84

using the GUI 6-84

described 6-82

AC adapter warning for Japan B-3

Access Control List Name parameter 6-59

access control lists (ACLs)

applying to an interface

using the CLI 6-68

applying to a WLAN

using the CLI 6-68

using the GUI6-64to 6-65

applying to the controller CPU

using the CLI 6-68

using the GUI6-63to 6-64

configuring

using the CLI6-66to 6-67

using the GUI6-58to 6-62

counters

configuring using the CLI 6-66

configuring using the GUI 6-59

described 6-58

identity networking 6-80

rules 6-58, 6-60, 6-67

using with the debug facilityD-43to D-44

Access Control Lists > Edit page 6-61

Access Control Lists > New page 6-59

Access Control Lists > Rules > New page 6-60

Access Control Lists page 6-58

Access Mode parameter 4-45, 4-47

access point core dumps, uploading

using the CLI 8-64

using the GUI 8-63

access point count, approved tiers for 5500 series controllers 4-3

access point event logs, viewing D-17

access point groups

assigning access points to

using the CLI 7-58

using the GUI 7-56

creating

using the CLI7-56to 7-58

using the GUI7-53to 7-56

default group 7-53

described 7-51

illustrated 7-52

removing

using the CLI 7-57

using the GUI 7-54

viewing7-58to 7-59

access point monitor service, debugging D-53

access point radios, searching for8-32to 8-33

access points

20-MHz channelization 12-31

40-MHz channelization 12-31

assisted roaming 4-64

authorization list 8-52

authorizing

using LSCs8-47to 8-51

using MICs 8-46

using SSCs 8-46

using the CLI 8-52

using the GUI 8-51

configuring hybrid REAP using the CLI15-15to 15-16

converting to mesh access points 9-62

embedded 8-43

guidelines for operating in Japan B-2

LEDs

configuring 8-121

interpreting D-2

migrating from the -J regulatory domain to the -U regulatory domain8-100to 8-103

number supported per controller 3-6

priming 8-7

searching for8-10to 8-13

supported for use with hybrid REAP 15-2

supporting oversized images8-68to 8-69

troubleshooting

the join process8-53to 8-60

using Telnet or SSHD-51to D-53

VCI strings 8-53

verifying that they join the controller 8-8

viewing join information

using the CLI8-58to 8-60

using the GUI8-55to 8-58

viewing multicast client table 4-62

Accounting Server parameters 7-64

accounting servers, disabling per WLAN 7-63

ACL. See access control lists (ACLs)

ACL Name parameter 6-63, 6-64

ACS server configuration page 7-61

Action parameter 6-61

active exploits 6-129

Add AAA Client page (on CiscoSecure ACS) 6-5, 6-21

Add AP button 15-19

Add New Rule button 6-59

Add Web Server button 11-20

AdHoc Rogue AP parameter 6-89

administrator access 4-42

administrator usernames and passwords, configuring 4-42

Admin Status parameter 3-26, 3-27

Admission Control (ACM) parameter 4-79, 4-81

AES CBS IPSec data encryption 6-10

AES-CCMP 7-25

AES parameter 7-26

Aggregated MAC Protocol Data Unit (A-MPDU) 4-37

Aggregated MAC Service Data Unit (A-MSDU) 4-37

aggregation method, specifying 4-37

AirMagnet Enterprise Analyzer D-48

Aironet IE parameter 7-28, 7-49

Aironet IEs

configuring using the CLI 7-51

configuring using the GUI 7-49

Airopeek D-48

Alarm Trigger Threshold parameter 12-39

All APs > Access Point Name > Link Details > Neighbor Name page 9-60

All APs > Access Point Name > Mesh Neighbor Stats page 9-60

All APs > Access Point Name > Neighbor Info page 9-59

All APs > Access Point Name > Statistics page 9-54

All APs > Access Point Name > VLAN Mappings page 15-14

All APs > Details (Advanced) page

configuring CDP 4-100

All APs > Details for (Advanced) page 8-4, 8-63, D-52

configuring country codes 8-96

configuring link latency 8-114

configuring PoE 8-119

All APs > Details for (Credentials) page 8-35, 8-39, 8-73

All APs > Details for (General) page 8-67, 8-71, 15-13

All APs > Details for (High Availability) page 8-71, 8-88, 8-92

All APs > Details for (H-REAP) page 8-71, 8-72, 15-13

All APs > Details for (Inventory) page 8-110

All APs > Details for page D-49, D-54

All APs > Details page 9-18, 9-42, 12-38

All APs page 8-10, 9-53, 12-38, 15-13

Allow AAA Override parameter 6-84

AnchorTime parameter 12-16

anonymous local authentication bind method 6-36, 6-38

Anonymous Provision parameter 6-46

Antenna Gain parameter 12-32

Antenna parameter 12-32

Antenna Type parameter 12-32

AP > Clients > Traffic Stream Metrics page 4-85

AP > Clients page 4-85

AP801 access point

described 8-43

using with a controller 8-43

AP Authentication Policy page 6-71, 12-39

AP Core Dump parameter 8-63

ap-count evaluation licenses, activating

using the CLI4-19to 4-20

using the GUI4-16to 4-19

AP Ethernet MAC Addresses parameter 8-48

AP Failover Priority parameter 8-92

AP Group Name parameter 7-54

AP Groups > Edit (APs) page 7-56

AP Groups > Edit (General) page 7-55

AP Groups > Edit (WLANs) page 7-55, 7-70

AP Groups page 7-53, 7-69

AP image download 8-28

AP Join Stats Detail page 8-58

AP Join Stats page 8-56

AP-manager interface

and dynamic interfaces 3-11

configuring

using the CLI3-17to 3-18

using the GUI3-13to 3-16

creating multiple interfaces

using the CLI 3-47

using the GUI3-45to 3-46

described 3-9

illustration

of four AP-manager interfaces 3-45

of three AP-manager interfaces 3-44

of two AP-manager interfaces 3-43

using multiple3-42to 3-47

AP Mode parameter 8-71, 12-38, 15-13, D-49

AP Name parameter 7-56

Applying an Access Control List to an Interface

using the GUI 6-63

AP Policies page 8-51

AP Primary Discovery Timeout parameter 8-87

ASLEAP detection 6-129

Assignment Method parameter 12-30, 12-33

asymmetric tunneling

described 14-27

illustrated 14-28

authenticated local authentication bind method 6-36, 6-38

Authentication Protocol parameter 4-47

Auth Key Mgmt parameter 7-26

Authority ID Information parameter 6-46, 15-23, 15-24

Authority ID parameter 6-46, 15-23

Authorize LSC APs against auth-list parameter 8-51

Authorize MIC APs against auth-list or AAA parameter 8-51

authorizing access points

using the CLI 8-52

using the GUI 8-51

auto-anchor mobility

configuring

using the GUI14-22to 14-24

guidelines 14-22

overview14-21to 14-22

auto-immune feature 6-110

AutoInstall

described 2-26, 2-29

example operation 2-29

obtaining

DHCP addresses for interfaces 2-27

TFTP server information 2-27

overview 2-26

selecting configuration file 2-28

using 2-26

Average Data Rate parameter 4-69, 4-73

Average Real-Time Rate parameter 4-69, 4-73

Avoid Cisco AP Load parameter 12-16

Avoid Foreign AP Interference parameter 12-16, 14-19

Avoid Non-802.11a (802.11b) Noise parameter 12-16

B

Backhaul Client Access parameter 9-66

backup controllers

configuring

using the CLI8-89to 8-91

using the GUI8-87to 8-89

described 8-86

Back-up Primary Controller IP Address parameter 8-88

Back-up Primary Controller Name field 8-88

Back-up Secondary Controller IP Address parameter 8-88

Back-up Secondary Controller Name parameter 8-88

bandwidth-based CAC

described 4-76

enabling

using the CLI 4-88

using the GUI 4-79

for mesh networks 9-46

Base MAC Address parameter 3-32

Beacon Period parameter 4-30

beamforming

configuring

using the CLI12-42to 12-43

using the GUI12-41to 12-42

described 12-40

guidelines 12-41

Beamforming parameter 12-41, 12-42

Bind Password parameter 6-36

Bind Username parameter 6-36

Bridge Data Rate parameter 9-43

Bridge Group Name parameter 9-42

bridge protocol data units (BPDUs) 3-29

bridging parameters

configuring using the CLI9-44to 9-45

configuring using the GUI9-42to 9-44

browsers supported 2-16

Buffered Log Level parameter D-12

Burst Data Rate parameter 4-69, 4-73

Burst Real-Time Rate parameter 4-69, 4-73

C

CAC

configuring for 7920 phones 7-37

described 4-76

enabling

using the CLI 4-89

using the GUI 4-81

in mesh networks 9-46

viewing in mesh networks9-49to 9-51

viewing using the CLI 4-90

capacity adder license. See licenses

CAPWAP

and mesh access points 9-7

cascading 12-6

CA Server URL parameter 8-47

Catalyst 3750G Integrated Wireless LAN Controller Switch

described 1-14

logical connectivity diagram and associated software commandsE-4to E-7

ports 3-3, 3-4, 3-6

CCKM

configuring 7-26

described 7-25

hybrid-REAP groups 15-18

with mobility 14-7

CCX

configuring Aironet IEs

using the CLI 7-51

using the GUI 7-49

described 7-48

link test 8-110

viewing a client's version

using the CLI 7-51

using the GUI7-49to 7-51

CCX Layer 2 client roaming

configuring

using the CLI 4-66

using the GUI4-65to 4-66

debugging using the CLI 4-67

described4-64to 4-65

obtaining information using the CLI 4-66

CCX radio management

configuring

using the CLI 12-45

using the GUI12-44to 12-45

debugging using the CLI 12-48

features 12-43

hybrid-REAP considerations 12-43

obtaining information using the CLI12-46to 12-48

CCXv5 clients

enabling location presence 4-116

troubleshootingD-28to D-43

CCXv5 Req button D-35

CCX Version parameter 7-50

CDP > AP Neighbors > Detail page 4-103

CDP > AP Neighbors page 4-102

CDP > Global Configuration page 4-99

CDP > Interface Neighbors > Detail page 4-101

CDP > Interface Neighbors page 4-101

CDP > Traffic Metrics page 4-103

CDP Advertisement Version parameter 4-99

CDP AP Neighbors page 4-102

CDP Protocol Status parameter 4-99

CDP State parameter 4-100

Certificate Authority (CA) certificates

downloading

using the CLI10-24to 10-25

using the GUI 10-23

overview 10-23

using with local EAP 6-42, 6-48

Certificate File Name parameter 11-8

Certificate File Path parameter 11-8

Certificate Issuer parameter 6-45

Certificate Password parameter 10-21, 11-9

Certificate Type parameter 8-52

Change Filter link 8-10, 8-33, 8-56

Change Rules Priority parameter 6-94

Channel Announcement parameter 4-39

Channel Assignment Leader parameter 12-17

Channel Assignment Method parameter 12-15

channel bonding in the 5-GHz band 12-31

Channel parameter 12-30, D-50

Channel Quiet Mode parameter 4-39

channels

statically assigning using the CLI 12-34

statically assigning using the GUI12-29to 12-33

Channel Scan Duration parameter 12-22

Channel Width Parameter 12-17

Channel Width parameter 12-30

Check Against CA Certificates parameter 6-45

Check Certificate Date Validity parameter 6-46

chokepoints for RFID tag tracking 4-108

CIDS Sensor Add page 6-108

CIDS Sensors List page 6-107

CIDS Shun List page 6-111

ciphers

configuring 7-26, 7-27

described 7-25

Cisco 2100 Series Wireless LAN Controllers

AutoInstall interfaces 2-27

described 1-8

FCC statement B-4

features not supported 1-8

network connections 1-18

ports 3-2, 3-4

Cisco 28/37/38xx Integrated Services Router

described 1-13

logical connectivity diagram and associated software commands E-3

ports 3-4, 3-6, 4-123

using 4-123

versions 1-13

Cisco 3200 Series Mobile Access Router (MAR)

described 9-65

operating with mesh access points

using the CLI to configure 9-67

using the GUI to configure 9-66

Cisco 3300 Series Mobility Services Engine (MSE), using with wIPS 6-124

Cisco 4400 Series Wireless LAN Controllers

AutoInstall interfaces 2-27

choosing between link aggregation and multiple AP-manager interfaces3-36to 3-46

described 1-9, 1-10

FCC statement B-3

models3-4to 3-5

network connections1-18to 1-19

ports 3-2, 3-4, 3-5

Cisco 5500 Series Wireless LAN Controllers

choosing between link aggregation and multiple AP-manager interfaces3-36to 3-46

CPUs D-5

described 1-10

FCC statement B-3

features not supported 1-11

interface configuration example 3-48

licenses. See licenses

models 3-5

multiple AP-manager interfaces3-47to 3-48

network connections 1-19

ports 3-3, 3-5

using the USB console port3-35to 3-36

Cisco 7920 Wireless IP Phones 7-37

Cisco 7921 Wireless IP Phones 7-37

Cisco Adaptive Wireless Path Protocol (AWPP) 9-7

Cisco AV-pairs 7-59, 7-60, 7-61

Cisco Centralized Key Management (CCKM). See CCKM

Cisco Clean Access (CCA) 7-65

Cisco CleanAir 13-1

Cisco Client Extensions (CCX). See CCX

Cisco Discovery Protocol (CDP)

configuring

using the CLI4-104to 4-105

using the GUI4-98to 4-100

debugging using the CLI 4-106

described 4-95

enabling using the GUI4-99to 4-100

sample network 4-98

supported devices 4-95

viewing neighbors

using the CLI4-105to 4-106

using the GUI4-100to 4-104

viewing traffic information

using the CLI 4-105

using the GUI 4-103

Cisco Discovery Protocol parameter 4-100

Cisco high-power switches 8-119

Cisco License Manager (CLM)

and the controller license agent 4-26

using to register PAKs 4-5

Cisco Licensing website 4-21

Cisco Logo parameter 11-13

Cisco NAC Appliance 7-65

CiscoSecure Access Control Server (ACS) 6-4

Cisco Spectrum Intelligence 13-24

Cisco Unified Wireless Network (UWN) Solution

described1-2to 1-4

illustrated 1-3

Cisco Wireless Control System (WCS) 1-2

Cisco WiSM

described1-11to 1-12

guidelines 4-121

logical connectivity diagram and associated software commandsE-1to E-3

maximum number supported by router chassis 1-12

ports 3-4, 3-5

SSC key-hash 8-45

CKIP

configuring

using the CLI 7-29

using the GUI7-28to 7-29

described 7-28

CleanAir Benefits 13-2

CleanAir guidelines 13-4

Clear Config button 8-78

Clear Filter link 7-8, 8-13, 8-33, 8-57

clearing the controller configuration 10-36

Clear Stats button 14-20

Clear Stats on All APs button 8-56

CLI

basic commands 2-26

enabling wireless connections 2-36

logging into2-23to 2-25

logging out 2-25

navigating 2-25

troubleshooting commandsD-7to D-10

using2-23to 2-26

Client Certificate Required parameter 6-45

client exclusion policies, configuring

using the CLI6-77to 6-78

using the GUI6-76to 6-77

Client Exclusion Policies page 6-77

client location, using WCS 1-7

client MFP 6-69

Client Protection parameter 6-73

client reporting

configuring using the CLID-37to D-40

configuring using the GUID-34to D-37

described D-28

Client Reporting page D-36

client roaming, configuring4-63to 4-67

clients

connecting to WLANs 15-16

viewing

using the CLI 8-126

using the GUI8-122to 8-126

viewing CCX version

using the CLI 7-51

using the GUI7-49to 7-51

Clients > AP > Traffic Stream Metrics page 4-84

Clients > AP page 4-84

Clients > Detail page

configuring client reporting D-35

viewing a client's CCX version 7-50

viewing client details 8-84, 8-125

viewing the status of workgroup bridges 8-83

viewing voice and video settings 4-83

Clients page

performing a link test 8-112

viewing clients 8-122

viewing the status of workgroup bridges 8-83

viewing voice and video settings 4-82

Client Type parameter 8-83, 8-84

Commands > Reset to Factory Defaults page 4-123

comma-separated values (CSV) file, uploading 15-22

Community Name parameter 4-45

conditional web redirect 7-59

configuring

using the CLI 7-62

using the GUI7-61to 7-62

described 7-59

Conditional Web Redirect parameter 7-62

Configuration File Encryption parameter 10-31

configuration files

downloading

using the CLI10-33to 10-34

using the GUI10-31to 10-32

editing10-35to 10-36

uploading

using the CLI10-30to 10-31

configuration wizard

CLI version2-13to 2-16

described 2-2

GUI version2-3to 2-13

Configuration Wizard - 802.11 Configuration page 2-11

Configuration Wizard Completed page 2-13

Configuration Wizard - Management Interface Configuration page 2-6

Configuration Wizard - Miscellaneous Configuration page 2-7

Configuration Wizard - Service Interface Configuration page 2-5

Configuration Wizard - Set Time page 2-12

Configuration Wizard - SNMP Summary page 2-4, 2-6

Configuration Wizard - System Information page 2-3

Configuration Wizard - Virtual Interface Configuration page 2-8

Configure 13-1

Configure Cisco CleanAir

Using the CLI 13-8

Using the GUI 13-5

Configure option for RRM override 12-30

Configure Sniffing on an Access Point

Configuring a Spectrum Expert 13-22

Confirm Password parameter 15-11

Console Log Level parameter D-12

console port

connecting2-2to 2-3

Control and Provisioning of Wireless Access Points protocol (CAPWAP) 1-5

debugging 8-6

described 8-2

guidelines 8-2

viewing MTU information 8-5

controller failure detection time, reducing 8-86

controller network module

baud rate 3-4

versions 3-6

controllers

configuration

clearing 10-36

erasing 10-36

saving 10-34

connections 1-15

discovery process 8-6

guidelines for operating in JapanB-2to B-3

multiple-controller deployment 1-4

overview 1-7

platforms1-8to 1-14

resetting factory default settings

using the GUI 4-123

single-controller deployment1-3to 1-4

synchronizing with location appliance 4-113

types of memory 1-16

upgrading software

using the CLI10-9to 10-11

using the GUI10-6to 10-8

Controller Spanning Tree Configuration page 3-32

Controller Time Source Valid parameter 6-73

Control Path parameter 14-24

core dump files

described D-20

uploading automatically to an FTP server

using the CLI D-22

using the GUI D-21

uploading from a 5500 series controller to a TFTP or FTP serverD-22to D-23

Core Dump page D-21

Country Code parameter 8-96

country codes

configuring

using the CLI8-98to 8-100

using the GUI8-95to 8-97

described 8-94

Japanese 8-101

viewing using the CLI 8-99

Country page 8-95

Coverage Exception Level per AP parameter 12-20

coverage hole detection

configuring per controller

using the CLI 12-25

using the GUI12-19to 12-20

disabling on a WLAN

described 7-64

using the CLI 7-65

using the GUI7-64to 7-65

coverage hole detection and correction 12-4

Coverage Hole Detection Enabled parameter 7-64

CPU Access Control Lists page 6-64

CPUs, 5500 series controllers D-5

crash files

uploading

using the CLID-19to D-20

using the GUID-18to D-19

Current Channel parameter 12-33

Custom Signatures page 6-116

D

data encryption

and OfficeExtend access points 8-75

configuring

using the CLI8-4to 8-5

using the GUI8-3to 8-4

described 8-3

for OfficeExtend access points 8-72

Data Encryption parameter 8-4, 8-72

Datagram Transport Layer Security 8-27

Data Path parameter 14-24

Data Rates parameter 4-32

date

configuring manually 2-30

configuring through NTP server 2-30

setting

using the CLI 2-32

DCA Channel Sensitivity parameter 12-16

DCA Channels parameter 12-18

debug commands, sending 8-60

debug facility

configuringD-44to D-47

describedD-43to D-44

default enable password 8-34

default-group access point group 7-53

Default Mobility Group parameter 14-12

Default Routers parameter 7-14

Delivery Traffic Indication Map (DTIM). See DTIM period

Deny Counters parameter 6-62

Description parameter 6-33, 9-13, 15-11

Designated Root parameter 3-32

DES IPSec data encryption 6-9

Destination parameter 6-60

Destination Port parameter 6-61

Detect and Report Ad-Hoc Networks parameter 6-89

device certificates

downloading

using the CLI 10-22

using the GUI10-20to 10-21

overview 10-20

using with local EAP 6-42, 6-48

DHCP

configuring using the CLI 7-12

configuring using the GUI 7-11

debugging 7-12

DHCP Addr. Assignment Required parameter 7-11

DHCP Allocated Lease page 7-14

DHCP option 43, in controller discovery process 8-8

DHCP option 82

configuring

using the CLI 6-57

using the GUI 6-57

described 6-55

example 6-56

DHCP Option 82 Remote ID Field Format parameter 6-56

DHCP Parameters page 4-41, 6-56

DHCP proxy

configuring

using the CLI 4-42

using the GUI 4-41

described 4-41

DHCP Scope > Edit page 7-13

DHCP scopes

configuring

using the CLI7-14to 7-16

using the GUI7-12to 7-14

described 7-12

DHCP Scopes page 7-13

DHCP server discovery 8-8

DHCP Server IP Addr parameter 7-11

DHCP Server Override parameter 7-11

DHCP servers

external7-9to 7-11

internal 7-9

diagnostic channel

configuring

using the CLID-30to D-34

using the GUI D-29

described D-28

Diagnostic Channel parameter D-29

directed roam request 4-64

Direction parameter 6-61

disabled clients, configuring a timeout 7-17

discovery request timer, configuring 8-90

distribution system ports3-4to 3-6

Diversity parameter 12-32

DNS Domain Name parameter 7-14

DNS IP Address parameter 8-67

DNS Servers parameter 7-14

Domain Name parameter 8-67

domain name server (DNS) discovery 8-8

Download button

downloading a CA certificate 10-24

downloading a configuration file 10-32

downloading a customized web authentication login page 11-22

downloading a device certificate 10-21

downloading a signature file 6-116

Download File to Controller page 10-17

downloading a customized web authentication login page 11-22

downloading CA certificates 10-23

downloading configuration files 10-31

downloading device certificates 10-21

downloading IDS signatures 6-115

downloading login banner file 10-17

Download SSL Certificate parameter 11-8

DSCP parameter 6-61

DTIM period, configuring for MAC filtering 7-17

DTLS 8-27

DTLS data encryption. See data encryption

DTPC Support parameter 4-30

dynamic AP management

for dynamic interface 3-23

for the management interface 3-16

Dynamic AP Management parameter 3-11

for dynamic interface 3-21

for management interface 3-14

dynamic AP-manager interface 3-11

dynamic channel assignment (DCA)

20-MHz channelization 12-4, 12-17

40-MHz channelization 12-4, 12-17

configuring

using the CLI12-23to 12-25

using the GUI12-14to 12-18

described 12-3

dynamic frequency selection8-104to 8-105

dynamic interface

configuring

using the CLI3-23to 3-24

using the GUI3-19to 3-22

described 3-11

dynamic interface example 3-48

dynamic transmit power control, configuring 4-31

dynamic WEP, configuring 7-23

Dynamic WEP Key Index parameter 6-43

E

EAP-FAST Method Parameters page 6-46

EAP-FAST parameter 6-45

EAPOL-Key Max Retries parameter 6-44

EAPOL-Key Timeout parameter 6-43

EAP Profile Name parameter 6-47

EAP-TLS parameter 6-45

EDCA Profile parameter 4-93

Edit QoS Profile page 4-69

Edit QoS Role Data Rates page 4-72

Egress Interface parameter 11-31

Email Input parameter 11-32

Enable AP Local Authentication parameter 15-21

Enable Authentication for Listener parameter 4-27

Enable Check for All Standard and Custom Signatures parameter 6-117

Enable Controller Management to be accessible from Wireless Clients parameter 2-37, 6-55

Enable Counters parameter 6-59

Enable Coverage Hole Detection parameter 12-19

Enable CPU ACL parameter 6-64

Enable Default Authentication parameter 4-27

Enable DHCP Proxy parameter 4-41

Enable Dynamic AP Management parameter 3-46

Enable EAP-FAST Authentication parameter 15-23

Enable IGMP Snooping parameter 4-60

Enable LEAP Authentication parameter 15-23

Enable Least Latency Controller Join parameter 8-73

Enable Link Latency parameter 8-73, 8-114, 8-115

Enable Listener parameter 4-27

Enable Low Latency MAC parameter 4-94

Enable LSC on Controller parameter 8-47

Enable NAT Address parameter 3-14

Enable Notification parameter 4-27

Enable OfficeExtend AP parameter 8-72

Enable passive client 7-74

Enable Password parameter 8-35

Enable Server Status parameter 6-36

Enable Tracking Optimization parameter 8-106

Encryption Key parameter 7-29

end user license agreementC-2to C-4

end-user license agreement (EULA) 4-7, 4-8

enhanced distributed channel access (EDCA) parameters

configuring using the CLI4-94to 4-95

enhanced neighbor list

described 4-64, 9-31

request (E2E) 4-64

Enter Saved Permission Ticket File Name parameter 4-23

EoIP port 14-24, 14-30

epings 14-24, 14-30

erasing the controller configuration 10-36

error codes, for failed VoIP calls7-44to 7-45

Ethernet connection, using remotely2-24to 2-25

Ethernet Multicast Mode parameter 4-59

evaluation licenses

installed on 5500 series controllers 4-3

event reporting for MFP 6-70

Excessive 802.11 Association Failures parameter 6-77

Excessive 802.11 Authentication Failures parameter 6-77

Excessive 802.1X Authentication Failures parameter 6-77

Excessive Web Authentication Failures parameter 6-77

Expedited Bandwidth parameter 4-79

expedited bandwidth requests

described 4-77

enabling

using the GUI 4-79

Expiration Timeout for Rogue AP and Rogue Client Entries parameter 6-89

Extensible Authentication Protocol (EAP)

configuring 7-23

setting local timers6-48to 6-49

timeout and failure counters

per access point 6-51

per client 6-52

extension channel 12-33

F

factory default settings

resetting using the GUI 4-123

failover priority for access points

configuring

using the CLI 8-93

using the GUI8-91to 8-93

described 8-91

viewing using the CLI 8-93

failover protection 1-17

fake access point detection 6-129

Fallback Mode parameter 6-10

Fast Ethernet port 3-6

fast heartbeat timer

configuring

using the CLI 8-89

using the GUI 8-87

described 8-86

fast SSID changing

configuring using the CLI 4-55

configuring using the GUI 4-54

FCC statement

2100 series controllers B-4

4400 series controllers B-3

5500 series controllers B-3

Federal Information Processing Standards (FIPS) 6-12

File Compression parameter 8-63

File Name to Save Credentials parameter 4-21

file transfers 1-16

File Type parameter

downloading a CA certificate 10-24

downloading a configuration file 10-31

downloading a customized web authentication login page 11-22

downloading a device certificate 10-21

Login Banner 10-17

upgrading controller software 10-8

uploading a configuration file 10-29

uploading packet capture files D-25

uploading PACs 10-26

filter, using to view clients8-123to 8-124

Fingerprint parameter 6-109

flashing LEDs, configuring 8-121

Forward Delay parameter 3-33, 3-34

forwarding plane architecture 4-56

Fragmentation Threshold parameter 4-30

fragmented pings 3-8

Friendly Rogue > Create page 6-95

FTP server guidelines 10-2

G

General (controller) page

configuring 802.3 bridging 4-56

configuring an RF group 12-7

enabling link aggregation 3-40

General (security) page 6-31

General page 6-43

Generate Password parameter 11-5

Generate Rehost Ticket button 4-23

gigabit Ethernet port 3-6

Global AP Failover Priority parameter 8-92

Global Configuration page

configuring authentication for access points 8-39

configuring backup controllers 8-87

configuring failover priority for access points 8-91

configuring global credentials for access points 8-35

global credentials for access points

configuring

using the CLI8-36to 8-37

using the GUI8-34to 8-36

described 8-34

overriding

using the CLI 8-36

using the GUI 8-35

Global multicast mode 7-73

Group Mode parameter 12-9, 14-18

Group Name parameter 14-13, 15-19

Group Setup page (on CiscoSecure ACS) 6-23

Guest LAN parameter 11-30

guest N+1 redundancy 14-21

guest user accounts

creating11-2to 11-7

creating as a lobby ambassador11-4to 11-6

viewing

using the CLI 11-7

using the GUI 11-6

Guest User parameter 6-33, 15-11

Guest User Role parameter 6-33, 15-11

guest WLAN, creating 11-5

GUI

browsers supported 2-16

enabling wireless connections 2-36

guidelines 2-16

logging into 2-17

logging out of 2-17

using 2-16

Guidelines and Limitations for Predownloading 10-12

GUI to configure passive client 7-72

H

Headline parameter 11-13

Hello Time parameter 3-33

help, obtaining 2-17

hex2pcap sample output D-46

Holdtime parameter 3-33, 4-99

Honeypot access point detection 6-129

HREAP Group Name parameter 15-14

HREAP Groups > Edit (Local Authentication > Local Users) page 15-22

HREAP Groups > Edit (Local Authentication > Protocols) page 15-23

HREAP Groups > Edit page 15-19, 15-20

HREAP Groups page 15-19

H-REAP Local Switching parameter 15-9

H-REAP Mode AP Fast Heartbeat Timeout parameter 8-87

H-REAP Mode AP Fast Heartbeat Timer State parameter 8-87

H-REAP parameter 8-71

HTTP Access parameter 2-18

HTTP Configuration page 2-18

HTTPS Access parameter 2-18

hybrid REAP

access points supported 15-2

authentication process15-2to 15-5

bandwidth restriction 15-2

configuring

access points using the CLI15-15to 15-16

access points using the GUI15-12to 15-15

controller using the GUI15-7to 15-11

guidelines 15-5

illustrated 15-2

number of access points supported 15-2

overview 15-2

hybrid-REAP

debugging 15-12, 15-16

hybrid-REAP groups

backup RADIUS server 15-17

CCKM 15-18

configuring

using the CLI 15-24

using the GUI15-18to 15-23

described 15-17

example 15-17

local authentication 15-18

Hysteresis parameter 4-65

I

identity networking

configuring6-78to 6-82

overview6-78to 6-79

RADIUS attributes6-79to 6-82

Identity Request Max Retries parameter 6-43

Identity Request Timeout parameter 6-43

IDS 6-107

IDS sensors

configuring

using the CLI6-109to 6-111

using the GUI6-107to 6-109

described 6-107

IDS signature events

viewing using the CLI6-122to 6-123

viewing using the GUI6-119to 6-120

IDS signatures

configuring

using the CLI6-120to 6-122

using the GUI6-115to 6-119

described 6-112

frequency 6-118

MAC frequency 6-118, 6-121

measurement interval 6-118

pattern 6-118

quiet time 6-118, 6-121

tracking method 6-118

uploading or downloading using the GUI6-115to 6-116

viewing

using the CLI6-122to 6-123

using the GUI6-119to 6-120

IGMP Snooping 7-74

IGMP Timeout parameter 4-60

IKE Diffie Hellman Group parameter 6-10

IKE Phase 1 parameter 6-10

Image pre-download 8-28

Index parameter for IDS 6-108

indoor access points

converting to mesh access points 9-62

infrastructure MFP

components 6-70

described 6-69

Infrastructure Protection parameter 6-73

Infrastructure Validation parameter 6-73

Ingress Interface parameter 11-31

Injector Switch MAC Address parameter 8-120

inline power 8-117

Install License button 4-7

intelligent power management (IPM) 8-119

inter-controller roaming

described 4-63

example 14-3

Interface Name parameter 7-55, 7-67, 7-70, 9-13

Interface parameter 7-11

interfaces

and identity networking 6-80

assigning WLANs 7-17

configuring

using the CLI3-16to 3-19

using the GUI3-13to 3-16

overview3-7to 3-11

Interfaces > Edit page

applying an ACL to an interface 6-63

configuring dynamic interfaces 3-20

configuring NAC out-of-band integration 7-68

creating multiple AP-manager interfaces 3-45

Interfaces > New page 3-20, 3-45

Interfaces page 3-13

interference 12-3

Interferences 13-3

Interference threshold parameter 12-21

Internet Group Management Protocol (IGMP)

configuring

using the CLI 4-61

using the GUI 4-60

snooping 4-58

inter-release mobility 14-10

inter-subnet mobility 14-7

inter-subnet roaming

described 4-63

illustrated14-3to 14-4

Interval parameter 12-16, 12-45

intra-controller roaming

described 4-63

illustrated 14-2

Inventory page 8-109

Invoke Channel Update Now button 12-16

Invoke Power Update Now button 12-12

IP address-to-MAC address binding

configuring4-67to 4-68

described 4-67

IP Mask parameter 4-45

IPSec parameter 6-9

IP Theft or IP Reuse parameter 6-77

IPv6 bridging

configuring

using the CLI 7-48

using the GUI7-47to 7-48

described 7-46

guidelines 7-46

IPv6 bridging and IPv4 web authentication example 7-47

IPv6 Enable parameter 7-48

J

Japanese country codes 8-101

Japanese regulations for migrating access points from the -J to the -U regulatory domain8-100to 8-103

K

Keep Alive Count parameter 14-23

Keep Alive Interval parameter 14-23

Key Encryption Key (KEK) parameter 6-8

Key Format parameter 7-29

Key Index parameter 7-29

key permutation

configuring 7-29, 7-30

described 7-28

Key Permutation parameter 7-29

Key Size parameter 7-29

Key Wrap Format parameter 6-8

Key Wrap parameter 6-8

L

LAG. See link aggregation (LAG)

LAG Mode on Next Reboot parameter 3-41

Last Auto Channel Assignment parameter 12-17

Last Power Level Assignment parameter 12-12

Layer 1 security 6-2

Layer 2

operation 1-5

security

configuring7-23to 7-30

described 6-2

Layer 2 Security parameter 7-26, 7-29, 7-62

Layer 3

operation 1-5

security

configuring7-31to 7-33

described 6-3

Layer 3 Security parameter

for VPN passthrough 7-32

for web authentication 7-33

for web redirect 7-62

LDAP

choosing server priority order 6-37

configuring

using the CLI6-38to 6-40

using the GUI6-35to 6-38

LDAP server

assigning to WLANs6-37to 6-38

choosing local authentication bind method

using the CLI 6-38

using the GUI 6-36

LDAP Servers > New page 6-35

LDAP Servers page 6-35

LDAP Servers parameter 6-47

LEAP parameter 6-45

Learn Client IP Address parameter 15-10

Lease Time parameter 7-14

LEDs

configuring 8-121

interpreting D-2

license agent

configuring

using the CLI4-28to 4-29

using the GUI4-26to 4-28

described 4-26

License Agent Configuration page 4-27

license agreementC-2to C-4

License Commands (Rehost) page 4-21

License Commands page 4-6

License Detail page 4-10, 4-17

license level, changing

using the CLI 4-15

using the GUI 4-14

License Level page 4-13

licenses

activating ap-count evaluation licenses

using the CLI4-19to 4-20

using the GUI4-16to 4-19

choosing feature set

using the CLI 4-15

using the GUI4-13to 4-15

installing

using the CLI4-8to 4-9

using the GUI4-6to 4-8

obtaining4-3to 4-6

rehosting

described 4-20

using the CLI4-24to 4-25

using the GUI4-20to 4-23

removing

using the CLI 4-8

using the GUI 4-9

required for OfficeExtend access points 8-70

saving

using the CLI 4-8

using the GUI 4-7

SKUs 4-4, 4-5

transferring to a replacement controller after an RMA4-25to 4-26

viewing

using the CLI4-10to 4-13

using the GUI4-9to 4-10

Licenses page 4-9, 4-14, 4-16

licensing portal, using to register PAKs 4-6

Lifetime parameter 6-33, 11-5, 15-11

Lightweight Access Point Protocol (LWAPP) 1-5, 8-2

lightweight mode, reverting to autonomous mode 8-45

limited warrantyC-4to C-6

link aggregation (LAG)

configuring neighboring devices 3-42

described3-37to 3-38

enabling

using the CLI 3-41

using the GUI3-40to 3-41

example 3-37

guidelines3-39to 3-40

illustrated 3-39

verifying settings using the CLI 3-42

link latency

and OfficeExtend access points 8-73, 8-75

configuring

using the CLI8-115to 8-116

using the GUI8-114to 8-115

described 8-113

Link Status parameter 3-26

Link Test

button 8-112

option 8-112, 9-59

page 8-112

link test

described 8-110

performing

using the CLI 8-113

using the GUI8-111to8-112, 9-59to 9-60

types of packets 8-110

Link Trap parameter 3-26, 3-27

Listener Message Processing URL parameter 4-27

Load-based AC parameter 4-79

load-based CAC

described4-76to 4-77

enabling

using the GUI 4-79

lobby ambassador account

creating using the CLI 11-3

creating using the GUI11-2to 11-3

Lobby Ambassador Guest Management > Guest Users List > New page 11-4

Lobby Ambassador Guest Management > Guest Users List page 11-4, 11-6

Local Auth Active Timeout parameter 6-43

local EAP

configuring

using the CLI6-47to 6-52

using the GUI6-42to 6-47

debugging 6-52

described6-40to 6-41

example 6-41

viewing information using the CLI 6-50

Local EAP Authentication parameter 6-47

Local EAP Profiles > Edit page 6-45

Local EAP Profiles page 6-44

Local Management Users > New page 11-3

Local Management Users page 11-2

Local Mode AP Fast Heartbeat Timeout parameter 8-87

Local Mode AP Fast Heartbeat Timer parameter 8-87

Local Net Users > New page 6-33, 15-11

Local Net Users page 6-32, 11-6

local network users

configuring using the CLI 6-34

configuring using the GUI6-32to 6-34

local significant certificate (LSC)

configuring

using the CLI8-49to 8-51

using the GUI8-47to 8-49

described 8-47

Local Significant Certificates (LSC) - AP Provisioning page 8-48

Local Significant Certificates (LSC) - General page 8-47

local user database, capacity 11-2

location

calibration 12-44

configuring settings using the CLI4-113to 4-115

viewing settings using the CLI4-115to 4-117

location appliance

installing certificate4-112to 4-113

synchronizing with controller 4-113

location-based services 12-44

location presence 4-116

logical connectivity diagram

Catalyst 3750G Integrated Wireless LAN Controller Switch E-4

Cisco 28/37/38xx Integrated Services Router E-3

Cisco WiSM E-1

login banner file

clearing10-19to 10-20

described 10-16

downloading

using the CLI10-18to 10-19

using the GUI10-17to 10-18

Login Banner page 10-20

logs

roamingD-28, D-40to D-41

RSNAD-28, D-40to D-42

syslogD-29, D-40to D-42

uploading

using the CLID-19to D-20

using the GUID-18to D-19

long preambles

described 6-52

enabling on SpectraLink NetLink phones

using the CLI 6-53

using the GUI 6-53

LWAPP-enabled access points

debug commands 8-60

disabling the reset button 8-66

guidelines 8-44

MAC addresses displayed on controller GUI 8-65

radio core dumps

described 8-60

receiving debug commands from controller 8-60

retrieving radio core dumps 8-61

reverting to autonomous mode8-45to 8-46

sending crash information to controller 8-60

uploading

access point core dumps8-63to 8-64

radio core dumps8-61to 8-62

M

MAC address of access point

adding to controller filter list

using the GUI 9-45

displayed on controller GUI 8-65

MAC Address parameter 9-13

MAC filtering

configuring on WLANs7-16to 7-17

DTIM period 7-17

MAC filtering, for mesh access points9-12to 9-13

MAC Filtering page 9-12

MAC Filters > New page 9-12

management frame protection (MFP)

configuring

using the CLI 6-73

using the GUI6-71to 6-72

debugging 6-76

guidelines 6-70

types 6-69

viewing settings6-74to 6-76

Management Frame Protection parameter 6-73

Management Frame Protection Settings page 6-73

management frame validation 6-70

management interface

configuring

using the CLI 3-16

using the GUI3-13to 3-16

described 3-8

Management IP Address parameter 8-71

management over wireless

described 6-54

enabling

using the CLI 6-55

using the GUI 6-55

Master Controller Configuration page 8-8

Master Controller Mode parameter 8-8

Max Age parameter 3-32

Max HTTP Message Size parameter 4-27

Maximum Age parameter 3-33

maximum local database entries

configuring using the CLI 6-31

configuring using the GUI 6-30

Maximum Local Database Entries parameter 6-31

Maximum Number of Sessions parameter 4-27

Max-Login Ignore Identity Response parameter 6-43

Max RF Bandwidth parameter 4-79, 4-81

MCS data rates 4-35

Member MAC Address parameter 14-13

memory

types 1-16

memory leaks, monitoringD-26to D-27

mesh

network example 9-48

parameters

configuring using the CLI 9-27, 9-30

configuring using the GUI9-22to 9-27

statistics

viewing for an access point using the CLI9-48to9-51, 9-57to 9-58

viewing for an access point using the GUI9-53to 9-57

Mesh > LinkTest Results page 9-59

mesh access points

adding MAC address to controller filter list

using the CLI 9-13

using the GUI9-12to 9-13

adding to mesh networks 9-11

and CAPWAP 9-7

converting to non-mesh access points 9-64

deployment modes 9-4

models 9-2

network access 9-4

operating with Cisco 3200 Series Mobile Access Routers

configuration guidelines 9-65

described 9-65

using the CLI to configure 9-67

using the GUI to configure 9-66

roles 9-2

mesh backhaul data rates 9-9

mesh backhaul deployment example 9-5

mesh constraints 9-8

mesh deployment example 9-5

mesh minimum required LinkSNR 9-9

mesh neighbors, parents, and children 9-7

mesh network hierarchy 9-3

mesh node security statistics9-56to 9-57

mesh node statistics 9-55

mesh point-to-multipoint wireless bridging example 9-6

mesh point-to-point wireless bridging example 9-5

mesh routing 9-7

Message Authentication Code Key (MACK) parameter 6-8, 6-12

message logs

configuring

using the CLID-13to D-16

using the GUI D-10

viewing

using the CLI D-16

using the GUID-12to D-13

See also system logging

Message Logs page D-13

Message parameter for web authentication 11-14

Metrics Collection parameter 4-80

MFP Client Protection parameter 6-72

MFP Frame Validation parameter 6-72

MIC 7-24, 7-28

Min Failed Client Count per AP parameter 12-20

Minimum RSSI parameter 4-65

mirror mode. See port mirroring, configuring

MMH MIC

configuring 7-29, 7-30

described 7-28

MMH Mode parameter 7-29

Mobile Announce messages 14-7

mobility

failover 14-21

overview 14-2

Mobility Anchor Config page 14-23, 14-29

Mobility Anchor Create button 14-24

mobility anchors. See auto-anchor mobility

Mobility Anchors option 14-23

Mobility Anchors page 14-24

Mobility Group Member > New page 14-12

Mobility Group Members > Edit All page 14-14

mobility groups

configuring

using the CLI 14-15

using the GUI14-12to 14-14

with one NAT device 14-8

with two NAT devices 14-9

determining when to include controllers 14-7

difference from RF groups 12-5

examples 14-7

illustrated 14-5

messaging among 14-7

number of access points supported 14-5, 14-6

number of controllers supported 14-5

prerequisites14-9to 14-10

using with NAT devices14-8to 14-9

mobility group statistics

types 14-17

viewing

using the CLI 14-20

using the GUI14-17to 14-20

mobility list

described 14-6

detecting failed members 14-21

number of controllers supported 14-7

ping requests to members 14-21

Mobility Multicast Messaging > Edit page 14-15

Mobility Multicast Messaging page 14-14

mobility ping tests, running 14-30

Mobility Statistics page 14-18

MODE access point button 8-45, 8-66

Mode parameter 4-65, 12-45

Monitoring 13-17

monitor intervals, configuring using the GUI 12-22

mpings 14-24, 14-30

Multicast Appliance Mode parameter 3-27

multicast client table, viewing 4-62

multicast groups

viewing using the CLI 4-62

viewing using the GUI 4-60

Multicast Groups page 4-60

multicast mode

configuring

using the CLI 4-61

using the GUI4-59to 4-60

described4-57to 4-58

guidelines4-58to 4-59, 8-80

multicast-multicast 7-72

Multicast-Multicast mode 7-72

Multicast page 4-59

multiple AP-manager interfaces

5500 series controller example3-47to 3-48

multiple country codes

configuration guidelines 8-94

configuring

using the CLI 8-98

using the GUI 8-96

N

NAC in-band mode 7-65

NAC out-of-band integration

and hybrid REAP 15-5

configuring

using the CLI7-70to 7-71

using the GUI7-67to 7-70

described7-65to 7-66

diagram 7-66

guidelines7-66to 7-67

NAC out-of-band support

configuring for a specific access point group

using the CLI 7-71

using the GUI 7-69

NAC State parameter 7-55, 7-69, 7-70

NAT address

for dynamic interface 3-21, 3-23

for management interface 3-14, 3-17

NAT devices in mobility groups14-8to 14-9

Native VLAN ID parameter 15-14

neighbor information

viewing for an access point using the CLI 9-61

viewing for an access point using the GUI9-58to 9-61

Neighbor Information option 9-58

Neighbor Packet Frequency parameter 12-22

neighbor statistics

viewing for an access point using the CLI 9-61

viewing for an access point using the GUI9-58to 9-61

Netbios Name Servers parameter 7-14

Netmask parameter 7-14

network analyzer supported software

AirMagnet D-48

Airopeek D-48

Omnipeek D-48

Wireshark D-48

Network Mobility Services Protocol (NMSP) 4-108

modifying the notification interval for clients, RFID tags, and rogues4-117to 4-118

viewing settings4-118to 4-120

Network parameter 7-14

NTP server

configuring to obtain time and date 2-30

Number of Attempts to LSC parameter 8-48

Number of Hits parameter 6-62

O

OfficeExtend Access Point Configuration page 8-77

OfficeExtend Access Point Home page 8-76

OfficeExtend Access Points

LEDs D-54

positioning D-54

OfficeExtend access points

and NAT 8-70

configuring

a personal SSID8-76to 8-78

using the CLI8-74to 8-76

using the GUI8-71to 8-73

described 8-69

firewall requirements 8-70

implementing security for 8-70

licensing requirements 8-70

supported access point models 8-70

trap logs 8-70

typical setup 8-69

viewing statistics8-78to 8-79

OfficeExtend AP

enabling 8-25

OfficeExtend AP parameter 8-73

online help, using 2-17

open source terms C-8

OpenSSL license issuesC-7to C-8

operating system

security 1-5

software 1-4

Order Used for Authentication parameter 6-11, 6-26

Override Global Config parameter 11-25, 11-32

Over-ride Global Credentials parameter 8-36, 8-40, 8-73

Override Interface ACL parameter 6-65

oversized access point images 8-69

Overview of CleanAir 13-2

P

P2P Blocking parameter 7-22

packet capture files

described D-23

sample output in Wireshark D-24

uploading

using the CLID-25to D-26

using the GUI D-25

Params parameter 8-48

Passive clients 7-72

password

restoring 4-43

password guidelines 8-39

Password parameter

for access point authentication 8-39

for access points 8-35

for local net users 6-33, 15-11

for PACs 10-27

passwords

viewing in clear text D-9

path loss measurement (S60), CLI command 4-113

PEAP parameter 6-45

peer-to-peer blocking

configuring

using the CLI7-22to 7-23

using the GUI7-21to 7-22

described 7-20

examples 7-21

guidelines 7-21, 7-66

permanent licenses, installed on 5500 series controllers 4-3

Personal SSID parameter 8-77

Physical Mode parameter 3-26, 3-27

Physical Status parameter 3-26

ping link test 8-110

ping tests 14-30

pinning 12-6

PMK cache lifetime timer 7-27

PMKID caching 7-27

PoE Status parameter 8-119

Pool End Address parameter 7-14

Pool Start Address parameter 7-13

Port > Configure page 3-25

port mirroring, configuring3-28to 3-29

Port Number parameter

for controller 3-26

for LDAP server 6-36

for RADIUS server 6-9

for TACACS+ server 6-25

for wired guest access 11-30

Port parameter for IDS 6-108

ports

configuring3-24to 3-35

on 2100 series controllers 3-2, 3-4

on 4400 series controllers 3-2, 3-4

on 5500 series controllers 3-3, 3-5

on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-4, 3-6

on Cisco 28/37/38xx Series Integrated Services Router3-4to 3-6, 4-123, 8-54

on Cisco WiSM 3-4, 3-5

overview3-2to 3-7

Ports page 3-24

Power Assignment Leader parameter 12-12

power cable warning for Japan B-3

Power Injector Selection parameter 8-119

Power Injector State parameter 8-119

Power Neighbor Count parameter 12-12

Power over Ethernet (PoE)

configuring

using the CLI 8-120

using the GUI8-118to 8-120

described 1-16, 8-117

Power Over Ethernet (PoE) parameter 3-26

Power Threshold parameter 12-12

preauthentication access control list (ACL)

applying to a WLAN

using the CLI 6-68

using the GUI6-65to 6-66

for external web server 11-20, 15-10

Preauthentication ACL parameter 6-66, 7-62

pre-download 8-28

Predownloading an image 10-11

Pre-Standard State parameter 8-119

Primary Controller Name parameter 8-71

Primary Controller parameters 8-71, 8-88

primary image pre-download 8-28

Primary RADIUS Server parameter 15-19

priming access points 8-7

Priority Order > Local-Auth page 6-37, 6-42

Priority Order > Management User page 6-11, 6-26

Priority parameter 3-33

Privacy Protocol parameter 4-47

probe request forwarding, configuring 8-108

probe requests, described 8-108

product authorization key (PAK)

obtaining for license upgrade 4-3

registering 4-5

product ID for controller, finding 4-24

product ID of controller, finding 4-22

Product License Registration page 4-22

Profile Details page D-37

Profile Name parameter 7-5, 9-13, 11-30, 15-8

protected access credentials (PACs)

overview 10-26

uploading

using the CLI10-27to 10-28

using the GUI 10-26

using with local EAP 6-42, 15-23

Protection Type parameter 6-71, 12-39

Protocol parameter 6-60

Protocol Type parameter 4-70

PSK

configuring 7-26

described 7-25

with mesh 9-25

PSK Format parameter 7-26

public key cryptography (PKC), with mobility 14-7

Q

QBSS

configuring

using the CLI 7-40

using the GUI7-38to 7-39

described 7-36

guidelines 7-37

QoS

identity networking 6-79

levels 4-68, 7-35

with CAC 4-76

QoS profiles

assigning to a WLAN

using the CLI 7-36

using the GUI7-35to 7-36

configuring

using the CLI4-70to 4-71

using the GUI4-68to 4-70

QoS roles

assigning for use with hybrid REAP 15-11

configuring

using the CLI4-74to 4-75

using the GUI4-71to 4-73

QoS Roles for Guest Users page 4-72

Quality of Service (QoS) parameter 7-35

quarantined VLAN

configuring 3-14, 3-21

using 15-9

with hybrid REAP 15-4

with NAC out-of-band integration 7-68

Quarantine parameter

for dynamic interface 3-20

for management interface 3-14

NAC out-of-band integration 7-68

Query Interval parameter 6-109

Queue Depth parameter 4-70

queue statistics 9-55

R

Radio > Statistics page 7-42

radio core dumps

described 8-60

retrieving 8-61

uploading

using the CLI 8-62

using the GUI8-61to 8-62

radio measurement requests

configuring

on the CLI 12-46

on the GUI 12-45

overview 12-44

viewing status using the CLI 12-46

radio preamble 6-52

radio resource management (RRM)

benefits 12-5

CCX features. See CCX radio management

configuring

monitor intervals using the GUI 12-22

using the CLI12-22to 12-26

using the GUI12-10to 12-22

coverage hole detection

configuring per controller using the CLI 12-25

configuring per controller using the GUI12-19to 12-20

described 12-4

debugging 12-28

disabling dynamic channel and power assignment

using the CLI 12-37

using the GUI 12-36

overriding RRM12-29to 12-37

overview 12-2

specifying channels12-14to 12-18

statically assigning channel and transmit power settings

using the CLI 12-34

using the GUI12-29to 12-33

update interval 12-7, 12-10

Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC parameter 12-11

radio resource management (RRM) settings

viewing using the CLI12-26to 12-28

radio resource monitoring 12-2

RADIUS

accounting 6-3

authentication 6-3

choosing authentication priority order 6-11

configuring

using the CLI6-11to 6-15

using the GUI6-6to 6-11

configuring on ACS 6-4

described 6-3

FIPS standard 6-12

KEK parameter 6-12

MACK parameter 6-12

server fallback behavior 6-10, 6-13

using with hybrid REAP 15-17

RADIUS > Fallback Parameters page 6-10

RADIUS accounting attributes6-18to 6-19

RADIUS authentication attributes6-16to 6-18

Range (RootAP to MeshAP) parameter 9-23

Redirect URL After Login parameter 11-13

Refresh-time Interval parameter 4-99

Regenerate Certificate button 11-8

regulatory information

for 2100 series controllers B-4

for 4400 series controllers B-3

rehosting a license. See licenses

Rehost Ticket File Name parameter 4-23

Remote Authentication Dial-In User Service. See RADIUS

Request Max Retries parameter 6-43

Request Timeout parameter 6-43

Reserved Roaming Bandwidth parameter 4-79

Reset Link Latency button 8-115

Reset Personal SSID parameter 8-72

resetting the controller 10-37

restoring passwords 4-43

Re-sync button 6-112

reverse path filtering (RPF) 14-28

RF Channel Assignment parameter 12-36

RF domain. See RF groups

RF group leader

described 12-6

viewing 12-9

RF group name

described 12-7

entering 12-8

RF groups

cascading 12-6

configuring

using the CLI 12-8

using the GUI 12-7

difference from mobility groups 12-5

overview12-5to 12-7

pinning 12-6

viewing status

using the CLI 12-10

using the GUI 12-9

RFID tags

described 4-106

number supported per controller 4-108

tracking

configuring using the CLI 4-109

debugging using the CLI 4-111

viewing information using the CLI4-110to 4-111

RFID tracking on access points, optimizing

using the CLI 8-107

using the GUI8-105to 8-106

RF-Network Name parameter 12-8

RLDP. See Rogue Location Discovery Protocol (RLDP)

roaming and real-time diagnostics

configuring using the CLID-40to D-43

described D-28

logs

described D-28

viewingD-40to D-41

roam reason report 4-64

roam reason report, described 9-32

rogue access points

alarm 12-39

automatically containing

using the CLI 6-90

using the GUI 6-89

classification mapping table 6-86

classifying 6-85

configuring RLDP6-88to 6-91

detecting

using the CLI12-39to 12-40

using the GUI12-38to 12-39

managing 6-84

rule-based classification support 6-85

tagging, location, and containment 6-85

viewing and classifying

using the CLI6-102to 6-107

using the GUI6-97to 6-102

WCS support for rule-based classification 6-87

Rogue AP Detail page 6-98

Rogue AP Ignore-List page 6-102

rogue classification rules

configuring using the CLI6-95to 6-97

configuring using the GUI6-91to 6-95

Rogue Client Detail page 6-100

rogue detection 6-88, 6-89

and OfficeExtend access points 8-72, 8-74

Rogue Detection parameter 6-88, 8-72

Rogue Location Discovery Protocol (RLDP)

configuring

using the CLI6-89to 6-91

using the GUI6-88to 6-89

defined 6-85

Rogue Location Discovery Protocol parameter 6-89

Rogue on Wire parameter 6-89

Rogue Policies page 6-88

Rogue Rule > Edit page 6-94

Rogue Rules > Priority page 6-94

rogue states 6-86, 6-87

Role Name parameter 4-72

Role of the Controller 13-2

Role parameter 6-33, 15-11

root bridge 3-29

Root Cost parameter 3-32

Root Port parameter 3-32

RRM. See radio resource management (RRM)

RSNA logs

configuringD-40to D-42

described D-28

S

safety warningsA-1to A-26

Save and Reboot button 10-21, 10-24

Save Licenses button 4-8

saving configuration settings 10-34

Scan Threshold parameter 4-66

Scope Name parameter 7-13

Search AP window 8-11, 8-33, 8-56

Search Clients page 8-123

Search WLANs window 7-7, 8-10, 8-33

Secondary Controller parameters 8-88

Secondary RADIUS Server parameter 15-19

SE-Connect 13-4, 13-23

secure web mode

described 2-18

enabling

using the CLI 2-19

using the GUI 2-18

security

overview 6-2

solutions6-2to 6-3

Security Policy Completed parameter 7-47

security settings

local and external authentication 9-22

Select APs from Current Controller parameter 15-21

self-signed certificate (SSC)

used to authorize access points 8-46

Sequence parameter 6-60

serial number for controller, finding 4-24

serial number of controller, finding 4-22

serial port

baud rate setting 2-24

timeout 2-24

Server Address parameter 6-108

Server Index (Priority) parameter 6-8, 6-25, 6-36

Server IP Address parameter

for LDAP server 6-36

for RADIUS server 6-8

for TACACS+ server 6-25

for wireless sniffer D-50

Server Key parameter 6-46, 15-23

Server Status parameter 6-9, 6-25

Server Timeout parameter 6-9, 6-26, 6-37

service port 3-6

service-port interface

configuring

using the CLI 3-19

using the GUI3-13to 3-16

described 3-10

session timeout

configuring

using the CLI 7-30

using the GUI 7-30

described 7-30

Set Priority button 4-17

Set reboot time 10-15

Set to Factory Default button 12-22

Severity Level Filtering parameter D-11

Shared Secret Format parameter 6-8, 6-25

Shared Secret parameter 6-8, 6-25

Short Preamble Enabled parameter 6-53

short preambles 6-52

Show Wired Clients option 8-84

shunned clients

described 6-111

viewing

using the CLI 6-112

using the GUI 6-111

Signature Events Detail page 6-119

Signature Events Summary page 6-119

Signature Events Track Detail page 6-120

Simple Bind parameter 6-36

sniffing. See wireless sniffing D-48

Sniff parameter D-50

SNMP, configuring4-43to 4-44

SNMP community string

changing default values using the CLI4-45to 4-46

changing default values using the GUI4-44to 4-45

SNMP v1 / v2c Community > New page 4-45

SNMP v1 / v2c Community page 4-44

SNMP v3 users

changing default values using the CLI 4-47

changing default values using the GUI4-46to 4-47

SNMP V3 Users > New page 4-47

SNMP V3 Users page 4-46

software, upgrading

guidelines10-2to 10-4

using the CLI10-9to 10-11

using the GUI10-6to 10-8

software, upgrading in mesh networks

guidelines10-4to 10-6

Source parameter for ACLs 6-60

Source Port parameter 6-61

Spanning Tree Algorithm parameter 3-33

Spanning Tree Protocol (STP)

configuring

using the CLI3-34to 3-35

using the GUI3-30to 3-34

described 3-29

spanning-tree root 3-29

Spanning Tree Specification parameter 3-32

SpectraLink NetLink phones

enabling long preambles

using the CLI 6-53

using the GUI 6-53

overview 6-52

Spectralink Voice Priority parameter 4-93

Spectrum Expert 13-22

splash page web redirect 7-60

Splash Page Web Redirect parameter 7-62

SSC key-hash on Cisco WiSM 8-45

SSH

and OfficeExtend access points 8-72, 8-75

configuring

using the CLI2-35to 2-36

troubleshooting access points

using the CLID-52to D-53

using the GUID-51to D-52

SSH parameter D-52

SSID

configuring

using the CLI 7-6

using the GUI 7-5

described 7-3

SSL certificate

generating

using the CLI 2-20

using the GUI 2-19

loading

using the CLI2-21to 2-22

using the GUI2-20to 2-21

SSL protocol 2-18

SSLv2, configuring for web administration 2-19

SSLv2 for web authentication, disabling 11-13

Standard Signature > Detail page 6-118

Standard Signatures page 6-116

stateful DHCPv6 IP addressing 7-46

State parameter 6-109, 6-119

static IP address

configuring

using the CLI8-67to 8-68

using the GUI8-66to 8-67

described 8-66

Static IP parameter 8-67

Static Mobility Group Members page 14-12

Statistics option 9-53

Status parameter

for DHCP scopes 7-14

for guest LANs 11-31

for SNMP community 4-45

for WLANs 7-5

STP Mode parameter 3-31

STP Port Designated Bridge parameter 3-30

STP Port Designated Cost parameter 3-30

STP Port Designated Port parameter 3-30

STP Port Designated Root parameter 3-30

STP Port Forward Transitions Count parameter 3-30

STP Port ID parameter 3-30

STP Port Path Cost Mode parameter 3-31

STP Port Path Cost parameter 3-31

STP Port Priority parameter 3-31

STP State parameter 3-30

strong passwords 8-39

Summary page 2-35

switch, configuring at the remote site15-6to 15-7

Switch IP Address (Anchor) parameter 14-24

SX/LC/T small form-factor plug-in (SFP) modules 3-5

symmetric mobility tunneling

illustrated 14-28

overview14-27to 14-29

verifying status

using the CLI 14-29

using the GUI 14-29

Symmetric Mobility Tunneling Mode parameter 14-29

syslog

described D-29

levels D-12

logsD-40to D-42

Syslog Configuration page D-10

Syslog Facility parameter D-11

syslog server

number supported by controller D-10

removing from controller D-10

severity level filtering D-11

Syslog Server IP Address parameter D-10

system logging

configuring

using the CLID-13to D-16

using the GUID-10to D-12

setting severity level D-12

system logs, viewing using the CLI D-16

System Messages D-2

System Resource Information page D-6

system resources

viewing using the CLI D-7

viewing using the GUI D-5

T

TACACS+

accounting 6-20

authentication 6-19

authorization 6-19

choosing authentication priority order 6-26

configuring

using the CLI6-27to 6-29

using the GUI6-24to 6-26

configuring on ACS6-20to 6-24

described6-19to 6-20

roles 6-19, 6-23

viewing administration server logs6-29to 6-30

TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 6-25

TACACS+ (Authentication, Authorization, or Accounting) Servers page 6-24

TACACS+ (Cisco) page (on CiscoSecure ACS) 6-22

TACACS+ Administration .csv page (on CiscoSecure ACS) 6-29, 6-30

TCP MSS

configuring8-116to 8-117

described 8-116

Telnet

and OfficeExtend access points 8-72, 8-75

troubleshooting access points

using the CLID-52to D-53

using the GUID-51to D-52

Telnet parameter D-52

Telnet sessions

configuring

using the CLI2-35to 2-36

using the GUI2-34to 2-35

Telnet-SSH Configuration page 2-34

Tertiary Controller parameters 8-89

text2pcap sample output D-46

TFTP server guidelines 10-2

time, configuring

using the CLI 2-32

using the NTP server 2-30

time-length-values (TLVs), supported for CDP4-95to 4-97

timeout, configuring for disabled clients 7-17

Time Since Topology Changed parameter 3-32

timestamps, enabling or disabling in log and debug messages D-16

Time to Live for the PAC parameter 6-46, 15-23

time zone

configuring using the CLI 2-32

configuring using the GUI 2-31

TKIP

configuring 7-26, 7-27

described 7-24

parameter 7-26

To 6-63

Topology Change Count parameter 3-32

traffic specifications (TSPEC) request

described 4-77

examples 4-77

traffic stream metrics (TSM)

configuring

using the GUI 4-80

described 4-78

viewing statistics

using the CLI4-91to 4-92

using the GUI4-84to 4-86

Transfer Mode parameter

downloading a CA certificate 10-24

downloading a configuration file 10-31

downloading a customized web authentication login page 11-22

downloading a device certificate 10-21

upgrading controller software 10-8

uploading a configuration file 10-29

uploading a PAC 10-27

uploading packet capture files D-25

Transition Time parameter 4-66

transmit power

statically assigning using the CLI 12-34

statically assigning using the GUI12-29to 12-33

transmit power levels 12-33

transmit power threshold, decreasing 12-23

trap logs

for OfficeExtend access points 8-70

Trap Logs page 4-3, 7-42

troubleshooting

access point join process8-53to 8-60

CCXv5 clientsD-28to D-43

problemsD-7to D-10

tunnel attributes and identity networking6-81to 6-82

Tx Power Level Assignment parameter 12-37

Type parameter 7-5, 11-30, 15-8

U

U-APSD

described 4-78

viewing status

using the CLI 4-91

using the GUI 4-83

UDP, use in RADIUS 6-4

UDP port 14-24, 14-30

unicast mode 4-57

unique device identifier (UDI)

described 8-109

retrieving

using the CLI 8-110

using the GUI8-109to 8-110

Upload button 6-116, 8-62, 10-27, D-19, D-25

Upload CSV File parameter 15-22

Upload File from Controller page 8-61, 10-26, 10-29, D-19, D-25

URL parameter 11-20

URL to Send the Notifications parameter 4-27

USB console port, using on a 5500 series controller3-35to 3-36

Use AES Key Wrap parameter 6-7

User Access Mode parameter 11-3

user accounts, managing11-1to 11-24

User Attribute parameter 6-36

User Base DN parameter 6-36

User Credentials parameter 6-37

User Name parameter 6-33, 15-11

Username parameter 8-35, 8-39, 8-40

User Object Type parameter 6-36

User parameter 10-26

User Profile Name parameter 4-47

Using CLI to monitor the Air quality 13-18

Using CLI to predownload 10-14

Using GUI to monitor air quality 13-17

Using GUI to predownload 10-13

Using Our SSID parameter 6-89

V

Validate Rogue Clients Against AAA parameter 6-89

Valid Client on Rogue AP parameter 6-89

Validity parameter 10-26

VCCI warnings for controllers B-3

VCI strings 8-53

Verify Certificate CN Identity parameter 6-46

video information, viewing for mesh networks using the CLI9-49to 9-51

video settings

configuring

using the CLI 4-89

using the GUI 4-81

viewing

using the CLI4-90to 4-92

using the GUI4-82to 4-86

virtual interface

configuring

using the CLI 3-18

using the GUI3-13to 3-16

described 3-10

VLAN Identifier parameter

for AP-manager interface 3-15

for dynamic interface 3-20, 3-21

VLAN ID parameter 7-67, 15-15

VLAN interface. See dynamic interface

VLAN Mappings

button 15-14

page 15-14

VLANs

described 3-11

guidelines 3-13

VLAN Support parameter 15-14

VLAN tag, and identity networking 6-80

Voice & Video Optimized parameter 4-93

voice information, viewing for mesh networks using the CLI9-48to 9-51

Voice Optimized parameter 4-93

voice-over-IP (VoIP) telephone roaming 4-63

Voice RSSI parameter 12-19

voice settings

configuring

using the CLI4-88to 4-89

using the GUI4-78to 4-80

viewing

using the CLI4-90to 4-92

using the GUI4-82to 4-86

VoIP calls, error codes7-44to 7-45

VoIP snooping

configuring

using the CLI7-42to 7-46

using the GUI7-41to 7-42

described7-40to 7-41

VoIP Snooping and Reporting parameter 7-41

VPN Gateway Address parameter 7-32

VPN passthrough

configuring using the CLI 7-32

configuring using the GUI7-31to 7-32

described 7-31

W

warnings

translatedA-1to A-26

warrantyC-4to C-6

webauth.tar files 11-25

webauth bundle 11-21

web authentication

certificate

obtaining using the CLI11-9to 11-10

obtaining using the GUI11-7to 11-9

configuring a WLAN for

using the CLI 7-34

using the GUI 7-32

described 11-10

process11-10to 11-12

successful login page 11-12

Web Authentication Certificate page 11-8

web authentication login page

assigning per WLAN

using the CLI 11-26

using the GUI 11-25

choosing the default

using the CLI11-14to 11-16

using the GUI11-13to 11-14

customized example 11-24

customizing from an external web server

using the CLI 11-20

using the GUI11-19to 11-20

default 11-11

downloading a customized login page

guidelines 11-21

using the CLI 11-23

using the GUI11-22to 11-23

modified default example 11-16

previewing 11-14, 11-23

verifying settings using the CLI 11-24

Web Authentication option 11-31

Web Authentication Type parameter 11-13, 11-20, 11-23

Web Auth Type parameter 11-25, 11-32

web-browser security alert 11-10

Web Login page 11-13, 11-20

web mode

configuring

using the CLI 2-19

using the GUI 2-18

described 2-18

Web Passthrough option 11-31

Web Policy parameter 6-65, 7-33, 7-62

web redirect 7-59

Web Server IP Address parameter 11-20

Web Session Timeout parameter 2-18

WEP keys, configuring 7-23

WGB parameter 8-83

WGB Wired Clients page 8-84

wired guest access

configuration overview 11-29

configuring

using the CLI11-33to 11-38

using the GUI11-30to 11-32

described11-27to 11-29

guidelines 11-29

one-controller example 11-28

two-controller example 11-29

wireless intrusion prevention system (wIPS)

configuring on an access point6-126to 6-127

described 6-124

viewing information6-127to 6-128

wireless sniffing

configuring

using the GUID-49to D-50

prerequisites D-48

supported software D-48

WLAN ID parameter 7-5

WLAN mobility security values 14-27

WLAN override 10-2

WLAN Profile parameter 6-33, 15-11

WLANs

assigning web login, login failure, and logout pages

using the CLI 11-26

using the GUI 11-25

checking security settings 7-23

configuring

conditional web redirect7-60to 7-63

static and dynamic WEP 7-24

connecting clients to 15-16

creating

using the CLI 7-6

using the GUI7-4to 7-6

deleting

using the CLI 7-7

using the GUI 7-4

described 1-15, 7-3

enabling or disabling

using the CLI 7-6

using the GUI 7-6

searching 7-7

session timeout

configuring 7-30

described 7-30

splash page web redirect 7-60

wired security solution 1-5

WLANs > Edit (Advanced) page 7-41, 7-64

applying an ACL to a WLAN 6-65

configuring AAA override 6-84

configuring infrastructure MFP for a WLAN 6-72

configuring IPv6 bridging 7-48

configuring NAC out-of-band integration 7-69

configuring the diagnostic channel D-29

WLANs > Edit (QoS) page 7-38

WLANs > Edit (Security > AAA Servers) page

assigning LDAP servers to a WLAN 6-38

choosing RADIUS or LDAP servers for external authentication 11-25

disabling accounting servers on a WLAN 7-63

enabling local EAP on a WLAN 6-47

WLANs > Edit (Security > Layer 2) page 7-26, 7-29

WLANs > Edit (Security > Layer 3) page

applying a preauthentication ACL to a WLAN 6-65

configuring a WLAN for VPN Passthrough 7-32

configuring web redirect 7-62

WLANs > Edit page 7-5, 11-30, 15-8

WLANs > New page 7-4, 9-39, 9-40, 9-60, 9-61, 11-30, 15-8

WLANs page 7-4, 14-23

WLAN SSID parameter

configuring for guest user 11-5

creating a centrally switched WLAN 15-8

creating WLANs 7-5

mapping an access point group to a WLAN 7-55, 7-70

WMM

configuring 4-36, 7-38, 7-40

described 7-37

with CAC 4-76

WMM parameter 4-93, 4-94

WMM Policy parameter 7-38

workgroup bridges (WGBs)

debugging 8-85

described 8-79

guidelines 8-80

illustrated 8-69, 8-72, 8-76, 8-77, 8-79

sample configuration 8-82

viewing status

using the CLI 8-85

using the GUI8-82to 8-84

world mode 4-31, 4-33

WPA1+WPA2

configuring

using the CLI 7-26

using the GUI7-25to 7-26

described 7-24

WPA2 Policy parameter 7-26

WPA Policy parameter 7-26

wplus license. See licenses