-
null
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Numerics
802.11b/g RRM interval template 10-62, 10-64
802.11b/g RRM threshold template 10-61
802.11b/g voice template 10-57
802.11h template
802.3 bridging
A
access control list templates 10-51
access point authentication and MFP templates 10-46
access point authorization template 10-39
access point inventory report 14-9
access point load
access point positions
changing with import or export of file 5-30
access point security statistics
access point templates
access point/radio templates 10-76
access points
configuring for hybrid REAP 12-9
accessing the schedule panel 14-3
ACS server
active interferer count per channel 9-26
active interferers count chart 9-26
active sessions
adding a migration template 9-17
adding access point templates 10-75
adding autonomous access points
adding controllers from config group 8-17
adding guest user account 7-15
adding templates from config group 8-18
adding WCS as TACACS+ server 15-5
adding WCS to a non-Cisco ACS server 15-13
adding WCS to ACS server 15-4
adding WCS usergroups
Advanced Options 5-15
Advanced tab
alarm severity
alternate parent
analyzing element location accuracy 5-57
AP list by location report 14-4
applying calibration models 5-54
applying controller templates 10-74
association request failures 6-38
association request success 6-38
association request timeouts 6-38
audit status
viewing for access points 9-22
audit trail
enabling for guest user activities 7-11
authentication order
authentication process
authentication request failures 6-38
authentication request success 6-38
authentication request timeout 6-38
automatic backups, scheduling 11-4, 15-2
automatic client exclusion 10-20
autonomous access points
autonomous to LWAPP migration support 9-14
auto-synchronizing location appliances 11-10
avoid foreign AP interference 10-54
B
backing up location appliance data 11-12
backing up the WCS database
backup and restore license B-6
bandwidth
bridging link information 6-41
buildings
C
CAC
calculating access point requirements 5-13
calibration models, applying 5-54
campus map, adding to WCS database 5-2
certificate signing request 3-20
changing access point positions 5-30
by importing or exporting a file 5-30
channels
monitoring on a floor map 5-47
using to enhance tag location 5-31
Cisco AP load
Cisco Unified Wireless Network Solution 5-57
Cisco Wireless LAN Solution
client alarms
client association report 14-7
client authentication provision 10-33
client devices
client reports
client security component 2-19
client tab
clients
monitoring on a floor map 5-49
clients detected by location server 2-19
combined inventory report 14-9
config group
downloading IDS signatures 8-21
downloading sw to controllers 8-20
config groups
downloading customized webauth 8-22
configuring an 802.11h template 10-63
configuring 802.3 bridging 9-12
configuring access control lists 10-51
configuring an access point 9-12, 9-18, 10-39
configuring an access point for hybrid REAP 12-9
configuring an ACL template 10-40
configuring alarm severity 13-57
configuring a client exclusion policy template 10-44
configuring the controller for hybrid REAP 12-6
configuring a CPU ACL template 10-41
configuring an EAP-FAST template 10-32
configuring EDCA parameters
for individual controllers 9-13
configuring firewall for WCS 3-6
configuring general templates 10-4
configuring global email parameters 15-22
configuring high density templates 10-55
configuring a high throughput template 10-64
configuring H-REAP AP groups 10-21
configuring hybrid REAP access point groups 12-12
configuring IDS signatures 3-10
configuring intrusion detection systems 3-9
configuring a LDAP server template 10-27
configuring a local EAP general template 10-30
configuring a local EAP profile template 10-31
configuring a manually disabled client template 10-40
configuring a mesh template 10-64, 10-65
configuring multiple country codes 8-13
configuring a network access control template 10-29
configuring a policy name template 10-52
configuring radio templates 10-78
configuring RADIUS servers 15-17
configuring a roaming parameters template 10-59
configuring a rogue policies template 10-42
configuring an RRM interval template 10-62
configuring an RRM threshold template 10-61
configuring spectrum experts 9-24
configuring the switch
configuring TACACS+ servers 15-15
configuring a TACACS+ server template 10-28
configuring a TFTP server template 10-68
configuring a trusted AP policies template 10-43
configuring a user authentication priority template 10-74
configuring a user login policies template 10-37
configuring a video parameter template 10-58
configuring a voice parameter template 10-57
configuring wired guest access 9-26
configuring templates
access point authentication and MFP 10-43
access point authorization 10-39
known rogue access point 10-63
traffic stream metrics QoS 10-8
connecting client devices
connecting to the Guest WLAN 3-19
content
controllers
configuring for hybrid REAP 12-6
controller CPU utilization 2-19
controller inventory report 14-9
controller inventory status 2-19
controller memory utilization 2-19
controller templates
controller utilization report 14-12
converting WLSE autonomous to WCS controller C-1
counters report
country codes
monitoring on a floor map 5-48-5-49
CPU access control list template 10-41
creating a lobby ambassador account 7-12
creating a network configuration audit 14-6
creating a network design 5-24
creating a new access point report 14-5
creating a new client report 14-8
creating a new inventory report 14-9
creating a new mesh report 14-6, 14-11
creating a new performance report 14-12
creating a new security report 14-14
creating calibration models 5-42
creating guest user accounts 7-11
customized Web authentication 3-16
customizing content on WCS Home page 2-18
customizing tabs on WCS Home page 2-17
D
data management tasks
default lobby ambassdor credentials
deleting guest user templates 7-17
deleting WCS user accounts 7-4
detecting a suspicious client 3-9
DHCP server
document
documentation
downloading a customized web authentication 3-16, 8-22, 10-48
downloading IDS signatures 3-11
downloading sw to controllers
after adding config group 8-20
downloading vendor CA certificates 4-5
downloading vendor device certificates 4-4
downstream packet loss rate 10-9
drawing polygon areas
E
EDCA parameters
configuring for individual controllers 9-13
configuring through a template 10-59
editing signature parameters 3-14
editing the default lobby ambassador credentials 7-9
email notification
enabling audit trails
for guest user activities 7-11
end user license agreement B-6
establishing logging options 15-18
exporting a file
to change access point position 5-30
exporting asset information 11-10
F
file encryption template 10-22
filtering
firewall, configuring for WCS 3-6
floor plans
adding to a campus building 5-6-5-8
adding to a standalone building 5-8-5-9
foreign access point interference
foreign AP interference
G
general tab
general templates
global settings
for standard and custom signatures 3-14
group setup window on ACS server 15-9
guest user account
guest user details
guest users
Guest WLAN
guidelines for using the map editor 5-9
H
heat map
hierarchy
high throughput template
Home page
H-REAP AP groups
H-REAP groups
Hybrid REAP
hybrid REAP access point groups 12-12
Hybrid REAP local switching 10-19
I
IDS signature attacks
IDS signature events
downloading from config group 8-21
importing a file
to change access point position 5-30
importing asset information 11-10
information elements
inspect location readiness 5-18
installer
installing WCS
interferers
Intrusion Detection Systems 3-9
invalid association request 6-39
invalid reassociation request 6-39
invalid reauthentication request 6-39
IOS access points
adding by device information 9-15
K
KEK
known rogue access point templates 10-67
L
Layer 1 security solutions 3-2
Layer 2 security solutions 3-2
Layer 3 security solutions 3-2
Layer 3 to Layer 2 mode
converting Cisco Wireless LAN Solution 3-5
LDAP server
configuring a template for 10-27
LEAP authentication
license
licensing
on WLSE network management C-3
link aggregation (LAG)
link metric
link stats
link test
lobby ambassador account
lobby ambassador defaults
local EAP general template 10-30
local EAP profile template 10-31
local management user template 10-73, 10-74
local net users template 10-34
local switching
location accuracy
location appliance
location appliance data
location appliance functionality 4-3
location appliance importing 11-8
location appliances
relationship with WCS Location 1-5
location inventory status 2-19
location readiness
location server inventory report 14-9
location server utilization 14-12
logging in
to the WCS user interface 7-13, 2-13-2-14
logging the lobby ambassador activities 7-19
long preambles
enabling for SpectraLink NetLink phones 4-6
M
MACK
message authenticator code keys 10-24
Maintain Image Aspect Ratio 5-50
malformed neighbor packets 6-37
management frame protection 3-7, 10-46
managing guest user accounts 7-14
managing user authentication order 9-5
manually disabled client
manually disabled clients 2-16
map
map editor
using to draw polygon areas 5-10
map editor, enhancing floor plans 5-9
map view
maps
using to monitor link stats 6-26
using to monitor mesh AP neighbors 6-31
mesh access point neighbors
mesh access points
mesh alarms
mesh networks
mesh packet error statistics 14-10
mesh parent-child hierarchical view 5-42
mesh security statistics
mesh statistics
mesh tab
mesh template
mesh tree
message integrity check information element 10-46
metrics
MFP alarms
MFP events
MFP signature generation 10-21
mobility groups
modifying a migration template 9-17
modifying access point reports 14-4
modifying client reports 14-6, 14-7
modifying inventory reports 14-9
modifying performance reports 14-12
modifying security reports 14-14
monitoring active sessions 7-5
monitoring channels
monitoring clients
monitoring coverage holes
monitoring mesh access point neighbors 6-31
monitoring mesh health 6-28, 6-33
monitoring mesh link statistics
monitoring mesh networks
monitoring outdoor areas 5-42, 5-50
monitoring predicted coverage 5-40
monitoring spectrum experts 9-25
monitoring transmit power levels 5-42
most recent client alarms 2-15
most recent security alarms 2-16
multiple country codes
N
network access control
new rogue AP count report 14-13
node hop count
noise
non-Cisco ACS server
O
optimizing the controller for high density 9-9
organization of document xviii
organizationally unique identifier 6-19
outdoor areas
adding to a campus map 5-4-5-5
overview
Cisco Wireless LAN Solution 1-2
P
packet error rate
packet error rate link color 6-42
packet error statistics
packet statistics
password rules
performing data management tasks 15-19
pinging network devices from a controller 6-26
placement of access points 5-21
to calculate access point requirements 5-13
policy name template
polygon areas
predicted coverage, monitoring 5-40
predictive tool
Q
silver, gold, platinum, bronze, management 6-38
R
radio measurements
radio receiver sensitivity 6-19
radio resource management 10-54
radio templates
radio utilization report 14-12
RADIUS accounting template 10-26
RADIUS authentication template 10-24
RADIUS servers
reassociation request failures 6-39
reassociation request success 6-39
reassociation request timeouts 6-39
reauthentication request failures 6-39
reauthentication request success 6-39
reauthentication request timeout 6-39
receiving radio measurements 6-24
recent coverage holes 2-15, 2-19
recovering the WCS password 11-20
removing controllers from config group 8-17
removing templates from config group 8-18
report
location server inventory 14-9
location server utilization 14-12
Tx power level and channel 14-12
reports 14-4
mesh packet error statistics 14-10
restoring WCS database on Linux 11-7
RF calibration model, creating 4-7
roaming parameters template
rogue access point templates 10-67
rogue access points
detecting and locating 6-3-6-4
rogue adhoc detail summary 2-19
rogue adhocs
rogue adhocs event report 14-13
rogue policies
RRM interval template
RRM threshold template
S
schedule panel
scheduling guest user account 7-18
search filters for alarms 13-4
security alarms
security statistics
security tab
sensors
servers
synchronizing WCS and location servers 11-9
setting lobby ambassodor defaults 7-8
setting multiple country codes 9-3
signature attacks summary 2-16
skull-and-crossbones indicator 6-4
SNMPv3
SNR link
downloading config groups to controllers 8-20
SpectraLink NetLink phones, enabling long preambles 4-6
spectrum expert
starting WCS
status report
stopping WCS
supported Cisco WLSE management stations C-2
switch
configuring for hybrid REAP 12-4
symmetric mobility tunneling 10-5
T
TACACS+ server
configuring a template for 10-28
tasks
template for configuring network user credentials 10-34
templates
TFTP server template
total APs not assigned to maps 2-15
traffic indicator message 10-53
traffic stream metrics QoS status 10-8
traffic stream metrics QoS template 10-8
traffic stream metrics report 14-4, 14-7
transmit power level values 5-48
transmit power levels
monitoring on a floor map 5-47
traps
traps added in 4.1 13-47, 13-54
traps added in 4.2 13-54
troubleshooting voice RF coverage 5-19
trusted AP policies
trusted AP policies template 10-43
turning password rules on or off 15-15
U
UDI
retrieving on controllers and access points 6-46
uninstalling WCS
unknown association requests 6-39
unknown reassociation request 6-40
unknown reauthentication request 6-40
upgrading to Linux 4
upgrading WCS
upstream packet loss rate 10-9
user accounts
user authentication order
user authentication priority template
user credential retrieval priority 10-34
user details
user login policies
to enhance tag location reporting 5-30
using maps
to monitor mesh AP neighbors 6-31
to monitor mesh link statistics 6-26
using maps to monitor mesh networks 6-26
802.11b/g RRM interval 10-62, 10-64
access point authentication & MFP 10-46
access point authorization 10-39
known rogue access point 10-67
local management user 10-73, 10-74
traffic stream metrics QoS 10-8
using testpoints
to analyze element location accuracy 5-57
using the installer to upgrade 11-15
utilization report
V
V5 Client Statistics Report 14-7
vendor device certificates
video parameter template
video parameter templates
View Filters icon 5-41, 5-47, 5-48, 5-49
viewing access point reports 14-4
viewing autonomous access points 9-16
viewing clients
viewing IDS signature attacks 13-60
viewing IDS signature events 3-15
viewing inventory reports 14-9
viewing performance reports 14-12
viewing security reports 14-14
voice parameter template
voice RF coverage
VoWLAN readiness
W
WCS
checking status
starting
stopping
uninstalling
upgrading
WCS controller deployment
WCS database
adding location appliances 4-2
backing up
restoring
scheduling automatic backups 11-4, 15-2
WCS Home page
WCS Location
relationship with Cisco location appliances 1-5
WCS on WLSE
WCS password
WCS user accounts
web authentication template 10-47
web login
WGBs
wired guest access
Wireless Control System (WCS)
wireless LAN event correlation 13-61
WLANs
WLSE autonomous deployment conversion C-1
WLSE map data
worst node hops
worst SNR links 2-17