Cisco Wireless Control System Configuration Guide, Release 5.0
Index
Downloads: This chapterpdf (PDF - 902.0KB) The complete bookPDF (PDF - 11.42MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

802.11a policy name 10-56

802.11b/g RRM interval template 10-66, 10-68

802.11b/g RRM threshold templates 10-65

802.11b/g voice templates 10-61

802.11 counters report 14-12

802.11h template

configuring 10-67

802.11 security trap 10-74

802.11 tags layer 5-48

802.1X association 6-33

802.1X authentication 6-33

802.3 bridging

configuring 9-13

A

AAA override 10-17

AAA servers 10-16

AAA traps 10-74

absolute 16-2

access control list template 10-41

access control list templates 10-55

accessing the schedule panel 14-3

access point

configuring 10-39

configuring for hybrid REAP 12-9

credentials 9-15

friendly 10-47

access point/radio templates 10-80

access point authentication and MFP templates 10-50

access point authorization template 10-39

access point inventory report 14-9

access point layer 5-45

access point load

avoiding 10-58

Access point placement 5-25

access point placement 5-25

access point positions

changing with import or export of file 5-34

access point reports 14-4

modifying 14-4

viewing 14-4

access points

adding 5-24

configuring 9-20

configuring for LOMM 9-25

converting to LWAPP C-2

detecting 13-12

searching 9-27

selecting 10-84

access points, adding to maps5-24to 5-25

access point security statistics

for mesh 6-44

access point templates

adding 10-79

access point threats 6-8

access point traps 10-74

accuracy tool 5-68

ACL template 10-41

configuring 10-41

ACS server

adding WCS to 15-4

active interferer count per channel 9-31

active interferers 9-30

active interferers count chart 9-31

active sessions

monitoring 7-5

adaptive scan threshold 10-65

add config groups 8-18

add group members 8-10

adding access points 5-23

adding access point templates 10-79

adding a license B-5

adding a migration template 9-19

adding a spectrum expert 9-29

adding autonomous access points

by CSV file 9-18

adding auto-provisioning filter 15-17

adding chokepoints 5-35

adding controllers 9-2

adding controllers from config group 8-20

adding guest user account 7-17

adding guest user accounts 7-17

adding IOS access points 9-17

by device information 9-17

adding templates from config group 8-21

adding WCS as TACACS+ server 15-5

adding WCS to ACS server

for use with RADIUS 15-9

adding WCS to an ACS server 15-4

adding WCS to a non-Cisco ACS server 15-13

adding WCS usergroups

into ACS for RADIUS 15-10

into ACS for TACACS+ 15-6

add known rogue 10-70

adjusted link metric 6-37

administration menu 2-23

advanced debug 5-34, 5-64, 5-69

Advanced Options

definition 5-21

advanced options 5-19

Advanced tab

on WLAN template 10-18

Aironet IE 10-19

alarm 13-1

alarm dashboard 2-24, 13-1

alarm monitor 2-24, 6-13

alarms 13-1

monitoring 13-4

rogue access point 13-8

rogue adhoc 13-10

alarm trigger threshold 10-51

all groups window 15-7

alternate parent

for mesh 14-10

altitude 16-2

altitude mode 16-2

analyzing element location accuracy 5-64

anonymous provisioning 10-33

antenna gain 6-29

antenna type 6-28

AP attack details 2-17

AP list by location 14-4

AP list by location report 14-4

AP list by SSID 14-4

AP mesh layer info 5-46

applying calibration models 5-59

applying config groups 8-21

applying controller templates 10-78

AP policies 3-7

AP policies template 10-43

AP profile status report 14-4

APs not assigned to maps 2-16

AP up time 6-42

assigning location presence 5-3

association request failures 6-47

association request success 6-47

association request timeouts 6-47

attacks

access points 6-8

audience of document -xviii

AUDIT_STATUS_DIFFERENCE 13-60

auditing config groups 8-22

auditing H-REAP groups 12-16

audit reports 14-5

configuring 9-5, 9-27

audit status

viewing 9-5

viewing for access points 9-27

audit trail

viewing 7-10

audit trails

enabling for guest user activities 7-12

authentication order

managing 9-5

authentication priority 9-5

authentication process

Hybrid REAP 12-2

authentication request failures 6-47

authentication request success 6-47

authentication request timeout 6-47

auto key generation 10-22

automated upgrade 11-15

automatic backups, scheduling 11-4, 15-2

automatic client exclusion 10-20

automatic client troubleshooting 15-30

autonomous access points

adding by CSV file 9-18

viewing 9-18

autonomous to LWAPP migration support 9-16

auto provisioning 15-16

setting 15-21

auto provisioning device information

detailed 15-19

auto provisioning filter

deleting 15-20

editing 15-20

auto-synchronizing location appliances 11-10

avoid access point load 10-58

avoid Cisco AP load 10-58

avoid foreign AP interference 10-58

avoid non-802.11 noise 10-58

B

background tasks 11-13

running 15-2

backhaul interface 6-46

backing up location appliance data 11-12

backing up the WCS database

on Linux11-5to 11-6

on Windows 11-5

backup and restore license B-6

bandwidth

making expedited 10-62

best practices A-1

bridge group name 6-46

Bridging link information 6-50

bridging link information 6-50

bridging mesh statistics 6-46

broadcast deauthentication frame signatures 3-10

bronze 10-18

bronze queue 6-47

buildings

adding to a campus map 5-3

adding to WCS database 5-4

busiest APs report 14-4

busiest clients report 14-7

C

CAC

enabling 9-8

CA certificates 4-5

CAD files 5-2

calculating access point requirements 5-17

calibration models 5-59

calibration models, applying 5-59

calibration status bar 5-62

call admission control 10-61

campus map, adding to WCS database 5-2

cascade reboot 8-22

caution, defined -xix

CCA sensitivity 10-60

certificate signing request 3-22

changing access point positions 5-34

by importing or exporting a file 5-34

channels

monitoring on a floor map 5-51

monitoring on floor map 5-51

channels on a floor map 5-51

checking the status of WCS

on Linux 11-2

on Windows 11-2

chokepoints 5-35

adding 5-35

monitoring 5-43

removing 5-42

using to enhance tag location 5-35

Cisco AP load

avoiding 10-58

Cisco Discovery Protocol 9-24

Cisco UDI 5-20

Cisco Unified Wireless Network Solution 5-64

Cisco WCS base B-2

Cisco WCS location B-2

Cisco Wireless LAN Solution

overview1-2to ??

security solutions3-2to 3-5

civic address 5-4

clamped to ground 16-2

classification rule 10-44

clear config 9-25

client alarms

most recent 2-17

client association report 14-7

client authentication provision 10-33

client count 2-16, 2-21

client count report 14-7

client devices

connecting to WLANs 12-11

client exclusion 10-20

happening automatically 10-20

client exclusion policies template 10-48

client MFP 3-7

client properties 6-21

client related traps 10-73

client report

creating new 14-8

client reports

modifying 14-6, 14-7

viewing 14-6, 14-7

clients

finding6-30to??, 6-30, ??to 6-32

manually disabled 2-17

map 6-32

monitoring on a floor map 5-53

monitoring on a floormap 5-53

parameters 5-53

clients, monitoring on floor map 5-53

clients detected by location server 2-21

client security component 2-20

clients layer 5-47

client statistics 6-33

client tab

home page 2-16

client traffic 2-17, 2-21

client troubleshooting

automatic 15-30

combined inventory report 14-9

command buttons 2-24

conducting accuracy testing 5-68

config group

adding controllers 8-20

adding templates 8-21

configuring 8-20

downloading IDS signatures 8-24

downloading sw to controllers 8-23

removing controllers 8-20

removing templates 8-21

config groups

applying 8-21

auditing 8-22

creating 8-18

downloading customized webauth 8-25

rebooting 8-22

configure menu 2-22

configuring 802.3 bridging 9-13

configuring access control lists 10-55

configuring access points 9-13, 9-20

configuring a client exclusion policy template 10-45

configuring a CPU ACL template 10-41

configuring a high throughput template 10-68

configuring alarm severity 13-66

configuring a LDAP server template 10-26

configuring a local EAP general template 10-29

configuring a local EAP profile template 10-31

configuring a manually disabled client template 10-40

configuring a mesh template 10-68, 10-69

configuring an 802.11h template 10-67

configuring an access point 10-39

configuring an access point for hybrid REAP 12-9

configuring an EAP-FAST template 10-32

configuring a network access control template 10-28

configuring an RRM interval template 10-66

configuring an RRM threshold template 10-65

configuring a policy name template 10-56

configuring a roaming parameters template 10-63

configuring a rogue policies template 10-42

configuring a TACACS+ server template 10-27

configuring a TFTP server template 10-71

configuring a trusted AP policies template 10-43

configuring audit reports 9-5

configuring a user authentication priority template 10-78

configuring a user login policies template 10-37

configuring a video parameter template 10-62

configuring a voice parameter template 10-61

configuring config group 8-18

configuring EDCA parameters

for individual controllers 9-14

through a template 10-63

configuring firewall for WCS 3-6

configuring general templates 10-4

configuring global credentials 9-15

configuring global email parameters 15-29

configuring high density templates 10-59

configuring H-REAP AP groups 10-21

configuring Hybrid REAP 12-1

configuring hybrid REAP access point groups 12-12

configuring Hybrid-REAP groups 12-13

Configuring IDS 3-9

Configuring IDS signatures 3-9

configuring IDS signatures 3-9

configuring intrusion detection systems 3-9

configuring multiple country codes 8-15

configuring radio templates 10-82

configuring RADIUS servers 15-23

configuring SNMPv3 9-14

configuring spectrum experts 9-29

configuring TACACS+ servers 15-16

configuring template

ACL 10-40

for rogue AP rule groups 10-45

configuring templates

802.11a policy name 10-55

802.11b/g RRM interval 10-66

802.11b/g RRM threshold 10-62

802.11b/g voice 10-61

access point/radio 10-80

access point authentication and MFP 10-43

access point authorization 10-39

file encryption 10-22

guest users 10-36

known rogue access point 10-67

local management user 10-77

local net users 10-26

MAC filter 10-38

QoS 10-7

RADIUS accounting 10-25

RADIUS authentication 10-23

syslog 10-75

Telnet SSH 10-74

traffic stream metrics QoS 10-8

trap control 10-72

trap receiver 10-71

web authentication 10-51

WLAN 10-9

configuring the controller for hybrid REAP 12-6

configuring the switch

for hybrid REAP 12-4

configuring wired guest access 9-31

connecting client devices

to WLANs 12-11

Connecting to the Guest WLAN 3-21

Containment 6-12

containment

of rogue access points 6-12

content

customizing 2-19

controller

configuring for hybrid REAP 12-6

controller CPU utilization 2-20

controller inventory report 14-9

controller inventory status 2-21

controller memory utilization 2-20

controllers

adding 9-2

adding to WCS database 4-2

pinging network devices 9-7

searching 9-4

specified 1-2

controller templates

applying 10-79

controller utilization report 14-12

controller values

refreshing 9-6

conventions of document -xix

converting WLSE autonomous to WCS controller C-1

counters report

for 802.11 14-12

country codes

multiple 8-15, 9-3

setting 9-3

coverage areas 2-21

coverage hole 6-60

coverage holes 2-16

finding 5-10

monitoring on a floor map5-52to 5-53

monitoring on floormap 5-52

coverage holes, monitoring 5-52

coverage hole summary report 14-12

Creating 14-5

creating a lobby ambassador account 7-14

creating a network configuration audit 14-6

Creating a network design 5-28

creating a network design 5-28

creating a new access point report 14-5

creating a new client report 14-8

creating a new inventory report 14-9

creating a new mesh report 14-6, 14-11

creating a new performance report 14-13

creating a new security report 14-14

creating calibration models 5-46

Creating guest user accounts 7-12

creating guest user accounts 7-12

creating placemarks 16-3

CSR 3-22

CSV file 9-18, 15-18

CSV files 16-4

customized web auth 9-32

customized webauth

downloading 8-25

Customized Web authentication 3-18

customized web authentication

downloading 10-53

customizing content on WCS Home page 2-19

customizing tabs on WCS Home page 2-18

Custom signature 3-15

D

data/coverage 5-20

data management tasks

performing 15-26

data point collection 5-59

debug commands A-4

debug strategy A-4

default lobby ambassdor credentials

editing 7-10

Deleting a guest user 3-21

deleting a license B-6

deleting a report 14-3

deleting guest user templates 7-19

deleting WCS user accounts 7-4

designing a network 5-28

detailed auto provisioning device information 15-19

detecting access points 13-12

detecting rogue access points 6-13

device certificates 4-5

device information 9-17

DHCP 6-33

DHCP server

overriding 10-20

DHCP statistics 6-62

diagnostic channel A-2

disable report schedule 14-2

disabling IDS signatures 3-14

DNS ping 6-33

DNS resolution 6-33

document

audience -xviii

conventions -xix

organization -xviii

purpose -xviii

documentation

obtaining-xxto ??

downloading a customized web authentication page 10-53

downloading customized webauth 8-25

Downloading customized web authentication 3-18

Downloading IDS signatures 3-13

downloading IDS signatures 3-13

from your config group 8-24

downloading sw to controllers

after adding config group 8-23

downloading vendor CA certificates 4-5

downloading vendor device certificates 4-5

download logs 5-71

downstream delay 10-9

downstream packet loss rate 10-9

drawing polygon areas

using map editor 5-14

DTIM 10-57

E

EAP-FAST template 10-32

EAPOL flood signature 3-11

EDCA parameters

configuring for individual controllers 9-14

configuring through a template 10-63

editing guest users 7-18

Editing signature parameters 3-16

editing the default lobby ambassador credentials 7-10

edit link 5-9

edit links

home page 2-18

edit location presence information 5-3

edit view 13-5

egress interface 9-32

email

configuring parameters 15-28

email notifications

monitoring 13-13

enable report schedule 14-2

enabling audit trails

for guest user activities 7-12

enabling high density 9-9

enabling IDS signatures 3-14

enabling load-based CAC 9-6

enabling location presence 5-7

Enabling Web login 3-17

enabling Web login 3-17

end user license agreementB-8to ??

entry chokepoint 5-43

establishing logging options 15-25

event history 6-18

event notification 1-5

Events 13-1

events 13-1

monitoring 13-12

excluded packets 6-46

exit chokepoint 5-43

expedited 10-62

expedited bandwidth 10-62

exporting a file

to change access point position 5-34

exporting asset information 11-10

exporting WLSE map data 5-55

export task list 15-7

extend to ground 16-2

external web auth 9-33

extracting task list 15-14

F

failed objects

monitoring 13-7

failure object 6-7

feature license B-3

file encryption template 10-22

filter

deleting auto provisiioning 15-20

editing current auto provisioning 15-20

filtering

using to modify maps 6-50

filter member management 15-18

filter mode 15-17

filter properties 15-18

finding clients 6-30

finding coverage holes 5-10

firewall, configuring for WCS 3-6

floor plans

adding to a campus building5-11to 5-12

adding to a standalone building5-12to 5-13

enhancing with map editor 5-13

foreign access point interference

avoiding 10-58

foreign AP interference

avoiding 10-58

Frame type 3-15

friendly access point template 10-47

friendly rogue 10-44

friendly rogue access points 6-4

G

general tab

client properties 6-21

home page 2-16

RF properties 6-23

security 6-24

general templates

configuring 10-4

generate password 10-36

GEO check box 5-8

geographical coordinates 16-1

global credentials

configuring 9-15

Global settings

for standard and custom signatures 3-16

global username and password

overriding 9-24

gold 10-18

gold queue 6-47

Google Earth coordinates 16-2

Google Earth maps 16-1

viewing 6-52

Google KML or CSV

importing into WCS 16-6

GPS markers 5-4

grid of plus marks 5-60

groups

for hybrid-REAP 12-13

for rogue access point rules 10-45

group setup window on ACS server 15-9

GUEST_USER_ADDED 13-58

GUEST_USER_AUTHENTICATED 13-58

Guest user

deleting 3-21

guest user account

scheduling 7-20

Guest user accounts

creating 7-12

guest user accounts

adding 7-17

creating 7-12

managing 7-16

guest user activities 7-12

guest user credentials 7-18

guest user details

emailing 7-21

print 7-21

guest users

viewing and editing 7-18

guest user templates 10-36

deleting 7-19

Guest WLAN

connecting 3-21

guidelines for using the map editor 5-13

H

heater status 6-42

heat map

described 5-25

graphic 5-25

help menu 2-23

hierarchy

of mesh network 6-49

Hierarchy of Mesh parent to child 6-51

hierarchy of mesh parent to child 6-51

high density

enabling 9-9

high density requirements 9-10

high density templates 10-59

high throughput template

configuring 10-68

historical report type 14-1

Home page

customizing content 2-19

customizing tabs 2-18

H-REAP AP groups

configuring 10-21

H-REAP configuration tab 10-22

H-REAP groups

auditing 12-16

Hybrid REAP

configuring 9-1, 12-1

hybrid REAP access point groups 12-12

hybrid-REAP groups 12-13

Hybrid REAP local switching 10-19

hysteresis 10-65

I

IDS 3-9

configuring 3-9

IDS sensors 3-9

IDS signature events

viewing 3-17

IDS signatures 3-9

disabling 3-14

downloading 3-13

downloading from config group 8-24

enabling 3-14

uploading 3-12

importing a file

to change access point position 5-34

importing asset information 11-10

importing coordinates

as CSV file 16-4

into Google Earth 16-2

importing Google KML or CSV into WCS 16-6

importing WLSE map data 5-55

indicator of alarms 2-24

information elements

Aironet 10-19

infrastructure MFP 3-7

ingress interface 9-32

input type 15-18

inspect location readiness 5-22

inspect VoWLAN readiness 5-23

installer

using to upgrade 11-16

installing a license B-4

installing WCS

for WLSE conversion C-2

insufficient memory 6-46

interferers

summary 9-30

internal web auth 9-32

inter-subnet roaming 8-4

Intrusion Detection Systems 3-9

intrusion detection systems 3-9

invalid association request 6-48

invalid reassociation request 6-48

invalid reauthentication request 6-48

inventory detail status 2-16

inventory reports 14-9

creating 14-9

modifying 14-9

viewing 14-9

inventory status 2-21

IOS access points

adding 9-17

adding by device information 9-17

IOSAP_DOWN 13-59

IOSAP_LINK_DOWN 13-59

IOSAP_LINK_UP 13-59

IOSAP_UP 13-59

IP connectivity 6-33

IPSEC failures 6-8

K

KEK

key encryption key 10-24

key wrap 10-24

KML file 16-2

L

laptop icon 6-32

latitude 16-1

Layer 1 security solutions 3-2

Layer 2 10-11

Layer 2 security solutions 3-2

Layer 3 10-14

Layer 3 security solutions 3-2

Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-5

LBS authorization 10-39

LDAP server

configuring a template for 10-26

LEAP authentication

requirements 8-8

legacy syslog template 10-75

license

adding B-5

backup and restore B-6

deleting B-6

license agreementB-8to ??

license installation B-4

license management B-5

licenses B-2

license types B-2

licensing

on WLSE network management C-4

lifetime 7-19

linear point collection 5-59

link aggregation 10-5

link aggregation (LAG)

guidelines12-4to ??

link metric

adjusted 6-37

unadjusted 6-37

link SNR 6-37

link stats

for mesh 14-10

Link test

running 6-55

link test

running 6-55

Link test result 6-56

link test results 6-37

list all filters 15-19

list filters 15-19

load 5-43

load-based CAC 10-62

enabling 9-8

Lobby ambassador 7-12

lobby ambassador

logging activites 7-21

lobby ambassador account

creating 7-14

editing 7-15

lobby ambassador defaults

setting 7-9

local authentication

for hybrid-REAP groups 12-13

Local EAP check box 10-17

local EAP general template 10-29

local EAP profile template 10-31

local management user template 10-77, 10-78

local net users template 10-34

local password policy 15-22

local switching

Hybrid REAP 10-19

locating rogue access points 6-13

location

of rogue access points 6-12

location accuracy

analyzing 5-64

using testpoints 5-64

location appliance

importing 11-8

location appliance data

backing up 11-12

location appliance functionality 4-3

location appliance importing 11-8

location appliances

adding to WCS database 4-2

auto-synchronizing 11-11

relationship with WCS Location 1-5

location inventory status 2-21

location menu 2-23

location optimized monitor mode 9-22

location presence

assigning 5-3

on a location server 5-7

location readiness

inspecting 5-22

location server inventory report 14-9

location server utilization 14-12

location tab 6-27

location upgrade B-2

log analysis 6-17

logging 15-4

logging in

to the WCS user interface 7-15

logging into the WCS user interface2-14to 2-16

logging options 15-25

logging the lobby ambassador activities 7-21

login.html 3-18

LOMM 9-22

configuring access point radios 9-25

longitude 16-3

long preambles, enabling for SpectraLink NetLink phones 4-6

LWAPP migration 9-16

M

MAC filtering 10-14

MAC filter template 10-38

MAC frequency 3-15

MAC information 3-15

MACK

message authenticator code keys 10-24

Maintain Image Aspect Ratio 5-54

maintaining WCS11-1to 11-20

malformed neighbor packets 6-46

malicious rogue 10-44

malicious rogue access points 6-4

most recent 6-7

management frame flood signatures 3-10

Management Frame Protection 3-7

management frame protection 10-50

management queue 6-47

managing guest user accounts 7-16

managing licenses B-5

managing multiple WCSs 1-7

managing user authentication order 9-5

manually disabled client

template for 10-40

manually disabled clients 2-17

manufacturer information 6-28

map

adding chokepoints 5-35

removing chokepoints 5-42

Map Editor

general notes and guidelines 5-13

map editor

general notes 5-13

guidelines for using 5-13

using to draw polygon areas 5-14

map editor, enhancing floor plans 5-13

maps

creating5-2to 5-25

monitoring5-43, 5-43to 5-54

searching 5-9

using to monitor link stats 6-35

using to monitor mesh AP neighbors 6-41

map view

updating 6-51

menu bar 2-22

mesh access point neighbors

monitoring 6-41

mesh access points

monitoring 6-38

mesh alarms

most recent 2-18

mesh alternate parent 14-10

mesh health 6-42

monitoring 6-42

mesh link statistics 6-35

monitoring 6-35

mesh link stats 14-10

mesh neighbors 6-41

mesh network

monitoring using maps 6-35

mesh network hierarchy 6-49

mesh networks

monitoring 6-35

mesh node hops 14-10

mesh packet error statistics 14-10

mesh packet statistics 14-10

mesh parent-child hierarchical view 5-46

mesh report

creating 14-6, 14-11

mesh reports 14-10

modifying 14-11

viewing 14-11

mesh security statistics

for an AP 6-42

mesh statistics

for an access point 6-44

mesh stranded APs 14-10

mesh tab

home page 2-18

mesh template

configuring 10-69

Mesh tree

viewing 6-49

mesh tree

viewing 6-49

mesh worst node hops 14-11

mesh worst SNR links 14-11

message integrity check information element 10-50

metrics

in QoS 10-8

MFP 3-7

for clients 3-7

MFP client protection 10-20

MFP signature generation 10-20

MFP templates 10-50

MIC IE 10-50

minimum RSSI 10-64

mirror mode 9-23

mobile announce messages 8-8

mobility 8-2

mobility anchors 8-13

mobility groups 8-7

prerequisites12-4to ??

mobility groups, configuring 8-8

mobility scalability 8-11

modifying access point reports 14-4

modifying a migration template 9-19

modifying audit reports 14-6

modifying client reports 14-6, 14-7

modifying inventory reports 14-9

modifying map displays 6-50

using filters 6-50

modifying mesh reports 14-11

modifying performance reports 14-12

modifying security reports 14-14

monitoring active sessions 7-5

monitoring alarms 13-4

monitoring channels

on a floor map 5-51

monitoring chokepoints 5-43

monitoring clients

on a floormap 5-53

monitoring coverage holes

on a floormap 5-52

monitoring email notifications 13-13

monitoring events 13-12

monitoring failed objects 13-7

monitoring maps 5-43

monitoring mesh access point neighbors 6-40

using maps 6-41

monitoring mesh health 6-37, 6-42, 6-52

monitoring mesh link statistics

using maps 6-35

monitoring mesh networks

using maps 6-35

Monitoring outdoor areas 5-46

monitoring outdoor areas 5-54

monitoring pre-coverage holes 6-60

monitoring predicted coverage 5-44

monitoring rogue access point alarms 13-7

monitoring rogue access point details 13-9

monitoring rogue access points 6-8

monitoring rogue adhoc alarms 13-10

monitoring rogue adhocs 6-10

monitoring rogue clients 6-10, 13-13

monitoring security configurations 13-14

monitoring shunned clients 6-11

monitoring spectrum experts 9-29

monitoring transmit power levels 5-46

on a floormap 5-51

monitor menu 2-22

monitor mode

location optimized 9-22

most recent AP alarms 2-20

most recent client alarms 2-17

most recent malicious rogue 6-7

most recent mesh alarms 2-18

most recent rogue adhocs 3-3, 6-7

most recent security alarms 2-18

most recent security alerts 6-7

multicast mobility mode 8-12

multiple country codes

configuring 8-15

setting 9-3

multiple syslog template 10-76

N

N+1 redundancy 8-5

NAT 8-11

Navigator 1-7

NetStumbler signature 3-11

network access control

configuring template 10-28

network address translation 8-11

network design 5-28

network protection 3-9

Network Summary page 2-15

new rogue AP count 14-13

new rogue AP count report 14-13

new rogue APs 14-13

new rogue APs report 14-13

new search 5-9

node hop count

worst 2-18

node hops 6-46

for mesh 14-10

noise

avoiding non-802.11 types 10-58

avoid non-802.11 10-58

non-802.11 noise

avoiding 10-58

non-Cisco ACS server

for use with RADIUS 15-13

note, defined -xix

NTP server template 10-3

null probe response signatures 3-10

O

on-demand accuracy testing 5-68

optimizing the controller for high density 9-10

organizationally unique identifier 6-28

organization of document -xviii

Outdoor areas

monitoring 5-54

outdoor areas

monitoring 5-54

outdoor areas, adding to a campus map 5-6

outdoor location

creating with Google Earth 16-1

override global username password 9-24

overview

Cisco Wireless LAN Solution1-2to ??

WCS 1-3

P

packet error rate

worse 2-18

packet error rate link color 6-51

packet error statistics

for mesh 14-10

packet jitter 10-8

packet latency 10-8

packet loss 10-8

packet loss rate 10-9

packets received 6-48

packet statistics

for mesh 14-10

packets transmitted 6-48

parent changes 6-46

parent TSF 6-34

passthrough 10-15

password rules

turning on or off 15-21

PEAP 10-32

peer-to-peer blocking 10-20

performance reports 14-12

creating 14-13

modifying 14-12

viewing 14-12

performing data management tasks 15-26

pico cell mode 10-57

pinging network devices from a controller 9-7

placemarks

creating 16-3

placement of access points 5-26

planning mode 5-18

to calculate access point requirements 5-17

planning mode, calculating access point requirements 5-17

platinum 10-18

platinum queue 6-47

PLR 10-9

policy manager solutions 3-3

policy name template

configuring 10-56

polygon areas

drawing with map editor 5-14

poor neighbor SNR 6-46

position testpoints 5-69

pre-coverage holes

monitoring 6-60

predicted coverage, monitoring5-44to ??, 5-44

predictive tool

distance based 5-22

Prerequisites 2-2

presence parameters 5-7

Present map 6-32

print guest user details 7-21

protection type 10-51

purpose of document -xviii

Q

QoS 10-17

QoS templates 10-7

Queue 14-10

queues

silver, gold, platinum, bronze, management 6-47

Quiet time 3-15

R

radio inventory status 2-21

radio measurements

receiving 6-34

radio receiver sensitivity 6-29

radio resource management 10-58

radio status

scheduling 9-26

radio templates

configuring 10-82

radio utilization report 14-12

RADIUS accounting template 10-25

RADIUS authentication template 10-23

RADIUS servers

configuring 15-23

reachability status 9-29

reassociation request failures 6-48

reassociation request success 6-48

reassociation request timeouts 6-48

reauthentication request failures 6-48

reauthentication request success 6-48

reauthentication request timeout 6-48

rebooting config groups 8-22

receiving radio measurements 6-34

recent alarms 2-20

recent coverage holes 2-16, 2-21

Recent map 6-32

recent rogue adhoc alarm 2-18

recent rogue AP alarms 2-17

recovering the WCS password 11-21

refresh browser 5-43

refresh controller values 9-6

refresh from network 5-43

refresh heatmap 5-43

related publications -xix

relative to ground 16-2

removing chokepoints 5-42

removing controllers from config group 8-20

removing templates from config group 8-21

report

802.11 counters 14-12

access point inventory 14-9

busiest APs 14-4

busiest clients 14-7

client association 14-7

client count 14-7

combined inventory 14-9

controller inventory 14-9

controller utilization 14-12

coverage hole summary 14-12

deleting 14-3

location server inventory 14-9

location server utilization 14-12

mesh alternate parent 14-10

mesh worst node hops 14-11

radio utilization 14-12

security summary 14-14

traffics stream metrics 14-4

traffic stream metrics 14-7

Tx power level and channel 14-12

unique client 14-7

voice statistics 14-12

reporting tag location 5-35

Reports 14-4

reports

access point type 14-4

disable schedule 14-2

enable schedule 14-2

mesh link stats 14-10

mesh node hops 14-10

mesh packet error statistics 14-10

mesh packet statistics 14-10

mesh worst SNR links 14-11

running 14-1

reset AP now 9-25

restore WCS values 9-6

restoring WCS database on Linux 11-7

restrict by protocol 6-31

retention expiration 5-9

retransmission rule enable 5-8

Retrieving UDI 6-56

RF calibration model, creating 4-7

RF calibration tool 1-7

RF prediction heat map 5-25

RF profile traps 10-74

RF properties 6-23

RF update traps 10-74

RLDP 10-43

roaming 8-2

roaming parameters template

configuring 10-64

roaming time 10-8, 10-9

ROGUE_AP_NOT_ON_NETWORK 13-61

rogue access point alarms

monitoring 13-7

rogue access point details 13-9

rogue access point location 6-12

rogue access point rule groups 10-45

rogue access point rules

configuring a template 10-43

viewing or editing 9-28

rogue access points

alarm monitor 6-13

detecting 6-13

detecting and locating6-13to 6-14

friendly 6-4

locating 6-13

malicious 6-4

monitoring6-2to ??, 6-8

solutions for 3-3

unclassified 6-5

rogue adhoc alarm 2-18

rogue adhoc alarms

monitoring 13-10

rogue adhoc detail summary 2-20

rogue adhocs 6-6

monitoring 6-10

most recent 3-3, 6-7

rogue adhocs event report 14-14

rogue AP alarms 2-17

rogue AP detail summary 2-20

rogue APs event report 14-14

rogue APs layer 5-49

rogue APs report 14-14

rogue clients

monitoring 6-10, 13-13

rogue clients layer 5-50

rogue detector 9-23

rogue location discovery protocol 10-43

rogue management 3-3

rogue policies

template for 10-42

rogues detected by APs 14-14

routing state 6-46

RRM 10-58

RRM intervals 10-67, 10-68

RRM interval template

configuring 10-66, 10-68

RRM thresholds 10-65

RRM threshold template

configuring 10-65

rules

for rogue access point 10-43

viewing or editing for rogue access points 9-28

Running 6-55

Running a link test 6-54

running a link test 6-55

running background tasks 15-2

running report 14-1

RX neighbor requests 6-46

RX neighbor responses 6-46

Rx sensitivity 10-60

S

saved searches 5-9

scalability parameters 8-11

scan threshold 10-65

scheduled accuracy testing 5-68

scheduled tasks

viewing 9-26

schedule panel

accessing 14-3

scheduling guest user account 7-20

scheduling radio status 9-26

search

using for alarms 13-6

search clients 6-31

searching controllers 9-4

searching maps 5-7

security alarms

most recent 2-18

security alerts

most recent 6-7

security configurations

monitoring 13-14

security mesh statistics 6-47

security reports 14-13

creating 14-14

modifying 14-14

viewing 14-14

security solutions3-2to 3-5

security statistics

for mesh 6-44

security summary report 14-14

security summary window 6-2

security tab

home page 2-17

selecting access points 10-84

sending mobile announce messages 8-8

sensors

viewing IDS types 3-9

sequence parameter 10-56

serial number 6-28

servers

synchronizing WCS and location servers 11-9

Service Options

definitions 5-20

service options 5-20

setting lobby ambassodor defaults 7-9

setting multiple country codes 9-3

shunned clients

monitoring 6-11

sidebar area 2-23

signature attacks 6-7

signature attacks summary 2-17

silver 10-18

silver queue 6-47

single device 15-18

skull-and-crossbones indicator 6-14

sniffer 10-81

sniffer mode 9-23

SNMP authentication 10-73

SNMPv3

configuring 9-14

SNR definition 6-51

SNR down 6-37

SNR link

worst 2-18

SNR UP 6-37

SNR up 6-37

software

downloading config groups to controllers 8-23

software, updating 4-4

SpectraLink NetLink phones, enabling long preambles 4-6

spectrum expert

adding 9-29

spectrum expert details 9-31

spectrum experts

configuring 9-29

monitoring 9-29

summary 9-30

Standard signature 3-15

standard signatures 3-9

starting WCS

on Linux 2-14

on Windows 2-13

statistics

DHCP 6-62

statistics tab 6-25

status, checking 11-2

status report

AP profile 14-4

stopping WCS

on Linux 11-3

on Windows 11-3

supported Cisco WLSE management stations C-2

switch

configuring for hybrid REAP 12-4

symmetric mobility tunneling 10-5

symmetric tunneling 8-5

synchronize servers 11-9

syslog templates 10-75, 10-76

System requirements 2-2

T

TACACS+ server

configuring a template for 10-27

TACACS+ servers

configuring 15-22

tagging

of rogue access points 6-12

tag location reporting 5-35

Target 6-34

target TSF 6-34

tasks

importing into ACS 15-4

Telnet SSH templates 10-74

temperature 6-42

template

configuring for rogue AP rules 10-43

template for configuring network user credentials 10-34

templates

using 10-1

test analysis 6-33

testing

accuracy 5-68

Testpoints 5-64

TFTP server 3-12

TFTP server template

configuring 10-71

threats

access points 6-8

tilt 16-2

tool to conduct accuracy testing 5-68

top APs by client count 2-16

total APs not assigned to maps 2-16

total interferer count 9-31

traffic indicator message 10-57

traffic stream metrics 10-62

traffic stream metrics QoS status 10-8

traffic stream metrics QoS template 10-8

traffic stream metrics report 14-4, 14-7

graphical 14-4

transition time 10-65

transmit power level 10-58

transmit power levels

monitoring on a floor map 5-51

monitoring on a floormap 5-51

values 5-52

transmit power level values 5-52

trap

802.11 security 10-74

trap control templates 10-72

trap receiver template 10-71

traps

AAA 10-74

access point 10-74

client related 10-73

RF profile 10-74

RF update 10-74

unsupported 13-65

WPS 10-74

traps added in 2.1 13-33

traps added in 2.2 13-37

traps added in 3.0 13-39

traps added in 3.1 13-41

traps added in 3.2 13-44

traps added in 4.0 13-45

traps added in 4.0.96.0 13-49

traps added in 4.1 13-51, 13-58

trend report type 14-1

troubleshooting A-1

troubleshooting voice RF coverage 5-23

trusted AP policies

template for 10-43

trusted AP policies template 10-43

tunneling 8-5

turning password rules on or off 15-16

Tx channel report 14-12

TX neighbor requests 6-46

TX neighbor responses 6-46

Tx power level report 14-12

U

UDI

retrieving on controllers and access points 6-57

unadjusted link metric 6-37

unclassified rogue 10-44

unclassified rogue access points 6-5

uninstalling WCS

on Linux 11-15

on Windows 11-14

unique client report 14-7

unique device identifier 6-57

unknown association requests 6-48

unknown reassociation request 6-49

unknown reauthentication request 6-49

Update map view 6-51

update map view 6-51

updating system software 4-4

upgrading the network 11-21

upgrading to Linux 4

during WLSE conversion C-3

upgrading WCS

on Linux 11-20

on Windows 11-20

Uploading IDS signatures 3-12

uploading IDS signatures 3-12

upstream delay 10-9

upstream packet loss rate 10-9

User accounts

for guest 7-12

user accounts

for guest 7-12

user authentication order

managing 9-5

user authentication priority template

configuring 10-78

user credential retrieval priority 10-34

user details

emailing 7-21

printing 7-21

user groups 7-3

User Interface 2-21

user login policies

configuring a template 10-37

user preferences 15-32

using chokepoints 5-34

to enhance tag location reporting 5-34

using edit view 13-5

using filtering 6-50

using maps

to monitor mesh AP neighbors 6-41

to monitor mesh link statistics 6-35

using maps to monitor mesh networks 6-35

using planning mode 5-14

using search 13-6

using template

ACL 10-41

for friendly access point 10-47

using templates 10-1

802.11a policy name 10-56

802.11b/g RRM interval 10-66, 10-68

802.11b/g RRM threshold 10-65

802.11b/g voice 10-61

access point/radio 10-80

access point authentication & MFP 10-50

access point authorization 10-39

file encryption 10-22

for legacy syslog 10-75

for multiple syslog 10-76

guest users 10-36

local management user 10-77, 10-78

local net users 10-34

MAC filter 10-38

NTP server 10-3

QoS 10-7

RADIUS accounting 10-25

RADIUS authentication 10-23

syslog 10-75, 10-76

Telnet SSH 10-74

traffic stream metrics QoS 10-8

trap control 10-72

trap receiver 10-71

web authentication 10-51

WLAN 10-9

using testpoints

to analyze element location accuracy 5-64

using the installer to upgrade 11-16

utilization report

for controllers 14-12

V

V5 Client Statistics Report 14-7

V5 client statistics report 14-7

vendor CA certificates

downloading 4-5

vendor device certificates

downloading 4-5

video parameter template

configuring 10-62

video parameter templates

configuring 10-62

view audit reports 9-6

View Filters icon 5-45, 5-51, 5-52, 5-53

viewing access point reports 14-4

viewing audit reports 14-6

viewing audit status 9-5

for access points 9-27

viewing autonomous access points 9-18

viewing client reports 14-7

viewing clients

identified as WGBs 6-54

viewing DHCP statistics 6-62

viewing Google Earth maps 6-52, 16-6

viewing guest users 7-18

Viewing IDS signature events 3-17

viewing IDS signature events 3-17

viewing inventory reports 14-9

viewing mesh reports 14-11

Viewing Mesh tree 6-43

viewing mesh tree 6-44

viewing MFP events 13-3

viewing performance reports 14-12

view in grid 2-20

viewing security reports 14-14

Viewing shunned clients 3-9

viewing shunned clients 3-9

viewing the audit trail 7-10

voice parameter template

configuring 10-61

voice RF coverage

troubleshooting 5-23

voice statistics report 14-12

voice traffic 5-20

VoWLAN readiness

inspecting 5-23

W

WCS

checking status

on Linux 11-2

on Windows 11-2

installing 2-4

maintaining11-1to 11-20

overview 1-3

servers supported 1-3

starting

on Linux 2-14

on Windows 2-13

stopping

on Linux 11-3

on Windows 11-3

uninstalling

on Linux 11-15

on Windows 11-14

upgrading

on Linux 11-20

on Windows 11-20

versions1-4to 1-6

WCS_EMAIL_FAILURE 13-60

WCS-ADV-SI-SE-10 B-3

WCS Base, described 1-4, 1-6

WCS controller deployment

from WLSE autonomous C-1

WCS database

adding chokepoints 5-35

adding controllers 4-2

adding location appliances 4-2

backing up

on Linux11-5to 11-6

on Windows 11-5

removing chokepoints 5-42

restoring

on Linux 11-7

on Windows 11-6

scheduling automatic backups 11-4, 15-2

WCS home 2-14

WCS Home page

customizing content 2-19

customizing tabs 2-18

WCS licenses B-2

WCS Location

described1-5to 1-6

relationship with Cisco location appliances 1-5

WCS Navigator 1-7

WCS on WLSE

licensing C-6

WCS password

recovering 11-21

WCS user accounts

adding 7-2

changing passwords 7-4

deleting 7-4

WCS user interface 7-16

described 1-3, 1-7

logging into2-14to 2-16

WCS values

restoring 9-6

web authentication template 10-51

Web authentication types 3-18

web auth security A-3

web auth types 9-32

web login

enabling 3-17

Wellenreiter signature 3-11

WGB 9-19

WGBs

viewing those clients 6-54

wired guest access

configuring 9-31

Wireless Control System (WCS)

See WCS

WLANs

web auth security A-3

WLAN templates 10-9

WLSE autonomous deployment conversion C-1

WLSE management stations C-2

WLSE map data

exporting 5-55

importing 5-55

WLSE upgrade B-2

WLSE upgrade license C-6

WMM policy 10-18

work group bridge mode 9-19

worst node hop count 2-18

worst node hops

for mesh 14-11

worst packet error rate 2-18

worst SNR link 2-18

worst SNR links

for mesh 14-11

WPS traps 10-74