The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Numerics
802.1X
authentication types in ACU 5-3
defined 5-3
A
ACAT
client adapters supported 1-2
help 1-5
obtaining software 1-3
operating systems supported 1-2
overview 1-2
security options 1-6
access point
MAC address, specifying 4-33
ACU
permitting non-administrator use 2-4
ad hoc network parameters 4-35
Allow Association To Mixed Cells parameter 4-14
Antenna Mode (Receive) parameter
infrastructure mode 4-27
Antenna Mode (Transmit) parameter
infrastructure mode 4-27
audience viii
authentication process 5-6
Automatically Prompt for LEAP User Name and Password option 4-19, 4-23
auto profile selection 2-6, 4-38
auto provisioning 4-12
B
Beacon Period parameter 4-37
broadcast key rotation
described 5-9
setting on client and access point 5-13
C
card type, defined 4-5
carrier/correlation (Car/Cor) 4-30
Caution, defined viii
channel
determining if clear 4-30
Cisco Centralized Key Management (CCKM)
defined 5-7
enabling 4-13
Clear Channel Assessment parameter 4-30
command line options, Install Wizard 1.6 A-2
configuration file, ACAT 1-6
configuration tabs 1-5
conventions viii
create profiles 4-2
D
Data Rate parameter, in RF network 4-28
Data Retries parameter, in RF network 4-31
dat file 1-6
diversity mode 4-27
document organization viii
drivers, client adapter 2-3
dynamic WEP keys, overview 5-3to 5-6
E
EAP authentication overview 5-3to 5-6
EAP-FAST authentication
described 5-3
RADIUS servers supported 5-3
setting on client and access point 5-10
username and password 4-22
EAP-SIM authentication
setting on client and access point 5-12
EAP-SIM parameter 2-8
EAP-TLS authentication
enabling 4-24
RADIUS servers supported 5-4
setting on client and access point 5-10, 5-11
energy detect (ED) 4-30
existing profiles 3-4
export profiles 3-3
F
fast roaming
defined 5-7
enabling 4-13
File menu 1-5
firmware 2-3
fragmented packets 4-31
Fragment Threshold parameter 4-31
H
host-based EAP
enabling 4-24
I
Include Windows Login Domain With User Name parameter 4-19, 4-23
infrastructure network parameters 4-32
L
LEAP authentication
RADIUS servers supported 5-3
LEAP Authentication Timeout Value parameter 4-19
LEAP Settings screen 4-18
Log File 3-3
long radio headers, using 4-30
M
MAC address
of access point, specifying 4-33
Manually Prompt for LEAP User Name and Password option 4-19, 4-23
message integrity check (MIC)
described 5-8
setting on client and access point 5-13
N
network security parameters
described 4-10
new profiles, adding 4-3
No Network Connection Unless User is Logged In parameter 4-19, 4-23
Note, defined viii
O
open authentication 4-14
P
packets
beacon 4-37
fragmented 4-31
parameters
ACM 2-5
ACU 2-4
Global Override 3-3
LEAP 2-7
PEAP 2-8
paramters
EAP-SIM 2-8
PC card antenna 4-27
PCI card antenna 4-27
PEAP 2-8
PEAP authentication
RADIUS servers supported 5-5
setting on client and access point 5-11
Protected EAP
R
RADIUS servers
additional information 5-6
defined 5-3
supported 5-3
range 4-28
removing
ACAT software 1-7
installed software components 1-7
RTS packets
advanced ad hoc parameters 4-36
advanced infrastructure parameters 4-34
RTS Retry Limit parameter
ad hoc mode 4-36
infrastructure mode 4-34
RTS Threshold parameter
ad hoc mode 4-36
infrastructure mode 4-34
S
saved username and password
security features
overview 5-9
shared key authentication 4-15
short radio headers, using 4-30
silent setup 3-4
Specified Access Point 1- 4 parameters 4-33
static WEP
disabling 4-16
with open authentication 5-9
with shared key authentication 5-9
static WEP keys
entering 4-15
guidelines for entering, in ACU 4-16
overview 5-2
selecting transmit key 4-16
size of 4-15
T
tab
Ad Hoc 4-35
Connection 4-6
Global Override Settings 3-1
Infrastructure 4-32
Installed Components 2-2
Profiles 4-39
Profile Settings 4-4
RF Settings 4-26
Security 4-10
Temporal Key Integrity Protocol (TKIP)
described 5-9
setting on client and access point 5-13
temporary username and password
automatically prompt for 4-19, 4-23
manually prompt for 4-19, 4-23
using Windows credentials 4-19, 4-23
transmit key 4-16
Transmit Power parameter 4-29
U
Use Saved User Name and Password option 4-18, 4-22
Use Short Radio Headers parameter 4-30
Use Temporary User Name and Password option 4-18, 4-22
Use Windows User Name and Password option 4-19, 4-23
W
Wake Duration parameter 4-36
WEP 3-3
keys
additional security features 5-8to 5-9
defined 5-2
size of 5-2
types of 5-2
WEP Key Entry Method parameter 4-15
WEP key hashing 5-9
World Mode parameter 4-31
WPA authentication
defined 5-6
enabling 4-11