Cisco Wireless Control System Configuration Guide, Release 4.0
Index
Downloads: This chapterpdf (PDF - 419.0KB) The complete bookPDF (PDF - 7.37MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

802.11a policy name 29

802.11a voice templates 36

802.11b/g radio templates 32

802.11b/g RRM interval template 39

802.11b/g RRM threshold templates 38

802.11b/g voice templates 35

802.11 counters report 9

802.11 security trap 43

802.1X 11

A

AAA override 9

AAA traps 43

access control list template 21

access point

configuring for hybrid REAP 9

access point/radio templates 47

access point authentication and MFP templates 23

Access point authorization 6

access point authorization template 20

access point load

avoiding 30

Access point placement 16

access point placement 16

access points

converting to LWAPP 2

access points, adding to maps14to 16

access point templates

adding 47

access point traps 43

account expiry 7

ACL template 21

add config groups 13

adding access point templates 47

adding a license 5

adding a mobility anchor 10

adding controllers from config group 15

adding controller templates 2

adding guest user accounts 5

adding templates from config group 15

add known rogue 40

add new rule 21

administration menu 15

Advanced Options

definition 13

Aironet IE 9

alarm monitor 16, 3

alarms 1

alarm trigger threshold 24

applying calibration models 31

applying config groups 16

applying controller templates 46

apply to controllers 6

AP policies 6

audience of document 16

auditing config groups 16

authentication process

Hybrid REAP 2

automatic backups, scheduling 4

automatic client exclusion 10

avoid access point load 30

avoid foreign AP interference 30

avoid non-802.11 noise 31

B

backing up the WCS database

on Linux5to 6

on Windows 5

backup and restore license 6

Bridging link information 12

buildings

adding to a campus map 3

adding to WCS database 4

C

Calibration models

monitoring 35

calibration models 31

calibration models, applying 31

campus map, adding to WCS database 2

cascade reboot 17

caution, defined 17

channels

monitoring on a floor map 28

channels on a floor map 28

checking the status of WCS

on Linux 2

on Windows 2

Cisco UDI 12

Cisco Unified Wireless Network Solution 35

overview 2

Cisco WCS base 2

Cisco WCS location 2

Cisco Wireless LAN Solution

overview 2

security solutions2to 4

CKIP 12

client devices

connecting to WLANs 12

client exclusion

happening automatically 10

client related traps 43

clients

finding5to 6

map 6

monitoring on a floor map 29

parameters 29

clients, monitoring on floor map 29

command buttons 16

config group

adding controllers 15

adding templates 15

configuring 14

downloading IDS signatures 18

downloading sw to controllers 17

removing controllers 15

removing templates 15

config groups

applying 16

auditing 16

creating 13

downloading customized webauth 19

rebooting 17

configure menu 15

configuring an access point for hybrid REAP 9

configuring config group 13

configuring firewall for WCS 5

configuring Hybrid REAP 1

Configuring IDS 7

Configuring IDS signatures 8

configuring template

ACL 21

configuring templates

802.11a policy name 29

802.11a voice 36

802.11b/g radio 32

802.11b/g RRM interval 39

802.11b/g RRM threshold 38

802.11b/g voice 35

access point/radio 47

access point authentication and MFP 23

access point authorization 20

file encryption 12

guest users 18

known rogue access point 40

local management user 45

local net users 16

MAC filter 19

QoS 3

RADIUS accounting 15

RADIUS authentication 14

syslog 45

Telnet SSH 44

traffic stream metrics QoS 5

trap control 42

trap receiver 41

web authentication 24

WLAN 7

configuring the controller for hybrid REAP 6

configuring the switch

for hybrid REAP 5

connecting client devices

to WLANs 12

Connecting to the Guest WLAN 17

controller

configuring for hybrid REAP 6

controllers

adding to WCS database 2

pinging network devices 7

specified 2

viewing status and configurations 7

controller templates

adding 2

applying 46

conventions of document 17

converting WLSE autonomous to WCS controller 1

Counters report

for 802.11 9

coverage holes

finding 6

monitoring on a floor map 29

coverage holes, monitoring 29

cranite 11

creating a lobby ambassador account 4

Creating a network design 19

creating a network design 19

creating calibration models 30

creating config groups 13

Creating guest user accounts 3

CSV file format 17

customized webauth

downloading 19

Customized Web authentication 14

customized web authentication

downloading 26

Custom signature 11

D

Deleting a guest user 17

deleting a license 6

deleting guest user templates 7

designing a network 19

DHCP server

overriding 10

document

audience 16

conventions 17

organization 16

purpose 16

documentation

obtaining 17

downloading a customized web authentication page 26

downloading customized webauth 19

Downloading customized web authentication 14

Downloading IDS signatures 9

downloading IDS signatures

from your config group 18

downloading sw to controllers

after adding config group 17

downstream delay 6

downstream packet loss rate 6

DTIM 29

E

editing guest users 6

Editing signature parameters 12

Enabling Web login 14

end user license agreement6to 9, 10

event notification 5

Events 1

events 1

F

file encryption template 12

firewall, configuring for WCS 5

Floor maps

modifying appearance 34

floor plans

adding to a campus building5to 6

adding to a standalone building7to 8

enhancing with map editor 8

foreign access point interference

avoiding 30

fortress 11

Frame type 11

G

generate password 18

Global settings

for standard and custom signatures 12

Guest user

deleting 17

Guest user accounts

creating 3

guest user accounts

adding 5

managing 5

guest users

viewing and editing 6

guest user templates 18

deleting 7

Guest WLAN

connecting 17

H

heat map

described 15

graphic 16, 27

Heatmap cutoff 35

help menu 15

Hierarchy of Mesh parent to child 11

Hybrid 4

Hybrid REAP

configuring 1, 4

Hybrid REAP local switching 10

I

IDS 7

IDS event correlation 3

IDS sensors 7

IDS signature attacks

viewing 2

IDS signatures 8

downloading 9

downloading from config group 18

uploading 8

importing the location appliance into WCS 8

information elements

Aironet 9

installing a license 4

installing WCS

for WLSE conversion 2

inter-subnet roaming 4

Intrusion Detection Systems 7

K

KEK

key encryption key 14

key wrap 14

known rogue access point templates 40

L

laptop icon 5

Layer 1 security solutions 2

Layer 2 security solutions 2

Layer 3 security solutions 2

Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 4

LEAP authentication

requirements 7

license

adding 5

backup and restore 6

deleting 6

license agreement6to 9, 10

license installation 4

license management 5

licenses 2

license types 2

licensing

on WLSE network management 3

lifetime 6, 19

link aggregation (LAG)

guidelines 4

Link test

running 12

Link test result 13

Lobby ambassador 3

lobby ambassador account

creating 4

local management user template 45

local net users template 16

local switching

Hybrid REAP 10

location accuracy

using testpoints 35

location appliance importing 8

location appliances

adding to WCS database 2

relationship with WCS Location 5

location menu 15

location upgrade 2

logging 16

logging in

to the WCS user interface 4

logging into the WCS user interface11to 13

login.html 15

long preambles, enabling for SpectraLink NetLink phones 4

M

MAC filtering 12

MAC filter template 19

MAC frequency 11

MAC information 11

MACK

message authenticator code keys 14

Maintain Image Aspect Ratio 30

maintaining WCS1to 15

Management Frame Protection 6

management frame protection 23

managing guest user accounts 5

managing licenses 5

Map Editor

general notes and guidelines 8

map editor, enhancing floor plans 8

maps

creating2to 16

monitoring 30

menu bar 14

Mesh tree

viewing 11

message integrity check information element 23

metrics

in QoS 5

MFP 6

MFP signature generation 12

MFP templates 23

MIC IE 23

mobility 2

mobility anchor

adding 10

mobility anchors 10

mobility groups, configuring 7

Modifying the appearance of floor maps 34

Monitoring calibration models 35

monitoring channels on a floor map 28

monitoring clients on a floor map 29

monitoring coverage holes 29

Monitoring outdoor areas 30

monitoring predicted coverage 26

monitoring transmit power levels 28

monitor menu 14

N

network design 19

network protection 7

Network Summary page 11, 8

noise

avoid non-802.11 31

note, defined 17

NTP server template 3

O

open source terms10to 12

organization of document 16

Outdoor areas

monitoring 30

outdoor areas, adding to a campus map4to 5

overview

WCS 3

P

packet jitter 5

packet latency 5

packet loss 5

packet loss rate 6

pico cell mode 30

pinging network devices from a controller 7

placement of access points 16

planning mode 11

PLR 6

policy manager solutions 3

Predicted Coverage 26

Prerequisites 2

Present map 5

protection type 24

purpose of document 16

Q

QoS templates 3

Quiet time 11

R

radio resource management 30

RADIUS accounting template 15

RADIUS authentication template 14

rebooting config groups 17

Recent map 5

related publications 17

removing controllers from config group 15

removing templates from config group 15

Report

for 802.11 counters 9

for voice metric 10

for voice statistics 9

Reports

for voice TSM 10

restoring WCS database on Linux 7

Retrieving UDI 13

RF calibration model, creating 5

RF calibration tool 7

RF prediction heat map 16, 27

RF profile traps 43

RF update traps 43

roaming 2

roaming time 5, 6

rogue access points

acknowledging 4

alarm monitor 3

detecting and locating2to 4

map 4

monitoring2to 4

solutions for 3

rogue access point templates 40

RRM 30

RRM intervals 39

RRM thresholds 38

rules

adding 21

Running a link test 12

S

security solutions2to 4

sequence parameter 22

Service Options

definitions 12

Shunned clients 7

sidebar area 15

skull-and-crossbones indicator 3

SNMP authentication 42

software

downloading config groups to controllers 17

software, updating 4

SpectraLink NetLink phones, enabling long preambles 4

Standard signature 11

starting WCS

on Linux 10

on Windows 10

static WEP 11

static WEP-802.1X 11

statistics reports, viewing 9

status, checking 2

stopping WCS

on Linux 3

on Windows 3

supported Cisco WLSE management stations 2

Supported Country Codes 1

Sweep Client Power for Location 35

switch

configuring for hybrid REAP 5

syslog templates 45

System requirements 2

T

Telnet SSH templates 44

templates

using 1

Testpoints 35

traffic indicator message 29

traffic stream metrics QoS status 6

traffic stream metrics QoS template 5

transmit power level 30

transmit power levels

monitoring on a floor map 28

values 28

transmit power levels, monitoring 28

trap

802.11 security 43

trap control templates 42

trap receiver template 41

traps

AAA 43

access point 43

client related 43

RF profile 43

RF update 43

WPS 43

U

UDI

retrieving on controllers and access points 14

uninstalling WCS

on Linux 14

on Windows 14

unique device identifier 14

Update map view 11

updating system software 4

upgrading to Linux 4

during WLSE conversion 3

upgrading WCS

on Linux 15

on Windows 15

Uploading IDS signatures 8

upstream delay 6

upstream packet loss rate 6

User accounts

for guest 3

user groups 2

User Interface 14

using template

ACL 21

using templates 1

802.11a policy name 29

802.11a voice 36

802.11b/g radio 32

802.11b/g RRM interval 39

802.11b/g RRM threshold 38

802.11b/g voice 35

access point/radio 47

access point authentication & MFP 23

access point authorization 20

file encryption 12

guest users 18

known rogue access point 40

local management user 45

local net users 16

MAC filter 19

NTP server 3

QoS 3

RADIUS accounting 15

RADIUS authentication 14

syslog 45

Telnet SSH 44

traffic stream metrics QoS 5

trap control 42

trap receiver 41

web authentication 24

WLAN 7

V

View Filters icon 26

viewing guest users 6

viewing IDS signature attacks 2

Viewing IDS signature events 13

Viewing Mesh tree 11

Viewing shunned clients 7

Voice metric report 10

Voice statistics report 9

Voice TSM reports 10

W

warranty9to 10

WCS

checking status

on Linux 2

on Windows 2

installing 3

maintaining1to 15

overview 3

servers supported 3

starting

on Linux 10

on Windows 10

stopping

on Linux 3

on Windows 3

uninstalling

on Linux 14

on Windows 14

upgrading

on Linux 15

on Windows 15

versions4to 6

viewing statistics reports 9

WCS Base, described 6

WCS controller deployment

from WLSE autonomous 1

WCS database

adding controllers 2

adding location appliances 2

backing up

on Linux5to 6

on Windows 5

restoring

on Linux 7

on Windows 6

scheduling automatic backups 4

WCS licenses 2

WCS Location

described4to 6

relationship with Cisco location appliances 5

WCS user accounts

adding 2

changing passwords 3

deleting 3

WCS user interface 4

described 3, 6

logging into11to 13

web authentication template 24

Web authentication types 14

Wireless Control System (WCS)

See WCS

WLAN templates 7

WLSE autonomous deployment conversion 1

WLSE management stations 2

WLSE upgrade 2

WMM policy 9

WPA1 + WPA2 12

WPS traps 43