The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Numerics
802.1X
authentication types in ACU5-3
defined5-3
A
ACAT
client adapters supported1-2
help1-5
obtaining software1-3
operating systems supported1-2
overview1-2
security options1-5
access point
MAC address, specifying4-32
ACU
permitting non-administrator use2-4
ad hoc network parameters4-34
Allow Association To Mixed Cells parameter4-14
Antenna Mode (Receive) parameter
infrastructure mode4-26
Antenna Mode (Transmit) parameter
infrastructure mode4-26
audienceviii
authentication process5-6
Automatically Prompt for LEAP User Name and Password option4-19, 4-22
auto profile selection2-6, 4-37
auto provisioning4-12
B
Beacon Period parameter4-36
broadcast key rotation
described5-9
setting on client and access point5-13
C
card type, defined4-5
carrier/correlation (Car/Cor)4-29
Caution, definedviii
channel
determining if clear4-29
Cisco Centralized Key Management (CCKM)
defined5-7
enabling4-13
Clear Channel Assessment parameter4-29
configuration file, ACAT1-5
configuration tabs1-4
conventionsviii
create profiles4-2
D
Data Rate parameter, in RF network4-27
Data Retries parameter, in RF network4-30
dat file1-5
diversity mode4-26
document organizationviii
drivers, client adapter2-3
dynamic WEP keys, overview5-3to 5-6
E
EAP authentication overview5-3to 5-6
EAP-FAST authentication
described5-3
RADIUS servers supported5-3
setting on client and access point5-10
username and password4-21
EAP-SIM authentication
setting on client and access point5-12
EAP-SIM parameter2-8
EAP-TLS authentication
enabling4-23
RADIUS servers supported5-4
setting on client and access point5-10, 5-11
energy detect (ED)4-29
existing profiles3-4
export profiles3-3
F
fast roaming
defined5-7
enabling4-13
File menu1-4
firmware2-3
fragmented packets4-30
Fragment Threshold parameter4-30
H
host-based EAP
enabling4-23
I
Include Windows Login Domain With User Name parameter4-19, 4-22
infrastructure network parameters4-31
L
LEAP authentication
RADIUS servers supported5-3
LEAP Authentication Timeout Value parameter4-19
LEAP Settings screen4-18
Log File3-3
long radio headers, using4-29
M
MAC address
of access point, specifying4-32
Manually Prompt for LEAP User Name and Password option4-19, 4-22
message integrity check (MIC)
described5-8
setting on client and access point5-13
N
network security parameters
described4-10
new profiles, adding4-3
No Network Connection Unless User is Logged In parameter4-19, 4-22
Note, definedviii
O
open authentication4-14
P
packets
beacon4-36
fragmented4-30
parameters
ACM2-5
ACU2-4
Global Override3-3
LEAP2-7
PEAP2-8
paramters
EAP-SIM2-8
PC card antenna4-26
PCI card antenna4-26
PEAP2-8
PEAP authentication
RADIUS servers supported5-5
setting on client and access point5-11
Protected EAP
R
RADIUS servers
additional information5-6
defined5-3
supported5-3
range4-27
removing
ACAT software1-6
installed software components1-7
RTS packets
advanced ad hoc parameters4-35
advanced infrastructure parameters4-33
RTS Retry Limit parameter
ad hoc mode4-35
infrastructure mode4-33
RTS Threshold parameter
ad hoc mode4-35
infrastructure mode4-33
S
saved username and password
security features
overview5-9
shared key authentication4-15
short radio headers, using4-29
silent setup3-4
Specified Access Point 1- 4 parameters4-32
static WEP
disabling4-16
with open authentication5-9
with shared key authentication5-9
static WEP keys
entering4-15
guidelines for entering, in ACU4-16
overview5-2
selecting transmit key4-16
size of4-15
T
tab
Ad Hoc4-34
Connection4-6
Global Override Settings3-1
Infrastructure4-31
Installed Components2-2
Profiles4-38
Profile Settings4-4
RF Settings4-25
Security4-10
Temporal Key Integrity Protocol (TKIP)
described5-9
setting on client and access point5-13
temporary username and password
automatically prompt for4-19, 4-22
using Windows credentials4-19, 4-22
transmit key4-16
Transmit Power parameter4-28
U
Use Saved User Name and Password option4-18, 4-21
Use Short Radio Headers parameter4-29
Use Temporary User Name and Password option4-18, 4-21
Use Windows User Name and Password option4-19, 4-22
W
Wake Duration parameter4-35
WEP3-3
keys
additional security features5-8to 5-9
defined5-2
size of5-2
types of5-2
WEP Key Entry Method parameter4-15
WEP key hashing5-9
World Mode parameter4-30
WPA authentication
defined5-6
enabling4-11