Cisco Wireless Control System Configuration Guide, Release 7.0
Index
Downloads: This chapterpdf (PDF - 970.0KB) The complete bookPDF (PDF - 30.32MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

Index

Numerics

40 MHz channel bonding 10-41

802.11a/n Parameters

High Throughput 10-40

802.11a policy name 12-83

802.11 association diagnostic test 11-18

802.11b/g/n DTIM period 12-31

802.11b/g RRM interval template 12-93, 12-95

802.11b/g RRM threshold templates 12-91

802.11b/g voice templates 12-86

802.11 counters report 17-87

802.11h template 12-94

configuring 12-94

802.11n summary reports 17-82

802.11 security trap 12-103

802.11 tags

filtering 5-61

802.1n scaling reports 17-3

802.1X authentication diagnostic test 11-18

802.1X supplicant credentials 12-9

802.3 bridging

configuring 10-37

880 series ISRs 1-6

A

AAA override 12-27

AAA servers 12-26

AAA traps 12-103

absolute 21-2

Access 9-25

access control list template 12-74

access control list templates 12-69

access mode 9-6

access point

configuring 12-59

configuring for hybrid REAP 15-9

credentials 9-2

friendly 12-81

access point/radio templates 12-114

access point authentication and MFP templates 12-63

access point authorization template 12-59

access point configuration

importing 9-25

access point floor settings

filtering 5-57

access point heatmap

filtering 5-33

access point icon 5-63

access point icons 5-64

access point load

avoiding 12-85

Access point placement 5-50

access point placement 5-50

access point positions

changing with import or export of file 5-54, 5-80

access points

adding 5-45

configuring 9-17

configuring for LOMM 9-33

converting to LWAPP C-2

detecting 16-21

embedded 1-6

positioning 5-54

searching 2-35, 9-35

selecting 12-134

access points, adding to maps5-45to 5-50

access point security statistics

for mesh 6-15

access point templates

adding 12-113

access point threats 3-8

access point threats or attacks 3-8

access point traps 12-103

acknowledged alarms

hiding 16-16

acknowledging alarms 16-16

ACL

template 12-69

ACL IP group details 12-70

ACL template 12-74

configuring 12-74

ACS server

adding WCS to 18-8

ACS View Server credentials 6-2

ACS view server tab 11-16

active interferer count per channel 9-39

active interferers 9-38

active interferers count chart 9-39

active sessions

monitoring 7-4

adaptive scan threshold 12-91

adaptive wIPS alarm report 17-103

adaptive wIPS top 10 APs report 17-105

add config groups 8-20

add group members 8-10

adding access point templates 12-113

adding a mobility services engine 13-2

adding a spectrum expert 9-37

adding autonomous access points

by CSV file 9-10

by device information 9-10

adding autonomous access points to WCS 9-10

adding a WLAN 10-23

adding controllers 10-2

adding event groups 13-10

adding guest user accounts 7-12

adding IOS access points 9-10

by device information 9-10

adding launch points

for Google Earth 21-7

adding SNMP entries 18-56

adding templates from config group 8-23

adding WCS as TACACS+ server 18-9

adding WCS to ACS server

for use with RADIUS 18-13

adding WCS to an ACS server 18-8

adding WCS to a non-Cisco ACS server 18-17

adding WCS usergroups

into ACS for RADIUS 18-14

into ACS for TACACS+ 18-10

adhoc rogue events report 17-107

adhoc rogues 2-26, 3-6

adhoc rogues report 17-109

adjusted link metric 6-5

administration menu 2-30

advanced debug 19-6

advanced options 5-40

advanced search 2-32, 16-12

Advanced tab

on WLAN template 12-29

age out dual band 10-32

age out suppression 10-32

aggregated historical data 18-7

aggressive load balancing 10-29

Aironet IE 10-21, 12-30

alarm 16-1

alarm cleanup options 18-36

alarm counts

for access points 16-4

for controllers 16-4

for coverage hole 16-4

for malicious APs 16-4

for mesh links 16-4

for mobility 16-4

for security 16-4

for unclassified APs 16-4

for WCS failures 16-4

alarm dashboard 16-1

alarm details

viewing 16-9

alarm display options 18-36

alarm indicator 16-1

alarms 16-1

acknowledging 16-16

assigning 3-22

clearing 3-22

config audit 19-10

deleting 3-22

monitoring 16-5

rogue access point 16-11

rogue adhoc 16-19

searching 2-34

unassigning 3-22

alarm severity

configuring 16-14

alarm summary 2-31

alarm trigger threshold 12-64

alarm warning 16-16

all groups window 18-11

allow AAA override 10-20

alternate parent report 17-69

altitude 21-2

altitude mode 21-2

anonymous provision 12-51

anonymous provisioning 12-51

AP attack details 2-21

AP authentication

template 12-63

AP authorization

template 12-59

AP-detected interferers

searching 2-40

AP failover priority

setting 9-1, 10-37

AP join taken time 11-7

AP load

avoiding 12-85

AP manager IP 9-16

AP mesh info

filtering 5-36

AP mode 12-115

AP parameters tab 12-114

applying CLI commands 12-109

applying config groups 8-23

applying controller templates 12-112

AP policies 3-37

AP policies template 12-77

AP primary discovery timeout 10-38

AP profile status report 17-49

APs

autonomous

new templates 12-120

lightweight

templates 12-113

APs not assigned to maps 2-20

AP status report

viewing for scheduled task 12-123

AP template task history

viewing 12-124

AP template tasks 12-123

AP threats and attacks 11-7

AP timers

configuring 10-13

AP up time 6-11

AP uptime 2-26

asset matching criteria 13-12

assigned virtual domain components 20-10

assigning location presence 5-7

assigning virtual domains 7-18

association request failures 6-18

association request success 6-18

association request timeouts 6-18

asynchronous 18-33

attacks

access points 3-8

attacks detected 3-9

audit 18-37

AUDIT_STATUS_DIFFERENCE 16-77

auditing config groups 8-24

auditing H-REAP groups 15-16

audit report 18-37

for alarms 16-10

audit reports

configuring 9-35, 10-34

audit status 6-14

viewing 10-34

viewing for access points 9-35

viewing for controllers 10-34

audit trail

viewing 7-9

authentication order

managing 10-33

authentication priority 10-34

template 12-108

authentication process

Hybrid REAP 15-2

authentication request failures 6-18

authentication request success 6-18

authentication request timeout 6-18

auto key generation 12-36

automated upgrade 14-9

automatic backups, scheduling 14-3, 18-1

automatic client exclusion 12-30

automatic client troubleshooting 11-9, 18-39, 18-40

automatic database synchronization 13-6

autonomous access points

adding 9-10

adding by CSV file 9-10

downloading images 9-12

upgrading 9-14

viewing 9-12

autonomous AP images

downloading 9-25

Autonomous APs

template

new 12-120

autonomous to lightweight migration 9-9

autonomous to LWAPP migration support 9-9

auto provisioning 18-19

auto provisioning filter

editing 18-24

auto refresh 5-73, 5-74, 18-41

avoid access point load 12-85

avoid Cisco AP load 12-85

avoid foreign AP interference 12-85

avoid non-802.11 noise 12-85

B

background scanning 10-65

on mesh configuration 12-99

on templates 12-99

background scanning in mesh networks

described10-63to 10-65

scenarios 10-64

Background Scan parameter 10-65

background tasks

running 18-1

backhaul interface 6-16

backing up the WCS database

on Linux 14-5

on Windows 14-4

backup and restore license B-4

band selection 10-31

bandwidth

making expedited 12-87

battery level

condition type 13-12

best practices A-1

bridge group 12-119

bridge group name 6-16

Bridging link information 6-5, 6-21

bridging link information 6-5, 6-21

bridging mesh statistics 6-16

broadcast deauthentication frame signatures 3-40

bronze 12-29

bronze queue 6-18

buildings

adding to a campus map 5-5

adding to WCS database 5-9

busiest APs report 17-51

busiest client report 17-22

C

CAC

enabling 10-38

CA certificates 4-4

CAD files 5-5

calculating access point requirements 5-37

calibrating client 12-111

call admission control 12-86

campus map, adding to WCS database 5-4

CAS 13-1

cascade reboot 8-25

category

for alarms 16-7

CDP 12-117

certificate signing request 3-50

change order buttons 17-8

changing access point positions 5-80

by importing or exporting a file 5-80

changing station role

root mode 9-15

channel bonding

configuring 10-41

channel change AP 6-40

channel change notifications 6-37

channel width

monitoring 6-23

checking the status of WCS

on Linux 14-2

on Windows 14-1

chokepoint

condition type 13-12

chokepoint icon 5-64

chokepoints

positioning 5-54

CIDR notation 12-70

Cisco Aironet 1510 Access Points

in Mesh network 10-63

Cisco AP load

avoiding 12-85

Cisco Discovery Protocol 9-22, 12-117

Cisco WCS base B-1

Cisco wired IPS events 2-26

Cisco Wireless LAN Solution

overview1-1to 1-2

security solutions3-1to 3-35

civic address 5-8

CKIP 10-18

clamped to ground 21-2

classification rule 12-77

clear config 9-25

CLI

template 12-108

CLI commands

applying to template 12-109

client

calibrating 12-111

managing 11-1

client alarm summary 11-5

client association failure 11-5

client authentication failure 11-5

client authentication provision 12-51

client authentication type distribution 11-6

client count 2-20, 11-3

client count report 17-24

client detail page 11-8

client details

retrieving from access point page 11-9

client devices

connecting to WLANs 15-12

client distribution 11-2

client elements 18-71

client excluded 11-5

client exclusion 10-21, 12-30

happening automatically 12-30

client exclusion policies 12-61

template 12-61

client exclusion policies template 12-61

client floor

filtering 5-59

client icon 5-63

client MFP 3-37

client protocol distribution 11-3

client related traps 12-102

client reports 17-21

clients

searching 2-37

clients detected by location server 2-27

client security events 2-27

client sessions report 17-26

client summary report 17-29

client tab 2-20, 11-1

client tab dashboard 11-10

client traffic 11-6

client troubleshooting

automatic 18-39

enabling 11-9

client WEP key decryption error 11-5

client WPA MIC error counter activated 11-5

CLI sessions 18-43, 18-60

color coding

of obstacles 5-32

command buttons 2-30

compliance reports 17-41

component options icon 2-29

components

of virtual domain 20-10

condition type

for event definitions 13-12

config audit 19-9

config audit alarms 19-10

config group

adding controllers 8-22

adding templates 8-23

configuring 8-21

downloading IDS signatures 8-27

downloading sw to controllers 8-26

removing controllers 8-22

removing templates 8-23

config group audits 8-24

config groups

applying 8-23

auditing 8-24

creating 8-19

downloading customized webauth 8-27

rebooting 8-25

reporting 8-26

config group task

deleting 12-126

config group task history

viewing 12-126

config group tasks 12-125

configuration audit report 17-41

configuration audit summary 19-9

configuration mismatch 6-39

configuration sync 18-5, 18-6

Configure Controllers

802.11a/n Parameters

High Throughput 10-40

configure menu 2-29

configuring 40 MHz channel bonding 10-41

configuring 802.3 bridging 10-38

configuring access points 9-17

configuring a client exclusion policy template 12-79

configuring a CPU ACL template 12-74

configuring a high throughput template 12-95

configuring alarm severity 16-14, 16-86

configuring a local EAP general template 12-46

configuring a local EAP profile template 12-47

configuring a manually disabled client template 12-60

configuring a mesh template 12-95, 12-98

configuring an 802.11h template 12-94

configuring an access point 12-59

configuring an access point for hybrid REAP 15-9

configuring an EAP-FAST template 12-49

configuring an RRM interval template 12-93

configuring an RRM threshold template 12-91

configuring a policy name template 12-83

configuring AP timers 10-13

configuring a roaming parameters template 12-88

configuring a TACACS+ server template 12-41

configuring a trusted AP policies template 12-77

configuring audit reports 10-34

configuring a user authentication priority template 12-108

configuring a user login policies template 12-56

configuring a video parameter template 12-87

configuring a voice parameter template 12-86

configuring config group 8-20

configuring controller WLANs 10-13

configuring DHCP proxy 10-10

configuring EDCA parameters

for individual controllers 10-43

through a template 12-88

configuring firewall for WCS 3-36

configuring global credentials 9-2

configuring global email parameters 18-46

configuring high availability 18-64

configuring H-REAP AP groups 12-32

configuring Hybrid REAP 13-1, 15-1

configuring hybrid REAP access point groups 15-12

configuring Hybrid-REAP groups 15-14

Configuring IDS 3-39

Configuring IDS signatures 3-39

configuring IDS signatures 3-39

configuring IGMP snooping 10-12

configuring intrusion detection systems 3-39

configuring LDAP bind requests 10-12

configuring multiple country codes 8-16

configuring NAC out-of-band 10-45

configuring radio templates 12-132

configuring RADIUS servers 18-31

configuring scheduled configuration tasks 12-123

configuring search results 2-45

configuring SNMPv3 10-44

configuring spectrum experts 9-37

configuring template

ACL 12-60

for rogue AP rule groups 12-79

configuring templates

802.11b/g RRM interval 12-93

802.11b/g RRM threshold 12-87

802.11b/g voice 12-86

access point/radio 12-114

access point authentication and MFP 12-77

access point authorization 12-59

file encryption 12-36

guest users 12-54

known rogue access point 12-94

local management user 12-106

MAC filter 12-57

QoS 12-13

RADIUS accounting 12-40

RADIUS authentication 12-37

syslog 12-105

Telnet SSH 12-104

traffic stream metrics QoS 12-16

trap control 12-101

WLAN 12-18

configuring the controller for hybrid REAP 15-5

configuring the switch

for hybrid REAP 15-4

configuring wired guest access 10-50

connecting client devices

to WLANs 15-12

Connecting to the Guest WLAN 3-50

Containment 6-1

containment

of rogue access point 16-21

of rogue access points 6-1

content

customizing 2-24

context aware configuring 13-14

context aware planning 13-14

context-aware software 13-1

controller

configuring for hybrid REAP 15-5

controller CPU utilization 2-27

controller details 9-16

controller license information 18-69

controller licenses

managing 18-74

searching 2-44

controller license status 18-6

controller memory utilization 2-27

controllers

adding 10-2

adding to WCS database 4-1

pinging network devices 10-38

searching 2-36, 10-32

specified 1-1

controller status report

viewing 12-125

controller template launch pad 12-1

controller templates

applying 12-112

controller upgrade settings 18-41, 18-43, 18-60

controller values

refreshing 10-35

controller WLANs

configuring 10-13

converting WLSE autonomous to WCS controller C-1

country codes

multiple 8-16, 10-28

setting 10-28

coverage hole 6-32, 6-39

coverage hole reports 17-89

coverage holes 2-20

CPU access control

template 12-74

Cranite 10-16

Creating a network design 5-53

creating a network design 5-53

creating a virtual domain 20-1

Creating guest user accounts 7-10

creating guest user accounts 7-10

creating placemarks 21-3

creating virtual domains 20-1

CSR 3-50

CSV file 9-10

method for adding autonomous access points 9-10

sample 10-3

CSV files 21-4

current AP template task

deleting 12-124

disabling 12-124

enabling 12-124

modifying 12-123

current config group task

disabling 12-125

enabling 12-125

modifying 12-125

currently logged guest users 2-28

current templates

viewing 10-44

customized web auth 10-55

customized webauth

downloading 8-27

Customized Web authentication 3-48

customized web authentication

downloading 12-67

customize report 17-7

customizing content on WCS Home page 2-24

customizing tabs on WCS Home page 2-23

Custom signature 3-45

D

dashboard

RRM 6-36

database synchronization

automatic 13-6

data collection

for RFID tag 12-111

data management tasks

performing 18-34

data retention 18-40

debug commands A-4

debug strategy A-4

default lobby ambassdor credentials

editing 7-9, 7-16

deleting a current AP template task 12-124

deleting a current config group task 12-126

deleting a license B-4

deleting a mobility services engine 13-4

deleting a WLAN 10-24

deleting controller templates 12-113

deleting event groups 13-11

deleting guest user templates 7-14

deleting WCS user accounts 7-4

designing a network 5-75

destination type

for report 17-4

detecting access points 16-21

detecting rogue access points 6-2

device certificates 4-3

device information 9-10

method for adding autonomous access points 9-10

device reports 17-48

DHCP diagnostic test 11-18

DHCP proxy

configuring 10-10

DHCP server

overriding 12-31

DHCP statistics 6-34

diagnostic channel A-1

diagnostic test

802.11 association 11-18

802.1X authentication 11-18

DHCP 11-18

DNS ping 11-18

DNS resolution 11-18

IP connectivity 11-18

profile redirect 11-18

disabled clients

template 12-60

disabling a current config group task 12-125

disabling current AP template task 12-124

disabling IDS signatures 3-44

discovering templates

from controllers 10-9

Distance

condition type 13-12

DNS ping diagnostic test 11-18

DNS resoltion diagnostic test 11-18

downloading a customized web authentication page 12-67

downloading autonomous AP images 9-25

downloading customized webauth 8-27

Downloading customized web authentication 3-48

Downloading IDS signatures 3-43

downloading IDS signatures 3-43

from your config group 8-27

downloading images

to autonomous access points 9-12

downloading sw to controllers

after adding config group 8-26

downloading vendor CA certificates 4-4

downloading vendor device certificates 4-3

downstream delay 12-17

downstream packet loss rate 12-17

drawing polygon areas

using map editor 5-30

DTIM 12-84

dynamic interface 12-11

E

EAP-FAST

template 12-50

EAP-FAST template 12-49

EAPOL flood signature 3-41

EDCA parameter

template 12-88

EDCA parameters

configuring for individual controllers 10-43

configuring through a template 12-88

edit content 2-25

edit contents 2-25

editing map properties 5-13

editing saved reports 17-12

editing scheduled run details 17-10

Editing signature parameters 3-47

editing the default lobby ambassador credentials 7-9, 7-16

edit link 5-21

edit links

home page 2-23

edit location presence information 5-7

Edit View

general 2-45

edit view

for alarms 16-8

egress interface 10-16

email

configuring parameters 18-45

email notifications

monitoring 16-23

embedded access points 1-6

emergency

condition type 13-12

enable background audit 8-20

enable enforcement 8-20

enable log module 18-32

enabling a current config group task 12-125

enabling audit trails

for guest user activities 7-10

enabling current AP template task 12-124

enabling IDS signatures 3-44

enabling load-based CAC 10-36

Enabling Web login 3-47

enabling Web login 3-47

end user license agreementB-7to B-12

establishing logging options 18-32

Ethernet bridging 9-3

Ethernet VLAN tagging guidelines 9-5

evaluation license

for controller 18-70

for MSE 18-70

event groups 13-10

event history 11-15, 16-10

event notification 1-5

Events 16-1

events 16-1

monitoring 16-22

searching 2-39

exclude device list 18-61

excluded packets 6-17

exclude switch trunk ports 18-61

exclude vendor list 18-61

executive summary report 17-84

expedited 12-87

expedited bandwidth 12-87

exporting a file 5-54

to change access point position 5-54, 5-80

export task list 18-11

extend to ground 21-2

extension license

for controller 18-70

for MSE 18-71

external antennas 12-134

external web auth 10-55

extracting task list 18-17

F

Failover 18-62

failover mechanism 18-62

failover scenario 18-62

failure source

for alarms 16-7

fast heartbeat interval 10-13

feature

of WCS license 18-68

feature license B-2

file encryption template 12-36

filter

editing current auto provisioning 18-24

filtering

using to modify maps 6-21

filtering 802.11 floor settings 5-61

filtering client floor settings 5-59

filtering floor setting

for access points 5-57

filtering floor settings

for AP mesh info 5-36

filtering rogue adhoc settings 5-62

filtering rogue AP settings 5-61

filtering rogue client floors 5-62

filtering saved reports 17-11

filtering scheduled run results 17-10

firewall, configuring for WCS 3-36

floor area map 5-55

Floor Areas

edit 5-74

floor component details 5-63

floor plans

adding to a campus building5-22to 5-27

adding to a standalone building5-27to 5-29

floor settings 5-56

foreign access point interference

avoiding 12-85

foreign AP interference

avoiding 12-85

Frame type 3-45

friendly access point template 12-81

friendly AP

template 12-81

friendly rogue 12-77

friendly rogue access points 3-7

friendly rogue APs 2-27

FTP

turning on and off 18-54

G

general tab

home page 2-20

general templates

configuring 12-4

generating migration analysis report 9-15

geographical coordinates 21-1

global credentials

configuring 9-2

Global settings

for standard and custom signatures 3-47

gold 12-29

gold queue 6-17

Google Earth

adding launch points 21-7

Google Earth coordinates 21-2

Google Earth maps 21-1

viewing 6-26

Google KML or CSV

importing into WCS 21-5

GPS markers 5-8

grace period license

for controller 18-70

groups

for hybrid-REAP 15-14

for rogue access point rules 12-79

group setup window on ACS server 18-12

GUEST_USER_ADDED 16-74

GUEST_USER_AUTHENTICATED 16-75

guest account settings 18-43

guest accounts status report 17-62

guest association report 17-64

guest count report 17-65

guest reports 17-62

guest user

template 12-54

guest user account

scheduling 7-14

Guest user accounts

creating 7-10

guest user accounts

adding 7-12

creating 7-10

managing 7-12

guest user details

emailing 7-15

print 7-15

guest user monitoring 6-36

guest user reports 17-120

guest users

currently logged 2-28

guest user sessions report 17-66

guest user templates 12-54

Guest WLAN

connecting 3-50

guidelines

for Ethernet VLAN tagging 9-5

for NAC out-of-band integration 10-46

guidelines for using the map editor 5-29

H

heater status 6-11

heat map

described 5-49

help menu 2-30

hide acknowledged alarms 16-16

hierarchy

of mesh network 6-19

Hierarchy of Mesh parent to child 6-22

hierarchy of mesh parent to child 6-22

High Throughput

802.11a/n 10-40

high throughput

template 12-95

high throughput template

configuring 12-95

historical data 18-7

historical report type 17-1

Home page

customizing content 2-24

customizing tabs 2-23

H-REAP AP groups

configuring 12-34

configuring template 12-34

H-REAP configuration 12-118

H-REAP configuration tab 12-35

H-REAP groups

auditing 15-16

H-REAP local switching 10-20

HTTP

turning on and off 18-54

http

//www.wildpackets.com/support/legacy/airopeek/overview 9-20

Hybrid REAP

configuring 9-1, 10-1, 15-1

hybrid REAP access point groups 15-12

hybrid-REAP groups 15-13

Hybrid REAP local switching 12-30

hysteresis 12-91

I

identical audit status 6-14

IDS 3-39

configuring 3-39

IDS sensors 3-39

IDS signatures 3-39

disabling 3-44

downloading 3-43

downloading from config group 8-27

enabling 3-44

uploading 3-42

IGMP snooping

configuring 10-12

images

downloading to autonomous access points 9-12

importing access point configuration 9-25

importing a file 5-54

to change access point position 5-54, 5-80

importing coordinates

as CSV file 21-4

into Google Earth 21-2

importing Google KML or CSV into WCS 21-5

In/Out

condition type 13-12

information elements

Aironet 12-30

infrastructure MFP 3-37

ingress interface 10-16

inspect location readiness 5-44

installer

using to upgrade 14-10

installing a license B-4

installing WCS

for WLSE conversion C-2

insufficient memory 6-17

integrating NAC out-of-band 10-45

interferers

summary 9-38

internal antennas 12-134

internal web auth 10-55

inter-subnet roaming 8-4

Intrusion Detection Systems 3-39

intrusion detection systems 3-39

invalid association request 6-19

invalid reassociation request 6-19

inventory detail status 2-20

inventory reports 17-41, 17-55

inventory status 2-27

IOS access points

adding 9-10

adding by device information 9-10

IOSAP_DOWN 16-76

IOSAP_LINK_DOWN 16-75

IOSAP_LINK_UP 16-75

IOSAP_UP 16-76

IP connectivity diagnostic test 11-18

K

KEK

key encryption key 12-39

key wrap 12-39

KML file 21-2

L

LAG mode 12-6

latest network audit report 10-36

latitude 21-2

launch pad

for controller templates 12-1

Layer 1 security solutions 3-2

Layer 2 12-20

Layer 2 security solutions 3-2

Layer 3 12-24

Layer 3 security solutions 3-2

Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-35

LBS authorization 12-59

template 12-59

LDAP 10-28

LDAP bind requests

configuring 10-28

LDAP servers 10-20

template 12-43

LEAP authentication

requirements 8-8

legacy beam forming 12-134

legacy syslog

template 12-105

legacy syslog template 12-105

license

backup and restore B-4

license agreementB-7to B-12

license installation B-4

license management 18-75

licenses B-1

license status 18-6

license types B-1

licensing 18-67

on WLSE network management C-4

limitations for high reliability 18-63

link aggregation (LAG)

guidelines 15-4

link latency 12-118

link metric

adjusted 6-5

unadjusted 6-5

link SNR 6-5

link stats report 17-70

load 5-74

load balancing 10-29

load-based AC 12-87

load-based CAC 12-87

enabling 10-38

Lobby ambassador 7-10

lobby ambassador defaults

setting 7-7

local authentication

for hybrid-REAP groups 15-14

local EAP authorization 10-20

Local EAP check box 12-27

local EAP general

template 12-46

local EAP general template 12-46

local EAP profile template 12-47

local management users

template 12-107

local management user template 12-107, 12-108

local net users

template 12-53

local net users template 10-27, 12-52

local password policy 18-29

local switching

Hybrid REAP 12-30

location

of rogue access point 16-21

of rogue access points 6-1

location appliance

importing 13-4

location appliance functionality 4-2

location appliance importing 13-4

location appliances

auto-synchronizing 13-6

relationship with WCS Location 1-4

location change

condition type 13-12

location configuration

template 12-110

location menu 2-30

location optimized monitor mode 9-20

location presence

assigning 5-7

location readiness

inspecting 5-44

location upgrade B-2

log analysis 11-14

logging 18-4

logging into the WCS user interface2-18to 2-19

logging options 18-32

logging the lobby ambassador activities 7-9

login.html 3-48

login disclaimer 18-44

login policies

template 12-56

log message levels 18-32

log modules

enabling 18-32

LOMM 9-20

configuring access point radios 9-33

longitude 21-3

long preambles, enabling for SpectraLink NetLink phones 4-5

lookup client

for DNS server 18-40

LWAPP

templates 12-113

LWAPP migration 9-9

LWAPP uptime 2-27

M

MAC filtering 12-23

template 12-57

MAC filter template 12-57

MAC frequency 3-46

MAC information 3-46

MACK

message authenticator code keys 12-39

mail

transport type 13-13

mail server configuration 18-45

maintaining WCS14-1to 14-14

malformed neighbor packets 6-17

malicious rogue 12-77

malicious rogue access points 3-5

managed network

security index 3-5

management frame flood signatures 3-41

Management Frame Protection 3-37

management frame protection 10-22, 12-63

management interface 12-7

management queue 6-18

managing a virtual domain 20-7

managing clients 11-1

managing controller licenses 18-74

managing current reports 17-8

managing guest user accounts 7-12

managing licenses 18-75

managing MSE licenses 18-76

managing multiple WCSs 1-9

managing saved reports 17-11

managing user authentication order 10-33

managing virtual domains 20-7

managing WLAN schedules 10-25

mandatory data rates 12-85

manually disabled client

template for 12-60

manually disabled clients 2-20

Map Editor

general notes and guidelines 5-29

map editor

general notes 5-29

guidelines 5-29

guidelines for using 5-29

using 5-29

using to draw polygon areas 5-30

map editor functions 5-29

map properties

editing 5-13

Maps

properties 5-13

maps

monitoring5-2to 5-3

searching 2-42, 5-21

using to monitor link stats 6-3

using to monitor mesh AP neighbors 6-8

map size 5-72

map view

updating 6-22

menu bar 2-29

mesh access point neighbors

monitoring 6-8

mesh access points

monitoring 6-6

mesh alarms

most recent 2-22

mesh configuration

template 12-98

mesh health 6-11

monitoring 6-11

mesh link statistics 6-3

monitoring 6-3

mesh neighbors 6-9

mesh network

monitoring using maps 6-3

mesh network hierarchy 6-19

mesh networks

background scanning 10-63

monitoring 6-3

mesh parent changing AP 2-27

mesh parent-child hierarchical view 5-36

mesh reports 17-68

mesh security statistics

for an AP 6-11

mesh statistics

for an access point 6-15

mesh tab

home page 2-22

mesh template

configuring 12-98

Mesh tree

viewing 6-19

mesh tree

viewing 6-19

message integrity check information element 12-63

metric collection 12-87

metrics

in QoS 12-16

MFP 3-37, 10-22

for clients 3-38

MFP attacks 3-8

MFP client protection 12-31

MFP signature generation 12-31

MFP templates 12-63

MIC IE 12-63

migration analysis

running 9-15

migration analysis report

generating 9-15

migration analysis summary

viewing 9-14

migration template 9-13

minimum RSSI 12-91

mirror mode 9-21

mismatched audit status 6-14

missing

condition type 13-12

mobile announce messages 8-8

mobility 8-1

mobility anchors 8-13, 10-26

mobility groups 8-7

prerequisites8-8to 8-9

mobility groups, configuring 8-8

mobility scalability 8-12

mobility services 13-1

mobility services engine

adding to WCS 13-2

deleting from WCS 13-4

keeping synchronized 13-4

modifying a current AP template task 12-123

modifying a current config group task 12-125

modifying a migration template 9-15

modifying map displays 6-21

using filters 6-21

Monitor Alarms

Rogue 3-19

monitoring active sessions 7-5

monitoring channel width 6-23

monitoring email notifications 16-23

monitoring events 16-22

monitoring guest users 6-36

monitoring mesh access point neighbors 6-8

using maps 6-8

monitoring mesh health 6-11, 6-23

monitoring mesh link statistics

using maps 6-3

monitoring mesh networks

using maps 6-3

monitoring neighboring channels 10-63

monitoring pre-coverage holes 6-32

monitoring rogue access point alarms 16-10

monitoring rogue access point details 16-14

monitoring rogue alarm events 16-22

monitoring security configurations 16-23, 18-54

monitoring spectrum experts 9-38

monitor menu 2-29

monitor mode

location optimized 9-20

monitor mode APs 18-71

most recent AP alarms 2-27

most recent audit alarms 19-10

most recent client alarms 11-6

most recent mesh alarms 2-22

most recent rogue adhocs 3-6

most recent security alarms 2-21, 2-28

MSE

synchronizing with WCS 13-4

MSE authorization

template 12-59

MSE license information 18-70

MSE licenses

managing 18-76

MSE synchronization status 13-9

multicast mobility mode 8-12

multiple country codes

configuring 8-16

setting 10-28

multiple syslog

template 12-106

multiple syslog template 12-106

N

N+1 redundancy 8-5

NAC out-of-band

configuring 10-45

NAC support 10-22

NAT 8-11

Navigator 1-9

netmask 12-70

NetStumbler signature 3-41

network address translation 8-11

network audit report

viewing latest 10-36

network design 5-75

network designs 13-4

network protection 3-39

Network Summary page 2-19

network summary reports 17-82

network users priority

template 12-51

network utilization reports 17-91

new rogue access points report 17-111

new rogue AP count report 17-113

new search 5-21

new switch failure 10-59

node hop count

worst 2-22

node hops 6-17

nodes report 17-72

noise

avoiding non-802.11 types 12-85

avoid non-802.11 12-85

non-802.11 noise

avoiding 12-85

non-aggregated historical data 18-8

non-Cisco ACS server

for use with RADIUS 18-17

normal mode

for Ethernet port 9-6

notification receiver 18-47

notifications

of channel change 6-37

of RF grouping 6-38

of transmission power change 6-38

NTP server template 12-8, 12-10

null probe response signatures 3-41

O

OfficeExtend 12-118

onstacle color coding 5-32

OUI search 18-61

outdoor areas, adding to a campus map5-19to 5-21

outdoor location

creating with Google Earth 21-1

out-of-sync 13-8

out of sync alerts 13-6

overview

Cisco Wireless LAN Solution1-1to 1-2

WCS 1-2

P

packet error rate

worse 2-22

packet error rate link color 6-21

packet error statistics report 17-75

packet jitter 12-16

packet latency 12-16

packet loss 12-16

packet loss rate 12-17

packet queue statistics report 17-77

packet stats report 17-73

parent changes 6-17

parent TSF 6-3

Passive Client 10-22

passthrough 12-25

password rules

turning on or off 18-29

PCI report 17-43

PEAP 12-49

peer-to-peer blocking 12-30

guidelines 10-46

percent time at maximum power 6-40

performance reports 17-86

performing data management tasks 18-34

permanent license

for controller 18-70

for MSE 18-70

pinging network devices from a controller 10-38

placemarks

creating 21-3

placement of access points 5-50

Planning Mode 5-35

planning mode 5-39

to calculate access point requirements 5-37

planning mode, calculating access point requirements 5-37

platinum 12-29

platinum queue 6-17

PLR 12-17

POE status 6-14

policy manager solutions 3-2

policy name template

configuring 12-83

polygon areas

drawing with map editor 5-30

poor neighbor SNR 6-17

positioning access points 5-54

positioning chokepoints 5-54

positioning Wi-Fi TDOA receivers 5-54

power injector setting 12-117

power injector settings 9-23

power-over-ethernet status 6-14

pre-coverage holes

monitoring 6-32

predictive tool

distance based 5-44

Prerequisites 2-1

prerequisites for high reliability 18-63

print guest user details 7-15

probe cycle count 10-32

profile redirect diagnostic test 11-18

protection type 12-64

Q

QoS 12-28

QoS profiles

configuring 10-65

QoS templates 12-13

quarantine 10-47

queues

silver, gold, platinum, bronze, management 6-17

quick search 2-32

Quiet time 3-46

R

radio measurements

receiving 6-2

radio resource management 12-85

Radio Resource Management statistics 6-37

radio status

scheduling 9-34

radio templates

configuring 12-132

RADIUS accounting servers

template 12-40

RADIUS accounting template 12-40

RADIUS and TACACS+ attributes

for virtual domain 7-19, 20-9

virtual domains 7-19, 20-9

RADIUS authentication template 12-37, 12-38

RADIUS fallback

template 12-42

RADIUS fallback mode 12-42

RADIUS servers 10-20

configuring 18-31

reachability status 9-37

reassociation request failures 6-18

reassociation request success 6-19

reassociation request timeouts 6-18

reauthentication request failures 6-19

reauthentication request success 6-19

reauthentication request timeout 6-19

rebooting config groups 8-25

receiving radio measurements 6-2

recent adhoc rogue alarms 3-9

recent alarms 2-27, 2-28

recent coverage holes 2-20

recent rogue adhoc alarm 2-21

recent rogue alarms 2-27

recent rogue AP alarms 2-21, 3-9

recovering the WCS password 14-16

recurrence

for report 17-4

refresh browser 5-75

refresh component icon 2-29

refresh controller values 10-35

refresh from network 5-73, 5-75

refresh options 5-74

relative to ground 21-2

removing controllers from config group 8-22

removing switches 10-60

removing templates from config group 8-23

report

running new 17-2

report launch pad 17-2

reports

running 17-1

scheduled runs 17-9

reset AP now 9-25

restore WCS values 10-35

restoring WCS database

in high availability environment 14-8

restoring WCS database on Linux 14-7

retain WCS value 8-25

Retrieving UDI 6-29

RF calibration model, creating 4-6

RF grouping notifications 6-38

RFID data collection 12-111

RF profile traps 12-103

RF update traps 12-103

roaming 8-1

roaming parameter

template 12-90

roaming parameters template

configuring 12-90

roaming time 12-16, 12-17

rogue access point alarms 16-10

monitoring 16-10

rogue access point containment 16-21

rogue access point details 16-14

rogue access point events report 17-115

rogue access point location 6-1, 16-21

rogue access point rule groups 12-79

rogue access point rules

configuring a template 12-77

viewing or editing 9-36

rogue access points

friendly 3-7

malicious 3-5

monitoring 3-9

solutions for 3-2

unclassified 3-7

rogue access points report 17-117

rogue access point tagging 16-21

rogue adhoc alarm 2-21

rogue adhoc alarms

monitoring 16-19

rogue adhoc floors

filtering 5-62

rogue adhoc icon 5-64

rogue adhocs

most recent 3-6

rogue alarm events

monitoring 16-22

rogue AP alarms 2-21

rogue AP detail summary 2-27

rogue AP floors

filtering 5-61

rogue AP icon 5-64

rogue AP rule groups

template 12-79

rogue AP rules

template 12-77

rogue client floors

filtering 5-62

rogue client icon 5-64

rogue clients

searching 2-42

rogue detector 9-20

rogue location discovery protocol 12-76

rogue policies

template 12-76

template for 12-75

role criteria 9-14

root access points (RAPs)

selecting 9-9

root mode

changing from station role 9-15

routing state 6-16

RRM 12-85

RRM dashboard 6-36

RRM DCA 10-41

RRM intervals 12-93, 12-94, 12-95

template 12-93

RRM interval template

configuring 12-93, 12-95

RRM threshold

template 12-91

RRM thresholds 12-91

RRM threshold template

configuring 12-91

RSSI legend 5-73

rules

for rogue access point 12-77

viewing or editing for rogue access points 9-36

Running a link test 6-28

running a link test 11-9

running a new report 17-2

running a saved report 17-12

running background tasks 18-1

running migration analysis 9-15

running report 17-1

RX neighbor requests 6-17

RX neighbor responses 6-17

S

sample CSV file 10-3

saved report

running 17-12

saved reports

editing 17-12

filtering 17-11

managing 17-11

saved searches 2-44, 5-21

scalability parameters 8-12

scan cycle period threshold 10-32

scan threshold 12-91

scheduled configuration tasks

configuring 12-123

Schedule details 9-17

scheduled run details

editing 17-10

scheduled run results 17-9

filtering 17-10

scheduled tasks

viewing 9-34

schedules

managing for WLANs 10-25

scheduling guest user account 7-14

scheduling radio status 9-34

search alarm parameters 2-35

search feature 2-32

using for troubleshooting 11-11

searching access points 2-36

searching AP-detected interferers 2-41

searching clients 2-38

searching controller licenses 2-44

searching controllers 2-37, 10-32

searching events 2-40

searching maps 2-42

searching rogue clients 2-42

searching SE-detected interferers 2-40

searching shunned clients 2-43

searching tags 2-43

searching Wi-Fi TDOA receivers 2-41

search results

configuring 2-45

secondary WCS operation 18-62

security alarms

most recent 2-21

security color range 3-5

security configurations

monitoring 16-23, 18-54

security index 3-5

security mesh statistics 6-18

security reports 17-102

security solutions3-1to 3-35

security statistics

for mesh 6-15

security summary 17-119

security tab

home page 2-20

interpreting 3-4

security thermometer 3-5

SE-detected interferers

searching 2-40

selecting access points 12-134

sending mobile announce messages 8-8

sensors

viewing IDS types 3-39

set sorting buttons 17-8

setting AP failover 9-1

setting AP failover priority 10-37

setting multiple country codes 10-28

shunned clients

searching 2-42

shutting switch port 10-61

sidebar area 2-30

signature attacks summary 2-21

silver 12-29

silver queue 6-17

sniffer 12-116

sniffer mode 9-20

SNMP

transport type 13-13

SNMP authentication 12-102

SNMP credentials 18-56

SNMP mediation 18-33

SNMPv3

configuring 10-44

SNR definition 6-21

SNR down 6-5

SNR link

worst 2-22

SNR UP 6-5

SNR up 6-5

SOAP 13-13

software

downloading config groups to controllers 8-26

software, updating 4-2

SpectraLink NetLink phones, enabling long preambles 4-5

spectrum expert

adding 9-37

spectrum expert details 9-39

spectrum experts

configuring 9-37

monitoring 9-38

summary 9-38

Standard signature 3-45

standard signatures 3-40

starting WCS

on Linux 2-17

on Windows 2-16

static WEP 10-16

Static WEP-802.1X 10-17

station role

changing to root mode 9-15

statistics

DHCP 6-34

status, checking 14-1

status schedules

managing for WLANs 10-25

stopping WCS

on Linux 14-3

on Windows 14-2

stranded APs report 17-79

strongest AP RSSI 16-11

supplicant credentials

for AP 802.1X 12-9

supported Cisco WLSE management stations C-2

supported data rates 12-85

switch

configuring for hybrid REAP 15-4

switches

removing 10-61

switch port

shutting 10-61

switch port trace 18-60

switch port tracing

using 10-56

symmetric mobility tunneling 12-7

symmetric tunneling 8-5

synchornization

of configuration 18-5, 18-6

synchronization 13-6

viewing information from 13-9

synchronization history 13-10

synchronizing mobility services engines 13-4

synchronizing WCS and MSE 13-4

syslog

transport type 13-14

syslog templates 12-105, 12-106

System requirements 2-2

T

TACACS+ server

configuring a template for 12-45

template 12-45

TACACS+ servers

configuring 18-29

tag elements 18-71

tagged packets 9-8

tagging

of rogue access point 16-21

of rogue access points 6-1

tag icon 5-63

tags

searching 2-43

Target 6-3

target TSF 6-3

tasks

importing into ACS 18-8

Telnet SSH

template 12-101

Telnet SSH templates 12-104

temperature 6-11

template

configuring for rogue AP rules 12-77

template for configuring network user credentials 12-51

template launch pad

for controllers 12-1

templates

applied to controllers 10-10

discovering from controllers 10-9

using 12-1

test analysis tab 11-18

TFTP

turning on and off 18-54

TFTP details 9-16

TFTP server 3-42

thermometer color range 3-5

threats

access points 3-8

throughput report 17-33

tilt 21-2

tools menu 2-30

top APs by client count 11-3

total APs not assigned to maps 2-20

total interferer count 9-39

total mismatched controllers 19-10

trace 18-34

trace switch port 10-56

traffic indicator message 12-84

traffic stream metrics 12-87

traffic stream metrics QoS status 12-17

traffic stream metrics QoS template 12-16

traffic stream metrics report 17-93

transition time 12-91

transmission power change notifications 6-38

transport types 13-13

trap

802.11 security 12-103

trap control

template 12-101

trap control templates 12-101

trap receiver

template 12-100

trap receiver template 12-100

traps

AAA 12-103

access point 12-103

client related 12-102

RF profile 12-103

RF update 12-103

unsupported 16-85

traps added in 2.1 16-47

traps added in 2.2 16-51

traps added in 3.0 16-54

traps added in 3.1 16-56

traps added in 3.2 16-59

traps added in 4.0 16-60

traps added in 4.0.96.0 16-65

traps added in 4.1 16-67, 16-74

traps added in release 6.0 16-82

traps added in release 7.0 16-86

trend report type 17-1

troubleshooting A-1

using logging options 18-34

troubleshooting voice RF coverage 5-45

trunk mode 9-6

trusted AP policies

template for 12-77

trusted AP policies template 12-77

tunneling 8-5

TX neighbor requests 6-17

TX neighbor responses 6-17

Tx power and channel report 17-96

type

of WCS license 18-69

U

UDI

retrieving on controllers and access points 6-29

unadjusted link metric 6-5

unclassified rogue 12-77

unclassified rogue access points 3-7

unclassified rogue APs 2-28

understanding virtual domains 7-20, 20-9

uninstalling WCS

on Linux 14-9

on Windows 14-8

unique clients report 17-37

unique device identifier 6-29

unknown association requests 6-19

unknown reassociation request 6-19

untagged packets 9-8

Update map view 6-22

update map view 6-22

updating system software 4-2

upgrade settings

for controller 18-41

upgrading autonomous access points 9-14

upgrading the network 14-15

upgrading to Linux 4

during WLSE conversion C-3

upgrading WCS

in high availability environment 14-15

on Linux 14-14

on Windows 14-14

Uploading IDS signatures 3-42

uploading IDS signatures 3-42

upstream delay 12-17

upstream packet loss rate 12-17

uptime reports 17-58

User accounts

for guest 7-10

user accounts

for guest 7-10

user authentication order

managing 10-33

user authentication priority template

configuring 12-108

user credential retrieval priority 12-51

user details

emailing 7-15

printing 7-15

User Interface 2-28

user login policies

configuring a template 12-56

template 12-56

user preferences 18-66

using chokepoints 5-80

using Edit View

for alarms 16-8

using filtering 6-5, 6-21

using logging

for troubleshooting 18-34

using maps

to monitor mesh AP neighbors 6-8

to monitor mesh link statistics 6-3

using maps to monitor mesh networks 6-3

using planning mode 5-30

using search 16-8

using template

ACL 12-74

for friendly access point 12-81

using templates 12-1

802.11a policy name 12-83

802.11b/g RRM interval 12-93, 12-95

802.11b/g RRM threshold 12-91

802.11b/g voice 12-86

access point/radio 12-114

access point authentication & MFP 12-63

access point authorization 12-59

file encryption 12-36

for legacy syslog 12-105

for multiple syslog 12-106

guest users 12-54

local management user 12-107, 12-108

local net users 10-27, 12-52

MAC filter 12-57

NTP server 12-8, 12-10

QoS 12-13

RADIUS accounting 12-40

RADIUS authentication 12-37

syslog 12-105, 12-106

Telnet SSH 12-104

traffic stream metrics QoS 12-16

trap control 12-101

trap receiver 12-100

web authentication 12-64

WLAN 12-18

using the installer to upgrade 14-10

utilization reports 17-60

V

V5 client statistics 17-40

vendor CA certificates

downloading 4-4

vendor device certificates

downloading 4-3

vendor search 18-61

video parameter

template 12-87

video parameter template

configuring 12-87

video parameter templates

configuring 12-87

View 2-29

view audit reports 10-34

view history 11-4

view in chart icon 2-29

viewing alarm details 16-9

viewing all current templates 10-44

viewing an AP template task history 12-124

viewing AP status report

for scheduled task 12-123

viewing audit status 10-34

for access points 9-35

viewing autonomous access points 9-12

viewing clients

identified as WGBs 6-28

viewing controller status report

for the scheduled task 12-125

viewing DHCP statistics 6-34

viewing Google Earth maps 6-23, 21-6

Viewing Mesh tree 6-12

viewing mesh tree 6-15

view in grid icon 2-29

Viewing shunned clients 3-39

viewing shunned clients 3-39

viewing synchronization history 13-10

viewing synchronization info 13-9

viewing the audit trail 7-9

viewing the migration analysis 9-14

viewing the RRM dashboard 6-38

view list 11-11

virtual domain

managing 20-7

virtual domain hierarchy 20-3

virtual domains 20-1

assigning 7-18

attributes 7-19, 20-9

creating 20-1

hierarchy 20-3

managing 20-7

understanding 7-20, 20-9

VLAN tagging 9-3

Voice-over-Internet Protocol

snooping 10-21

voice parameter template

configuring 12-86

voice RF coverage

troubleshooting 5-45

voice statistics 17-100

VoIP calls graph 17-97

VoIP calls table 17-99

VoIP snooping 10-21

W

WCS

checking status

on Linux 14-2

on Windows 14-1

installing 2-6

maintaining14-1to 14-14

overview 1-2

servers supported 1-2

starting

on Linux 2-17

on Windows 2-16

stopping

on Linux 14-3

on Windows 14-2

uninstalling

on Linux 14-9

on Windows 14-8

upgrading

on Linux 14-14

on Windows 14-14

versions1-3to 1-6

WCS_EMAIL_FAILURE 16-76

WCS-ADV-SI-SE-10 B-2

WCS Base, described 1-3, 1-6

WCS controller deployment

from WLSE autonomous C-1

WCS database

backing up

on Linux 14-5

on Windows 14-4

restoring

on Linux 14-7

on Windows 14-5

restoring in high availability environment 14-8

scheduling automatic backups 14-3, 18-1

WCS guest operations report 17-67

WCS home 2-18

WCS Home page

customizing content 2-24

customizing tabs 2-23

WCS licenses B-1

WCS Location

described1-4to 1-6

relationship with Cisco location appliances 1-4

WCS Navigator 1-9

WCS on WLSE

licensing C-7

WCS password

recovering 14-16

WCS user accounts

adding 7-1

changing passwords 7-4

deleting 7-4

WCS user interface 7-11

described 1-3, 1-9

logging into2-18to 2-19

WCS values

restoring 10-35

web authentication

template 12-64

web authentication template 12-64

web authentication type 12-66

Web authentication types 3-48

web auth security A-3

web auth types 10-55

web login

enabling 3-47

web policy 10-19

Wellenreiter signature 3-42

WGB 9-12

WGBs

viewing those clients 6-28

Wi-Fi TDOA receiver icon 5-64

Wi-Fi TDOA receivers

positiioning 5-54

searching 2-41

wIPS 13-1

planning and configuring 13-16

wired guest access

configuring 10-50

Wireless Control System (WCS)

See WCS

WLAN

adding 10-23

deleting 10-24

WLAN AP groups 12-32

WLAN details

viewing 10-14

WLANs

configuring 10-13

web auth security A-3

WLAN status schedules

managing 10-25

WLAN templates 12-18

WLSE autonomous deployment conversion C-1

WLSE management stations C-2

WLSE upgrade B-2

WLSE upgrade license C-7

WMM parameters 10-20

WMM policy 12-29

work group bridge mode 9-12

worst node hop count 2-22

worst node hops report 17-80

worst packet error rate 2-22

worst SNR link 2-22

WPA+WPA2 10-18

X

XML mediation 18-33

Z

zoom in or out 5-72