Cisco Systems 102075 Cisco Aironet 802.11n Dual Band Access Points User Manual Cisco Wireless LAN Controller Configuration Guide 10

Cisco Systems Inc Cisco Aironet 802.11n Dual Band Access Points Cisco Wireless LAN Controller Configuration Guide 10

Cisco Wireless LAN Controller Configuration Guide_10

Download: Cisco Systems 102075 Cisco Aironet 802.11n Dual Band Access Points User Manual Cisco Wireless LAN Controller Configuration Guide 10
Mirror Download [FCC.gov]Cisco Systems 102075 Cisco Aironet 802.11n Dual Band Access Points User Manual Cisco Wireless LAN Controller Configuration Guide 10
Document ID1514970
Application IDGJWZcRIgkuxlOIkJh9Knmg==
Document DescriptionCisco Wireless LAN Controller Configuration Guide_10
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize281.36kB (3516986 bits)
Date Submitted2011-08-02 00:00:00
Date Available2011-08-18 00:00:00
Creation Date2011-08-02 09:59:02
Producing SoftwareAcrobat Distiller 9.0.0 (Windows)
Document Lastmod2011-08-02 09:59:04
Document TitleCisco Wireless LAN Controller Configuration Guide_10
Document CreatorFrameMaker 7.2

Appendix D
Troubleshooting
Configuring Wireless Sniffing
•
Wireshark
Note
The latest version of Wireshark can decode the packets by going to the Anaylze mode. Select decode as,
and switch UDP5555 to decode as AIROPEEK.
Note
You must disable IP-MAC address binding in order to use an access point in sniffer mode if the access
point is joined to a Cisco 5500 Series Controller, a Cisco 2100 Series Controller, or a controller network
module that runs software release 6.0 or later releases. To disable IP-MAC address binding, enter the
config network ip-mac-binding disable command in the controller CLI. See the “Configuring
IP-MAC Address Binding” section on page 4-67 for more information.
Note
You must enable WLAN 1 in order to use an access point in sniffer mode if the access point is joined to
a Cisco 5500 Series Controller, a Cisco 2100 Series Controller, or a controller network module that runs
software release 6.0 or later releases. If WLAN 1 is disabled, the access point cannot send packets.
Prerequisites for Wireless Sniffing
To perform wireless sniffing, you need the following hardware and software:
•
A dedicated access point—An access point configured as a sniffer cannot simultaneously provide
wireless access service on the network. To avoid disrupting coverage, use an access point that is not
part of your existing wireless network.
•
A remote monitoring device—A computer capable of running the analyzer software.
•
Windows XP or Linux operating system—The controller supports sniffing on both Windows XP and
Linux machines.
•
Software and supporting files, plug-ins, or adapters—Your analyzer software may require
specialized files before you can successfully enable
Using the GUI to Configure Sniffing on an Access Point
To configure sniffing on an access point using the controller GUI, follow these steps:
Step 1
Choose Wireless > Access Points > All APs to open the All APs page.
Step 2
Click the name of the access point that you want to configure as the sniffer. The All APs > Details for
page appears (see Figure D-14).
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
D-45
Appendix D
Troubleshooting
Configuring Wireless Sniffing
Figure D-14
All APs > Details for Page
Step 3
From the AP Mode drop-down list, choose Sniffer.
Step 4
Click Apply to commit your changes.
Step 5
Click OK when warned that the access point will be rebooted.
Step 6
Choose Wireless > Access Points > Radios > 802.11a/n (or 802.11b/g/n) to open the 802.11a/n (or
802.11b/g/n) Radios page.
Step 7
Hover your cursor over the blue drop-down arrow for the desired access point and choose Configure.
The 802.11a/n (or 802.11b/g/n) Cisco APs > Configure page appears (see Figure D-15).
Cisco Wireless LAN Controller Configuration Guide
D-46
OL-21524-02
Appendix D
Troubleshooting
Configuring Wireless Sniffing
Figure D-15
802.11a/n Cisco APs > Configure Page
Step 8
Unselect the Sniff check box to enable sniffing on this access point, or leave it unselected to disable
sniffing. The default value is unchecked.
Step 9
If you enabled sniffing in Step 8, follow these steps:
a.
From the Channel drop-down list, choose the channel on which the access point sniffs for packets.
b.
In the Server IP Address text box, enter the IP address of the remote machine running Omnipeek,
Airopeek, AirMagnet, or Wireshark.
Step 10
Click Apply to commit your changes.
Step 11
Click Save Configuration to save your changes.
Using the CLI to Configure Sniffing on an Access Point
To configure sniffing on an access point using the controller CLI, follow these steps:
Step 1
To configure the access point as a sniffer, enter this command:
config ap mode sniffer Cisco_AP
where Cisco_AP is the access point configured as the sniffer.
Step 2
When warned that the access point will be rebooted and asked if you want to continue, enter Y. The
access point reboots in sniffer mode.
Step 3
To enable sniffing on the access point, enter this command:
config ap sniff {802.11a | 802.11b} enable channel server_IP_address Cisco_AP
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
D-47
Appendix D
Troubleshooting
Troubleshooting Access Points Using Telnet or SSH
where
– channel is the radio channel on which the access point sniffs for packets. The default values are
36 (802.11a/n) and 1 (802.11b/g/n).
– server_IP_address is the IP address of the remote machine running Omnipeek, Airopeek,
AirMagnet, or Wireshark.
– Cisco_AP is the access point configured as the sniffer.
Note
Step 4
To disable sniffing on the access point, enter the config ap sniff {802.11a | 802.11b} disable
Cisco_AP command.
To save your changes, enter this command:
save config
Step 5
To view the sniffer configuration settings for an access point, enter this command:
show ap config {802.11a | 802.11b} Cisco_AP
Information similar to the following appears:
Cisco AP Identifier................................ 17
Cisco AP Name.......................................... AP1131:46f2.98ac
...
AP Mode ........................................... Sniffer
Public Safety ..................................... Global: Disabled, Local: Disabled
Sniffing .............................................. No
...
Troubleshooting Access Points Using Telnet or SSH
The controller supports the use of the Telnet and Secure Shell (SSH) protocols to troubleshoot
lightweight access points. Using these protocols makes debugging easier, especially when the access
point is unable to connect to the controller.
•
To avoid potential conflicts and security threats to the network, the following commands are
unavailable while a Telnet or SSH session is enabled: config terminal, telnet, ssh, rsh, ping,
traceroute, clear, clock, crypto, delete, fsck, lwapp, mkdir, radius, release, reload, rename,
renew, rmdir, save, set, test, upgrade.
•
Commands available during a Telnet or SSH session include debug, disable, enable, help, led,
login, logout, more, no debug, show, systat, undebug, where.
You can configure Telnet or SSH by using the controller CLI in software release 5.0 or later releases or
using the controller GUI in software release 6.0 or later releases.
Note
See the “Configuring Telnet and SSH Sessions” section on page 2-34 for instructions on configuring
Telnet or SSH sessions on the controller.
Cisco Wireless LAN Controller Configuration Guide
D-48
OL-21524-02
Appendix D
Troubleshooting
Troubleshooting Access Points Using Telnet or SSH
Using the GUI to Troubleshoot Access Points Using Telnet or SSH
To enable Telnet or SSH access (or both) on lightweight access points using the controller GUI, follow
these steps:
Step 1
Choose Wireless > Access Points > All APs to open the All APs page.
Step 2
Click the name of the access point for which you want to enable Telnet or SSH.
Step 3
Choose the Advanced tab to open the All APs > Details for (Advanced) page (see Figure D-16).
Figure D-16
All APs > Details for (Advanced) Page
Step 4
To enable Telnet connectivity on this access point, select the Telnet check box. The default value is
unchecked.
Step 5
To enable SSH connectivity on this access point, select the SSH check box. The default value is
unchecked.
Step 6
Click Apply to commit your changes.
Step 7
Click Save Configuration to save your changes.
Using the CLI to Troubleshoot Access Points Using Telnet or SSH
To enable Telnet or SSH access (or both) on lightweight access points using the controller CLI, follow
these steps:
Step 1
To enable Telnet or SSH connectivity on an access point, enter this command:
config ap {telnet | ssh} enable Cisco_AP
The default value is disabled.
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
D-49
Appendix D
Troubleshooting
Debugging the Access Point Monitor Service
To disable Telnet or SSH connectivity on an access point, enter this command:
config ap {telnet | ssh} disable Cisco_AP
Note
Step 2
To save your changes, enter this command:
save config
Step 3
To see whether Telnet or SSH is enabled on an access point, enter this command:
show ap config general Cisco_AP
Information similar to the following appears:
Cisco AP Identifier..............................
Cisco AP Name....................................
Country code.....................................
Reg. Domain allowed by Country...................
AP Country code..................................
AP Regulatory Domain.............................
Switch Port Number ..............................
MAC Address......................................
IP Address Configuration.........................
IP Address.......................................
IP NetMask.......................................
Gateway IP Addr..................................
Domain...........................................
Name Server......................................
Telnet State.....................................
Ssh State........................................
...
AP33
Multiple Countries:US,AE,AR,AT,AU,BH
802.11bg:-ABCENR 802.11a:-ABCEN
US - United States
802.11bg:-A 802.11a:-A
00:19:2f:11:16:7a
Static IP assigned
10.22.8.133
255.255.248.0
10.22.8.1
Enabled
Enabled
Debugging the Access Point Monitor Service
The controller sends access point status information to the Cisco 3300 Series Mobility Services Engine
(MSE) using the access point monitor service.
The MSE sends a service subscription and an access point monitor service request to get the status of all
access points currently known to the controller. When any change is made in the status of an access point,
a notification is sent to the MSE.
Using the CLI to Debug Access Point Monitor Service Issues
If you experience any problems with the access point monitor service, enter this command:
debug service ap-monitor {all | error | event | nmsp | packet} {enable | disable}
where
•
all configures debugging of all access point status messages.
•
error configures debugging of access point monitor error events.
•
event configures debugging of access point monitor events.
•
nmsp configures debugging of access point monitor NMSP events.
•
packet configures debugging of access point monitor packets.
Cisco Wireless LAN Controller Configuration Guide
D-50
OL-21524-02
Appendix D
Troubleshooting
Troubleshooting OfficeExtend Access Points
•
enable enables the debub service ap-monitor mode.
•
disable disables the debug service ap-monitor mode.
Troubleshooting OfficeExtend Access Points
This section provides troubleshooting information if you experience any problems with your
OfficeExtend access points.
Interpreting OfficeExtend LEDs
The LED patterns are different for 1130 series and 1140 series OfficeExtend access points. See the Cisco
OfficeExtend Access Point Quick Start Guide for a description of the LED patterns. You can find this
guide at this URL:
http://www.cisco.com/en/US/products/hw/wireless/index.html
Positioning OfficeExtend Access Points for Optimal RF Coverage
When positioning your OfficeExtend access point, consider that its RF signals are emitted in a cone
shape spreading outward from the LED side of the access point (see Figure D-17). Be sure to mount the
access point so that air can flow behind the metal back plate and prevent the access point from
overheating.
Figure D-17
OfficeExtend Access Point Radiation Patterns
Troubleshooting Common Problems
Most of the problems experienced with OfficeExtend access points are one of the following:
•
The access point cannot join the controller because of network or firewall issues.
Resolution: Follow the instructions in the “Viewing Access Point Join Information” section on
page 8-55 to view join statistics for the OfficeExtend access point, or find the access point’s public
IP address and perform pings of different packet sizes from inside the company.
•
The access point joins but keeps dropping off. This behavior usually occurs because of network
problems or when the network address translation (NAT) or firewall ports close because of short
timeouts.
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
D-51
Appendix D
Troubleshooting
Troubleshooting OfficeExtend Access Points
Resolution: Ask the teleworker for the LED status.
•
Clients cannot associate because of NAT issues.
Resolution: Ask the teleworker to perform a speed test and a ping test. Some servers do not return
big packet pings.
•
Clients keep dropping data. This behavior usually occurs because the home router closes the port
because of short timeouts.
Resolution: Perform client troubleshooting in WCS to determine if the problem is related to the
OfficeExtend access point or the client.
•
The access point is not broadcasting the enterprise WLAN.
Resolution: Ask the teleworker to check the cables, power supply, and LED status. If you still
cannot identify the problem, ask the teleworker to try the following:
– Connect to the home router directly and see if the PC is able to connect to an Internet website
such as http://www.cisco.com/. If the PC cannot connect to the Internet, check the router or
modem. If the PC can connect to the Internet, check the home router configuration to see if a
firewall or MAC-based filter is enabled that is blocking the access point from reaching the
Internet.
– Log into the home router and check to see if the access point has obtained an IP address. If it
has, the access point’s LED normally blinks orange.
•
The access point cannot join the controller, and you cannot identify the problem.
Resolution: A problem could exist with the home router. Ask the teleworker to check the router
manual and try the following:
– Assign the access point a static IP address based on the access point’s MAC address.
– Put the access point in a demilitarized zone (DMZ), which is a small network inserted as a
neutral zone between a company’s private network and the outside public network. It prevents
outside users from getting direct access to a server that has company data.
– If problems still occur, contact your company’s IT department for assistance.
•
The teleworker experiences problems while configuring a personal SSID on the access point.
Resolution: Clear the access point configuration and return it to factory default settings by clicking
Clear Config on the access point GUI or by entering the clear ap config Cisco_AP command and
then follow the steps in the “Configuring a Personal SSID on an OfficeExtend Access Point” section
on page 8-85 to try again. If problems still occur, contact your company’s IT department for
assistance.
•
The home network needs to be rebooted.
Resolution: Ask the teleworker to follow these steps:
a. Leave all devices networked and connected, and then power down all the devices.
b. Turn on the cable or DSL modem, and then wait for 2 minutes. (Check the LED status.)
c. Turn on the home router, and then wait for 2 minutes. (Check the LED status.)
d. Turn on the access point, and then wait for 5 minutes. (Check the LED status.)
e. Turn on the client.
Cisco Wireless LAN Controller Configuration Guide
D-52
OL-21524-02
A P P E N D I X
Logical Connectivity Diagrams
This appendix provides logical connectivity diagrams for the controllers integrated into other Cisco
products, specifically the Catalyst 3750G Integrated Wireless LAN Controller Switch, the Cisco WiSM,
and the Cisco 28/37/38xx Series Integrated Services Router. These diagrams show the internal
connections between the switch or router and the controller. The software commands used for
communication between the devices are also provided. This appendix contains these sections:
•
Cisco WiSM, page E-1
•
Cisco 28/37/38xx Integrated Services Router, page E-3
•
Catalyst 3750G Integrated Wireless LAN Controller Switch, page E-4
Cisco WiSM
Figure E-1 shows the logical connectivity for the Cisco WiSM.
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
E-1
Appendix E
Logical Connectivity Diagrams
Cisco WiSM
Figure E-1
Logical Connectivity Diagram for the Cisco WiSM
Catalyst 6500 WiSM or Cisco 7600 Series Router WiSM
Various Switch or Router Blades providing
100M/Gig/PoE/SFP Ports
2 SFP Ports
RS-232 Serial
at 9600 baud
Supervisor 720
Console
Switch or Router Motherboard
Memory
Boot Flash
Flash File System
Flash File System
on CF Card
Disk 0
Disk 1
Ethernet
4 Gig E
Ports
Memory
4404
Controller-A
Hidden
Port 9
Boot Flash
Controller Motherboard
Console
Gig E
Service
RS-232 Serial
at 9600 baud
Ethernet
Hidden
Port 5
Port 6
Port 7
Port 8
Ethernet
4 Gig E
Ports
Memory
4404
Controller-B
Hidden
Port 10
Flash File System
on CF Card
Do not remove
Boot Flash
Flash File System
on CF Card
Do not remove
Controller Motherboard
Gig E
Service
Ethernet
Console
RS-232 Serial
at 9600 baud
155912
Hidden
Port 1
Port 2
Port 3
Port 4
The commands used for communication between the Cisco WiSM, the Supervisor 720, and the 4404
controllers are documented in Configuring a Cisco Wireless Services Module and Wireless Control
System at this URL:
Cisco Wireless LAN Controller Configuration Guide
E-2
OL-21524-02
Appendix E
Logical Connectivity Diagrams
Cisco 28/37/38xx Integrated Services Router
http://www.cisco.com/en/US/docs/wireless/technology/wism/technical/reference/appnote.html#wp394
98
Cisco 28/37/38xx Integrated Services Router
Figure E-2 shows the logical connectivity for the Cisco 28/37/38xx integrated services router.
Figure E-2
Logical Connectivity Diagram for the Cisco 28/37/38xx Integrated Services Router
Console
28/37/38xx
Integrated
Services Router
Memory
Router CPU
(Cisco IOS Software)
Flash
Internal Ethernet
Interface
Internal Ethernet
Interface 1
CPU
Memory
Compact Flash
230621
Controller
Network Module
StrataFlash
These commands are used for communication between the 28/37/38xx Integrated Services Router and
the controller network module. They are initiated from the router. The commands vary depending on the
version of the network module.
These commands are used for communication between the router and Fast Ethernet versions of the
controller network module:
•
interface wlan-controller slot/unit (and support for subinterfaces with dot1q encap)
•
show interfaces wlan-controller slot/unit
•
show controllers wlan-controller slot/unit
•
test service-module wlan-controller slot/unit
•
test HW-module wlan-controller slot/unit reset {enable | disable}
•
service-module wlan-controller slot/port {reload | reset | session [clear] | shutdown | status}
These commands are used for communication between the router and Gigabit Ethernet versions of the
controller network module:
•
interface integrated-service-engine slot/unit (and support for subinterfaces with dot1q encap)
•
show interfaces integrated-service-engine slot/unit
•
show controllers integrated-service-engine slot/unit
•
test service-module integrated-service-engine slot/unit
•
test HW-module integrated-service-engine slot/unit reset {enable | disable}
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
E-3
Appendix E
Logical Connectivity Diagrams
Catalyst 3750G Integrated Wireless LAN Controller Switch
•
Note
service-module integrated-service engine slot/port {reload | reset | session [clear] | shutdown |
status}
See the Cisco Wireless LAN Controller Network Module Feature Guide for more information. You can
find this document at this URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124newft/124limit/124x/124xa2/bo
xernm.htm#wp2033271
Catalyst 3750G Integrated Wireless LAN Controller Switch
Figure E-3 shows the logical connectivity for the catalyst 3750G integrated wireless LAN.
Figure E-3
Logical Connectivity Diagram for the Catalyst 3750G Integrated Wireless LAN
Controller Switch
RS-232 Serial
at 9600 baud
G1/0/1 through G1/0/24
G1/0/25
G1/0/26
Console
24 Gig PoE Ports
2 SFP Ports
3750G Switch
Switch Motherboard
Memory
Hidden
G1/0/27
G1/0/28
2 SFP Ports
Hidden
Port 1
Port 2
2 SFP Ports
Memory
4402
Controller
Boot Flash
Flash File System
Boot Flash
Flash File System
on CF Card
Do not remove
Console
Gig E Service
RS-232 Serial
at 9600 baud
Ethernet
155911
Controller Motherboard
Cisco Wireless LAN Controller Configuration Guide
E-4
OL-21524-02
Appendix E
Logical Connectivity Diagrams
Catalyst 3750G Integrated Wireless LAN Controller Switch
RS-232 Serial
at 9600 baud
G1/0/1 through G1/0/24
G1/0/25
G1/0/26
Console
24 Gig PoE Ports
2 SFP Ports
3750G Switch
Switch Motherboard
Memory
Hidden
G1/0/27
G1/0/28
2 SFP Ports
Hidden
Port 1
Port 2
2 SFP Ports
Memory
4402
Controller
Boot Flash
Flash File System
Boot Flash
Flash File System
on CF Card
Do not remove
Console
Gig E Service
RS-232 Serial
at 9600 baud
Ethernet
155911
Controller Motherboard
These commands are used for communication between the Catalyst 3750G switch and the 4402
controller.
Login Command
This command is used to initiate a telnet session from the switch to the controller:
session switch_number processor 1
Because there can be several switches in a stack, the switch_number parameter is used to indicate to
which controller in the stack this session should be directed. Once a session is established, the user
interacts with the controller CLI. Entering exit terminates the session and returns the user to the switch
CLI.
Show Commands
These commands are used to view the status of the internal controller. They are initiated from the switch.
•
show platform wireless-controller switch_number summary
Information similar to the following appears:
Switch
•
Status
up
up
State
operational
operational
show platform wireless-controller switch_number status
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
E-5
Appendix E
Logical Connectivity Diagrams
Catalyst 3750G Integrated Wireless LAN Controller Switch
Information similar to the following appears:
Switch Service IP
Management IP
SW Version
Status
------+---------------+---------------+---------------+------1
127.0.1.1
70.1.30.1
4.0.52.0
operational
127.0.1.2
70.1.31.1
4.0.45.0
operational
•
show platform wireless-controller switch_number management-info
sw vlan ip
1 0
70.1.30.1/16
2 0
70.1.31.1/16
gateway
70.1.1.1
70.1.1.1
http https mac
version
0016.9dca.d963 4.0.52.0
0016.9dca.dba3 4.0.45.0
Debug Commands
The Wireless Control Protocol (WCP) is an internal keep-alive protocol that runs between the switch and
the controller. It enables the switch to monitor the health of the controller and to report any problems. It
uses UDP and runs over the two internal Gigabit ports, but it creates an internal VLAN 4095 to separate
control traffic from data traffic. Every 20 seconds the switch sends a keep-alive message to the controller.
If the controller does not acknowledge 16 consecutive keep-alive messages, the switch declares the
controller dead and sends a reset signal to reboot the controller.
These commands are used to monitor the health of the internal controller.
This command is initiated from the controller.
•
debug wcp ?
where ? is one of the following:
packet—Debugs WCP packets.
events—Debugs WCP events.
Information similar to the following appears:
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Tue
Feb
Feb
Feb
Feb
Feb
Feb
Feb
Feb
Feb
23:30:31
23:30:31
23:30:31
23:30:51
23:30:51
23:30:51
23:31:11
23:31:11
23:31:11
2006:
2006:
2006:
2006:
2006:
2006:
2006:
2006:
2006:
Received WCP_MSG_TYPE_REQUEST
Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE
Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE
Received WCP_MSG_TYPE_REQUEST
Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE
Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE
Received WCP_MSG_TYPE_REQUEST
Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE
Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE
This command is initiated from the switch.
•
debug platform wireless-controller switch_number ?
where ? is one of the following:
all—All
errors—Errors
packets—WCP packets
sm—State machine
wcp—WCP protocol
Cisco Wireless LAN Controller Configuration Guide
E-6
OL-21524-02
Appendix E
Logical Connectivity Diagrams
Catalyst 3750G Integrated Wireless LAN Controller Switch
Reset Commands
These two commands (in this order) are used to reset the controller from the switch. They are not yet
available but will be supported in a future release.
Note
•
test wireless-controller stop switch_number
•
test wireless-controller start switch_number
A direct console connection to the controller does not operate when hardware flow control is enabled on
the PC. However, the switch console port operates with hardware flow control enabled.
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
E-7
Appendix E
Logical Connectivity Diagrams
Catalyst 3750G Integrated Wireless LAN Controller Switch
Cisco Wireless LAN Controller Configuration Guide
E-8
OL-21524-02
INDEX
802.11a > RRM > Coverage page
Symbols
802.11a > RRM > DCA page
D-5
11n Mode parameter
and PoE Status field
8-130
8-128
transmit power settings when using PoE
3DES IPSec data encryption
802.11a Global Parameters page
13-44
configuring using the CLI
4-31 to 4-33
configuring using the GUI
4-29 to 4-31
802.11g Support parameter
8-129
802.11h, described
6-9
8-117, D-47
4-30
4-38
802.11h Global Parameters page
7-41
7920 Client CAC parameter
4-38
802.11h parameters, configuring
7-41
7920 support mode
7-39
using the CLI
4-39
using the GUI
4-38 to 4-39
802.11n
7-39
7921 support mode
13-23
802.11 bands
operating modes when using PoE
7920 AP CAC parameter
802.11a > RRM > General page
802.11b/g/n Cisco APs > Configure page
4-34
1250 series access points
described
13-17
802.11a > RRM > Dynamic Channel Assignment (DCA)
page 13-17
Numerics
configuring
13-21
clients
7-40
802.11a (or 802.11b) > Client Roaming page
802.11a (or 802.11b) > Voice Parameters page
configuring
4-64
4-78, 4-80,
4-85
802.11a (or 802.11b/g) > EDCA Parameters page
8-133
4-94
using the CLI
4-35 to 4-37
using the GUI
4-33 to 4-35
devices
4-33
802.11a (or 802.11b/g) Global Parameters > Auto RF
page 13-9
802.11n (2.4 GHz) High Throughput page
802.11a (or 802.11b/g) Global Parameters page
802.1X
4-29, 13-49
802.11a (or 802.11b/g) Network Status parameter
4-30,
4-38
802.11a/n (4.9 GHz) > Configure page
802.11a/n Cisco APs > Configure page
configuring
described
9-128
802.11a/n (or 802.11b/g/n) Cisco APs > Configure
page 13-33
802.11a/n (or 802.11b/g/n) Radios page
802.1Q VLAN trunk port
4-83, 13-32, 13-45
9-19, 13-46
802.11a/n Radios page (from Monitor Menu)
8-31
802.11a/n Radios page (from Wireless Menu)
8-31
4-34
3-5
7-24
7-25
dynamic key settings
7-24
802.1X+CCKM
configuring
described
7-27
7-26
802.1X authentication for access points
configuring
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-1
Index
the switch
using with the debug facility
8-41
D-40 to D-41
using the CLI
8-39 to 8-41
Access Control Lists > Edit page
6-65
using the GUI
8-38 to 8-39
Access Control Lists > New page
6-63
described
Access Control Lists > Rules > New page
8-37
802.1x Authentication parameter
Access Control Lists page
8-38
802.3 bridging
Access Mode parameter
configuring using the CLI
4-56
configuring using the GUI
4-55 to 4-56
802.3 Bridging parameter
802.3 frames
6-62
4-44, 4-46
access point
assisted roaming, described
9-92
access point core dumps, uploading
4-56
4-55
802.3X flow control, enabling
6-63
4-54
using the CLI
8-63
using the GUI
8-63
access point count, approved tiers for 5500 series
controllers 4-4
access point event logs, viewing
access point groups
AAA override
assigning access points to
configuring
using the CLI
6-88
using the GUI
6-88
described
B-2
Access Control List Name parameter
6-63
7-61
using the GUI
7-60
using the CLI
7-60 to 7-61
using the GUI
7-57 to 7-60
default group
access control lists (ACLs)
applying to an interface
using the CLI
using the CLI
creating
6-86
AC adapter warning for Japan
6-71
7-57
described
7-55
illustrated
7-56
removing
applying to a WLAN
using the CLI
6-72
using the GUI
6-68 to 6-69
using the CLI
6-72
using the GUI
6-67 to 6-68
using the CLI
7-61
using the GUI
7-58
viewing
applying to the controller CPU
7-61 to 7-62
access point monitor service, debugging
access point radios, searching for
D-50
8-31 to 8-32
access points
configuring
using the CLI
6-70 to 6-71
using the GUI
6-62 to 6-66
20-MHz channelization
13-33
40-MHz channelization
13-34
adding MAC address to controller filter list
counters
configuring using the CLI
6-70
configuring using the GUI
6-63
described
6-61
identity networking
rules
D-15
6-84
6-62, 6-64, 6-71
using the GUI
?? to 9-25
assisted roaming
4-63
authorization list
8-51
authorizing
using LSCs
8-46 to 8-50
Cisco Wireless LAN Controller Configuration Guide
IN-2
OL-21524-02
Index
using MICs
8-46
AdHoc Rogue AP parameter
using SSCs
8-45
administrator access
6-94
4-41
using the CLI
8-51
administrator usernames and passwords, configuring
using the GUI
8-50
Admin Status parameter
configuring hybrid REAP using the CLI
converting to mesh access points
embedded
15-16 to 15-17
Admission Control (ACM) parameter
AES-CCMP
8-41
guidelines for operating in Japan
3-25, 3-26
AES CBS IPSec data encryption
9-124
LEDs
4-78, 4-80
6-10
7-25
AES parameter
B-1
7-27
Aggregated MAC Protocol Data Unit (A-MPDU)
configuring
8-132
Aggregated MAC Service Data Unit (A-MSDU)
interpreting
D-2
aggregation method, specifying
4-35
migrating from the -J regulatory domain to the -U
regulatory domain 8-111 to 8-114
AirMagnet Enterprise Analyzer
D-44
number supported per controller
Aironet IEs
priming
3-5
8-8
regulatory information
searching for
?? to B-2
8-10 to 8-12
supporting oversized images
15-1
VCI strings
D-48 to D-50
8-58 to 8-60
using the GUI
8-55 to 8-58
viewing multicast client table
Accounting Server parameters
configuring CDP
4-62
13-42
configuring country codes
7-66
configuring link latency
configuring PoE
6-67, 6-68
ACS server configuration page
9-122
9-117
4-101
All APs > Details for (Advanced) page
7-67
ACL. See access control lists (ACLs)
8-4, 8-63, D-49
8-108
8-125
8-130
All APs > Details for (Credentials) page
7-64
All APs > Details for (General) page
6-65
8-34, 8-38, 8-82
8-67, 8-80, 15-14
All APs > Details for (High Availability) page
6-133
8-80, 8-98,
8-102
Add AAA Client page (on CiscoSecure ACS)
15-22
Add Web Server button
D-44
All APs > Details (Advanced) page
accounting servers, disabling per WLAN
Add New Rule button
7-53
All APs > Access Point Name > VLAN Mappings
page 15-15
using the CLI
Add AP button
configuring using the GUI
All APs > Access Point Name > Statistics page
8-9
viewing join information
active exploits
7-55
All APs > Access Point Name > Neighbor Info page
verifying that they join the controller
Action parameter
configuring using the CLI
All APs > Access Point Name > Mesh Neighbor Stats
page 9-123
8-52
ACL Name parameter
4-36
All APs > Access Point Name > Link Details > Neighbor
Name page 9-122
8-53 to 8-60
using Telnet or SSH
4-36
7-29, 7-53
Alarm Trigger Threshold parameter
8-68 to 8-69
troubleshooting
the join process
Aironet IE parameter
Airopeek
supported for use with hybrid REAP
4-41
6-4, 6-21
All APs > Details for (H-REAP) page
All APs > Details for (Inventory) page
6-63
11-19
All APs > Details for page
All APs > Details page
8-81, 15-14
8-121
D-46, D-51
9-26, 9-54, 9-79, 13-41
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-3
Index
All APs page
using the GUI
8-10, 9-116, 9-121, 13-41, 15-14
Allow AAA Override parameter
AnchorTime parameter
described
6-88
anonymous local authentication bind method
Antenna Gain parameter
Antenna parameter
of two AP-manager interfaces
using multiple
13-35
13-35
4-84
3-45
3-44
3-43
3-42 to 3-47
AP Mode parameter
8-80, 13-41, 15-14, D-46
AP Name parameter
7-60
AP Policies page
4-84
AP801 access point
described
of four AP-manager interfaces
of three AP-manager interfaces
6-48
AP > Clients > Traffic Stream Metrics page
AP > Clients page
6-38, 6-40
13-35
Antenna Type parameter
3-7
illustration
9-70, 13-18
Anonymous Provision parameter
3-45 to 3-46
8-51
AP Primary Discovery Timeout parameter
ASLEAP detection
8-41
using with a controller
AP Authentication Policy page
AP Core Dump parameter
6-133
Assignment Method parameter
8-41
6-74, 13-42
8-63
ap-count evaluation licenses, activating
8-97, 9-30
13-33, 13-36
asymmetric tunneling
described
14-26
illustrated
14-27
using the CLI
4-19 to 4-20
authenticated local authentication bind method
using the GUI
4-17 to 4-19
Authentication Protocol parameter
AP Ethernet MAC Addresses parameter
AP Failover Priority parameter
AP Group Name parameter
8-48
8-102
7-59
AP Groups > Edit (WLANs) page
7-59, 7-73
8-27
AP Join Stats Detail page
AP Join Stats page
8-58
Authorize MIC APs against auth-list or AAA
parameter 8-51
using the CLI
8-51
using the GUI
8-50
using the GUI
AP Local Authentication on a WLAN
guidelines
overview
15-18
and dynamic interfaces
3-9
14-21 to 14-22
using the CLI
3-16
using the GUI
3-11 to 3-14
creating multiple interfaces
3-47
6-114
AutoInstall
described
configuring
14-22 to 14-24
14-22
auto-immune feature
AP-manager interface
using the CLI
8-51
configuring
15-18
Using the CLI
6-48, 15-24
auto-anchor mobility
8-56
AP local authentication
Using GUI
6-48, 15-24, 15-26
authorizing access points
7-57, 7-72
AP image download
7-27
Authorize LSC APs against auth-list parameter
7-60
AP Groups > Edit (General) page
AP Groups page
4-46
Authority ID Information parameter
Authority ID parameter
7-58
AP Groups > Edit (APs) page
Auth Key Mgmt parameter
6-38, 6-40
2-26, 2-29
example operation
2-29
obtaining
DHCP addresses for interfaces
TFTP server information
2-26
2-26
Cisco Wireless LAN Controller Configuration Guide
IN-4
OL-21524-02
Index
overview
Bind Username parameter
2-26
selecting configuration file
using
6-38
bridge protocol data units (BPDUs)
2-28
3-28
bridging parameters
2-26
Average Data Rate parameter
configuring using the GUI
4-69, 4-73
Average Real-Time Rate parameter
Avoid Cisco AP Load parameter
browsers supported
4-69, 4-73
Avoid Foreign AP Interference parameter
9-70, 13-18, 14-19
Avoid Non-802.11a (802.11b) Noise parameter
2-17
Buffered Log Level parameter
9-70, 13-18
9-71, 13-18
?? to 9-80
Burst Data Rate parameter
D-9
4-69, 4-73
Burst Real-Time Rate parameter
4-69, 4-73
Backhaul Client Access parameter
CAC
9-37, 9-128
backup controllers
configuring for 7920 phones
configuring
described
using the CLI
8-99 to 8-100, 9-31 to 9-33
using the GUI
8-96 to 8-98, 9-29 to 9-31
described
4-75
enabling
8-95, 9-28
Back-up Primary Controller IP Address parameter
8-97,
9-30
using the CLI
4-88
using the GUI
4-80
in mesh networks
9-94
viewing in mesh networks
Back-up Primary Controller Name field
8-97, 9-30
Back-up Secondary Controller IP Address
parameter 8-98, 9-30
Back-up Secondary Controller Name parameter
described
viewing using the CLI
capacity adder license. See licenses
8-98, 9-30
CAPWAP
cascading
4-75
using the CLI
4-87
using the GUI
4-78
for mesh networks
9-94
Base MAC Address parameter
Beacon Period parameter
13-6
described
3-32
4-30
1-13
logical connectivity diagram and associated software
commands E-4 to E-7
ports
3-3, 3-5
CCKM
configuring
configuring
7-27
using the CLI
?? to 9-20, 13-46 to 13-47
described
using the GUI
?? to 9-19, 13-44 to 13-46
hybrid-REAP groups
guidelines
8-47
Catalyst 3750G Integrated Wireless LAN Controller
Switch
beamforming
described
9-12
CA Server URL parameter
enabling
9-102 to 9-103
4-89
and mesh access points
bandwidth-based CAC
7-39
with mobility
13-43
Bind Password parameter
15-20
14-7
CCX
13-44
Beamforming parameter
7-25
13-45, 13-46
6-38
configuring Aironet IEs
using the CLI
7-55
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-5
Index
using the GUI
described
link test
using the GUI
7-53
overview
7-52
10-22
10-22
using with local EAP
8-121
viewing a client’s version
6-43, 6-49
Certificate File Name parameter
using the CLI
7-55
Certificate File Path parameter
using the GUI
7-53 to 7-55
Certificate Issuer parameter
CCX Layer 2 client roaming
11-8
6-47
Certificate Password parameter
configuring
Certificate Type parameter
10-20, 11-8
8-51
using the CLI
4-66
Change Filter link
using the GUI
4-64 to 4-66
Change Rules Priority parameter
debugging using the CLI
described
8-10, 8-32, 8-56
4-66
CCX radio management
Channel parameter
13-50
Channel Quiet Mode parameter
using the GUI
13-49 to 13-50
channels
13-52
13-48
hybrid-REAP considerations
obtaining information using the CLI
13-50 to 13-52
CCXv5 clients
enabling location presence
7-54
CDP > AP Neighbors page
4-104
13-32 to 13-36
13-18
Channel Width parameter
9-71, 13-33
CDP > Interface Neighbors page
4-102
6-112
CIDS Sensors List page
6-112
CDP Advertisement Version parameter
configuring
described
4-102
6-47
4-109
6-116
7-27, 7-28
7-26
Cisco 2100 Series Wireless LAN Controllers
4-105
4-100
AutoInstall interfaces
described
4-103
CDP Protocol Status parameter
CIDS Sensor Add page
6-47
ciphers
4-100
CDP > Interface Neighbors > Detail page
CDP > Traffic Metrics page
13-24
Channel Width Parameter
CIDS Shun List page
4-104
CDP > Global Configuration page
4-100
4-101
Certificate Authority (CA) certificates
downloading
using the CLI
statically assigning using the GUI
chokepoints for RFID tag tracking
CDP > AP Neighbors > Detail page
CDP State parameter
13-37
Check Certificate Date Validity parameter
D-32
CDP AP Neighbors page
statically assigning using the CLI
Check Against CA Certificates parameter
4-117
D-25 to D-39
CCX Version parameter
13-34
4-38
Channel Scan Duration parameter
13-48
9-70, 13-17
13-33, D-47
using the CLI
debugging using the CLI
9-71, 13-19
Channel Assignment Method parameter
channel bonding in the 5-GHz band
configuring
CCXv5 Req button
4-38
Channel Assignment Leader parameter
4-63 to 4-64
troubleshooting
6-99
Channel Announcement parameter
4-67
obtaining information using the CLI
features
11-8
1-7
FCC statement
B-3
features not supported
network connections
ports
10-23 to 10-25
2-26
1-7
1-16
3-2, 3-3
Cisco 2500 Series Controller
1-8
Cisco Wireless LAN Controller Configuration Guide
IN-6
OL-21524-02
Index
Cisco 2500 Series Controllers
License SKUs
Cisco 7921 Wireless IP Phones
Cisco Adaptive Wireless Path Protocol (AWPP)
4-4
Cisco 28/37/38xx Integrated Services Router
described
ports
3-3, 3-5, 4-123
using
4-123
operating with mesh access points
9-129
using the GUI to configure
9-128
Cisco 3300 Series Mobility Services Engine (MSE), using
with wIPS 6-128
Cisco 4400 Series Wireless LAN Controllers
AutoInstall interfaces
using the CLI
4-105 to 4-106
using the GUI
4-99 to 4-101
described
4-96
enabling using the GUI
sample network
B-3
network connections
4-99
supported devices
4-97
using the CLI
4-106 to 4-107
using the GUI
4-101 to 4-105
using the CLI
4-107
using the GUI
4-105
Cisco Discovery Protocol parameter
1-17
Cisco 5500 Series Wireless LAN Controllers
and the controller license agent
using to register PAKs
choosing between link aggregation and multiple
AP-manager interfaces 3-36 to 3-46
Cisco Licensing website
CPUs
Cisco Logo parameter
11-12
Cisco NAC Appliance
7-68
D-5
1-9
B-3
features not supported
1-9
3-48
3-4
multiple AP-manager interfaces
ports
4-6
4-21
Cisco Spectrum Intelligence
licenses. See licenses
network connections
4-26
CiscoSecure Access Control Server (ACS)
interface configuration example
models
4-101
Cisco License Manager (CLM)
3-2, 3-3, 3-4
FCC statement
4-100 to 4-101
viewing traffic information
1-9
3-4
described
4-108
viewing neighbors
2-26
choosing between link aggregation and multiple
AP-manager interfaces 3-36 to 3-46
ports
12-1
debugging using the CLI
using the CLI to configure
models
Cisco CleanAir
7-68
configuring
9-127
FCC statement
Cisco Clean Access (CCA)
Cisco Discovery Protocol (CDP)
Cisco 3200 Series Mobile Access Router (MAR)
described
7-62, 7-63, 7-64
Cisco Client Extensions (CCX). See CCX
1-12
described
Cisco AV-pairs
9-12
Cisco Centralized Key Management (CCKM). See CCKM
1-12
logical connectivity diagram and associated software
commands E-3
versions
7-40
3-47 to 3-48
1-17
Cisco 7920 Wireless IP Phones
12-24
Cisco Unified Wireless Network (UWN) Solution
described
1-1 to 1-4
illustrated
1-2
Cisco Wireless Control System (WCS)
1-2
Cisco WiSM
3-2, 3-4
using the USB console port
6-4
configuring the Supervisor 720
3-34 to 3-35
described
7-40
guidelines
4-121 to ??
1-10 to 1-12
4-122
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-7
Index
logical connectivity diagram and associated software
commands E-1 to E-3
ports
3-3, 3-4
connecting to WLANs
8-44
CKIP
configuring
using the CLI
8-137
using the GUI
8-133 to 8-137
viewing CCX version
using the CLI
7-30
using the GUI
7-29 to 7-30
7-29
CleanAir Benefits
Clear Config button
8-87
using the GUI
7-53 to 7-55
configuring client reporting
viewing client details
clearing the controller configuration
10-34
14-20
8-56
viewing the status of workgroup bridges
performing a link test
logging into
2-25
viewing clients
2-37
2-23 to 2-25
logging out
6-47
client exclusion policies, configuring
using the CLI
6-81 to 6-82
using the GUI
6-80 to 6-81
Client Exclusion Policies page
6-80
ClientLink. See beamforming
client location, using WCS
4-81
conditional web redirect
15-23
4-44
7-62
configuring
using the CLI
7-65
using the GUI
7-64 to 7-65
described
7-63
7-65
Configuration File Encryption parameter
6-73
4-124
comma-separated values (CSV) file, uploading
Conditional Web Redirect parameter
1-7
8-91
8-92, 8-93
Community Name parameter
Client Certificate Required parameter
10-30
configuration files
Client Protection parameter
6-77
client reporting
configuring using the CLI
D-34 to D-37
configuring using the GUI
D-31 to D-34
D-26
Client Reporting page
viewing the status of workgroup bridges
Commands > Reset to Factory Defaults page
D-6 to D-7
2-22 to 2-25
described
8-133
Client Type parameter
2-25
troubleshooting commands
client MFP
4-82
8-123
viewing voice and video settings
2-25
navigating
8-91
Clients page
CLI
enabling wireless connections
7-54
8-92, 8-136
viewing voice and video settings
Clear Stats on All APs button
basic commands
4-83
D-32
viewing a client’s CCX version
7-8, 8-12, 8-32, 8-57
Clear Stats button
7-55
Clients > Detail page
12-4
Clear Filter link
using the CLI
Clients > AP > Traffic Stream Metrics page
12-2
CleanAir guidelines
using
15-18
viewing
SSC key-hash
described
clients
downloading
using the CLI
10-31 to 10-32
using the GUI
10-30 to 10-31
editing
10-33 to 10-34
uploading
D-33
client roaming, configuring
using the CLI
4-62 to 4-67
10-29 to 10-30
configuration wizard
Cisco Wireless LAN Controller Configuration Guide
IN-8
OL-21524-02
Index
CLI version
described
described
2-13 to 2-16
guidelines
2-1
GUI version
8-2
8-2
viewing MTU information
2-2 to 2-13
Configuration Wizard - 802.11 Configuration page
Configuration Wizard Completed page
2-11
baud rate
versions
Configuration Wizard - Miscellaneous Configuration
page 2-7
Configuration Wizard - Service Interface Configuration
page 2-5
2-4, 2-6
Configuration Wizard - System Information page
3-5
controllers
configuration
clearing
2-3
10-34
10-34
saving
10-33
connections
1-13
Configuration Wizard - Virtual Interface Configuration
page 2-8
discovery process
Configure
multiple-controller deployment
12-1
Configure Dynamic Anchoring of Static IP Clients
Using the CLI
14-31
Configure option for RRM override
13-33
Configure RF Group
Using CLI
Configuring a Spectrum Expert
12-23
12-5
platforms
1-7 to 1-13
resetting factory default settings
4-124
upgrading software
using the CLI
10-8 to 10-10
using the GUI
10-5 to 10-7
14-31
Control Path parameter
3-31
6-77
14-23
core dump files
D-45
described
D-18
uploading automatically to an FTP server
15-12
using the CLI
D-19
Console Log Level parameter
D-9
using the GUI
D-18
console port
2-1 to 2-2
Control and Provisioning of Wireless Access Points
protocol (CAPWAP) 1-5
8-7
4-114
1-15
Confirm Password parameter
debugging
1-2 to 1-3
Controller Time Source Valid parameter
Configuring Sniffing on an Access Point
connecting
1-3 to 1-4
Controller Spanning Tree Configuration page
12-8
Configuring Dynamic Anchoring of Static IP Clients
Using the GUI
1-6 to 1-7
types of memory
Configuring Cisco Cleanair
Using the GUI
overview
B-1 to B-2
synchronizing with location appliance
Configuring Cisco CleanAir
Using the CLI
guidelines for operating in Japan
single-controller deployment
13-11
Using the GUI
8-7
using the GUI
13-12
Configure RF Group Mode
Using GUI
8-95
3-3
erasing
2-12
Configuration Wizard - SNMP Summary page
controller failure detection time, reducing
controller network module
2-13
Configuration Wizard - Management Interface
Configuration page 2-6
Configuration Wizard - Set Time page
8-6
uploading from a 5500 series controller to a TFTP or
FTP server D-20
Core Dump page
D-18
Country Code parameter
8-108
country codes
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-9
Index
configuring
configuring
using the CLI
8-109 to 8-111
using the CLI
8-5 to 8-6
using the GUI
8-107 to 8-108
using the GUI
8-4 to 8-5
described
Japanese
for OfficeExtend access points
8-106
Data Encryption parameter
8-112
viewing using the CLI
Country page
8-5, 8-82
Datagram Transport Layer Security
8-110
8-107
Coverage Exception Level per AP parameter
13-21
coverage hole detection
Data Path parameter
14-23
Data Rates parameter
4-31
configuring manually
2-31
using the CLI
13-27
configuring through NTP server
using the GUI
13-20 to 13-22
setting
disabling on a WLAN
described
8-26
date
configuring per controller
using the CLI
2-29
2-32
DCA Channel Sensitivity parameter
7-67
using the CLI
7-68
DCA Channels parameter
using the GUI
7-67 to 7-68
debug commands, sending
coverage hole detection and correction
CPU Access Control Lists page
CPUs, 5500 series controllers
9-71, 13-18
9-71, 13-19
8-60
debug facility
13-4
Coverage Hole Detection Enabled parameter
7-67
configuring
described
6-68
D-41 to D-44
D-40 to D-41
default enable password
D-5
crash files
8-33
default-group access point group
uploading
create
8-82
7-57
Default Mobility Group parameter
14-12
using the CLI
D-17
Default Routers parameter
using the GUI
D-16 to D-17
Delivery Traffic Indication Map (DTIM). See DTIM
period
3-50
Deny Counters parameter
create interface group
using GUI
Description parameter
3-50
Create Interface Groups
using CLI
3-51
CLI
3-51
GUI
3-50
6-34, 9-25, 15-12
3-32
DES IPSec data encryption
6-9
6-64
Destination Port parameter
6-65
Detect and Report Ad-Hoc Networks parameter
Current Channel parameter
Custom Signatures page
6-65
Designated Root parameter
Destination parameter
Creating Interface Groups
7-15
device certificates
13-36
downloading
6-121
using the CLI
10-21
using the GUI
10-19 to 10-20
overview
10-19
using with local EAP
data encryption
and OfficeExtend access points
6-93
8-84
6-43, 6-49
DHCP
Cisco Wireless LAN Controller Configuration Guide
IN-10
OL-21524-02
Index
configuring using the CLI
7-13
Diagnostic Channel parameter
configuring using the GUI
7-12
directed roam request
debugging
Direction parameter
7-13
DHCP Addr. Assignment Required parameter
DHCP Allocated Lease page
4-64
6-65
disabled clients, configuring a timeout
7-12
discovery request timer, configuring
7-16
DHCP option 43, in controller discovery process
distribution system ports
8-8
DHCP option 82
Diversity parameter
configuring
6-61
DNS IP Address parameter
using the GUI
6-60
DNS Servers parameter
example
Domain Name parameter
7-15
8-67
7-15
8-67
domain name server (DNS) discovery
6-59
DHCP Option 82 Remote ID Field Format parameter
DHCP Parameters page
4-40, 4-41, 6-60
DHCP proxy
6-60
downloading a CA certificate
10-23
4-41
using the GUI
4-39 to 4-40, ?? to 4-41, ?? to 4-94
downloading a device certificate
downloading a signature file
4-39
DHCP Scope > Edit page
10-31
downloading a customized web authentication login
page 11-22
using the CLI
described
8-8
Download button
downloading a configuration file
configuring
10-20
6-120
Download File to Controller page
7-15
10-17
downloading a customized web authentication login
page 11-21
DHCP scopes
configuring
downloading CA certificates
using the CLI
7-16 to 7-17
using the GUI
7-14 to 7-15
described
7-14
DHCP Scopes page
10-30
downloading device certificates
10-20
downloading login banner file
8-8
DHCP Server IP Addr parameter
DHCP servers
7-12
DSCP parameter
internal
7-10
10-16
11-7
6-65
DTIM period, configuring for MAC filtering
DTLS
7-10 to 7-12
6-120
Download SSL Certificate parameter
7-12
DHCP Server Override parameter
external
10-23
downloading configuration files
downloading IDS signatures
7-14
DHCP server discovery
7-19
4-2, 8-26
DTLS data encryption. See data encryption
DTPC Support parameter
DHCP Timeout
4-30
Dynamic Anchoring for Clients with Static IP Addresses
configurie using GUI
4-41
diagnostic channel
Configuring
14-30
dynamic AP management
configuring
for dynamic interface
using the CLI
D-27 to D-31
using the GUI
D-26 to D-27
described
8-99, 9-31
13-35
DNS Domain Name parameter
6-59
7-18
3-3 to 3-5
using the CLI
described
D-27
3-21
for the management interface
3-15
Dynamic AP Management parameter
3-9
D-25
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-11
Index
for dynamic interface
Enable Controller Management to be accessible from
Wireless Clients parameter 2-37, 6-58
3-20
for management interface
3-13
dynamic AP-manager interface
Enable Counters parameter
3-10
Enable Coverage Hole Detection parameter
dynamic channel assignment (DCA)
20-MHz channelization
13-4, 13-19
40-MHz channelization
13-4, 13-19
Enable CPU ACL parameter
Enable DHCP Proxy parameter
using the CLI
13-25 to 13-27
using the GUI
9-69 to 9-72, 13-16 to 13-20
sensitivity thresholds
dynamic frequency selection
3-46
Enable EAP-FAST Authentication parameter
15-24
Enable Link Latency parameter
Enable Listener parameter
configuring
3-21 to 3-22
using the GUI
3-18 to 3-21
Enable NAT Address parameter
3-9
Enable Notification parameter
3-48
dynamic WEP, configuring
4-30
Dynamic WEP Key Index parameter
4-95
4-27
8-81
7-77
Enable Password parameter
6-45
8-47
3-12
Enable OfficeExtend AP parameter
Enable passive client
7-24
8-34
Enable Server Status parameter
6-38
Enable Tracking Optimization parameter
EAP-FAST Method Parameters page
EAP-FAST parameter
EAPOL-Key Timeout parameter
EAP Profile Name parameter
Edit QoS Profile page
C-1 to C-4
4-8
4-95 to 4-96
enhanced neighbor list
6-49
described
4-63, 9-92
request (E2E)
4-63
Enter Saved Permission Ticket File Name parameter
4-68
Edit QoS Role Data Rates page
Email Input parameter
end user license agreement
configuring using the CLI
6-45
4-95
Egress Interface parameter
7-30
8-117
enhanced distributed channel access (EDCA) parameters
6-45
6-46
EDCA Profile parameter
Encryption Key parameter
end-user license agreement (EULA)
6-46
EAPOL-Key Max Retries parameter
EAP-TLS parameter
6-48
8-82
4-27
Enable LSC on Controller parameter
dynamic transmit power control, configuring
15-24
8-82, 8-125, 8-126
Enable Low Latency MAC parameter
using the CLI
dynamic interface example
4-59
Enable Least Latency Controller Join parameter
8-115 to 8-116
dynamic interface
described
Enable Dynamic AP Management parameter
Enable LEAP Authentication parameter
9-71
4-27
4-40
Enable IGMP Snooping parameter
13-3
13-21
6-68
Enable Default Authentication parameter
configuring
described
6-63
EoIP port
4-72
epings
11-30
Enable AP Local Authentication parameter
Enable Authentication for Listener parameter
14-23, 14-29
14-23, 14-29
erasing the controller configuration
11-31
15-23
4-27
Enable Check for All Standard and Custom Signatures
parameter 6-122
4-23
error codes, for failed VoIP calls
10-34
7-45 to 7-47
Ethernet connection, using remotely
Ethernet Multicast Mode parameter
2-24 to 2-25
4-59
evaluation licenses
Cisco Wireless LAN Controller Configuration Guide
IN-12
OL-21524-02
Index
installed on 5500 series controllers
event reporting for MFP
described
4-3
fast SSID changing
6-73
Excessive 802.11 Association Failures parameter
6-81
Excessive 802.11 Authentication Failures parameter
6-81
Excessive 802.1X Authentication Failures parameter
6-81
Excessive Web Authentication Failures parameter
Expedited Bandwidth parameter
6-81
4-54
configuring using the GUI
4-54
15-5
FCC statement
4-78
4-76
enabling
configuring using the CLI
fault tolerance
expedited bandwidth requests
described
8-95
2100 series controllers
B-3
4400 series controllers
B-3
5500 series controllers
B-3
Federal Information Processing Standards (FIPS)
using the GUI
File Compression parameter
4-78
8-63
Expiration Timeout for Rogue AP and Rogue Client
Entries parameter 6-93
File Name to Save Credentials parameter
Extensible Authentication Protocol (EAP)
File Type parameter
configuring
file transfers
7-24
6-50 to 6-51
per access point
per client
extension channel
6-53
downloading a device certificate
13-36
Login Banner
4-124
failover priority for access points
upgrading controller software
10-7
uploading a configuration file
10-28
uploading packet capture files
D-22
10-25
filter, using to view clients
Fingerprint parameter
8-134 to 8-135
6-113
flashing LEDs, configuring
configuring
8-132
using the CLI
8-102
Forward Delay parameter
using the GUI
8-101 to 8-102
forwarding plane architecture
viewing using the CLI
8-103
fragmented pings
4-55
Fallback Mode parameter
6-133
4-30
3-6
Friendly Rogue > Create page
1-15
fake access point detection
Fast Ethernet port
3-32, 3-33
Fragmentation Threshold parameter
8-101
failover protection
10-20
10-17
uploading PACs
factory default settings
resetting using the GUI
10-30
downloading a customized web authentication login
page 11-21
6-53
described
10-23
downloading a configuration file
timeout and failure counters
4-21
1-14
downloading a CA certificate
setting local timers
6-12
FTP server guidelines
6-99
10-2
6-10
3-5
fast heartbeat timer
configuring
General (controller) page
using the CLI
8-99
configuring 802.3 bridging
using the GUI
8-97
configuring an RF group
4-56
13-8
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-13
Index
enabling link aggregation
General (security) page
General page
logging out of
3-40
using
6-31
Generate Password parameter
Generate Rehost Ticket button
GUI to configure passive client
11-4
3-5
7-75
8-102
Global Configuration page
Headline parameter
configuring backup controllers
8-96, 9-29
configuring failover priority for access points
11-13
Hello Time parameter
8-101
configuring global credentials for access points
global credentials for access points
8-34
help, obtaining
3-32, 3-33
2-17
hex2pcap sample output
Holdtime parameter
configuring
D-43
3-32, 4-100
Honeypot access point detection
using the CLI
8-35 to 8-36
using the GUI
8-33 to 8-35
6-133
HREAP Groups > Edit (Local Authentication > Local
Users) page 15-23
HREAP Groups > Edit (Local Authentication > Protocols)
page 15-24
8-33
overriding
HREAP Groups > Edit page
using the CLI
8-35
using the GUI
8-34
Global multicast mode
7-76
Group Mode parameter
13-10, 14-18
Group Name parameter
14-13, 15-22
HREAP Groups page
15-22
15-21
HREAP Group Support
15-21
H-REAP Local Switching parameter
15-10
H-REAP Mode AP Fast Heartbeat Timeout
parameter 8-97
Group Setup page (on CiscoSecure ACS)
6-23
Guest LAN parameter
11-29
H-REAP Mode AP Fast Heartbeat Timer State
parameter 8-97
guest N+1 redundancy
14-21
H-REAP parameter
8-80
HTTP Access parameter
guest user accounts
creating
10-12
4-23
Global AP Failover Priority parameter
described
2-16
Guidelines and Limitations for Predownloading
6-44
gigabit Ethernet port
2-17
11-1 to 11-6
creating as a lobby ambassador
11-3 to 11-5
2-18
HTTP Configuration page
2-18
HTTPS Access parameter
2-19
hybrid REAP
viewing
using the CLI
11-6
access points supported
using the GUI
11-5 to 11-6
authentication process
Guest User parameter
Guest User Role parameter
guest WLAN, creating
bandwidth restriction
6-33, 15-12
6-33, 15-12
11-5
GUI
browsers supported
guidelines
logging into
15-2 to 15-5
15-2, 15-3
configuring
access points using the CLI
15-16 to 15-17
access points using the GUI
15-13 to 15-16
controller using the GUI
2-17
enabling wireless connections
15-1
2-37
2-17
2-17
guidelines
15-6
illustrated
15-2
15-8 to 15-12
number of access points supported
15-2
Cisco Wireless LAN Controller Configuration Guide
IN-14
OL-21524-02
Index
overview
measurement interval
15-1
hybrid-REAP
pattern
debugging
hybrid-REAP groups
viewing
configuring
using the CLI
15-25
using the GUI
15-21 to 15-25
example
6-122
uploading or downloading using the
GUI 6-119 to 6-120
15-20
15-20
described
6-123, 6-125
tracking method
backup RADIUS server
CCKM
6-122
quiet time
15-13, 15-17
6-122
using the CLI
6-126 to 6-128
using the GUI
6-123 to 6-124
IGMP Snooping
15-19
7-77
IGMP Timeout parameter
15-19
local authentication
Hysteresis parameter
IKE Diffie Hellman Group parameter
15-20
Hybrid-REAP Groups and OKC
4-59
IKE Phase 1 parameter
15-20
Image pre-download
4-65
6-10
6-10
8-27
Index parameter for IDS
6-113
indoor access points
converting to mesh access points
infrastructure MFP
identity networking
configuring
overview
components
6-82 to 6-86
described
6-82 to 6-83
RADIUS attributes
6-83 to 6-86
Identity Request Max Retries parameter
Identity Request Timeout parameter
IDS
6-45
6-45
6-73
6-72
Infrastructure Protection parameter
6-77
Infrastructure Validation parameter
6-77
Ingress Interface parameter
11-30
Injector Switch MAC Address parameter
6-112
inline power
IDS sensors
using the CLI
6-114 to 6-115
using the GUI
6-112 to 6-114
described
4-62
14-2
Interface Groups
IDS signature events
viewing using the CLI
6-126 to 6-128
viewing using the GUI
6-123 to 6-124
4-8
inter-controller roaming
example
6-112
using GUI
Interface groups
3-50
3-50
3-50
Interface Name parameter
IDS signatures
Interface parameter
configuring
using the CLI
6-124 to 6-126
using the GUI
6-119 to 6-123
described
6-117
frequency
6-123
MAC frequency
8-130
8-128
Install License button
configuring
described
9-124
7-59, 7-70, 7-73, 9-25
7-12
interfaces
and identity networking
assigning WLANs
6-84
7-18
configuring
6-123, 6-125
using the CLI
3-14 to 3-17
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-15
Index
using the GUI
overview
described
3-11 to 3-14
guidelines
3-6 to 3-9
Interfaces > Edit page
IPv6 Enable parameter
6-67
configuring dynamic interfaces
creating multiple AP-manager interfaces
Interfaces > New page
7-71
3-45
3-18, 3-45
7-52
Japanese country codes
3-12
8-112
Japanese regulations for migrating access points from the
-J to the -U regulatory domain 8-111 to 8-114
13-3
Interferences
7-51
3-19
configuring NAC out-of-band integration
interference
7-49
IPv6 bridging and IPv4 web authentication example
applying an ACL to an interface
Interfaces page
7-49
12-2
Interference threshold parameter
13-23
Internet Group Management Protocol (IGMP)
Keep Alive Count parameter
configuring
14-22
using the CLI
4-61
Keep Alive Interval parameter
using the GUI
4-59
Key Encryption Key (KEK) parameter
snooping
Key Format parameter
4-57
inter-release mobility
14-10
Key Index parameter
inter-subnet mobility
14-7
key permutation
configuring
inter-subnet roaming
described
described
4-63
illustrated
14-3 to 14-4
Interval parameter
described
4-62
illustrated
14-1
Inventory page
6-8
9-70, 13-17
13-13
IP address-to-MAC address binding
LAG. See link aggregation (LAG)
LAG Mode on Next Reboot parameter
3-40
Last Auto Channel Assignment parameter
4-67
Last Power Level Assignment parameter
4-67
IPSec parameter
6-8
Invoke Power Update Now button
IP Mask parameter
7-30
7-30
Key Wrap parameter
Invoke Channel Update Now button
described
7-29
Key Wrap Format parameter
8-120
configuring
7-30
7-30, 7-31
Key Size parameter
intra-controller roaming
6-8
7-30
Key Permutation parameter
9-70, 13-18, 13-49
14-22
Layer 1 security
4-44
9-71, 13-19
13-14
6-2
Layer 2
6-9
IP Theft or IP Reuse parameter
6-81
operation
1-5
security
IPv6 bridging
configuring
configuring
using the CLI
7-52
using the GUI
7-51 to 7-52
described
7-24 to 7-31
6-2
Layer 2 Security parameter
7-27, 7-30, 7-65
Cisco Wireless LAN Controller Configuration Guide
IN-16
OL-21524-02
Index
Layer 3
license level, changing
operation
1-5
security
configuring
described
4-16
using the GUI
4-15
License Level page
7-32 to 7-34
Layer 3 Security parameter
for VPN passthrough
activating ap-count evaluation licenses
7-33, 7-36
for web authentication
7-34
using the CLI
4-19 to 4-20
using the GUI
4-17 to 4-19
choosing feature set
7-65
for wired guest access
11-30
LDAP
choosing server priority order
6-38
configuring
using the CLI
6-40 to 6-41
using the GUI
6-36 to 6-39
using the CLI
4-16
using the GUI
4-14 to 4-16
installing
using the CLI
4-8 to 4-9
using the GUI
4-7 to 4-8
obtaining
LDAP server
4-3 to 4-7
rehosting
assigning to WLANs
described
6-39
choosing local authentication bind method
using the CLI
6-40
using the GUI
6-38
LDAP Servers > New page
LDAP Servers page
LEAP parameter
6-37
using the CLI
4-23 to 4-25
using the GUI
4-21 to 4-23
using the CLI
4-8
using the GUI
4-10
required for OfficeExtend access points
6-49
Learn Client IP Address parameter
15-11
7-15
LEDs
using the CLI
4-9
using the GUI
4-8
SKUs
configuring
8-132
interpreting
D-1
8-80
saving
6-46
Lease Time parameter
4-20
removing
6-37
LDAP Servers parameter
4-5, 4-6
transferring to a replacement controller after an
RMA 4-25 to 4-26
viewing
license agent
configuring
using the CLI
4-28 to 4-29
using the GUI
4-26 to 4-28
described
4-14
licenses
6-2
for web redirect
using the CLI
using the GUI
4-9 to 4-11
4-9, 4-15, 4-17
licensing portal, using to register PAKs
License Agent Configuration page
4-27
License Commands page
4-7
4-10, 4-18
Lifetime parameter
4-6
6-33, 11-4, 15-12
Lightweight Access Point Protocol (LWAPP)
C-1 to C-4
License Commands (Rehost) page
License Detail page
4-11 to 4-14
Licenses page
4-26
license agreement
using the CLI
4-21
1-5, 8-2
lightweight mode, reverting to autonomous mode
limited warranty
8-44
C-4 to C-6
link aggregation (LAG)
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-17
Index
configuring neighboring devices
described
Lobby Ambassador Guest Management > Guest Users List
page 11-3, 11-5
3-41
3-36 to 3-37
Local Auth Active Timeout parameter
enabling
local authentication, local switching
using the CLI
3-41
using the GUI
3-40 to 3-41
example
using the GUI
3-39 to 3-40
illustrated
3-39
configuring
3-41
link latency
and OfficeExtend access points
using the CLI
6-49 to 6-54
using the GUI
6-43 to 6-49
debugging
8-82, 8-84
6-54
described
configuring
using the CLI
8-126 to 8-127
using the GUI
8-125 to 8-126
example
6-42 to 6-43
6-43
viewing information using the CLI
Local EAP Authentication parameter
8-124
Link Status parameter
Local EAP Profiles > Edit page
3-25
Local EAP Profiles page
Link Test
8-123
option
8-123, 9-122
11-2
11-1
Local Mode AP Fast Heartbeat Timer parameter
Local Net Users > New page
link test
Local Net Users page
8-121
8-97
8-97
6-33, 15-12
6-32, 11-6
local network users
performing
using the CLI
8-124
using the GUI
8-122 to 8-123, 9-122
types of packets
Link Trap parameter
6-34 to 6-35
configuring using the GUI
6-32 to 6-34
configuring
3-25, 3-26
Load-based AC parameter
configuring using the CLI
local significant certificate (LSC)
8-121
Listener Message Processing URL parameter
4-27
4-78
using the CLI
8-49 to 8-50
using the GUI
8-46 to 8-48
described
load-based CAC
described
6-46
Local Mode AP Fast Heartbeat Timeout parameter
9-122
described
6-49
6-45
Local Management Users page
8-123
window
6-52
Local Management Users > New page
button
page
15-17
local EAP
verifying settings using the CLI
described
15-3
Local Authentication on a WLAN
3-37
guidelines
6-45
8-46
Local Significant Certificates (LSC) - AP Provisioning
page 8-47
4-75 to 4-76
enabling
Local Significant Certificates (LSC) - General page
using the GUI
4-78
local user database, capacity
lobby ambassador account
8-46
11-1
location
creating using the CLI
11-3
creating using the GUI
11-1 to 11-3
Lobby Ambassador Guest Management > Guest Users List
> New page 11-4
calibration
13-49
configuring settings using the CLI
viewing settings using the CLI
4-114 to 4-116
4-116 to 4-118
Cisco Wireless LAN Controller Configuration Guide
IN-18
OL-21524-02
Index
location appliance
sending crash information to controller
installing certificate
location-based services
location presence
uploading
4-113 to 4-114
synchronizing with controller
access point core dumps
4-114
radio core dumps
13-48
Catalyst 3750G Integrated Wireless LAN Controller
Switch E-4
Cisco 28/37/38xx Integrated Services Router
E-3
E-1
MAC address of access point
adding to controller filter list
?? to 9-25
displayed on controller GUI
10-18 to 10-19
described
8-61 to 8-62
using the GUI
login banner file
clearing
8-63 to 8-64
4-117
logical connectivity diagram
Cisco WiSM
8-60
MAC Address parameter
10-15
9-25
MAC filtering
downloading
configuring on WLANs
using the CLI
10-17 to 10-18
using the GUI
10-16 to 10-17
Login Banner page
8-65
DTIM period
7-19
MAC Filtering page
10-19
9-24
MAC Filters > New page
logs
7-17 to 7-18
9-24
management frame protection (MFP)
roaming
D-26, D-37
configuring
RSNA
D-26, D-37 to D-38
syslog
D-26, D-37 to D-38
uploading
D-17
using the GUI
D-16 to D-17
using the GUI
6-74 to 6-76
described
guidelines
long preambles
types
6-54
using the CLI
6-55
using the GUI
6-54
6-72 to ??
6-74
6-72
debug commands
management frame validation
6-77
6-73
management interface
configuring
8-66
8-44
MAC addresses displayed on controller GUI
8-65
radio core dumps
using the CLI
3-14
using the GUI
3-11 to 3-14
described
3-7
Management IP Address parameter
8-60
8-80
management over wireless
receiving debug commands from controller
retrieving radio core dumps
6-77
Management Frame Protection Settings page
8-60
disabling the reset button
6-78 to 6-80
Management Frame Protection parameter
LWAPP-enabled access points
described
6-80
viewing settings
enabling on SpectraLink NetLink phones
guidelines
6-77
debugging
using the CLI
described
using the CLI
8-61
reverting to autonomous mode
8-44 to 8-45
8-60
described
6-58
enabling
using the CLI
6-59
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-19
Index
using the GUI
using the GUI to configure
6-58
Master Controller Configuration page
Master Controller Mode parameter
Max Age parameter
roles
8-9
mesh network hierarchy
3-32
Maximum Age parameter
mesh node statistics
3-33
mesh routing
configuring using the CLI
6-31
configuring using the GUI
6-31
Maximum Number of Sessions parameter
Maximum RF Usage Per AP parameter
6-31
9-117
9-12
message logs
configuring
4-27
4-69
Max-Login Ignore Identity Response parameter
6-45
using the CLI
D-11 to D-14
using the GUI
D-8
viewing
4-78, 4-80
4-34
Member MAC Address parameter
9-119 to 9-120
Message Authentication Code Key (MACK)
parameter 6-8, 6-12
Maximum Local Database Entries parameter
Max RF Bandwidth parameter
9-12
9-3
mesh node security statistics
4-27
maximum local database entries
MCS data rates
9-2
mesh neighbors, parents, and children
8-9
Max HTTP Message Size parameter
9-128
14-13
using the CLI
D-14
using the GUI
D-10 to D-11
See also system logging
memory
types
Message Logs page
1-15
memory leaks, monitoring
D-10
Message parameter for web authentication
D-24 to D-25
Metrics Collection parameter
mesh
network example
9-101
parameters
configuring using the CLI
9-40, 9-64
configuring using the GUI
9-35 to 9-40
statistics
6-76
MFP Frame Validation parameter
6-76
7-25, 7-29
migrating access points from the -J to the -U regulatory
domain 8-111 to 8-114
Min Failed Client Count per AP parameter
viewing for an access point using the
CLI ?? to 9-104, 9-120 to 9-121
viewing for an access point using the
GUI 9-116 to 9-120
Mesh > LinkTest Results page
and CAPWAP
9-126
7-30, 7-31
7-29
7-30
Mobile Announce messages
14-7
mobility
9-1
failover
9-3
operating with Cisco 3200 Series Mobile Access
Routers
configuration guidelines
described
4-65
MMH MIC
MMH Mode parameter
9-12
13-21
mirror mode. See port mirroring, configuring
described
converting to non-mesh access points
network access
Minimum RSSI parameter
configuring
9-122
mesh access points
models
4-79
MFP Client Protection parameter
MIC
11-13
9-127
9-127
using the CLI to configure
overview
14-21
14-1
Mobility Anchor Config page
Mobility Anchor Create button
14-28
14-23
mobility anchors. See auto-anchor mobility
9-129
Cisco Wireless LAN Controller Configuration Guide
IN-20
OL-21524-02
Index
Mobility Anchors option
Mobility Anchors page
multicast groups
14-23
14-23
Mobility Group Member > New page
14-12
Mobility Group Members > Edit All page
14-14
viewing using the CLI
4-61
viewing using the GUI
4-60
Multicast Groups page
mobility groups
multicast mode
configuring
configuring
4-60
using the CLI
14-15
using the CLI
4-60
using the GUI
14-11 to 14-14
using the GUI
4-59
with one NAT device
14-8
with two NAT devices
14-9
determining when to include controllers
difference from RF groups
examples
14-7
multicast-multicast
7-75
7-75
3-52
4-59
Multicast VLAN
14-7
number of controllers supported
14-5
14-5
Using the CLI
3-53
using the GUI
3-52
multiple AP-manager interfaces
14-9 to 14-10
using with NAT devices
5500 series controller example
14-8 to 14-9
mobility group statistics
types
4-58, 8-88
Multicast page
number of access points supported
prerequisites
guidelines
Multicast Optimization
14-5
messaging among
4-57 to 4-58
Multicast-Multicast mode
13-5
14-7
illustrated
described
3-47 to 3-48
multiple country codes
configuration guidelines
14-17
viewing
8-106
configuring
using the CLI
14-20
using the CLI
8-109
using the GUI
14-17 to 14-20
using the GUI
8-107 to 8-108
mobility list
detecting failed members
14-21
number of controllers supported
ping requests to members
14-21
NAC in-band mode
Mobility Multicast Messaging > Edit page
Mobility Multicast Messaging page
mobility ping tests, running
Mobility Statistics page
Monitoring
14-14
NAC out-of-band integration
15-7
configuring
8-45, 8-66
4-65, 13-49
using the CLI
7-73 to 7-74
using the GUI
7-70 to 7-73
described
12-18
diagram
14-23, 14-29
13-24
guidelines
7-68 to 7-69
7-69
7-69 to 7-70
NAC out-of-band support
Multicast Appliance Mode parameter
multicast client table, viewing
7-68
and hybrid REAP
14-29
monitor intervals, configuring using the GUI
mpings
14-15
14-18
MODE access point button
Mode parameter
14-7
4-62
3-26
configuring for a specific access point group
using the CLI
7-74
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-21
Index
using the GUI
NAC State parameter
and NAT
7-72
8-69
configuring
7-59, 7-72, 7-73
NAT address
a personal SSID
for dynamic interface
3-19, 3-22
for management interface
3-12, 3-15
NAT devices in mobility groups
using the CLI
8-83 to 8-85
using the GUI
8-80 to 8-83
described
14-8 to 14-9
8-85 to 8-87
8-69
Native VLAN ID parameter
15-15
firewall requirements
Neighbor Discovery Packet
13-31
implementing security for
neighbor information
licensing requirements
viewing for an access point using the CLI
Neighbor Information option
trap logs
enabling
9-123
viewing for an access point using the
GUI 9-121 to 9-123
Netbios Name Servers parameter
Netmask parameter
8-87 to 8-88
OfficeExtend AP
neighbor statistics
viewing for an access point using the CLI
7-15
8-24
OfficeExtend AP parameter
online help, using
2-17
open source terms
C-8
OpenSSL license issues
7-15
Network Mobility Services Protocol (NMSP)
8-69
8-69
viewing statistics
13-24
8-80
8-80
typical setup
9-121
Neighbor Packet Frequency parameter
8-79
supported access point models
9-123
viewing for an access point using the
GUI 9-121 to 9-123
debugging
8-79
4-109
8-82
C-6 to C-8
operating system
security
4-121
software
1-4 to 1-5
1-4
modifying the notification interval for clients, RFID
tags, and rogues 4-118
Order Used for Authentication parameter
viewing settings
Override Global Config parameter
Network parameter
4-118 to 4-121
11-24, 11-31
Over-ride Global Credentials parameter
7-15
6-11, 6-26
8-35, 8-39, 8-82,
8-83
NTP server
configuring to obtain time and date
2-30
Number of Attempts to LSC parameter
8-48
Number of Hits parameter
Override Interface ACL parameter
oversized access point images
8-68
over-the-air provisioning (OTAP)
6-65
Overview of CleanAir
6-69
8-8
12-1
OfficeExtend Access Point Configuration page
OfficeExtend Access Point Home page
8-86
8-85
OfficeExtend Access Points
LEDs
D-51
OfficeExtend access points
7-23
packet capture files
described
D-51
positioning
P2P Blocking parameter
D-21
sample output in Wireshark
D-21
uploading
using the CLI
D-23
Cisco Wireless LAN Controller Configuration Guide
IN-22
OL-21524-02
Index
using the GUI
Params parameter
Passive clients
for LDAP server
D-22
for RADIUS server
8-47
6-9
for TACACS+ server
7-75
password
6-25
for wired guest access
restoring
Port parameter for IDS
4-42
password guidelines
configuring
for access point authentication
for access points
for PACs
8-38
8-34
for local net users
6-33, 15-12
passwords
viewing in clear text
6-46
on 2100 series controllers
3-2, 3-3
on 4400 series controllers
3-2, 3-3, 3-4
on 5500 series controllers
3-2, 3-4
4-114
on Cisco WiSM
overview
peer-to-peer blocking
Ports page
configuring
3-3, 3-4
3-1 to 3-6
3-23
Power Assignment Leader parameter
using the CLI
7-23 to 7-24
using the GUI
7-22 to 7-23
described
7-21
examples
7-22
guidelines
Power Injector Selection parameter
8-130
8-130
13-14
Power over Ethernet (PoE)
Personal SSID parameter
8-86
Physical Mode parameter
3-25, 3-26
Physical Status parameter
3-25
configuring
using the CLI
8-131
using the GUI
8-129 to 8-131
described
1-14, 8-128
Power Over Ethernet (PoE) parameter
8-121
Power Threshold parameter
14-29
3-25
13-13
preauthentication access control list (ACL)
13-6
PMK cache lifetime timer
7-28
7-28
PoE Status parameter
8-130
Pool End Address parameter
Pool Start Address parameter
Port > Configure page
Port Number parameter
3-25
7-15
7-15
applying to a WLAN
using the CLI
6-72
using the GUI
6-69 to 6-70
for external web server
3-27 to 3-28
11-19, 15-11
Preauthentication ACL parameter
pre-download
3-24
port mirroring, configuring
for controller
13-14
B-2
Power Neighbor Count parameter
7-22, 7-69
PMKID caching
power cable warning for Japan
Power Injector State parameter
permanent licenses, installed on 5500 series
controllers 4-3
ping tests
3-23 to 3-34
on Cisco 28/37/38xx Series Integrated Services
Router 3-3 to 3-5, 4-123, 8-54
D-7
path loss measurement (S60), CLI command
ping link test
6-113
on Catalyst 3750G Integrated Wireless LAN
Controller Switch 3-3, 3-5
10-26
PEAP parameter
11-29
ports
8-38
Password parameter
pinning
6-37
6-70, 7-65
8-27
Predownloading an image
10-11
Primary Controller Name parameter
Primary Controller parameters
8-80
8-80, 8-98, 9-30
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-23
Index
primary image pre-download
guidelines
8-27
Primary RADIUS Server parameter
priming access points
QoS
15-22
identity networking
8-8
Priority Order > Local-Auth page
levels
6-38, 6-44
Priority Order > Management User page
Priority parameter
7-40
4-68, 7-37
translation values
6-11, 6-26
with CAC
3-33
Privacy Protocol parameter
7-37
4-75
QoS profiles
4-46
probe request forwarding, configuring
probe requests, described
6-83
assigning to a WLAN
8-119
8-119
using the CLI
7-38
product authorization key (PAK)
using the GUI
7-38
obtaining for license upgrade
registering
configuring
4-3
4-6
product ID for controller, finding
product ID of controller, finding
4-24
Profile Details page
4-68 to 4-70
7-5, 7-83, 9-25, 11-29, 15-9
using the CLI
4-73 to 4-74
using the GUI
4-71 to 4-73
QoS Roles for Guest Users page
10-25
uploading
using the CLI
10-26 to 10-27
using the GUI
10-25
using with local EAP
configuring
using
3-12, 3-19
15-10
with hybrid REAP
6-75, 13-42
15-5
with NAC out-of-band integration
6-64
Protocol Type parameter
for dynamic interface
3-19
for management interface
7-27
3-12
NAC out-of-band integration
7-25
PSK Format parameter
Query Interval parameter
7-27
public key cryptography (PKC), with mobility
7-71
Quarantine parameter
4-70
PSK
described
7-38
quarantined VLAN
6-43, 15-24
Protection Type parameter
configuring
4-72
Quality of Service (QoS) parameter
Protocol parameter
15-12
configuring
protected access credentials (PACs)
overview
using the GUI
assigning for use with hybrid REAP
4-22
D-34
Profile Name parameter
4-70 to 4-71
QoS roles
4-22
Product License Registration page
using the CLI
14-7
Queue Depth parameter
queue statistics
7-71
6-113
4-69
9-118
QBSS
configuring
Radio > Statistics page
using the CLI
7-41
using the GUI
7-40 to 7-41
described
7-39
7-44
radio core dumps
described
8-60
retrieving
8-61
Cisco Wireless LAN Controller Configuration Guide
IN-24
OL-21524-02
Index
uploading
accounting
6-3
using the CLI
8-62
authentication
using the GUI
8-61 to 8-62
choosing authentication priority order
radio measurement requests
13-50
on the GUI
13-49
overview
6-11 to 6-15
using the GUI
6-6 to 6-11
described
viewing status using the CLI
6-12
KEK parameter
6-54
6-12
MACK parameter
13-5
CCX features. See CCX radio management
configuring
6-4
6-3
FIPS standard
13-51
radio resource management (RRM)
benefits
using the CLI
configuring on ACS
13-48
radio preamble
6-12
server fallback behavior
6-10, 6-13
using with hybrid REAP
15-20
RADIUS > Fallback Parameters page
monitor intervals using the GUI
RADIUS accounting attributes
13-24
6-10
6-18 to 6-19
using the CLI
13-24 to 13-28
RADIUS authentication attributes
using the GUI
13-11 to 13-24
Range (RootAP to MeshAP) parameter
coverage hole detection
13-27
configuring per controller using the
GUI 13-20 to 13-22
debugging
13-4
13-30
disabling dynamic channel and power assignment
using the CLI
13-40
using the GUI
13-39
overriding RRM
overview
13-32 to 13-40
13-1
9-69 to 9-71, 13-16 to 13-19
statically assigning channel and transmit power
settings
using the CLI
13-37
using the GUI
13-32 to 13-36
update interval
13-7, 13-10
Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC
parameter 13-13
radio resource management (RRM) settings
viewing using the CLI
radio resource monitoring
RADIUS
Refresh-time Interval parameter
Regenerate Certificate button
13-28 to 13-30
13-2
9-37
11-12
4-100
11-7
regulatory information
for 2100 series controllers
B-3
for 4400 series controllers
B-3
for lightweight access points
?? to B-2
rehosting a license. See licenses
Rehost Ticket File Name parameter
4-23
Remote Authentication Dial-In User Service. See RADIUS
Request Max Retries parameter
specifying channels
6-15 to 6-18
Redirect URL After Login parameter
configuring per controller using the CLI
described
6-11
configuring
configuring
on the CLI
6-3
Request Timeout parameter
6-45
6-45
Reserved Roaming Bandwidth parameter
Reset Link Latency button
8-126
Reset Personal SSID parameter
resetting the controller
restoring passwords
Re-sync button
4-78
8-81
10-35
4-42
6-116
reverse path filtering (RPF)
14-27
RF Channel Assignment parameter
13-39
RF Group Leader
Auto mode, Static Mode
13-6
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-25
Index
RF group leader
described
automatically containing
13-6
RF group name
described
entering
using the CLI
6-95
using the GUI
6-93
classification mapping table
13-7
classifying
13-8
RF groups
6-90
configuring RLDP
cascading
using the CLI
13-8
using the GUI
13-8
using the CLI
13-42 to 13-43
using the GUI
13-41 to 13-42
managing
difference from mobility groups
pinning
6-89
rule-based classification support
13-5
using the CLI
13-10
using the GUI
13-9 to 13-10
RF Group support
using the CLI
6-107 to 6-111
using the GUI
6-102 to 6-107
WCS support for rule-based classification
Rogue AP Detail page
13-5
RFID tags
number supported per controller
4-110
tracking
configuring using the CLI
debugging using the CLI
8-118
using the GUI
8-116 to 8-117
RF-Network Name parameter
4-111 to 4-112
configuring using the GUI
6-96 to 6-100
13-8
roaming and real-time diagnostics
D-37 to D-39
6-93, 6-94
and OfficeExtend access points
Rogue Detection parameter
logs
6-93, 8-81
using the CLI
6-94 to 6-96
using the GUI
?? to 6-94
defined
6-89
Rogue Location Discovery Protocol parameter
Rogue Policies page
6-94
6-98
Rogue Rules > Priority page
D-37
rogue states
4-64
9-92
rogue access points
13-42
6-93
6-93
Rogue Rule > Edit page
D-26
roam reason report, described
8-81, 8-84
configuring
Rogue on Wire parameter
D-26
roam reason report
6-105
Rogue Location Discovery Protocol (RLDP)
RLDP. See Rogue Location Discovery Protocol (RLDP)
configuring using the CLI
6-100 to 6-102
rogue detection
4-112
RFID tracking on access points, optimizing
using the CLI
configuring using the CLI
Rogue Client Detail page
4-110
viewing information using the CLI
viewing
6-107
rogue classification rules
4-109
described
6-92
6-103
Rogue AP Ignore-List page
described
6-89
viewing and classifying
13-6
described
6-90
tagging, location, and containment
13-5 to 13-7
viewing status
alarm
6-93 to 6-96
detecting
13-6
configuring
overview
6-91
6-99
6-91, 6-92
Role Name parameter
4-72
Role of the Controller
12-1
Role parameter
6-33, 15-12
Cisco Wireless LAN Controller Configuration Guide
IN-26
OL-21524-02
Index
root bridge
serial number of controller, finding
3-28
Root Cost parameter
3-32
Root Port parameter
3-32
serial port
baud rate setting
RRM. See radio resource management (RRM)
timeout
RSNA logs
2-24
2-24
Server Address parameter
configuring
6-113
Server Index (Priority) parameter
D-37 to D-38
described
for LDAP server
6-37
for RADIUS server
6-8
for TACACS+ server
for wireless sniffer
A-1 to A-26
Save and Reboot button
Save Licenses button
Server Key parameter
10-20, 10-23
Scan Threshold parameter
service port
4-65
8-10, 8-32, 8-56
configuring
8-134
Search WLANs window
7-8, 8-10, 8-32
Secondary Controller parameters
6-9, 6-25
6-9, 6-26, 6-38
using the CLI
3-17
using the GUI
3-11 to 3-14
described
8-98, 9-30
Secondary RADIUS Server parameter
SE-Connect
6-48, 15-24
3-5
service-port interface
Search Clients page
D-47
Server Timeout parameter
10-33
7-14
Scope Name parameter
6-25
Server Status parameter
4-8
saving configuration settings
Search AP window
3-9
session timeout
15-22
configuring
12-4, 12-24
secure web mode
using the CLI
7-32
described
using the GUI
7-31
2-18
described
enabling
7-31
using the CLI
2-19
Set Priority button
using the GUI
2-18
Set reboot time
4-18
10-14
Set to Factory Default button
security
13-24
overview
6-2
Severity Level Filtering parameter
solutions
6-1 to 6-2
Shared Secret Format parameter
Security Mode parameter
Shared Secret parameter
9-38
Security Policy Completed parameter
short preambles
local and external authentication
used to authorize access points
8-45
6-64
serial number for controller, finding
15-22
4-24
6-55
6-54
8-92
shunned clients
described
self-signed certificate (SSC)
6-8, 6-25
6-8, 6-25
Show Wired Clients option
9-36
Select APs from Current Controller parameter
D-8
Short Preamble Enabled parameter
7-51
security settings
Sequence parameter
6-8, 6-25, 6-37
Server IP Address parameter
D-26
safety warnings
4-22
6-115
viewing
using the CLI
6-116
using the GUI
6-116
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-27
Index
Signature Events Detail page
Signature Events Summary page
SSC key-hash on Cisco WiSM
4-44 to 4-45
changing default values using the GUI
4-43 to 4-44
using the CLI
SNMP v1 / v2c Community page
4-44
using the CLI
D-49 to D-50
using the GUI
D-48 to D-49
SSH parameter
4-43
SNMP v3 users
2-36 to 2-37
troubleshooting access points
4-43
SNMP v1 / v2c Community > New page
D-49
SSID
changing default values using the CLI
4-47
changing default values using the GUI
4-45 to 4-47
SNMP V3 Users > New page
SNMP V3 Users page
4-46
configuring
using the CLI
7-6
using the GUI
7-5
described
4-45
software, upgrading
7-2
SSL certificate
generating
10-1 to 10-3
using the CLI
10-8 to 10-10
using the GUI
10-5 to 10-7
using the CLI
10-3 to 10-5
Source parameter for ACLs
Source Port parameter
using the CLI
2-21 to 2-22
using the GUI
2-20 to 2-21
SSL protocol
6-64
2-18
SSLv2, configuring for web administration
6-65
Spanning Tree Algorithm parameter
2-20
loading
software, upgrading in mesh networks
guidelines
3-33
Spanning Tree Protocol (STP)
SSLv2 for web authentication, disabling
Standard Signature > Detail page
configuring
Standard Signatures page
3-33 to 3-34
stateful DHCPv6 IP addressing
using the GUI
3-29 to 3-33
State parameter
6-122
7-50
6-113, 6-123
configuring
3-28
Spanning Tree Specification parameter
3-32
SpectraLink NetLink phones
enabling long preambles
using the CLI
8-67 to 8-68
using the GUI
8-66 to 8-67
described
8-66
using the CLI
6-55
Static IP parameter
using the GUI
6-54
Static Mobility Group Members page
overview
11-12
static IP address
3-28
spanning-tree root
2-19
6-121
using the CLI
described
8-82, 8-84
configuring
changing default values using the CLI
guidelines
8-44
and OfficeExtend access points
4-42 to 4-43
SNMP community string
SNMP engine Id
7-65
SSH
D-47
SNMP, configuring
7-63
Splash Page Web Redirect parameter
D-44
4-95
12-23
splash page web redirect
6-124
6-38
sniffing. See wireless sniffing
Sniff parameter
Spectrum Expert
6-123
Signature Events Track Detail page
Simple Bind parameter
Spectralink Voice Priority parameter
6-124
6-54
Statistics option
8-67
14-12
9-116
Cisco Wireless LAN Controller Configuration Guide
IN-28
OL-21524-02
Index
Status parameter
removing from controller
for DHCP scopes
for guest LANs
configuring
3-30
STP Port Designated Bridge parameter
3-29
STP Port Designated Cost parameter
3-29
STP Port Designated Port parameter
3-30
STP Port Designated Root parameter
STP Port Path Cost parameter
STP Port Priority parameter
STP State parameter
strong passwords
Summary page
3-30
described
3-30
8-38
2-36
system resources
viewing using the CLI
D-5
viewing using the GUI
D-5
6-20
authentication
4-121 to ??
6-19
authorization
4-121
6-19
choosing authentication priority order
15-7 to 15-8
3-4
using the CLI
6-26 to 6-28
using the GUI
6-24 to 6-26
configuring on ACS
14-27
described
14-26 to 14-28
roles
6-20 to 6-24
6-19 to 6-20
6-19, 6-23
viewing administration server logs
using the CLI
14-28
using the GUI
14-28
6-26
configuring
14-23
verifying status
6-29 to 6-30
TACACS+ (Authentication, Authorization, or
Accounting) Servers > New page 6-25
Symmetric Mobility Tunneling Mode parameter
syslog
logs
D-5
accounting
symmetric mobility tunneling
levels
System Resource Information page
TACACS+
SX/LC/T small form-factor plug-in (SFP) modules
described
D-9
3-29
Switch IP Address (Anchor) parameter
overview
D-8 to D-10
3-31
switch, configuring at the remote site
illustrated
using the GUI
D-14
3-30
Supervisor 720
configuring
D-11 to D-14
system logs, viewing using the CLI
3-29
STP Port Path Cost Mode parameter
using the CLI
setting severity level
3-29
STP Port Forward Transitions Count parameter
STP Port ID parameter
D-8
system logging
4-44
7-6, 7-83
STP Mode parameter
D-8
Syslog Server IP Address parameter
11-30
for SNMP community
for WLANs
severity level filtering
7-15
D-8
14-28
TACACS+ (Authentication, Authorization, or
Accounting) Servers page 6-24
TACACS+ (Cisco) page (on CiscoSecure ACS)
D-26
TACACS+ Administration .csv page (on CiscoSecure
ACS) 6-29, 6-30
D-9
D-37 to D-38
Syslog Configuration page
Syslog Facility parameter
6-22
TCP MSS
D-8
configuring
D-9
described
syslog server
number supported by controller
8-127 to 8-128
8-127
Telnet
D-8
Cisco Wireless LAN Controller Configuration Guide
OL-21524-02
IN-29
Index
and OfficeExtend access points
8-82, 8-84
troubleshooting access points
using the CLI
D-49 to D-50
using the GUI
D-48 to D-49
Telnet parameter
using the CLI
4-90 to 4-91
using the GUI
4-83 to 4-85
Transfer Mode parameter
downloading a CA certificate
downloading a configuration file
D-49
Telnet sessions
using the CLI
2-36 to 2-37
using the GUI
2-34 to 2-36
Telnet-SSH Configuration page
Tertiary Controller parameters
text2pcap sample output
downloading a device certificate
2-35
10-7
uploading a configuration file
10-28
10-26
uploading packet capture files
Transition Time parameter
10-2
10-20
upgrading controller software
uploading a PAC
8-98, 9-31
D-43
TFTP server guidelines
D-22
4-65
transmit power
time, configuring
using the CLI
2-32
using the NTP server
2-29
time-length-values (TLVs), supported for CDP
timeout, configuring for disabled clients
Time Since Topology Changed parameter
4-97
7-18
3-32
statically assigning using the CLI
13-37
statically assigning using the GUI
13-32 to 13-36
transmit power levels
for OfficeExtend access points
Time to Live for the PAC parameter
troubleshooting
time zone
8-80
4-3, 7-44
access point join process
configuring using the CLI
2-32
CCXv5 clients
configuring using the GUI
2-32
problems
TKIP
13-25
trap logs
Trap Logs page
6-48, 15-24
13-36
transmit power threshold, decreasing
timestamps, enabling or disabling in log and debug
messages D-13
To
10-30
downloading a customized web authentication login
page 11-21
configuring
8-53 to 8-60
D-25 to D-39
D-6 to D-7
Troubleshooting OEAPs
configuring
10-23
D-51
tunnel attributes and identity networking
7-27, 7-28
described
7-25
Tx Power Level Assignment parameter
parameter
7-27
Type parameter
6-85 to 6-86
13-40
7-5, 7-83, 11-29, 15-9
6-66
Topology Change Count parameter
3-32
traffic specifications (TSPEC) request
described
4-76
examples
4-76
U-APSD
described
traffic stream metrics (TSM)
configuring
using the GUI
described
4-79
4-77
viewing statistics
4-77
viewing status
using the CLI
4-90
using the GUI
4-82
UDP, use in RADIUS
UDP port
6-3
14-23, 14-29
Cisco Wireless LAN Controller Configuration Guide
IN-30
OL-21524-02

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04
Modify Date                     : 2011:08:02 09:59:04-04:00
Create Date                     : 2011:08:02 09:59:02-04:00
Metadata Date                   : 2011:08:02 09:59:04-04:00
Creator Tool                    : FrameMaker 7.2
Format                          : application/pdf
Document ID                     : uuid:3c3f3864-ad4c-4efb-b476-0a8c12fcc3b3
Instance ID                     : uuid:3816c896-b339-47cf-9b80-d300287d8af6
Producer                        : Acrobat Distiller 9.0.0 (Windows)
Page Count                      : 46
Creator                         : FrameMaker 7.2
EXIF Metadata provided by EXIF.tools
FCC ID Filing: LDK102075

Navigation menu