The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Numerics
802.1X
authentication types
in ACU 4-16
defined 4-16
A
configuration file 1-8
configuration tabs 1-7
file menu 1-7
global settings 3-1
Gobal Settings tab 3-2
help 1-8
obtaining software 1-3
operating systems supported 1-2
overview 1-2
security options 1-8
access point
reporting those that fail LEAP authentication 4-19, 4-21
security settings 4-20 to 4-22
ad hoc network
selecting in ACAU 4-8
advanced ad hoc parameters
described 4-3
advanced infrastructure parameters
described 4-3
Aironet Desktop Utility (ADU)
Properties screens, overview 4-3
Allow Association to Mixed Cells parameter 4-13 to 4-14, 4-15
antenna
gains
IEEE 802.11a B-4
audience viii
authentication
process 4-17
auto profile selection
including a profile in 4-33 to 4-34
prioritizing profiles 4-34
restrictions 4-33
B
broadcast key rotation
described 4-20
setting on client and access point 4-22
broadcast SSIDs 4-4
C
Canadian compliance statement A-3
Caution, defined ix
channels, supported by regulatory domains
IEEE 802.11a B-2
IEEE 802.11b B-3
CiscoAdminConfig.dat file 2-4, 3-10
Client Name parameter 4-4
creating 2-2
modifying 2-4
retrieving from registry 2-8
configuration tabs 1-7
configuring settings 3-8 to 3-10
Constantly Awake Mode (CAM) 4-7
conventions ix
D
declarations of conformity
European community, Switzerland, Norway, Iceland, and Liechtenstein A-3
FCC A-2
RF exposure A-7
documentation
additonal publications and information xii
how to obtain ix
ordering x
document organization viii
domain name
specifying for saved user name and password 4-26
dynamic WEP keys, overview 4-16 to 4-17
E
EAP authentication
EAP-Cisco Wireless
EAP-TLS authentication
enabling
F
Fast PSP 4-7
fast reassociation
described 4-18
setting on client and access point 4-21
FCC
declaration of conformity statement A-2
File menu
contents of 1-7
frequency
G
Global Settings Tab 3-2
H
host-based EAP authentication
requirements 4-26
I
including in auto profile selection 2-7
infrastructure network
selecting in ACAU 4-8
J
Japan, guidelines for operating client adapters A-7 to A-8
L
LEAP authentication
requirements 4-24
setting on client and access point 4-20
LEAP Authentication Timeout Value parameter 4-26
long radio headers, using 4-8
M
Max Power Savings
Max PSP 4-7
message integrity check (MIC)
described 4-19
setting on client and access point 4-22
N
network
security parameters
Network Security Type parameter 4-22, 4-23
Network Type parameter 4-8
No Network Connection Unless User Is Logged In parameter 4-26
Note, defined ix
P
PEAP authentication
described 4-17
enabling
RADIUS servers supported 4-17
setting on client and access point 4-21
peer-to-peer network 4-8
power level
maximum B-4 to ??, B-5 to ??
including in auto profile selection 2-7
profile management settings 3-7
Profile Manager
ACAU menu option 4-2
auto profile selection feature 4-33
exporting a profile 2-6
importing a profile 2-5
overview 4-2
screen
profiles
importing and exporting 2-5
Protected EAP
R
RADIUS servers
additional information 4-17
defined 4-16
range 4-6
registry 2-8
reading a file from 2-8
domains
IEEE 802.11a B-2
IEEE 802.11b B-3
related publications ix
removing 2-5
ACAU software 1-8
retrieving configuration file from 2-8
RF network parameters
described 4-5
S
saving and retrieving 3-10
security features
overview 4-15 to ??
Security paramters
setting 4-13
Setup Settings 3-4
short radio headers
using 4-8
Smart Card or other Certificate Properties screen 4-31
SSID1 parameter 4-4
SSID2 parameter 4-4
static WEP
with open authentication, setting on client and access point 4-20
with shared key authentication, setting on client and access point 4-20
static WEP keys
guidelines for entering
in ACU 4-23
overview 4-16
overwriting 4-23
selecting transmit key 4-23
size of 4-23
system parameters
described 4-3
T
Taiwan, administrative rules for client adapters A-9
technical assistance x
Technical Assistance Center xi
Temporal Key Integrity Protocol (TKIP)
described 4-20
transmit key 4-23
U
Upgrading ACAU software 1-5
user settings 3-6
W
WEP
keys
additional security features 4-19 to ??
defined 4-15
size of 4-15
types of 4-15
WEP Key Entry Method parameter 4-22
WEP key hashing 4-20