Table Of Contents
A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -
Index
A
access point creating and configuring VLANs on4-11
Access Point Radio Port page13-9
accounting on RADIUS server9-11
activity timeout7-18, 9-6
administrator authorization8-32
Aironet extensions3-18
antenna gainsB-3
antennas 3-13
Apply button2-3
AP Radio Advanced page3-16
AP Radio Hardware page3-9
AP Radio Identification page3-7
assigning network ports9-9
associations allowed, more than 20 workgroup bridges3-18
Association table
Association Table Advanced page7-15
Association Table page9-2
Station page9-3
authentication server
Authentication Server Setup page8-15
backup servers8-31
EAP8-4
port setting8-17
shared secret8-17
authentication types
combining MAC-based and EAP8-25
LEAP8-17
MAC-based8-21
Network-EAP8-3
open8-5
shared key8-6
summary of settings8-27
B
backup authentication servers8-31
basic settings
configuration server protocol3-3
default gateway3-3
ensure compatibility with3-6
IP address3-3
IP subnet mask3-3
optimize radio network for3-5
role in radio network3-4
SNMP admin. community3-6
SSID3-4, 3-8, 3-10
system name3-3
baud rate2-5
beacons, period and rate3-12
bit-flip attack8-3
blinking top panel indicators13-28
boot block version13-32
BOOTP protocol7-5
BOOTP server timeout7-5
Boot Server Setup page7-4
broadcast SSID3-10
broadcast WEP key rotation8-13
browsing to network devices9-2
C
Cancel button2-3
carrier test13-3
centralized administrator authentication8-35
assigning RADIUS or TACACS servers8-36
authorization parameters8-38
examples of8-38
procedure for configuring8-35
system flow notes8-37
channel
identifiers, center frequenciesB-2
overlap3-12
restrict searched channels3-13
search for less-congested channel3-13
checkstack command13-18
China regulatory domainB-2
Cisco Secure ACS
enabling EAP8-18
setting session-based WEP key timeout8-19
CLI
auto-apply2-7
common functions2-6
diagnostics13-14
terminal emulator settings2-4
client devices
browsing to9-2
deauthenticating9-7
disassociating9-7
EAP settings8-17
in network map2-4
Station page information9-3
cold restart10-14
combining EAP and MAC-based authentication8-25
configuration
distributing the configuration10-9
downloading the configuration10-11
resetting the configuration10-13
System Configuration Setup page10-10
uploading the configuration10-11
configuration server protocol3-3
Console/Telnet Setup page11-4
D
Database Query page, gets and sets11-3
data rate, radio3-11
default formatC-2
defined11-5
DHCP
class identifier7-7
lease duration7-6
minimum lease duration7-6
multiple-offer timeout7-5
diagnostic pages
AP Radio Port page13-9
Ethernet Port page13-7
Event Log page13-12
Network Ports page13-5
packet tracing13-23
Radio Diagnostics page13-2
Disallow Infrastructure Stations3-18
distribute configuration10-9
distribute firmware10-7
limit distributions10-9
diversity, antenna3-13
DNS server7-9
draft of 802.1x protocol8-16
DTIM3-12
E
EAP authentication
combining with MAC-based authentication8-25
overview8-3
setting up in Cisco Secure ACS8-18
setting up on the access point8-15
setting WEP key timeout8-19
EIRP, maximumB-3to B-4
encryption. See WEP
ensure compatibility with3-6
Error MessagesC-1
Ethernet configuration
advanced settings3-26
hardware settings3-23
identity settings3-22
speed3-24
Ethernet encapsulation type3-19
Ethernet indicator13-27
Ethernet Port page13-7
Event log messagesC-1
Cisco Emblem formatC-2
message descriptionsC-4
message formatsC-2
statuses and reasonsC-29
event log messagesC-2
Event Log page13-12
Event notification
Event Display Setup page7-18
Event Handling Setup page7-20
Express Setup page3-2
extended statistics7-17
F
filters
ISO numeric designators for protocolsA-1
MAC address filtering5-6
protocol filtering5-2
protocol filter listsA-1
find an access point's physical location13-28
firmware
distributing to other Access Points10-7
updating to a new version10-2
flow control2-5
fragment threshold3-12
frequenciesB-2
FTP7-10
G
gateway3-3
H
help, setting up7-7
hexadecimal digits8-8
Home button2-2
hops9-5
Hot Standby mode12-4
HTTP Port7-8
HyperTerminal2-7
I
initialization vector8-12
IP subnet mask3-3
ISO designators for protocolsA-1
Israel regulatory domainB-2
J
Japan
power levels and antenna gainB-4
regulatory domainB-2
K
key features1-2
key hashing, WEP8-12
Kilomicroseconds, in beacon period3-12
L
LEAP
enabling on a repeater access point8-19
with Network-EAP setting8-14
LED indicators
Ethernet13-27
locate unit by flashing LEDs13-28
radio traffic13-28
status13-27
limiting distributions10-9
link test9-6
load balancing3-18
locate unit by flashing LEDs13-28
logs13-12
M
MAC address3-3
MAC address filters5-6
MAC-based authentication8-21
combining with EAP8-25
setting up in Cisco Secure ACS8-26
map windows2-3
memory, conserving7-17
memory use diagnostics13-21
Mexico, regulatory domainB-2
MIC8-10
monitored access point12-4
multicast packets3-17
disallowing5-4
N
name server7-9
NAS, adding and configuring8-18
Native VLAN
configuration4-6
native VLAN
creating4-12
Network-EAP8-3
network infrastructure, classify workgroup bridges as3-18
network map window2-4
Network Ports page13-5
North America and ANZ regulatory domainB-2
O
OK button2-3
optimize radio network for3-5
P
packet tracing13-23
parity2-5
password reset13-31
pings9-6
ports, assigning to MAC addresses9-9
power level
maximumB-3to B-4
power level setting3-11
preamble3-21
primary port3-7
protocol filters
enabling filters5-6
forward or block5-5
list of available protocolsA-1
priorities5-5
time to live setting5-4
proxy Mobile IP6-1
authentication server page explained6-13
components of6-7
configuring6-19
configuring on a wired LAN6-19
configuring security associations on a CiscoSecure ACS server6-23
general page explained6-12
how it works6-8
local SA bindings link6-15
security6-11
settings on the authenticator configuration page6-14
settings on the local SA bindings page6-15
settings on the statistics page6-16
settings on the subnet map table page6-18
setup page explained6-11
statistics6-16
understanding6-2
view subnet map table6-18
PSPF7-18
Q
QoS configuration5-10
entering information for5-10
example5-18
Generate QBSS Element5-11
Send IGMP General Query5-12
settings on QoS setup page5-11
Traffic Category5-12
Use Symbol Extensions5-12
Quality of Service
defined1-3
R
radio
carrier test13-3
radio cell role3-17
radio configuration
advanced settings3-15
hardware settings3-9
identity settings3-6
primary port3-7
radio indicator13-28
radio modulation3-21
radio power level3-11
RADIUS-based VLAN access control4-7
RADIUS server
backup servers8-31
shared secret8-17
wireless network accounting9-11
receive and transmit3-13
receive antenna3-13
regulatory
domainsB-2
regulatory domainsB-2
related publications, obtainingxvii
repeater
chain of access points12-2
setting up a repeater12-2
setting up as a LEAP Client8-19
specified access points3-21
resetting to the default configuration13-31
restarts, cold and warm10-14
restore defaults2-3
restrict searched channels3-13
roaming1-3
rogue AP
alert timeout for7-17
role in radio network3-4
root unit3-4
routing setup7-11
RS-232 serial port2-4
RTS retries and threshold3-12
S
search for less-congested channel
restrict searched channels3-13
Secure Shell11-5
Secure Shell,using11-5
security
Cisco Secure ACS8-18
overview8-2
Security Setup page8-33
user manager8-32
serial cable2-4
server setup
boot server7-4
FTP7-10
name server7-9
routing7-11
time server7-2
web server7-7
session-based WEP key, timeout value8-19
severity levels7-17
shared key8-6
SNMP
Admin. community3-6
Database Query page11-3
SNMP Setup page11-2
supported MIBs2-8
using to set WEP8-10
Speed setting3-24
SSH11-5
SSID3-4
primary and secondary4-7
SSID for use by Infrastructure Stations3-18
standby mode12-4
Station pages9-3
statistics9-7
status indicator13-27
stop bits2-5
system name3-3
T
Telnet interface
enabling Telnet11-5
setup page11-4
temporal key integrity protocol3-20
terminal emulator2-4
TFTP7-11
timeout per device class setting7-18
timeout value for session-based WEP keys8-19
time server
GMT offset7-3
manually set date and time7-3
TKIP8-12
top panel indicators13-27
tracing packets13-23
transmit antenna3-13
transmit power3-11
U
unicast packets, filtering5-9
updating firmware10-2
user management
capabilities8-34
creating list of authorized users8-33
user information8-33
using11-5
V
vendor class identifier7-7
VLAN configuration
802.1Q Encapsulation Mode4-3
broadcast domain segmentation4-5
creating and configuring on access point4-11
creating and configuring SSIDs4-16
creating native VLAN4-12
creating SSID for infrastructure devices4-21
enabling VLAN (802.1Q) tagging4-19
entering information4-2
example of4-9
Existing VLANs4-4
identifying the native VLAN4-19
Maximum Number of Enabled VLAN IDs4-4
native VLAN configuration4-6
Native VLAN ID4-4
obtaining and recording setup information4-11
Optionally allow Encrypted packets on the unencrypted VLAN4-4
primary and secondary SSIDs4-7
rules and guidelines for4-21
security policy4-4
settings on VLAN setup page4-2
Single VLAN ID which allows Unencrypted packets4-4
using configuration screens4-11
VLAN (802.1Q) Tagging4-3
VLAN ID4-4
VLAN Name4-4
VLANs
creating and configuring on access point4-11
creating and configuring SSIDs for4-16
creating native VLAN4-12
creating SSID for Infrastructure devices4-21
criteria for wireless deployment4-8
deployment example4-9
guidelines for deploying wireless4-8
Summary of rules for deployment of4-21
using configuration screens4-11
VLAN support
defined1-4
W
warm restart10-14
Web-based interface
common buttons2-2
compatible browsers2-2
Web server7-7
WEP
broadcast key rotation8-13
full encryption8-9
key example8-9
key hashing8-12
key size8-8
optional8-9
overview8-2
session key timeout8-19
setting with SNMP8-10
transmit key8-8
with EAP8-3
Windows XP, using EAP with8-16
workgroup bridges, allowing more than 20 to associate3-18
World mode3-10