Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

802.11b/g/n Parameters Controller Templates 4-54

802.11b/g RRM interval template 4-51

802.11b/g RRM threshold templates 4-50

802.11h template

configuring 4-49

802.11 security trap 4-70

802.1X supplicant credentials 4-13

A

AAA override 21-11

AAA traps 4-69

access control list template 4-35

access control list templates 4-32

access point

friendly 4-28

access point load

avoiding 4-43

access points, adding to maps9-11to 9-13

access point traps 4-69

ACL IP group details 4-33

ACL Protocol Groups

configuring 4-37

ACL template 4-35

configuring 4-35

adaptive scan threshold 4-48

adding

users 19-2

Aironet IE 21-13

alarms

severity 14-3

status 14-3

alarm severity

configuring 14-7

anonymous provisioning 21-27

AP load

avoiding 4-43

applying CLI commands 4-72

AP policies template 4-26

AP Username Password Controller Templates 4-12

assigning location presence 9-4

auto key generation 21-20

automatic backups, scheduling 18-9

automatic client exclusion 21-14

avoid access point load 4-43

avoid Cisco AP load 4-43

avoid foreign AP interference 4-43

avoid non-802.11 noise 4-43

B

background scanning

on mesh configuration 4-67

on templates 4-67

bronze 21-12

buildings

adding to NCS database 9-4

C

calibrating client 4-73

CIDR notation 4-33

Cisco AP load

avoiding 4-43

Cisco Prime NCS (WAN)

about 1-1

civic address 9-4

CLI commands

applying to template 4-72

client

calibrating 4-73

client exclusion 21-14

happening automatically 21-14

client related traps 4-69

color coding

of obstacles 9-22

Configure NAT for IP Address Conservation 4-87

Configuring

ACL Protocol Groups 4-37

configuring a client exclusion policy template 4-28

configuring a CPU ACL template 4-35

configuring a high throughput template 4-49

configuring a local EAP general template 4-24

configuring a local EAP profile template 4-24

configuring a manually disabled client template 4-32

configuring a mesh template 4-67

configuring an 802.11h template 4-49

configuring an EAP-FAST template 4-25

configuring an RRM interval template 4-51

configuring an RRM threshold template 4-49

configuring a policy name template 4-42

configuring a roaming parameters template 4-47

configuring a TACACS+ server template 4-22

configuring a trusted AP policies template 4-26

configuring a user authentication priority template 4-72

configuring a user login policies template 4-31

configuring EDCA parameters

through a template 4-47

configuring FlexConnect AP groups 4-18

configuring search results 20-7

configuring template

ACL 4-32

for rogue AP rule groups 4-28

configuring templates

802.11b/g RRM interval 4-51

access point authentication and MFP 4-26

file encryption 4-30

known rogue access point 4-49

local management user 4-71

MAC filter 4-31

RADIUS accounting 4-22

RADIUS authentication 4-21

syslog 4-70

Telnet SSH 4-70

traffic stream metrics QoS 4-15

trap control 4-68

WLAN 4-16

Controller Templates

802.11b/g/n Parameters 4-54

AP Username Password 4-12

SNMP Community 4-10

Voice

802.11b/g/n 4-40, 4-45, 4-57

D

data collection

for RFID tag 4-73

Deploying DMVPN Template 12-1

Deploying GETVPN Template 4-82

DHCP server

overriding 21-16

DMVPN 4-92

DMVPN Template 4-78

downstream delay 4-15

downstream packet loss rate 4-15

drawing polygon areas

using map editor 9-21

DTIM 4-43

Dynamic Multipoint VPN 4-92

E

EAP-FAST template 4-25

EDCA parameters

configuring through a template 4-47

edit location presence information 9-4

Edit View

general 20-7

event

severity 14-3

F

file encryption template 4-30

FlexConnect

bandwidth restriction 21-13

FlexConnect AP groups

configuring 4-19

FlexConnect configuration tab 21-20

FlexConnect local switching 21-13

foreign access point interference

avoiding 4-43

foreign AP interference

avoiding 4-43

friendly access point template 4-28

friendly rogue 4-27

G

GET VPN Group Member Template 4-79

GET VPN Key Server Template 4-81

gold 21-12

groups

for rogue access point rules 4-28

guidelines for using the map editor 9-17

H

heat map

described 9-13

high throughput template

configuring 4-49

hysteresis 4-48

I

information elements

Aironet 21-13

interface components

dashlet 20-2

filters 20-2

global toolbar 20-1

quick view 20-3

sub-menus 20-2

tables 20-3

interface group 4-14

K

KEK

key encryption key 21-22

key wrap 21-22

L

LAG mode 21-2

Learn Client IP Address 21-13

legacy syslog template 4-70

Local EAP check box 21-11

local EAP profile template 4-24

local management user template 4-71, 4-72

local switching

FlexConnect 21-13

location presence

assigning 9-4

M

MACK

message authenticator code keys 21-22

malicious rogue 4-27

management interface 21-3

managing

faults 14-1

licenses 18-12

Managing Interface 4-85

Managing Interfaces 4-91

mandatory data rates 4-44

manually disabled client

template for 4-32

map editor

guidelines 9-17

guidelines for using 9-17

using to draw polygon areas 9-21

map editor functions 9-17

mesh template

configuring 4-67

metrics

in QoS 4-15

MFP client protection 21-16

minimum RSSI 4-48

multiple syslog template 4-71

N

NAT44 Rule 4-88

NAT Inside and Outside Addresses 4-87

NAT IP Pools 4-87

NCS database

scheduling automatic backups 18-9

netmask 4-33

noise

avoiding non-802.11 types 4-43

avoid non-802.11 4-43

non-802.11 noise

avoiding 4-43

NTP server template 4-10, 4-14

O

onstacle color coding 9-22

Overview of NAT 4-86

P

packet jitter 4-15

packet latency 4-15

packet loss 4-15

packet loss rate 4-15

passthrough 21-10

PEAP 21-26

peer-to-peer blocking 21-14

placement of access points 9-14

platinum 21-12

PLR 4-15

Purpose of NAT 4-86

Q

quick search 20-6

R

radio resource management 4-43

RADIUS accounting template 4-22

RADIUS authentication template 4-21

RADIUS fallback mode 4-23

recovering the NCS password 18-10

restoring NCS database

in high availability environment 18-10

RFID data collection 4-73

RF Profiles 4-41

RF profile traps 4-69

RF update traps 4-69

roaming parameters template

configuring 4-48

roaming time 4-15

rogue access point rule groups 4-28

rogue access point rules

configuring a template 4-26

rogue location discovery protocol 21-27

rogue policies

template for 4-26

RRM 4-43

RRM interval template

configuring 4-51

RRM threshold template

configuring 4-50

rules

for rogue access point 4-26

S

sam_packet_capture 13-5

scan threshold 4-48

silver 21-12

SNMP authentication 4-69

SNMP Community

controller templates 4-10

Standalone Building

adding floor plan 9-8

supported data rates 4-44

symmetric mobility tunneling 21-3

syslog templates 4-70, 4-71

T

TACACS+ server

configuring a template for 4-23

Telnet SSH templates 4-70

template

configuring for rogue AP rules 4-26

trace 18-3

traffic indicator message 4-43

traffic stream metrics QoS template 4-15

transition time 4-48

trap

802.11 security 4-70

trap control templates 4-68

trap receiver template 4-68

traps

AAA 4-69

access point 4-69

client related 4-69

RF profile 4-69

RF update 4-69

troubleshooting

using logging options 18-3

Types of NAT 4-87

U

unclassified rogue 4-27

upstream delay 4-15

upstream packet loss rate 4-15

user credential retrieval priority 4-25

user login policies

configuring a template 4-31

users

adding 19-2

Uses of NAT 4-87

using logging

for troubleshooting 18-3

using planning mode 9-21

using template

ACL 4-35

for friendly access point 4-28

using templates

802.11b/g RRM interval 4-51

802.11b/g RRM threshold 4-50

local management user 4-71, 4-72

password policy 4-31

QoS 4-11

RADIUS accounting 4-22

syslog 4-70, 4-71

Telnet SSH 4-70

traffic stream metrics QoS 4-15

trap control 4-68

trap receiver 4-68

WLAN 4-16

V

Voice

802.11b/g/n Controller Templates 4-40, 4-45, 4-57

W

WLAN AP groups 4-18

WLAN templates 4-16