This guide is organized into these chapters:
“Overview of Access Point Features,” lists the software and hardware features of the access point and describes the access point role in your network.
“Using the Web-Browser Interface,” describes how to use the web-browser interface to configure the access point.
“Using the Command-Line Interface,” describes how to use the command-line interface (CLI) to configure the access point.
“Configuring the Access Point for the First Time,”describes how to configure basic settings on a new access point.
“Administrating the Access Point,” describes how to perform one-time operations to administer your access point, such as preventing unauthorized access to the access point, setting the system date and time, and setting the system name and prompt.
“Configuring Radio Settings,” describes how to configure settings for the access point radio such as the role in the radio network, transmit power, channel settings, and others.
“Configuring Multiple SSIDs,” describes how to configure and manage multiple Service Set Identifiers (SSIDs) and multiple basic SSIDs (BSSIDs) on your access point. You can configure up to 16 SSIDs and up to eight BSSIDs on your access point.
“Configuring Spanning Tree Protocol,”describes how to configure Spanning Tree Protocol (STP) on your access point, bridge, or access point operating in a bridge mode. STP prevents bridge loops from occurring in your network.
“Configuring an Access Point as a Local Authenticator,” describes how to configure the access point to act as a local RADIUS server for your wireless LAN. If the WAN connection to your main RADIUS server fails, the access point acts as a backup server to authenticate wireless devices.
“Configuring WLAN Authentication and Encryption,” describes how to configure the cipher suites required to use authenticated key management, Wired Equivalent Privacy (WEP), and WEP features including MIC, CMIC, TKIP, CKIP, and broadcast key rotation.
“Configuring Authentication Types,” describes how to configure authentication types on the access point. Client devices use these authentication methods to join your network.
“Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services,” describes how to configure the access point to participate in WDS, to allow fast reassociation of roaming client services, and to participate in radio management.
“Configuring RADIUS and TACACS+ Servers,” describes how to enable and configure the RADIUS and Terminal Access Controller Access Control System Plus (TACACS+), which provide detailed accounting information and flexible administrative control over authentication and authorization processes.
“Configuring VLANs,” describes how to configure your access point to interoperate with the VLANs set up on your wired LAN.
“Configuring QoS,” describes how to configure and manage MAC address, IP, and EtherType filters on the access point using the web-browser interface.
“Configuring Filters,” describes how to configure and manage MAC address, IP, and EtherType filters on the access point using the web-browser interface.
“Configuring CDP,” describes how to configure Cisco Discovery Protocol (CDP) on your access point. CDP is a device-discovery protocol that runs on all Cisco network equipment.
“Configuring SNMP,” describes how to configure the Simple Network Management Protocol (SNMP) on your access point.
“Configuring Repeater and Standby Access Points and Workgroup Bridge Mode,” describes how to configure your access point as a hot standby unit or as a repeater unit.
“Managing Firmware and Configurations,” describes how to manipulate the Flash file system, how to copy configuration files, and how to archive (upload and download) software images.
“Configuring L2TPv3 Over UDP/IP,” describes how to configure the Layer 2 Tunneling Protocol (L2TPv3), which is a tunneling protocol that enables tunneling of Layer 2 packets over IP core networks.
“Configuring System Message Logging,” describes how to configure system message logging on your access point.
“Troubleshooting,”provides troubleshooting procedures for basic problems with the access point.
Appendix A, “Protocol Filters,” lists some of the protocols that you can filter on the access point.
Appendix B, “Supported MIBs,” lists the Simple Network Management Protocol (SNMP) Management Information Bases (MIBs) that the access point supports for this software release.
Appendix C, “Error and Event Messages,” lists the CLI error and event messages and provides an explanation and recommended action for each message.