Cisco Wireless Control System Configuration Guide, Release 7.0.172.0
Index
Downloads: This chapterpdf (PDF - 1.13MB) The complete bookPDF (PDF - 43.47MB) | Feedback

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - Z

Index

Numerics

40 MHz channel bonding 9-123

802.11a/n

Parameters

monitor 6-19

RRM Grouping

monitor 6-20

RRM Groups

monitor 6-22

802.11a/n Parameters 9-118

802.11h 9-129

DCA 9-122

EDCA 9-128

General 9-119

High Throughput 9-130

Media 9-125, 9-136

Roaming 9-128

RRM Intervals 9-121

RRM Radio Grouping 9-125

RRM Thresholds 9-129

802.11 association diagnostic test 10-31

802.11b/g/n

Parameters

monitor 6-21

802.11b/g/n Parameters 9-131

EDCA 9-138

General 9-132

High Throughput 9-140

Roaming 9-139

RRM Intervals 9-134

RRM Thresholds 9-133

802.11b/g/n Parameters Controller Templates 11-116

802.11b/g RRM interval template 11-108, 11-112

802.11b/g RRM threshold templates 11-111

802.11 Counters

access points 6-33

802.11 counters report 15-120

802.11 General Parameters

configuring 9-113

802.11h

802.11a/n 9-129

802.11h template 11-107

configuring 11-107

802.11 MAC Counters

access points 6-48

802.11n summary reports 15-114

802.11 Parameters

configuring 9-83, 9-113

802.11 security trap 11-134

802.1n scaling reports 15-3

802.1X authentication diagnostic test 10-31

802.1X supplicant credentials 11-11

802.3 Bridging

configuring 9-28

802.3x Flow Control 9-28

880 series ISRs 1-7

A

AAA

AAA mode 16-116

active sessions 16-124

AP/MSE Authorization 9-91

General 9-84

LDAP Servers 9-87

local password policy 16-118

MAC Filtering 9-91

RADIUS 16-126

TACACS+ 16-124

TACACS+ Servers 9-89

users 16-118

Web Auth Configuration 9-92

AAA Local Net Users 9-89

AAA Mode 16-116

AAA override 11-32

AAA RADIUS

Acct Servers 9-85

Fallback Parameters 9-86

AAA servers 11-31

AAA traps 11-134

absolute 19-2

Access Control List

Rules 9-99

Access Control Lists

configuring 9-98

access control list template 11-87

access control list templates 11-80

access mode 9-158

access point

configuring 11-68

configuring for hybrid REAP 13-9

credentials 9-154

friendly 11-94

access point authentication and MFP templates 11-72

access point authorization template 11-68

access point icons 5-17

access point load

avoiding 11-101

Access Point Password

Global 9-59

access point positions

changing with import or export of file 5-56, 5-57

Access Points

Cisco APs

configuring 9-111

detecting 6-110

disabling

ineligible 9-166

Monitoring

overview 6-23

radio utilization 6-33

Tx power and channel 6-33

access points

configuring 9-166

configuring for LOMM 9-185

converting to LWAPP C-2

embedded 1-7

positioning 5-56

searching 2-38, 9-188

access points, adding to maps5-48to 5-53

access point threats 3-9

access point threats or attacks 3-9

Access Point Timer Settings 9-63

access point traps 11-134

Account

creating 7-21

ACL

configuring 9-98

Rules 9-99

template 11-80

ACL IP group details 11-81

ACL Protocol Groups

configuring 11-85

ACL template 11-87

configuring 11-87

ACS server

adding WCS to 16-41

ACS View Server credentials 9-222

ACS View Servers

configure 9-221

ACS view server tab 10-28

active interferer count per channel 9-195

active interferers 9-194

active interferers count chart 9-195

Active Sessions 16-124

location server 12-24

active sessions

monitoring 7-5

adaptive scan threshold 11-106

adaptive wIPS alarm report 15-139, 15-141, 15-146, 15-155

adaptive wIPS top 10 APs report 15-143

add config groups 8-20

add group members 8-10

Adding

location server 12-9

MSE 12-5

adding a spectrum expert 9-193

adding autonomous access points

by CSV file 9-162

by device information 9-162

adding guest user accounts 7-13

adding IOS access points 9-161

by device information 9-162

adding launch points

for Google Earth 19-7

Adding System Interfaces 9-38

adding templates from config group 8-23

adding WCS as TACACS+ server 16-42

Adhoc Rogue

alarm details 6-108

Alarms

overview 6-103

Events

details 6-115

overview 6-114

monitoring alarms 6-103

Adhoc Rogues

overview 6-88

adhoc rogues 2-26, 3-7

adhoc rogues report 15-149

adjusted link metric 5-82

Administration 18-1

location server 12-20

administration menu 2-30

Administrative Tools

overview 1-14

advanced debug 17-7

advanced options 5-104

Advanced Parameters

location server 12-25

advanced search 2-35, 6-106

Advanced tab

on WLAN template 11-34

age out dual band 9-117

age out suppression 9-117

aggregated historical data 16-71

Aggressive Load Balancing 9-29

aggressive load balancing 9-114

Aironet IE 9-71, 11-35

Airopeek

configuring 9-112

Alarm

details 6-87

alarm 6-80

alarm cleanup options 16-62

alarm counts

for access points 6-83

for controllers 6-83

for coverage hole 6-83

for malicious APs 6-83

for mesh links 6-83

for mobility 6-83

for security 6-83

for unclassified APs 6-83

for WCS failures 6-83

alarm dashboard 6-80

alarm display options 16-63

alarm indicator 6-80

Alarms

acknowledging 6-121

Adhoc Rogue

details 6-108

overview 6-103

assigning 6-120

cleaning 6-120

deleting 6-120

email notifications 6-116

monitoring 6-1

Rogue AP

details 6-96

Rogue APs 6-89

unassigning 6-120

working with 6-120

alarms 14-1

assigning 3-24

clearing 3-24

config audit 17-21

deleting 3-24

searching 2-37

unassigning 3-24

alarm severity

configuring 6-84

alarm summary 2-33

alarm trigger threshold 11-73

alarm warning 6-121

all groups window 16-43

allow AAA override 9-70

alternate parent report 15-97

altitude 19-2

altitude mode 19-2

anonymous provision 11-60

anonymous provisioning 11-60

AP/MSE Authorization

configuring 9-91

AP attack details 2-20

AP authentication

template 11-72

AP Authentication and MFP

configuring 9-110

AP authorization

template 11-68

AP Config

export 9-176

AP Failover Priority 9-27

AP failover priority

setting 9-154

AP join taken time 10-7

AP load

avoiding 11-101

AP Location data 5-54

AP manager IP 11-157

applying CLI commands 11-140

applying config groups 8-23

AP policies 3-39

AP policies template 11-90

AP Profile Status

access points 6-33

AP profile status report 15-71

APs

802.11 Counters 6-33

AP Profile Status 6-33

autonomous

templates 11-152

configuration templates 11-143

copy and replace 9-186

Coverage (RSSI) 6-30

Coverage (SNR) 6-30

details 6-34

CDP Neighbors 6-40

Current Associated Clients 6-40

general 6-34

interfaces 6-39

Dynamic Power Control 6-28

Edit View 6-25

Export AP config 9-176

Generate Report 6-26

Interference 6-29

lightweight

templates 11-143

lightweight access point template 11-143

monitor

overview 6-23

Noise 6-29

Radio

details 6-41

radio 9-176

remove unassociated 9-186

TSM 6-33

UpTime 6-30

Voice Statistics 6-31

Voice TSM Reports 6-32

Voice TSM Table 6-31

APs not assigned to maps 2-19

AP Status Report

Scheduled Task 9-204

AP Template

tasks 9-204

AP Template Task

delete 9-205

enable, disable 9-204

history 9-205

modify 9-204

AP threats and attacks 10-7

AP Timer Settings 9-63

AP up time 5-88, 6-50

AP uptime 2-26

AP Username Password Controller Templates 11-10

asset matching criteria 12-66

assigning location presence 5-31

assigning virtual domains 7-19, 16-121

association request failures 5-95, 6-54

association request success 5-95, 6-54

association request timeouts 5-95, 6-54

attacks

access points 3-9

attacks detected 3-9

AUDIT_STATUS_DIFFERENCE 14-54

auditing config groups 8-24

auditing H-REAP groups 13-16

Audit Mode

basic audit 16-64

template based audit 16-64

Audit Now 9-19

audit report

for alarms 6-88, 12-71

audit reports

configuring 9-188

audit status 5-91

viewing for access points 9-188

audit trail

viewing 7-10

Authentication Priority

configuring 9-151

authentication priority

template 11-139

authentication process

Hybrid REAP 13-2

authentication request failures 5-95, 6-54

authentication request success 5-95, 6-54

authentication request timeout 5-95, 6-54

auto key generation 11-43

automated upgrade 4-15

automatic backups, scheduling 4-9

automatic client exclusion 11-36

automatic client troubleshooting 10-21, 16-66

autonomous access points

adding 9-161

adding by CSV file 9-162

downloading images 9-164

upgrading 9-164

viewing 9-163

Autonomous AP

Migration Templates

edit 11-155

autonomous AP images

downloading 9-175

Autonomous APs

template

new 11-152

templates 11-152

autonomous to lightweight migration 9-161

autonomous to LWAPP migration support 9-161

auto provisioning filter

editing 16-53

auto refresh 5-108, 5-121

avoid access point load 11-101

avoid Cisco AP load 11-101

avoid foreign AP interference 11-101

avoid non-802.11 noise 11-101

B

background scanning 9-55

on mesh configuration 11-130

on templates 11-130

background scanning in mesh networks

described9-53to 9-55

scenarios 9-54

Background Scan parameter 9-56

backhaul interface 5-93, 6-52

backing up the WCS database

on Linux 4-11

on Windows 4-10

Backup

location server 12-35

backup and restore license B-4

band selection 9-115

battery level

condition type 12-65

best practices A-1

bridge group name 5-93, 6-52

Bridging link information 5-82, 5-98

bridging link information 5-82, 5-98

bridging mesh statistics 5-93, 6-52

broadcast deauthentication frame signatures 3-42

bronze 11-34

bronze queue 5-95, 6-53

buildings

adding to WCS database 5-33

busiest APs report 15-73

busiest client report 15-24

C

CA Certificate

configuring 9-101

CA certificates 4-5

calculating access point requirements 5-102

calibrating client 11-142

CAS 12-1

cascade reboot 8-25

CDP Interface Neighbors

controller ports

monitor 6-11

certificate signing request 3-52

change order buttons 15-8

changing station role

root mode 9-165

channel bonding

configuring 9-123

channel width

monitoring 6-55

checking the status of WCS

on Linux 4-7

on Windows 4-6

Chokepoint

adding to WCS database 9-197

adding to WCS map 9-198

removing from WCS 9-199

removing from WCS map 9-199

chokepoint

condition type 12-65

Chokepoints 6-67

new 9-197

chokepoints

positioning 5-56

CIDR notation 11-81

Cisco Access Points

configuring 9-111

Cisco Adaptive wIPS

alarms 6-117

Cisco Aironet 1510 Access Points

in Mesh network 9-53

Cisco AP load

avoiding 11-101

Cisco Discovery Protocol 9-171

Cisco WCS base B-1

Cisco wired IPS events 2-27

Cisco Wireless LAN Solution

overview1-1to 1-2

security solutions3-1to 3-37

civic address 5-32

CKIP 9-68

clamped to ground 19-2

classification rule 11-91

Classifying Rogue APs 6-93

clear config 9-174

CLI

template 11-139

CLI commands

applying to template 11-140

Client

disable 10-36

remove 10-37

Sessions Report 10-38

client 10-37

calibrating 11-142

managing 10-1

client alarm summary 10-5

client association failure 10-5

client authentication failure 10-5

client authentication provision 11-60

client authentication type distribution 10-6

client count 2-19, 10-4

client count report 15-26

client detail page 10-10

Client Details

Association History 10-18

CCXv5 Information 10-19

Event Information 10-19

Location Information 10-19

Statistics 10-18

client details

retrieving from access point page 10-21

client devices

connecting to WLANs 13-12

client distribution 10-3

client excluded 10-5

client exclusion 9-72, 11-36

happening automatically 11-36

Client Exclusion Policies

configuring 9-105

client exclusion policies 11-70

template 11-70

client exclusion policies template 11-70

Client Location

current map 10-38

recent map 10-37

client MFP 3-39

client protocol distribution 10-3

client related traps 11-133

client reports 15-23

clients

searching 2-40

clients detected by location server 2-27

client security events 2-27

client sessions report 15-29

Client Summary

filtering 10-11

client summary report 15-33

client tab 2-20, 10-2

client tab dashboard 10-22

client traffic 10-6

client troubleshooting

automatic 16-66

enabling 10-21

client WEP key decryption error 10-5

client WPA MIC error counter activated 10-5

CLI Sessions

monitor 6-6

CLI sessions 16-71, 16-90

color coding

of obstacles 5-74

command buttons 2-32

compliance reports 15-48

component options icon 2-29

condition type

for event definitions 12-65

config audit 17-20

config audit alarms 17-21

config group

adding controllers 8-22

adding templates 8-23

configuring 8-21

downloading IDS signatures 8-27

downloading sw to controllers 8-26

removing controllers 8-22

removing templates 8-23

config group audits 8-24

config groups

applying 8-23

auditing 8-24

creating 8-19

downloading customized webauth 8-27

rebooting 8-25

reporting 8-26

Config Group Task

delete 9-207

enable,disable 9-206

history 9-207

Config Group Tasks 9-205

modify 9-206

Configuration

scheduled 9-203

configuration audit report 15-49

Configuration Backup 16-22

Configure Access Points

Radio 9-176

Configure APs

copy and replace 9-186

Configure Controllers

802.11

General Parameters 9-113

802.11a/n Parameters 9-118

802.11h 9-129

Dynamic Channel Assignment 9-122

EDCA 9-128

General 9-119

High Throughput 9-130

Media 9-125, 9-136

Roaming 9-128

RRM Intervals 9-121

RRM Radio Grouping 9-125

RRM Thresholds 9-129

802.11b/g/n Parameters 9-131

EDCA 9-138

General 9-132

High Throughput 9-140

Roaming 9-139

RRM DCA List 9-135

RRM Radio Grouping 9-135

RRM Thresholds 9-133

802.11 Parameters 9-83, 9-113

Access Control List

Rules 9-99

Access Points

Cisco APs 9-111

Download Customized Web Auth Bundle 9-36

Download IDS signatures 9-36

Downloading Configuration 9-34

Downloading Software 9-34

Download Web Admin Certificate 9-35

H-REAP 9-80

H-REAP AP Groups 9-80

Management 9-145

Authentication Priority 9-151

Local Management Users 9-151

Syslog 9-149

Syslog Servers 9-149

Telnet SSH 9-148

Trap Receivers 9-145

Web Admin 9-149

Mesh 9-141

Ports 9-144

Rebooting Controllers 9-7

Removing Controllers 9-7

Security

AAA 9-84

AAA AP authorization 9-91

AAA Local Net Users 9-89

AAA RADIUS Acct Servers 9-85

AAA RADIUS Auth Servers 9-84

Access Control Lists 9-98

AP Authentication and MFP 9-110

CA Certificate 9-101

Client Exclusion Policies 9-105

CPU Access Control List 9-100

Custom Signatures 9-109

Disabled Clients 9-98

file encryption 9-83

ID Certificate 9-102

IDS Sensor List 9-101

Local EAP 9-94

Local EAP General 9-94

Local EAP general EAP-FAST parameters 9-97

Local EAP General Network Users Priority 9-97

Local EAP Profiles 9-96

Rogue Policies 9-104

Standard Signatures 9-106

User Login Policies 9-98

Web Auth Certificate 9-103

Wireless Protection 9-103

System

DHCP Scopes 9-57

Mobility Groups 9-50

Network Route 9-49

Network Time Protocol 9-53

QoS Profiles 9-56

Spanning Tree Protocol 9-50

System Commands 9-30

System Interfaces 9-37

Uploading Files from Controllers 9-33

configure menu 2-30

Configuring

ACL Protocol Groups 11-85

Wired Guest Access 9-45

Configuring 802.3 Bridging 9-28

configuring access points 9-166

configuring a client exclusion policy template 11-92

configuring a CPU ACL template 11-87

configuring a high throughput template 11-108

configuring alarm severity 6-84, 14-64

configuring a local EAP general template 11-55

configuring a local EAP profile template 11-56

configuring a manually disabled client template 11-69

configuring a mesh template 11-108, 11-129

configuring an 802.11h template 11-107

configuring an access point 11-68

configuring an access point for hybrid REAP 13-9

configuring an EAP-FAST template 11-58

configuring an RRM interval template 11-112

configuring an RRM threshold template 11-107

configuring a policy name template 11-99

configuring a roaming parameters template 11-104

configuring a TACACS+ server template 11-50

configuring a trusted AP policies template 11-90

configuring a user authentication priority template 11-139

configuring a user login policies template 11-65

configuring config group 8-20

configuring controller WLANs 9-64

configuring EDCA parameters

through a template 11-104

Configuring Existing Controllers 9-21

configuring firewall for WCS 3-38

configuring global credentials 9-154

configuring global email parameters 16-74

configuring H-REAP AP groups 11-38

configuring Hybrid REAP 13-1

configuring hybrid REAP access point groups 13-12

configuring Hybrid-REAP groups 13-14

Configuring IDS 3-41

Configuring IDS signatures 3-41

configuring IDS signatures 3-41

configuring intrusion detection systems 3-41

configuring multiple country codes 8-16

configuring search results 2-47

configuring spectrum experts 9-193

configuring template

ACL 11-69

for rogue AP rule groups 11-92

configuring templates

802.11b/g RRM interval 11-112

access point authentication and MFP 11-90

access point authorization 11-68

file encryption 11-45

guest users 11-63

known rogue access point 11-107

local management user 11-137

MAC filter 11-66

QoS 11-16

RADIUS accounting 11-49

RADIUS authentication 11-46

syslog 11-136

Telnet SSH 11-135

traffic stream metrics QoS 11-20

trap control 11-132

WLAN 11-22

configuring the controller for hybrid REAP 13-6

configuring the switch

for hybrid REAP 13-5

Configuring User Roles 9-58

connecting client devices

to WLANs 13-12

Connecting to the Guest WLAN 3-52

content

customizing 2-25

context aware configuring 12-74

context aware planning 12-69

context-aware software 12-1

Controller

General System Parameters 9-24

Multicast Mode 9-62

Template Launch Pad 11-1

Uploading configuration/logs 9-33

controller

configuring for hybrid REAP 13-6

controller CPU utilization 2-27

controller details 11-157

Controller DHCP 9-61

configuring 9-61

controller license information 16-10

controller licenses

managing 16-101

searching 2-46

controller memory utilization 2-27

Controllers

Adding an Interface 9-38

configuring existing 9-21

DHCP Stats

monitor 6-7

Edit View 6-3

monitor

Summary 6-4

monitoring 6-1

search 6-2

System Parameters

monitor 6-3

controllers

adding 9-4

adding to WCS database 4-2

searching 2-39

specified 1-1

Controller Security

monitor 6-12

Controller Templates

802.11b/g/n Parameters 11-116

Adding 11-2

applying 11-2

AP Username Password 11-10

delete 11-2

managing, creating 11-3

SNMP Community 11-8

Viewing 9-18

Voice

802.11b/g/n 9-118, 11-98, 11-102, 11-119

Controller Time and Date 9-33

controller upgrade settings 16-69, 16-71, 16-91

Controller User Roles 9-58

controller WLANs

configuring 9-64

converting WLSE autonomous to WCS controller C-1

Country Codes

setting multiple 9-113

country codes

multiple 8-16

Coverage (RSSI)

access points 6-30

Coverage (SNR)

access points 6-30

coverage hole 6-62

coverage hole reports 15-123

coverage holes 2-19

CPU access control

template 11-87

CPU Access Control Lists

configuring 9-100

CPU ACL

configuring 9-100

Cranite 9-67

Creating Account 7-21

Creating a Lobby Ambassador Account 7-21

Creating guest user accounts 7-11

creating guest user accounts 7-11

creating placemarks 19-3

creating virtual domains 18-2

CSR 3-52

CSV file 9-162

method for adding autonomous access points 9-162

CSV files 19-4

Current building

delete 5-35

edit map 5-35

currently logged guest users 2-28

Custom and Standard Signatures

Global Settings 9-108

customized webauth

downloading 8-27

Customized Web Auth Bundle

download 9-36

Customized WebAuth Bundles

downloads 9-14

Customized Web authentication 3-50

customized web authentication

downloading 11-76

customize report 15-7

customizing content on WCS Home page 2-25

customizing tabs on WCS Home page 2-23

Custom signature 3-47

Custom Signatures

configuring 9-109

D

data collection

for RFID tag 11-142

DCA 11-114, 11-127

802.11a/n 9-122

debug commands A-4

debug strategy A-4, D-11

default lobby ambassdor credentials

editing 7-10, 7-17

Deleting

MSE 12-6

deleting a license B-4

deleting a WLAN 9-75

deleting guest user templates 7-15

deleting WCS user accounts 7-4

designing a network 5-109

destination type

for report 15-5

Detecting APs 6-110

details

clients 10-39

device certificates 4-4

device information 9-162

method for adding autonomous access points 9-162

device reports 15-69

DHCP

configuring 9-61

DHCP diagnostic test 10-30

DHCP Scopes

configuring 9-57

DHCP server

overriding 11-38

DHCP Stats

controllers

monitor 6-7

diagnostic channel A-1, D-1

diagnostic test

802.11 association 10-31

802.1X authentication 10-31

DHCP 10-30

DNS ping 10-31

DNS resolution 10-31

IP connectivity 10-30

profile redirect 10-31

Disable

client 10-36

Disabled Clients

manual 9-98

disabled clients

template 11-69

disabling IDS signatures 3-46

Discovering Templates from Controllers 9-18

Distance

condition type 12-65

DNS ping diagnostic test 10-31

DNS resoltion diagnostic test 10-31

Download

Web Admin Certificate 9-150

Web Auth Certificate 9-150

downloading a customized web authentication page 11-76

downloading autonomous AP images 9-175

Downloading Configurations to Controllers 9-34

downloading customized webauth 8-27

Downloading customized web authentication 3-50

Downloading IDS signatures 3-45

downloading IDS signatures 3-45

from your config group 8-27

downloading images

to autonomous access points 9-164

Downloading Signature Files 9-107

Downloading Software

controllers 9-34

downloading sw to controllers

after adding config group 8-26

downloading vendor CA certificates 4-5

downloading vendor device certificates 4-4

Downloads

Customized WebAuth Bundles 9-14

Vendor CA Certificates 9-16

Vendor Device Certificate 9-15

downstream delay 11-21

downstream packet loss rate 11-21

drawing polygon areas

using map editor 5-72

DTIM 11-100

Dynamic Channel Assignment

802.11a/n 9-122

dynamic interface 11-14

E

EAP-FAST

template 11-59

EAP-FAST template 11-58

EAPOL flood signature 3-43

EDCA

802.11b/g/n Parameters 9-138

EDCA parameter

template 11-104

EDCA parameters

configuring through a template 11-104

edit content 2-26

edit contents 2-26

editing saved reports 15-13

editing scheduled run details 15-11

Editing signature parameters 3-49

editing the default lobby ambassador credentials 7-10, 7-17

edit link 5-71

edit links

home page 2-23

edit location presence information 5-31

Edit View

access points 6-25

alarms 6-85

controllers 6-3

general 2-47

egress interface 9-66

email

configuring parameters 16-73

Email Notifications

alarms 6-116

embedded access points 1-7

emergency

condition type 12-65

enable background audit 8-20

enable enforcement 8-20

enable log module 16-57

enabling 10-37

enabling audit trails

for guest user activities 7-11

enabling IDS signatures 3-46

Enabling Web login 3-49

enabling Web login 3-49

end user license agreementB-7to B-12

Ethernet bridging 9-156

Ethernet Switch

credentials 9-190

remove 9-192

Ethernet Switches

configure 9-212

Ethernet VLAN tagging guidelines 9-157

evaluation license

for controller 16-11

for MSE 16-13

event history 6-88, 10-27, 12-71

event notification 1-5

Events

Adhoc Rogue 6-128

details 6-115

overview 6-114

monitoring 6-124

overview 6-124

Pre Coverage Holes 6-129

Rogue Alarms 6-111

Rogue AP

details 6-112

Rogue APs 6-127

wIPS 6-129

working with 6-134

events

searching 2-42

exclude device list 16-92

excluded packets 5-94, 6-52

exclude switch trunk ports 16-92

exclude vendor list 16-92

executive summary report 15-116

Export Asset Information

location server 12-45

exporting a file 5-56

to change access point position 5-56, 5-57

export task list 16-43

extend to ground 19-2

extension license

for controller 16-11

for MSE 16-13

extracting task list 16-48

F

Factory Defaults

restoring 9-32

failover mechanism 16-6

Failover Priority 9-27

feature

of WCS license 16-9

feature license B-2

File Encryption

controller 9-83

file encryption template 11-45

filter

editing current auto provisioning 16-53

filtering

using to modify maps 5-98

filtering saved reports 15-12

filtering scheduled run results 15-10

firewall, configuring for WCS 3-38

Floor Areas

delete 5-53

edit 5-53

Floor Plan Editor 1-14

foreign access point interference

avoiding 11-101

foreign AP interference

avoiding 11-101

Frame type 3-47

friendly access point template 11-94

friendly AP

template 11-94

friendly rogue 11-90

friendly rogue access points 3-8

friendly rogue APs 2-27

FTP

turning on and off 16-82

G

General Properties

Location Server 12-20

general tab

home page 2-19

general templates

configuring 11-4

generating migration analysis report 9-165

geographical coordinates 19-1

Global AP Password

configuring 9-59

global credentials

configuring 9-154

Global Settings

Standard and Custom Signatures 9-108

Global settings

for standard and custom signatures 3-49

Global SSID Group

add 9-218

delete 9-219

edit 9-219

gold 11-34

gold queue 5-94, 6-53

Google Earth

adding launch points 19-7

Google Earth coordinates 19-2

Google Earth maps 19-1

Google KML or CSV

importing into WCS 19-5

GPS markers 5-32

grace period license

for controller 16-11

groups

for hybrid-REAP 13-14

for rogue access point rules 11-92

group setup window on ACS server 16-44

GUEST_USER_ADDED 14-51

GUEST_USER_AUTHENTICATED 14-52

guest account settings 16-71

guest accounts status report 15-89

guest association report 15-91

guest count report 15-92

guest reports 15-89

guest user

template 11-63

guest user account

scheduling 7-15

Guest user accounts

creating 7-11

guest user accounts

adding 7-13

creating 7-11

managing 7-13

guest user details

emailing 7-16

print 7-16

Guest Users

monitoring 6-16

guest users

currently logged 2-28

guest user sessions report 15-94

guest user templates 11-63

Guest WLAN

connecting 3-52

guidelines

for Ethernet VLAN tagging 9-157

guidelines for using the map editor 5-19

H

heater status 5-88, 6-50

heat map

described 5-52

Help Menu 1-13

help menu 2-30

hierarchy

of mesh network 5-96

Hierarchy of Mesh parent to child 5-99

hierarchy of mesh parent to child 5-99

High Throughput

802.11a/n 9-130

802.11b/g/n Parameters 9-140

high throughput

template 11-108

high throughput template

configuring 11-108

historical report type 15-1

History Parameters

location server 12-43

Home Page 2-18

customizing tabs 2-19

Home page

customizing content 2-25

customizing tabs 2-23

H-REAP AP Groups

configuring 9-80

H-REAP AP groups

configuring 11-41

configuring template 11-41

H-REAP configuration tab 11-42

H-REAP Group

auditing 9-83

H-REAP groups

auditing 13-16

H-REAP local switching 9-71

H-REAP Parameters 9-80

H-REAP Users 11-43

HTTP

turning on and off 16-82

Hybrid REAP

configuring 13-1

hybrid REAP

bandwidth restriction 9-71, 11-35, 13-3

hybrid REAP access point groups 13-12

hybrid-REAP groups 13-13

Hybrid REAP local switching 11-35

hysteresis 11-106

I

ID Certificate

configuring 9-102

identical audit status 5-91

IDS 3-41

configuring 3-41

IDS Sensor List

configuring 9-101

IDS sensors 3-41

IDS Signatures

configuring 9-106

download 9-36

IDS signatures 3-41

disabling 3-46

downloading 3-45

downloading from config group 8-27

enabling 3-46

uploading 3-44

images

downloading to autonomous access points 9-164

Import Asset Information

location server 12-44

importing a file 5-56

to change access point position 5-56, 5-57

importing coordinates

as CSV file 19-4

into Google Earth 19-2

importing Google KML or CSV into WCS 19-5

Import map 5-54

In/Out

condition type 12-65

information elements

Aironet 11-35

infrastructure MFP 3-39

ingress interface 9-66

Inspect Location Readiness 5-78

Inspect VoWLAN Readiness 5-79

installer

using to upgrade 4-16

installing a license B-4

installing WCS

for WLSE conversion C-2

insufficient memory 5-94, 6-52

interface group 11-19

Interferers

summary 6-72, 6-74

interferers

summary 9-194

inter-subnet roaming 8-4

Intrusion Detection Systems 3-41

intrusion detection systems 3-41

invalid association request 5-96, 6-54

invalid reassociation request 5-96, 6-55

inventory detail status 2-19

inventory reports 15-48, 15-78

inventory status 2-27

IOS access points

adding 9-161

adding by device information 9-162

IOSAP_DOWN 14-53

IOSAP_LINK_DOWN 14-52

IOSAP_LINK_UP 14-52

IOSAP_UP 14-53

IP connectivity diagnostic test 10-30

K

KEK

key encryption key 11-48

key wrap 11-48

KML file 19-2

L

LAG mode 11-6

Latest Network Audit Report 9-20

latitude 19-2

Layer 1 security solutions 3-2

Layer 2 11-25

Layer 2 security solutions 3-2

Layer 3 11-29

Layer 3 security solutions 3-2

Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-37

LBS authorization 11-68

template 11-68

LDAP Servers 9-87

LDAP servers 9-70

template 11-52

LEAP authentication

requirements 8-8

legacy syslog

template 11-136

legacy syslog template 11-136

license

backup and restore B-4

license agreementB-7to B-12

license installation B-4

license management 16-102

licenses B-1

license types B-1

licensing

on WLSE network management C-4

Lightweight AP Protocol Transport Mode 9-28

limitations for high reliability 16-95

Link Aggregation 9-30

link aggregation (LAG)

guidelines 13-4

link metric

adjusted 5-82

unadjusted 5-82

link SNR 5-82

link stats report 15-98

Load

access points 6-27

load 5-108

load balancing 9-114

Lobby Ambassador

account 7-21

creating account 7-21

Lobby ambassador 7-11

Lobby Ambassador Account

creating 7-21

editing 7-22

lobby ambassador defaults

setting 7-7

local authentication

for hybrid-REAP groups 13-14

Local EAP 9-94

General EAP-FAST Parameters 9-97

General Network Users Priority 9-97

General Parameters 9-94

Profiles 9-96

local EAP authorization 9-70

Local EAP check box 11-32

local EAP general

template 11-55

local EAP general template 11-55

local EAP profile template 11-56

Local Management Users

configuring 9-151

local management users

template 11-138

local management user template 11-138, 11-139

Local Net Users

configuring 9-89

local net users

template 11-62

local net users template 11-61

Local Password Policy 16-118

local switching

Hybrid REAP 11-35

Location

calibration 1-15

location servers 9-223

notifications 12-58

notification settings 12-59

notifications summary 12-58

synchronize servers 12-10

location appliance functionality 4-2

Location Appliances 1-15

location appliances

relationship with WCS Location 1-5

location change

condition type 12-65

location configuration

template 11-141

Location History

clients 10-39

location menu 2-30

location optimized monitor mode 9-169

Location Parameters

location server 12-53

location presence

assigning 5-31

Location Readiness 5-78

Location Server

active sessions 12-24

administration 12-20

advanced parameters 12-25

backup 12-35

export asset information 12-45

general properties 12-20

history parameters 12-43

import asset information 12-44

location parameters 12-53

logs 12-27

maintenance 12-35

NMSP parameters 12-22

notification parameters 12-56

restore 12-36

server events 12-32

WCS alarms 12-33

WCS events 12-33

Location server

adding 12-9

location server

automatic backup 12-36

backup historical data 12-35

configuration clearing 12-27

reboot hardware 12-26

Location Servers 9-223

location upgrade B-2

log analysis 10-26

logging 16-18

logging into the WCS user interface2-16to 2-18

logging options 16-56

logging the lobby ambassador activities 7-10

login.html 3-50

login disclaimer 16-72

login policies

template 11-65

log message levels 16-57

log modules

enabling 16-57

Logs

location server 12-27

LOMM 9-169

configuring access point radios 9-185

longitude 19-3

long preambles, enabling for SpectraLink NetLink phones 4-5

LWAPP

template

edit 11-151

templates 11-143

Transport Mode 9-28

LWAPP migration 9-161

LWAPP template

new 11-143

LWAPP uptime 2-27

M

MAC Filtering

configuring 9-91

MAC filtering 11-28

template 11-66

MAC filter template 11-66

MAC frequency 3-48

MAC information 3-48

MACK

message authenticator code keys 11-48

mail server configuration 16-73

Maintenance

location server 12-35

malformed neighbor packets 5-94, 6-52

malicious rogue 11-90

malicious rogue access points 3-5, 3-6

managed network

security index 3-5

management frame flood signatures 3-43

Management Frame Protection 3-39

management frame protection 9-73, 11-72

Management Frame Protection Summary

controllers

monitor 6-14

management interface 11-7

Management Parameters

configuring 9-145

management queue 5-95, 6-53

managing clients 10-1

managing controller licenses 16-101

managing current reports 15-9

managing MSE licenses 16-103

managing multiple WCSs 1-10

managing saved reports 15-11

managing virtual domains 18-7

managing WLAN schedules 9-76

mandatory data rates 11-101

manually disabled client

template for 11-69

Manually Disabled Clients

managing 9-98

manually disabled clients 2-20

Map Editor

general notes and guidelines 5-19

map editor

guidelines 5-19

guidelines for using 5-19

using to draw polygon areas 5-72

map editor functions 5-4

map properties

editing 5-28

maps

searching 2-44

using to monitor link stats 5-80

using to monitor mesh AP neighbors 5-85

map size 5-121

map view

updating 5-99

Menu Bar 1-11

menu bar 2-29

Mesh

monitoring health 5-88

statistics for AP 5-92, 6-51

mesh access point neighbors

monitoring 5-85

mesh access points

monitoring 5-83

mesh alarms

most recent 2-21

mesh configuration

template 11-129

mesh link statistics 5-80

monitoring 5-80

mesh neighbors 5-86

mesh network

monitoring using maps 5-80

mesh network hierarchy 5-96

mesh networks

background scanning 9-53

monitoring 5-80

Mesh Parameters 9-141

mesh parent changing AP 2-27

mesh parent-child hierarchical view 5-11

mesh reports 15-97

mesh tab

home page 2-21

mesh template

configuring 11-129

Mesh tree

viewing 5-96

mesh tree

viewing 5-96

message integrity check information element 11-72

metrics

in QoS 11-20

MFP 3-39, 9-73

for clients 3-40

MFP attacks 3-9

MFP client protection 11-38

MFP signature generation 11-38

MFP Summary

controllers

monitor 6-14

MFP templates 11-72

MIC IE 11-72

migration analysis

running 9-165

migration analysis report

generating 9-165

migration analysis summary

viewing 11-156

Migration Templates

Autonomous APs

edit 11-155

minimum RSSI 11-106

Mirror Mode 10-37

mirror mode 9-170

mismatched audit status 5-91

mobile announce messages 8-8

Mobility 12-1

Mobility Stats

monitor 6-17

service 12-1

mobility 8-1

Mobility Anchor Group Keep Alive Interval 9-30

mobility anchors 8-13, 9-77

Mobility Group

Prerequisites 9-51

Mobility Groups

configuring 9-50

Messaging 9-51

mobility groups 8-7

prerequisites8-8to 8-9

mobility groups, configuring 8-8

mobility scalability 8-12

Mobility Services 12-1

viewing 12-4

mobility services engine

deleting 12-6

Mobility Stats

monitor 6-17

modifying a migration template 11-157

modifying map displays 5-98

using filters 5-98

Monitor

Alarms 6-1

Events 6-124

Ports

overview 6-8

Rogue AP Rules 6-15

Monitor Access Points

details 6-34

edit view 6-25

load 6-27

radio type

802.11 MAC counters 6-48

on demand statistics 6-41

operational parameters 6-45

view alarms 6-49

view events 6-49

radio utilization 6-33

search 6-23

search results 6-24

Tx power and channel 6-33

Monitor Alarms

details 6-87

edit view 6-85

Rogue 3-20

Monitor APs

802.11 Counters 6-33

AP Profile Status 6-33

Coverage (RSSI) 6-30

Coverage (SNR) 6-30

details

CDP Neighbors 6-40

Current Associated Clients 6-40

general 6-34

interfaces 6-39

Dynamic Power Control 6-28

Interference 6-29

Noise 6-29

Radio

details 6-41

TSM 6-33

UpTime 6-30

Voice Statistics 6-31

Voice TSM Reports 6-32

Voice TSM Table 6-31

Monitor Chokepoints 6-67

Monitor Client

detecting APs

details 10-39

disable 10-36

location history 10-39

present map 10-38

recent map 10-37

remove 10-37

roam reason 10-38

v5 statistics 10-33

voice metrics 10-39

Monitor Controllers 6-1

802.11a/n parameters 6-19

802.11a/n RRM Grouping 6-20

802.11a/n RRM Groups 6-22

802.11b/g/n parameters 6-21

CLI Sessions 6-6

ports

general 6-8

spanning tree protocol 6-5

System

summary 6-4

WLANs 6-8

Monitor Events

Details 6-127

search 6-126

Monitoring

Guest Users 6-16

monitoring active sessions 7-6

monitoring channel width 6-55

monitoring mesh access point neighbors 5-85

using maps 5-85

monitoring mesh health 5-88, 6-55

monitoring mesh link statistics

using maps 5-80

monitoring mesh networks

using maps 5-80

monitoring neighboring channels 9-53

monitoring pre-coverage holes 6-62

monitoring rogue access point alarms 6-84

monitoring spectrum experts 9-193

monitor menu 2-29

monitor mode

location optimized 9-169

Monitor Spectrum Experts 6-71

Monitor Tags 6-64

most recent AP alarms 2-27

most recent audit alarms 17-21

most recent client alarms 10-6

most recent mesh alarms 2-21

most recent rogue adhocs 3-7

most recent security alarms 2-20, 2-28

MSE

adding 12-5

deleting 12-6

MSE authorization

template 11-68

MSE license information 16-13

MSE licenses

managing 16-103

multicast mobility mode 8-12

Multicast Mode

controller 9-62

Multiple Country Codes

setting 9-113

multiple country codes

configuring 8-16

multiple syslog

template 11-137

multiple syslog template 11-137

N

N+1 redundancy 8-5

NAC Out-of-Band Integration 9-43

NAC support 9-72

NAT 8-11

Navigator 1-10

netmask 11-81

NetStumbler signature 3-43

network address translation 8-11

Network Audit Report

latest 9-20

network design 5-109

network designs 12-10

network protection 3-41

Network Routes

configuring 9-49

Network Summary page 2-17

network summary reports 15-114

Network Time Protocol

configuring 9-53

network users priority

template 11-60

network utilization reports 15-125

new rogue access points report 15-153

new search 5-71

NMSP Parameters

location server 12-22

node hop count

worst 2-21

node hops 5-94, 6-53

nodes report 15-101

noise

avoiding non-802.11 types 11-101

avoid non-802.11 11-101

non-802.11 noise

avoiding 11-101

non-aggregated historical data 16-71

non-Cisco ACS server

for use with RADIUS 16-48

normal mode

for Ethernet port 9-158

Notification Parameters

location server 12-56

Notifications

location 12-58

Notification Settings

location 12-59

Notifications Summary

location 12-58

NTP configuration 9-53

NTP server template 11-9, 11-13

null probe response signatures 3-43

O

On Demand Statistics

access points 6-41

onstacle color coding 5-74

Operational Parameters

access points 6-45

OUI search 16-92

outdoor location

creating with Google Earth 19-1

overview

Cisco Wireless LAN Solution1-1to 1-2

WCS 1-2

P

packet error rate

worse 2-21

packet error rate link color 5-98

packet error statistics report 15-105

packet jitter 11-20

packet latency 11-20

packet loss 11-20

packet loss rate 11-21

packet queue statistics report 15-107

packet stats report 15-103

parent changes 5-94, 6-52

Passive Client 9-72

passthrough 11-30

PCI report 15-52

PEAP 11-58

peer-to-peer blocking 11-35

performance reports 15-119

permanent license

for controller 16-11

for MSE 16-13

placemarks

creating 19-3

placement of access points 5-54

planning mode 5-103

to calculate access point requirements 5-102

planning mode, calculating access point requirements 5-102

platinum 11-34

platinum queue 5-94, 6-53

PLR 11-21

POE status 5-91

policy manager solutions 3-2

polygon areas

drawing with map editor 5-72

poor neighbor SNR 5-94, 6-52

Port Parameters

configuring 9-144

Ports

Monitor

overview 6-8

monitor controllers 6-8

positioning access points 5-56

positioning chokepoints 5-56

positioning Wi-Fi TDOA receivers 5-56

power injector settings 9-172

power-over-ethernet status 5-91

pre-coverage holes

monitoring 6-62

Preferred Call 9-117

Prerequisites 2-1

Present Map

clients 10-38

print guest user details 7-16

probe cycle count 9-116

Profile

List 9-213

Profile editor 9-215

profile redirect diagnostic test 10-31

protection type 11-73

Q

QoS 11-33

QoS Profiles

configuring 9-56

QoS templates 11-16

queues

silver, gold, platinum, bronze, management 5-94, 6-53

quick search 2-34

Quiet time 3-48

R

Radio

access points

configuring 9-176

radio resource management 11-101

Radio Status

scheduling and viewing 9-187

radio status

scheduling 9-187

Radio Utilization

access points 6-33

RADIUS 16-126

RADIUS Accounting

controllers

monitor 6-13

RADIUS accounting servers

template 11-49

RADIUS accounting template 11-49

RADIUS and TACACS+ attributes

virtual domains 7-20, 18-10

RADIUS Authentication

controllers

monitor 6-12

RADIUS authentication template 11-46, 11-47

RADIUS Auth Servers

AAA RADIUS

Auth Servers 9-84

RADIUS fallback

template 11-51

RADIUS fallback mode 11-51

RADIUS servers 9-70

configuring 16-126

reachability status 9-193

Readiness

location 5-78

VoWLAN 5-79

reassociation request failures 5-95, 6-54

reassociation request success 5-96, 6-54

reassociation request timeouts 5-95, 6-54

reauthentication request failures 5-96, 6-54

reauthentication request success 5-96, 6-54

reauthentication request timeout 5-96, 6-54

rebooting config groups 8-25

Rebooting Controllers 9-7

recent adhoc rogue alarms 3-9

recent alarms 2-27, 2-28

recent coverage holes 2-19

Recent Map

clients 10-37

recent rogue adhoc alarm 2-20

recent rogue alarms 2-27

recent rogue AP alarms 2-20, 3-9

recovering the WCS password 4-22

recurrence

for report 15-5

refresh browser 5-109

refresh component icon 2-29

Refresh Config 9-17

refresh from network 5-108, 5-121

relative to ground 19-2

Remove APs 9-186

Remove Controllers 9-7

removing controllers from config group 8-22

removing templates from config group 8-23

report

running new 15-3

report launch pad 15-2

Reports

Rogue AP Events 15-157

reports

scheduled runs 15-9

reset AP now 9-174

Restore

location server 12-36

Restoring Factory Defaults 9-32

restoring WCS database

in high availability environment 4-14

restoring WCS database on Linux 4-13

retain WCS value 8-25

Retrieving UDI 6-59

RF calibration model, creating 4-6

RF Calibration Models

apply to maps 5-68

delete 5-69

RFID data collection 11-142

RF profile traps 11-134

RF update traps 11-134

Roaming

802.11b/g/n Parameters 9-139

roaming 8-1

roaming parameter

template 11-105

roaming parameters template

configuring 11-105

roaming time 11-20, 11-21

Roam Reason

clients 10-38

rogue access point events report 15-159

rogue access point rule groups 11-92

rogue access point rules

configuring a template 11-90

viewing or editing 9-190

rogue access points

friendly 3-8

malicious 3-6

monitoring 3-10

solutions for 3-3

unclassified 3-7

rogue access points report 15-159

rogue adhoc alarm 2-20

rogue adhocs

most recent 3-7

Rogue Alarm Events 6-111

Rogue AP

alarm details 6-96, 6-112

alarms 6-89

containment 6-110

location 6-110

malicious 6-95

Rules

monitor 6-15

tagging 6-110

rogue AP alarms 2-20

rogue AP detail summary 2-27

Rogue AP Events

report 15-157

rogue AP rule groups

template 11-92

Rogue AP Rules

configuring 9-105

details 6-16

rogue AP rules

template 11-90

Rogue APs

classification types 6-95

classifying 6-93

friendly 6-95

overview 6-88

unclassified 6-96

Rogue Client

details 6-101

rogue clients

searching 2-44

rogue detector 9-169

Rogue Devices

detecting 6-89

rogue location discovery protocol 11-89

Rogue Policies

configuring 9-104

rogue policies

template 11-89

template for 11-89

role criteria 11-156

root mode

changing from station role 9-165

routing state 5-93, 6-52

RRM

DCA

802.11b/g/n Parameters 9-135

Radio Grouping

802.11b/g/n Parameters 9-135

RRM DCA 9-123

RRM Intervals

802.11a/n 9-121

802.11b/g/n Parameters 9-134

RRM intervals 11-107

template 11-112

RRM interval template

configuring 11-108, 11-112

RRM Radio Grouping

802.11a/n 9-125

RRM threshold

template 11-111

RRM Thresholds

802.11b/g/n Parameters 9-133

RRM threshold template

configuring 11-111

RSSI legend 5-121

rules

for rogue access point 11-90

viewing or editing for rogue access points 9-190

Running a link test 6-58

running a new report 15-3

running a saved report 15-13

running migration analysis 9-165

RX neighbor requests 5-94, 6-52

RX neighbor responses 5-94, 6-52

S

Save Config to Flash 9-17

saved report

running 15-13

saved reports

editing 15-13

filtering 15-12

managing 15-11

saved searches 2-46, 5-71

scalability parameters 8-12

scan cycle period threshold 9-116

scan threshold 11-106

Scheduled Configuration 9-203

Schedule details 9-166

scheduled run details

editing 15-11

scheduled run results 15-9

filtering 15-10

Scheduled Task

AP status report 9-204

schedules

managing for WLANs 9-76

scheduling guest user account 7-15

scheduling radio status 9-187

Search

access points 6-23

controller results 6-2

Events 6-126

overview 1-14

search feature 2-34

using for troubleshooting 10-22

searching clients 2-40

searching controller licenses 2-46

searching events 2-42

searching maps 2-44

searching rogue clients 2-44

searching SE-detected interferers 2-42

searching shunned clients 2-45

searching tags 2-45

searching Wi-Fi TDOA receivers 2-43

search results

configuring 2-47

secondary WCS operation 16-6

Security

AAA

LDAP servers 9-87

TACACS+ Servers 9-89

Web Auth Configuration 9-92

AAA MAC Filtering 9-91

Local EAP 9-94

security alarms

most recent 2-20

security color range 3-5

security configurations

monitoring 6-116

security index 3-5

security mesh statistics 5-95, 6-53

Security Reports

Rogue AP Events 15-157

security solutions3-1to 3-37

security summary 15-162

security tab

home page 2-20

interpreting 3-4

security thermometer 3-5

SE-detected interferers

searching 2-42

sending mobile announce messages 8-8

sensors

viewing IDS types 3-41

Server Events

location servers 12-32

status 12-32

set sorting buttons 15-8

Set Time

controller 9-33

setting AP failover 9-154

Setting Controller Time and Date 9-33

setting multiple country codes 9-83

shunned clients

searching 2-44

sidebar area 2-32

signature attacks summary 2-20

silver 11-34

silver queue 5-94, 6-53

Sniffer 11-144

Sniffer Feature 9-111

sniffer mode 9-169

SNMP authentication 11-133

SNMP Community

controller templates 11-8

SNR definition 5-98

SNR down 5-82

SNR link

worst 2-21

SNR UP 5-82

SNR up 5-82

software

downloading config groups to controllers 8-26

software, updating 4-3

Spanning Tree Protocol

configuring 9-50

monitor controllers 6-5

SpectraLink NetLink phones, enabling long preambles 4-5

spectrum expert

adding 9-193

spectrum expert details 9-195

Spectrum Experts 6-71

details 6-73

Interferers 6-72, 6-74

summary 6-72

spectrum experts

configuring 9-193

monitoring 9-193

summary 9-194

SSID Group

add 9-220

add from global list 9-220

add global 9-218

delete 9-221

delete global 9-219

edit 9-221

edit global 9-219

SSID Group List

wIPS 9-218

SSID group list

global 9-218

SSID groups

wIPS 9-220

Standalone Building

adding floor plan 5-46

Standard and Custom Signatures

Global Settings 9-108

Standard signature 3-47

Standard Signature Parameters

configuring 9-106

standard signatures 3-42

starting WCS

on Linux 2-16

on Windows 2-15

static WEP 9-67

Static WEP-802.1X 9-67

station role

changing to root mode 9-165

status, checking 4-7

Status Report

scheduled task 9-206

status schedules

managing for WLANs 9-76

stopping WCS

on Linux 4-9

on Windows 4-7

stranded APs report 15-109

supplicant credentials

for AP 802.1X 11-11

supported Cisco WLSE management stations C-2

supported data rates 11-101

Switch

credentials 9-190

remove 9-192

switch

configuring for hybrid REAP 13-5

Switches

ethernet 9-212

Switch Port Tracing

Details 16-93

Troubleshooting 16-93

symmetric mobility tunneling 11-7

symmetric tunneling 8-5

Synchronize servers

location 12-10

Syslog

configuring individual controller 9-149

Individual controller 9-149

multiple servers 9-149

syslog templates 11-136, 11-137

System

General Properties 9-24

System Commands

controller 9-30

System Interfaces

Controllers 9-37

System parameters

controllers

monitor 6-3

System requirements 2-2

T

TACACS+ 16-124

TACACS+ server

configuring a template for 11-54

template 11-54

tagged packets 9-160

Tags 6-64

tags

searching 2-45

Task

configuration backup 16-22

Telnet SSH

template 11-132

Telnet SSH Parameters

configuring 9-148

Telnet SSH templates 11-135

temperature 5-88, 6-50

template

configuring for rogue AP rules 11-90

template for configuring network user credentials 11-60

Template Launch Pad

overview 11-1

Templates

AP Configuration 11-143

delete 11-2

test analysis tab 10-30

TFTP

turning on and off 16-82

TFTP details 11-157

TFTP Server

adding 9-223

TFTP server 3-44

TFTP Servers

configure 9-222

delete 9-223

thermometer color range 3-5

threats

access points 3-9

throughput report 15-38

tilt 19-2

Timer Setting

AP 9-63

tools menu 2-30

top APs by client count 10-3

total APs not assigned to maps 2-19

total interferer count 9-195

total mismatched controllers 17-21

TPC 11-115, 11-128

trace 16-60

traffic indicator message 11-100

Traffic Stream Metrics

access points 6-33

traffic stream metrics QoS status 11-21

traffic stream metrics QoS template 11-20

traffic stream metrics report 15-127

transition time 11-107

Transport Mode

LWAPP 9-28

transport types 12-67

trap

802.11 security 11-134

Trap Control

configuring 9-146

trap control

template 11-132

trap control templates 11-132

trap receiver

template 11-131

Trap Receivers

configuring 9-145

trap receiver template 11-131

traps

AAA 11-134

access point 11-134

client related 11-133

RF profile 11-134

RF update 11-134

unsupported 14-63

traps added in 2.1 14-22

traps added in 2.2 14-26

traps added in 3.0 14-29

traps added in 3.1 14-31

traps added in 3.2 14-35

traps added in 4.0 14-36

traps added in 4.0.96.0 14-42

traps added in 4.1 14-44, 14-51

traps added in release 6.0 14-59

traps added in release 7.0 14-64

trend report type 15-1

Troubleshooting

Switch Port Tracing 16-93

troubleshooting A-1, D-1

using logging options 16-60

troubleshooting voice RF coverage 5-108

trunk mode 9-158

trusted AP policies

template for 11-90

trusted AP policies template 11-90

TSM

access points 6-33

tunneling 8-5

TX neighbor requests 5-94, 6-52

TX neighbor responses 5-94, 6-52

Tx Power and Channel

access points 6-33

Tx power and channel report 15-130

type

of WCS license 16-10

U

UDI

retrieving on controllers and access points 6-59

unadjusted link metric 5-82

unclassified rogue 11-90

unclassified rogue access points 3-7

unclassified rogue APs 2-28

understanding virtual domains 18-10

uninstalling WCS

on Linux 4-15

on Windows 4-14

unique clients report 15-44

unique device identifier 6-59

unknown association requests 5-96, 6-55

unknown reassociation request 5-96, 6-55

untagged packets 9-160

Update map view 5-99

update map view 5-99

updating system software 4-3

upgrade settings

for controller 16-69

upgrading autonomous access points 9-164

upgrading the network 4-21

upgrading to Linux 4

during WLSE conversion C-3

upgrading WCS

in high availability environment 4-21

on Linux 4-20

on Windows 4-20

Uploading IDS signatures 3-44

uploading IDS signatures 3-44

Uploading Signature Files 9-107

upstream delay 11-21

upstream packet loss rate 11-21

UpTime

access points 6-30

uptime reports 15-85

User accounts

for guest 7-11

user accounts

for guest 7-11

user authentication priority template

configuring 11-139

user credential retrieval priority 11-60

user details

emailing 7-16

printing 7-16

User Interface 2-29

Menu Bar 1-11

User Login Policies

configuring 9-98

user login policies

configuring a template 11-65

template 11-65

User Preferences 7-1, 16-7

user preferences 16-99

User Roles

configuring 9-58

Users 16-118

using Edit View

for alarms 6-84

using filtering 5-82, 5-98

using logging

for troubleshooting 16-60

using maps

to monitor mesh AP neighbors 5-85

to monitor mesh link statistics 5-80

using maps to monitor mesh networks 5-80

using planning mode 5-72

using search 6-85

using template

ACL 11-87

for friendly access point 11-94

using templates

802.11b/g RRM interval 11-108, 11-112

802.11b/g RRM threshold 11-111

access point authentication & MFP 11-72

access point authorization 11-68

file encryption 11-45

for legacy syslog 11-136

for multiple syslog 11-137

guest users 11-63

local management user 11-138, 11-139

local net users 11-61

MAC filter 11-66

NTP server 11-9, 11-13

password policy 11-78

QoS 11-16

RADIUS accounting 11-49

RADIUS authentication 11-46

syslog 11-136, 11-137

Telnet SSH 11-135

traffic stream metrics QoS 11-20

trap control 11-132

trap receiver 11-131

web authentication 11-73

WLAN 11-22

using the installer to upgrade 4-16

utilization reports 15-86

V

V5 client statistics 15-47

V5 Statistics

client 10-33

Vendor CA Certificates

downloads 9-16

vendor CA certificates

downloading 4-5

Vendor Device Certificate

downloads 9-15

vendor device certificates

downloading 4-4

vendor search 16-92

View 2-29

View Alarms

access points 6-49

View Events

access points 6-49

view history 10-4

view in chart icon 2-29

Viewing

Mobility Services 12-4

viewing alarm details 6-84

viewing audit status

for access points 9-188

viewing autonomous access points 9-163

viewing clients

identified as WGBs 6-58

viewing Google Earth maps 6-55, 19-6

Viewing Mesh tree 5-89, 6-50

view in grid icon 2-29

Viewing shunned clients 3-41

viewing shunned clients 3-41

Viewing Templates Applied to a Controller 9-18

viewing the audit trail 7-10

viewing the migration analysis 11-156

view list 10-23

virtual domains 18-1

assigning 7-19, 16-121

attributes 7-20, 18-10

creating 18-2

hierarchy 18-4

managing 18-7

understanding 18-10

VLAN tagging 9-156

Voice

802.11b/g/n Controller Templates 9-118, 11-98, 11-102, 11-119

Voice Metrics

clients 10-39

Voice-over-Internet Protocol

snooping 9-72

Voice RF Coverage issues 5-80

Voice Statistics

access points 6-31

voice statistics 15-136

Voice TSM Reports

access points 6-32

Voice TSM Table

access points 6-31

VoIP calls graph 15-132

VoIP calls table 15-134

VoIP snooping 9-72

VoWLAN Readiness 5-79

W

WCS

checking status

on Linux 4-7

on Windows 4-6

installing 2-6

overview 1-2

servers supported 1-3

starting

on Linux 2-16

on Windows 2-15

stopping

on Linux 4-9

on Windows 4-7

uninstalling

on Linux 4-15

on Windows 4-14

upgrading

on Linux 4-20

on Windows 4-20

versions1-3to 1-7

WCS_EMAIL_FAILURE 14-53

WCS-ADV-SI-SE-10 B-2

WCS Alarm

status 12-33

WCS Alarms

location servers 12-33

WCS Base, described 1-4, 1-7

WCS controller deployment

from WLSE autonomous C-1

WCS database

backing up

on Linux 4-11

on Windows 4-10

restoring

on Linux 4-13

on Windows 4-11

restoring in high availability environment 4-14

scheduling automatic backups 4-9

WCS Events

location servers 12-33

status 12-33

WCS guest operations report 15-95

WCS home 2-17

WCS Home Page 2-18

WCS Home page

customizing content 2-25

customizing tabs 2-23

WCS licenses B-1

WCS Location

described1-4to 1-7

relationship with Cisco location appliances 1-5

WCS Location Calibration 1-15

WCS Navigator 1-10

WCS on WLSE

licensing C-7

WCS password

recovering 4-22

WCS user accounts

adding 7-2

changing passwords 7-5

deleting 7-4

WCS user interface 7-12

described 1-3, 1-11

logging into2-16to 2-18

Web Admin

configuring 9-149

Web Admin Certficate

downloading 9-35

Web Auth Certificate

configuring 9-103

Web Auth Configuration 9-92

web authentication

template 11-73

web authentication template 11-73

web authentication type 11-75

Web authentication types 3-50

web auth security A-3

web login

enabling 3-49

web policy 9-69

Wellenreiter signature 3-44

WGB mode 10-13

WGBs

viewing those clients 6-58

WiFi TDOA Receivers

adding 9-201

configure 9-200

edit 9-203

remove 9-203

tag location 9-200

Wi-Fi TDOA receivers

positiioning 5-56

searching 2-43

wIPS 12-1

planning and configuring 12-76

Profile

add 9-214

Profile Editor 9-215

Profile List 9-213

SSID Group List 9-218

wIPS Alarms

details 6-118

monitoring 6-117

wIPS Profile

apply 9-217

delete 9-217

wIPS Profiles

add 9-214

configure 9-212

Wired Guest Access

configuring 9-45

Wireless Management 9-30

Wireless Protection Policies

configuring 9-103

WLAN

adding 9-74

deleting 9-75

WLAN AP groups 11-38

WLAN details

viewing 9-65

WLANs

configuring 9-64

monitor 6-8

web auth security A-3

WLAN status schedules

managing 9-76

WLAN templates 11-22

WLSE autonomous deployment conversion C-1

WLSE management stations C-2

WLSE upgrade B-2

WLSE upgrade license C-7

WMM parameters 9-70

WMM policy 11-34

Work Group Bridge mode 10-13

work group bridge mode 9-164

worst node hop count 2-21

worst node hops report 15-111

worst packet error rate 2-21

worst SNR link 2-21

WPA+WPA2 9-68

Z

zoom in or out 5-121