Cisco Systems 102075 Cisco Aironet 802.11n Dual Band Access Points User Manual Cisco Wireless LAN Controller Configuration Guide 10
Cisco Systems Inc Cisco Aironet 802.11n Dual Band Access Points Cisco Wireless LAN Controller Configuration Guide 10
Contents
- 1. User manual
- 2. Cisco Wireless LAN Controller Configuration Guide_1
- 3. Cisco Wireless LAN Controller Configuration Guide_2
- 4. Cisco Wireless LAN Controller Configuration Guide_3
- 5. Cisco Wireless LAN Controller Configuration Guide_4
- 6. Cisco Wireless LAN Controller Configuration Guide_5
- 7. Cisco Wireless LAN Controller Configuration Guide_6
- 8. Cisco Wireless LAN Controller Configuration Guide_7
- 9. Cisco Wireless LAN Controller Configuration Guide_8
- 10. Cisco Wireless LAN Controller Configuration Guide_9
- 11. Cisco Wireless LAN Controller Configuration Guide_10
- 12. Cisco Wireless LAN Controller Configuration Guide_11
- 13. User Manual
Cisco Wireless LAN Controller Configuration Guide_10
Appendix D Troubleshooting Configuring Wireless Sniffing • Wireshark Note The latest version of Wireshark can decode the packets by going to the Anaylze mode. Select decode as, and switch UDP5555 to decode as AIROPEEK. Note You must disable IP-MAC address binding in order to use an access point in sniffer mode if the access point is joined to a Cisco 5500 Series Controller, a Cisco 2100 Series Controller, or a controller network module that runs software release 6.0 or later releases. To disable IP-MAC address binding, enter the config network ip-mac-binding disable command in the controller CLI. See the “Configuring IP-MAC Address Binding” section on page 4-67 for more information. Note You must enable WLAN 1 in order to use an access point in sniffer mode if the access point is joined to a Cisco 5500 Series Controller, a Cisco 2100 Series Controller, or a controller network module that runs software release 6.0 or later releases. If WLAN 1 is disabled, the access point cannot send packets. Prerequisites for Wireless Sniffing To perform wireless sniffing, you need the following hardware and software: • A dedicated access point—An access point configured as a sniffer cannot simultaneously provide wireless access service on the network. To avoid disrupting coverage, use an access point that is not part of your existing wireless network. • A remote monitoring device—A computer capable of running the analyzer software. • Windows XP or Linux operating system—The controller supports sniffing on both Windows XP and Linux machines. • Software and supporting files, plug-ins, or adapters—Your analyzer software may require specialized files before you can successfully enable Using the GUI to Configure Sniffing on an Access Point To configure sniffing on an access point using the controller GUI, follow these steps: Step 1 Choose Wireless > Access Points > All APs to open the All APs page. Step 2 Click the name of the access point that you want to configure as the sniffer. The All APs > Details for page appears (see Figure D-14). Cisco Wireless LAN Controller Configuration Guide OL-21524-02 D-45 Appendix D Troubleshooting Configuring Wireless Sniffing Figure D-14 All APs > Details for Page Step 3 From the AP Mode drop-down list, choose Sniffer. Step 4 Click Apply to commit your changes. Step 5 Click OK when warned that the access point will be rebooted. Step 6 Choose Wireless > Access Points > Radios > 802.11a/n (or 802.11b/g/n) to open the 802.11a/n (or 802.11b/g/n) Radios page. Step 7 Hover your cursor over the blue drop-down arrow for the desired access point and choose Configure. The 802.11a/n (or 802.11b/g/n) Cisco APs > Configure page appears (see Figure D-15). Cisco Wireless LAN Controller Configuration Guide D-46 OL-21524-02 Appendix D Troubleshooting Configuring Wireless Sniffing Figure D-15 802.11a/n Cisco APs > Configure Page Step 8 Unselect the Sniff check box to enable sniffing on this access point, or leave it unselected to disable sniffing. The default value is unchecked. Step 9 If you enabled sniffing in Step 8, follow these steps: a. From the Channel drop-down list, choose the channel on which the access point sniffs for packets. b. In the Server IP Address text box, enter the IP address of the remote machine running Omnipeek, Airopeek, AirMagnet, or Wireshark. Step 10 Click Apply to commit your changes. Step 11 Click Save Configuration to save your changes. Using the CLI to Configure Sniffing on an Access Point To configure sniffing on an access point using the controller CLI, follow these steps: Step 1 To configure the access point as a sniffer, enter this command: config ap mode sniffer Cisco_AP where Cisco_AP is the access point configured as the sniffer. Step 2 When warned that the access point will be rebooted and asked if you want to continue, enter Y. The access point reboots in sniffer mode. Step 3 To enable sniffing on the access point, enter this command: config ap sniff {802.11a | 802.11b} enable channel server_IP_address Cisco_AP Cisco Wireless LAN Controller Configuration Guide OL-21524-02 D-47 Appendix D Troubleshooting Troubleshooting Access Points Using Telnet or SSH where – channel is the radio channel on which the access point sniffs for packets. The default values are 36 (802.11a/n) and 1 (802.11b/g/n). – server_IP_address is the IP address of the remote machine running Omnipeek, Airopeek, AirMagnet, or Wireshark. – Cisco_AP is the access point configured as the sniffer. Note Step 4 To disable sniffing on the access point, enter the config ap sniff {802.11a | 802.11b} disable Cisco_AP command. To save your changes, enter this command: save config Step 5 To view the sniffer configuration settings for an access point, enter this command: show ap config {802.11a | 802.11b} Cisco_AP Information similar to the following appears: Cisco AP Identifier................................ 17 Cisco AP Name.......................................... AP1131:46f2.98ac ... AP Mode ........................................... Sniffer Public Safety ..................................... Global: Disabled, Local: Disabled Sniffing .............................................. No ... Troubleshooting Access Points Using Telnet or SSH The controller supports the use of the Telnet and Secure Shell (SSH) protocols to troubleshoot lightweight access points. Using these protocols makes debugging easier, especially when the access point is unable to connect to the controller. • To avoid potential conflicts and security threats to the network, the following commands are unavailable while a Telnet or SSH session is enabled: config terminal, telnet, ssh, rsh, ping, traceroute, clear, clock, crypto, delete, fsck, lwapp, mkdir, radius, release, reload, rename, renew, rmdir, save, set, test, upgrade. • Commands available during a Telnet or SSH session include debug, disable, enable, help, led, login, logout, more, no debug, show, systat, undebug, where. You can configure Telnet or SSH by using the controller CLI in software release 5.0 or later releases or using the controller GUI in software release 6.0 or later releases. Note See the “Configuring Telnet and SSH Sessions” section on page 2-34 for instructions on configuring Telnet or SSH sessions on the controller. Cisco Wireless LAN Controller Configuration Guide D-48 OL-21524-02 Appendix D Troubleshooting Troubleshooting Access Points Using Telnet or SSH Using the GUI to Troubleshoot Access Points Using Telnet or SSH To enable Telnet or SSH access (or both) on lightweight access points using the controller GUI, follow these steps: Step 1 Choose Wireless > Access Points > All APs to open the All APs page. Step 2 Click the name of the access point for which you want to enable Telnet or SSH. Step 3 Choose the Advanced tab to open the All APs > Details for (Advanced) page (see Figure D-16). Figure D-16 All APs > Details for (Advanced) Page Step 4 To enable Telnet connectivity on this access point, select the Telnet check box. The default value is unchecked. Step 5 To enable SSH connectivity on this access point, select the SSH check box. The default value is unchecked. Step 6 Click Apply to commit your changes. Step 7 Click Save Configuration to save your changes. Using the CLI to Troubleshoot Access Points Using Telnet or SSH To enable Telnet or SSH access (or both) on lightweight access points using the controller CLI, follow these steps: Step 1 To enable Telnet or SSH connectivity on an access point, enter this command: config ap {telnet | ssh} enable Cisco_AP The default value is disabled. Cisco Wireless LAN Controller Configuration Guide OL-21524-02 D-49 Appendix D Troubleshooting Debugging the Access Point Monitor Service To disable Telnet or SSH connectivity on an access point, enter this command: config ap {telnet | ssh} disable Cisco_AP Note Step 2 To save your changes, enter this command: save config Step 3 To see whether Telnet or SSH is enabled on an access point, enter this command: show ap config general Cisco_AP Information similar to the following appears: Cisco AP Identifier.............................. Cisco AP Name.................................... Country code..................................... Reg. Domain allowed by Country................... AP Country code.................................. AP Regulatory Domain............................. Switch Port Number .............................. MAC Address...................................... IP Address Configuration......................... IP Address....................................... IP NetMask....................................... Gateway IP Addr.................................. Domain........................................... Name Server...................................... Telnet State..................................... Ssh State........................................ ... AP33 Multiple Countries:US,AE,AR,AT,AU,BH 802.11bg:-ABCENR 802.11a:-ABCEN US - United States 802.11bg:-A 802.11a:-A 00:19:2f:11:16:7a Static IP assigned 10.22.8.133 255.255.248.0 10.22.8.1 Enabled Enabled Debugging the Access Point Monitor Service The controller sends access point status information to the Cisco 3300 Series Mobility Services Engine (MSE) using the access point monitor service. The MSE sends a service subscription and an access point monitor service request to get the status of all access points currently known to the controller. When any change is made in the status of an access point, a notification is sent to the MSE. Using the CLI to Debug Access Point Monitor Service Issues If you experience any problems with the access point monitor service, enter this command: debug service ap-monitor {all | error | event | nmsp | packet} {enable | disable} where • all configures debugging of all access point status messages. • error configures debugging of access point monitor error events. • event configures debugging of access point monitor events. • nmsp configures debugging of access point monitor NMSP events. • packet configures debugging of access point monitor packets. Cisco Wireless LAN Controller Configuration Guide D-50 OL-21524-02 Appendix D Troubleshooting Troubleshooting OfficeExtend Access Points • enable enables the debub service ap-monitor mode. • disable disables the debug service ap-monitor mode. Troubleshooting OfficeExtend Access Points This section provides troubleshooting information if you experience any problems with your OfficeExtend access points. Interpreting OfficeExtend LEDs The LED patterns are different for 1130 series and 1140 series OfficeExtend access points. See the Cisco OfficeExtend Access Point Quick Start Guide for a description of the LED patterns. You can find this guide at this URL: http://www.cisco.com/en/US/products/hw/wireless/index.html Positioning OfficeExtend Access Points for Optimal RF Coverage When positioning your OfficeExtend access point, consider that its RF signals are emitted in a cone shape spreading outward from the LED side of the access point (see Figure D-17). Be sure to mount the access point so that air can flow behind the metal back plate and prevent the access point from overheating. Figure D-17 OfficeExtend Access Point Radiation Patterns Troubleshooting Common Problems Most of the problems experienced with OfficeExtend access points are one of the following: • The access point cannot join the controller because of network or firewall issues. Resolution: Follow the instructions in the “Viewing Access Point Join Information” section on page 8-55 to view join statistics for the OfficeExtend access point, or find the access point’s public IP address and perform pings of different packet sizes from inside the company. • The access point joins but keeps dropping off. This behavior usually occurs because of network problems or when the network address translation (NAT) or firewall ports close because of short timeouts. Cisco Wireless LAN Controller Configuration Guide OL-21524-02 D-51 Appendix D Troubleshooting Troubleshooting OfficeExtend Access Points Resolution: Ask the teleworker for the LED status. • Clients cannot associate because of NAT issues. Resolution: Ask the teleworker to perform a speed test and a ping test. Some servers do not return big packet pings. • Clients keep dropping data. This behavior usually occurs because the home router closes the port because of short timeouts. Resolution: Perform client troubleshooting in WCS to determine if the problem is related to the OfficeExtend access point or the client. • The access point is not broadcasting the enterprise WLAN. Resolution: Ask the teleworker to check the cables, power supply, and LED status. If you still cannot identify the problem, ask the teleworker to try the following: – Connect to the home router directly and see if the PC is able to connect to an Internet website such as http://www.cisco.com/. If the PC cannot connect to the Internet, check the router or modem. If the PC can connect to the Internet, check the home router configuration to see if a firewall or MAC-based filter is enabled that is blocking the access point from reaching the Internet. – Log into the home router and check to see if the access point has obtained an IP address. If it has, the access point’s LED normally blinks orange. • The access point cannot join the controller, and you cannot identify the problem. Resolution: A problem could exist with the home router. Ask the teleworker to check the router manual and try the following: – Assign the access point a static IP address based on the access point’s MAC address. – Put the access point in a demilitarized zone (DMZ), which is a small network inserted as a neutral zone between a company’s private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. – If problems still occur, contact your company’s IT department for assistance. • The teleworker experiences problems while configuring a personal SSID on the access point. Resolution: Clear the access point configuration and return it to factory default settings by clicking Clear Config on the access point GUI or by entering the clear ap config Cisco_AP command and then follow the steps in the “Configuring a Personal SSID on an OfficeExtend Access Point” section on page 8-85 to try again. If problems still occur, contact your company’s IT department for assistance. • The home network needs to be rebooted. Resolution: Ask the teleworker to follow these steps: a. Leave all devices networked and connected, and then power down all the devices. b. Turn on the cable or DSL modem, and then wait for 2 minutes. (Check the LED status.) c. Turn on the home router, and then wait for 2 minutes. (Check the LED status.) d. Turn on the access point, and then wait for 5 minutes. (Check the LED status.) e. Turn on the client. Cisco Wireless LAN Controller Configuration Guide D-52 OL-21524-02 A P P E N D I X Logical Connectivity Diagrams This appendix provides logical connectivity diagrams for the controllers integrated into other Cisco products, specifically the Catalyst 3750G Integrated Wireless LAN Controller Switch, the Cisco WiSM, and the Cisco 28/37/38xx Series Integrated Services Router. These diagrams show the internal connections between the switch or router and the controller. The software commands used for communication between the devices are also provided. This appendix contains these sections: • Cisco WiSM, page E-1 • Cisco 28/37/38xx Integrated Services Router, page E-3 • Catalyst 3750G Integrated Wireless LAN Controller Switch, page E-4 Cisco WiSM Figure E-1 shows the logical connectivity for the Cisco WiSM. Cisco Wireless LAN Controller Configuration Guide OL-21524-02 E-1 Appendix E Logical Connectivity Diagrams Cisco WiSM Figure E-1 Logical Connectivity Diagram for the Cisco WiSM Catalyst 6500 WiSM or Cisco 7600 Series Router WiSM Various Switch or Router Blades providing 100M/Gig/PoE/SFP Ports 2 SFP Ports RS-232 Serial at 9600 baud Supervisor 720 Console Switch or Router Motherboard Memory Boot Flash Flash File System Flash File System on CF Card Disk 0 Disk 1 Ethernet 4 Gig E Ports Memory 4404 Controller-A Hidden Port 9 Boot Flash Controller Motherboard Console Gig E Service RS-232 Serial at 9600 baud Ethernet Hidden Port 5 Port 6 Port 7 Port 8 Ethernet 4 Gig E Ports Memory 4404 Controller-B Hidden Port 10 Flash File System on CF Card Do not remove Boot Flash Flash File System on CF Card Do not remove Controller Motherboard Gig E Service Ethernet Console RS-232 Serial at 9600 baud 155912 Hidden Port 1 Port 2 Port 3 Port 4 The commands used for communication between the Cisco WiSM, the Supervisor 720, and the 4404 controllers are documented in Configuring a Cisco Wireless Services Module and Wireless Control System at this URL: Cisco Wireless LAN Controller Configuration Guide E-2 OL-21524-02 Appendix E Logical Connectivity Diagrams Cisco 28/37/38xx Integrated Services Router http://www.cisco.com/en/US/docs/wireless/technology/wism/technical/reference/appnote.html#wp394 98 Cisco 28/37/38xx Integrated Services Router Figure E-2 shows the logical connectivity for the Cisco 28/37/38xx integrated services router. Figure E-2 Logical Connectivity Diagram for the Cisco 28/37/38xx Integrated Services Router Console 28/37/38xx Integrated Services Router Memory Router CPU (Cisco IOS Software) Flash Internal Ethernet Interface Internal Ethernet Interface 1 CPU Memory Compact Flash 230621 Controller Network Module StrataFlash These commands are used for communication between the 28/37/38xx Integrated Services Router and the controller network module. They are initiated from the router. The commands vary depending on the version of the network module. These commands are used for communication between the router and Fast Ethernet versions of the controller network module: • interface wlan-controller slot/unit (and support for subinterfaces with dot1q encap) • show interfaces wlan-controller slot/unit • show controllers wlan-controller slot/unit • test service-module wlan-controller slot/unit • test HW-module wlan-controller slot/unit reset {enable | disable} • service-module wlan-controller slot/port {reload | reset | session [clear] | shutdown | status} These commands are used for communication between the router and Gigabit Ethernet versions of the controller network module: • interface integrated-service-engine slot/unit (and support for subinterfaces with dot1q encap) • show interfaces integrated-service-engine slot/unit • show controllers integrated-service-engine slot/unit • test service-module integrated-service-engine slot/unit • test HW-module integrated-service-engine slot/unit reset {enable | disable} Cisco Wireless LAN Controller Configuration Guide OL-21524-02 E-3 Appendix E Logical Connectivity Diagrams Catalyst 3750G Integrated Wireless LAN Controller Switch • Note service-module integrated-service engine slot/port {reload | reset | session [clear] | shutdown | status} See the Cisco Wireless LAN Controller Network Module Feature Guide for more information. You can find this document at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124newft/124limit/124x/124xa2/bo xernm.htm#wp2033271 Catalyst 3750G Integrated Wireless LAN Controller Switch Figure E-3 shows the logical connectivity for the catalyst 3750G integrated wireless LAN. Figure E-3 Logical Connectivity Diagram for the Catalyst 3750G Integrated Wireless LAN Controller Switch RS-232 Serial at 9600 baud G1/0/1 through G1/0/24 G1/0/25 G1/0/26 Console 24 Gig PoE Ports 2 SFP Ports 3750G Switch Switch Motherboard Memory Hidden G1/0/27 G1/0/28 2 SFP Ports Hidden Port 1 Port 2 2 SFP Ports Memory 4402 Controller Boot Flash Flash File System Boot Flash Flash File System on CF Card Do not remove Console Gig E Service RS-232 Serial at 9600 baud Ethernet 155911 Controller Motherboard Cisco Wireless LAN Controller Configuration Guide E-4 OL-21524-02 Appendix E Logical Connectivity Diagrams Catalyst 3750G Integrated Wireless LAN Controller Switch RS-232 Serial at 9600 baud G1/0/1 through G1/0/24 G1/0/25 G1/0/26 Console 24 Gig PoE Ports 2 SFP Ports 3750G Switch Switch Motherboard Memory Hidden G1/0/27 G1/0/28 2 SFP Ports Hidden Port 1 Port 2 2 SFP Ports Memory 4402 Controller Boot Flash Flash File System Boot Flash Flash File System on CF Card Do not remove Console Gig E Service RS-232 Serial at 9600 baud Ethernet 155911 Controller Motherboard These commands are used for communication between the Catalyst 3750G switch and the 4402 controller. Login Command This command is used to initiate a telnet session from the switch to the controller: session switch_number processor 1 Because there can be several switches in a stack, the switch_number parameter is used to indicate to which controller in the stack this session should be directed. Once a session is established, the user interacts with the controller CLI. Entering exit terminates the session and returns the user to the switch CLI. Show Commands These commands are used to view the status of the internal controller. They are initiated from the switch. • show platform wireless-controller switch_number summary Information similar to the following appears: Switch • Status up up State operational operational show platform wireless-controller switch_number status Cisco Wireless LAN Controller Configuration Guide OL-21524-02 E-5 Appendix E Logical Connectivity Diagrams Catalyst 3750G Integrated Wireless LAN Controller Switch Information similar to the following appears: Switch Service IP Management IP SW Version Status ------+---------------+---------------+---------------+------1 127.0.1.1 70.1.30.1 4.0.52.0 operational 127.0.1.2 70.1.31.1 4.0.45.0 operational • show platform wireless-controller switch_number management-info sw vlan ip 1 0 70.1.30.1/16 2 0 70.1.31.1/16 gateway 70.1.1.1 70.1.1.1 http https mac version 0016.9dca.d963 4.0.52.0 0016.9dca.dba3 4.0.45.0 Debug Commands The Wireless Control Protocol (WCP) is an internal keep-alive protocol that runs between the switch and the controller. It enables the switch to monitor the health of the controller and to report any problems. It uses UDP and runs over the two internal Gigabit ports, but it creates an internal VLAN 4095 to separate control traffic from data traffic. Every 20 seconds the switch sends a keep-alive message to the controller. If the controller does not acknowledge 16 consecutive keep-alive messages, the switch declares the controller dead and sends a reset signal to reboot the controller. These commands are used to monitor the health of the internal controller. This command is initiated from the controller. • debug wcp ? where ? is one of the following: packet—Debugs WCP packets. events—Debugs WCP events. Information similar to the following appears: Tue Tue Tue Tue Tue Tue Tue Tue Tue Feb Feb Feb Feb Feb Feb Feb Feb Feb 23:30:31 23:30:31 23:30:31 23:30:51 23:30:51 23:30:51 23:31:11 23:31:11 23:31:11 2006: 2006: 2006: 2006: 2006: 2006: 2006: 2006: 2006: Received WCP_MSG_TYPE_REQUEST Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE Received WCP_MSG_TYPE_REQUEST Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE Received WCP_MSG_TYPE_REQUEST Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE This command is initiated from the switch. • debug platform wireless-controller switch_number ? where ? is one of the following: all—All errors—Errors packets—WCP packets sm—State machine wcp—WCP protocol Cisco Wireless LAN Controller Configuration Guide E-6 OL-21524-02 Appendix E Logical Connectivity Diagrams Catalyst 3750G Integrated Wireless LAN Controller Switch Reset Commands These two commands (in this order) are used to reset the controller from the switch. They are not yet available but will be supported in a future release. Note • test wireless-controller stop switch_number • test wireless-controller start switch_number A direct console connection to the controller does not operate when hardware flow control is enabled on the PC. However, the switch console port operates with hardware flow control enabled. Cisco Wireless LAN Controller Configuration Guide OL-21524-02 E-7 Appendix E Logical Connectivity Diagrams Catalyst 3750G Integrated Wireless LAN Controller Switch Cisco Wireless LAN Controller Configuration Guide E-8 OL-21524-02 INDEX 802.11a > RRM > Coverage page Symbols 802.11a > RRM > DCA page D-5 11n Mode parameter and PoE Status field 8-130 8-128 transmit power settings when using PoE 3DES IPSec data encryption 802.11a Global Parameters page 13-44 configuring using the CLI 4-31 to 4-33 configuring using the GUI 4-29 to 4-31 802.11g Support parameter 8-129 802.11h, described 6-9 8-117, D-47 4-30 4-38 802.11h Global Parameters page 7-41 7920 Client CAC parameter 4-38 802.11h parameters, configuring 7-41 7920 support mode 7-39 using the CLI 4-39 using the GUI 4-38 to 4-39 802.11n 7-39 7921 support mode 13-23 802.11 bands operating modes when using PoE 7920 AP CAC parameter 802.11a > RRM > General page 802.11b/g/n Cisco APs > Configure page 4-34 1250 series access points described 13-17 802.11a > RRM > Dynamic Channel Assignment (DCA) page 13-17 Numerics configuring 13-21 clients 7-40 802.11a (or 802.11b) > Client Roaming page 802.11a (or 802.11b) > Voice Parameters page configuring 4-64 4-78, 4-80, 4-85 802.11a (or 802.11b/g) > EDCA Parameters page 8-133 4-94 using the CLI 4-35 to 4-37 using the GUI 4-33 to 4-35 devices 4-33 802.11a (or 802.11b/g) Global Parameters > Auto RF page 13-9 802.11n (2.4 GHz) High Throughput page 802.11a (or 802.11b/g) Global Parameters page 802.1X 4-29, 13-49 802.11a (or 802.11b/g) Network Status parameter 4-30, 4-38 802.11a/n (4.9 GHz) > Configure page 802.11a/n Cisco APs > Configure page configuring described 9-128 802.11a/n (or 802.11b/g/n) Cisco APs > Configure page 13-33 802.11a/n (or 802.11b/g/n) Radios page 802.1Q VLAN trunk port 4-83, 13-32, 13-45 9-19, 13-46 802.11a/n Radios page (from Monitor Menu) 8-31 802.11a/n Radios page (from Wireless Menu) 8-31 4-34 3-5 7-24 7-25 dynamic key settings 7-24 802.1X+CCKM configuring described 7-27 7-26 802.1X authentication for access points configuring Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-1 Index the switch using with the debug facility 8-41 D-40 to D-41 using the CLI 8-39 to 8-41 Access Control Lists > Edit page 6-65 using the GUI 8-38 to 8-39 Access Control Lists > New page 6-63 described Access Control Lists > Rules > New page 8-37 802.1x Authentication parameter Access Control Lists page 8-38 802.3 bridging Access Mode parameter configuring using the CLI 4-56 configuring using the GUI 4-55 to 4-56 802.3 Bridging parameter 802.3 frames 6-62 4-44, 4-46 access point assisted roaming, described 9-92 access point core dumps, uploading 4-56 4-55 802.3X flow control, enabling 6-63 4-54 using the CLI 8-63 using the GUI 8-63 access point count, approved tiers for 5500 series controllers 4-4 access point event logs, viewing access point groups AAA override assigning access points to configuring using the CLI 6-88 using the GUI 6-88 described B-2 Access Control List Name parameter 6-63 7-61 using the GUI 7-60 using the CLI 7-60 to 7-61 using the GUI 7-57 to 7-60 default group access control lists (ACLs) applying to an interface using the CLI using the CLI creating 6-86 AC adapter warning for Japan 6-71 7-57 described 7-55 illustrated 7-56 removing applying to a WLAN using the CLI 6-72 using the GUI 6-68 to 6-69 using the CLI 6-72 using the GUI 6-67 to 6-68 using the CLI 7-61 using the GUI 7-58 viewing applying to the controller CPU 7-61 to 7-62 access point monitor service, debugging access point radios, searching for D-50 8-31 to 8-32 access points configuring using the CLI 6-70 to 6-71 using the GUI 6-62 to 6-66 20-MHz channelization 13-33 40-MHz channelization 13-34 adding MAC address to controller filter list counters configuring using the CLI 6-70 configuring using the GUI 6-63 described 6-61 identity networking rules D-15 6-84 6-62, 6-64, 6-71 using the GUI ?? to 9-25 assisted roaming 4-63 authorization list 8-51 authorizing using LSCs 8-46 to 8-50 Cisco Wireless LAN Controller Configuration Guide IN-2 OL-21524-02 Index using MICs 8-46 AdHoc Rogue AP parameter using SSCs 8-45 administrator access 6-94 4-41 using the CLI 8-51 administrator usernames and passwords, configuring using the GUI 8-50 Admin Status parameter configuring hybrid REAP using the CLI converting to mesh access points embedded 15-16 to 15-17 Admission Control (ACM) parameter AES-CCMP 8-41 guidelines for operating in Japan 3-25, 3-26 AES CBS IPSec data encryption 9-124 LEDs 4-78, 4-80 6-10 7-25 AES parameter B-1 7-27 Aggregated MAC Protocol Data Unit (A-MPDU) configuring 8-132 Aggregated MAC Service Data Unit (A-MSDU) interpreting D-2 aggregation method, specifying 4-35 migrating from the -J regulatory domain to the -U regulatory domain 8-111 to 8-114 AirMagnet Enterprise Analyzer D-44 number supported per controller Aironet IEs priming 3-5 8-8 regulatory information searching for ?? to B-2 8-10 to 8-12 supporting oversized images 15-1 VCI strings D-48 to D-50 8-58 to 8-60 using the GUI 8-55 to 8-58 viewing multicast client table Accounting Server parameters configuring CDP 4-62 13-42 configuring country codes 7-66 configuring link latency configuring PoE 6-67, 6-68 ACS server configuration page 9-122 9-117 4-101 All APs > Details for (Advanced) page 7-67 ACL. See access control lists (ACLs) 8-4, 8-63, D-49 8-108 8-125 8-130 All APs > Details for (Credentials) page 7-64 All APs > Details for (General) page 6-65 8-34, 8-38, 8-82 8-67, 8-80, 15-14 All APs > Details for (High Availability) page 6-133 8-80, 8-98, 8-102 Add AAA Client page (on CiscoSecure ACS) 15-22 Add Web Server button D-44 All APs > Details (Advanced) page accounting servers, disabling per WLAN Add New Rule button 7-53 All APs > Access Point Name > VLAN Mappings page 15-15 using the CLI Add AP button configuring using the GUI All APs > Access Point Name > Statistics page 8-9 viewing join information active exploits 7-55 All APs > Access Point Name > Neighbor Info page verifying that they join the controller Action parameter configuring using the CLI All APs > Access Point Name > Mesh Neighbor Stats page 9-123 8-52 ACL Name parameter 4-36 All APs > Access Point Name > Link Details > Neighbor Name page 9-122 8-53 to 8-60 using Telnet or SSH 4-36 7-29, 7-53 Alarm Trigger Threshold parameter 8-68 to 8-69 troubleshooting the join process Aironet IE parameter Airopeek supported for use with hybrid REAP 4-41 6-4, 6-21 All APs > Details for (H-REAP) page All APs > Details for (Inventory) page 6-63 11-19 All APs > Details for page All APs > Details page 8-81, 15-14 8-121 D-46, D-51 9-26, 9-54, 9-79, 13-41 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-3 Index All APs page using the GUI 8-10, 9-116, 9-121, 13-41, 15-14 Allow AAA Override parameter AnchorTime parameter described 6-88 anonymous local authentication bind method Antenna Gain parameter Antenna parameter of two AP-manager interfaces using multiple 13-35 13-35 4-84 3-45 3-44 3-43 3-42 to 3-47 AP Mode parameter 8-80, 13-41, 15-14, D-46 AP Name parameter 7-60 AP Policies page 4-84 AP801 access point described of four AP-manager interfaces of three AP-manager interfaces 6-48 AP > Clients > Traffic Stream Metrics page AP > Clients page 6-38, 6-40 13-35 Antenna Type parameter 3-7 illustration 9-70, 13-18 Anonymous Provision parameter 3-45 to 3-46 8-51 AP Primary Discovery Timeout parameter ASLEAP detection 8-41 using with a controller AP Authentication Policy page AP Core Dump parameter 6-133 Assignment Method parameter 8-41 6-74, 13-42 8-63 ap-count evaluation licenses, activating 8-97, 9-30 13-33, 13-36 asymmetric tunneling described 14-26 illustrated 14-27 using the CLI 4-19 to 4-20 authenticated local authentication bind method using the GUI 4-17 to 4-19 Authentication Protocol parameter AP Ethernet MAC Addresses parameter AP Failover Priority parameter AP Group Name parameter 8-48 8-102 7-59 AP Groups > Edit (WLANs) page 7-59, 7-73 8-27 AP Join Stats Detail page AP Join Stats page 8-58 Authorize MIC APs against auth-list or AAA parameter 8-51 using the CLI 8-51 using the GUI 8-50 using the GUI AP Local Authentication on a WLAN guidelines overview 15-18 and dynamic interfaces 3-9 14-21 to 14-22 using the CLI 3-16 using the GUI 3-11 to 3-14 creating multiple interfaces 3-47 6-114 AutoInstall described configuring 14-22 to 14-24 14-22 auto-immune feature AP-manager interface using the CLI 8-51 configuring 15-18 Using the CLI 6-48, 15-24 auto-anchor mobility 8-56 AP local authentication Using GUI 6-48, 15-24, 15-26 authorizing access points 7-57, 7-72 AP image download 7-27 Authorize LSC APs against auth-list parameter 7-60 AP Groups > Edit (General) page AP Groups page 4-46 Authority ID Information parameter Authority ID parameter 7-58 AP Groups > Edit (APs) page Auth Key Mgmt parameter 6-38, 6-40 2-26, 2-29 example operation 2-29 obtaining DHCP addresses for interfaces TFTP server information 2-26 2-26 Cisco Wireless LAN Controller Configuration Guide IN-4 OL-21524-02 Index overview Bind Username parameter 2-26 selecting configuration file using 6-38 bridge protocol data units (BPDUs) 2-28 3-28 bridging parameters 2-26 Average Data Rate parameter configuring using the GUI 4-69, 4-73 Average Real-Time Rate parameter Avoid Cisco AP Load parameter browsers supported 4-69, 4-73 Avoid Foreign AP Interference parameter 9-70, 13-18, 14-19 Avoid Non-802.11a (802.11b) Noise parameter 2-17 Buffered Log Level parameter 9-70, 13-18 9-71, 13-18 ?? to 9-80 Burst Data Rate parameter D-9 4-69, 4-73 Burst Real-Time Rate parameter 4-69, 4-73 Backhaul Client Access parameter CAC 9-37, 9-128 backup controllers configuring for 7920 phones configuring described using the CLI 8-99 to 8-100, 9-31 to 9-33 using the GUI 8-96 to 8-98, 9-29 to 9-31 described 4-75 enabling 8-95, 9-28 Back-up Primary Controller IP Address parameter 8-97, 9-30 using the CLI 4-88 using the GUI 4-80 in mesh networks 9-94 viewing in mesh networks Back-up Primary Controller Name field 8-97, 9-30 Back-up Secondary Controller IP Address parameter 8-98, 9-30 Back-up Secondary Controller Name parameter described viewing using the CLI capacity adder license. See licenses 8-98, 9-30 CAPWAP cascading 4-75 using the CLI 4-87 using the GUI 4-78 for mesh networks 9-94 Base MAC Address parameter Beacon Period parameter 13-6 described 3-32 4-30 1-13 logical connectivity diagram and associated software commands E-4 to E-7 ports 3-3, 3-5 CCKM configuring configuring 7-27 using the CLI ?? to 9-20, 13-46 to 13-47 described using the GUI ?? to 9-19, 13-44 to 13-46 hybrid-REAP groups guidelines 8-47 Catalyst 3750G Integrated Wireless LAN Controller Switch beamforming described 9-12 CA Server URL parameter enabling 9-102 to 9-103 4-89 and mesh access points bandwidth-based CAC 7-39 with mobility 13-43 Bind Password parameter 15-20 14-7 CCX 13-44 Beamforming parameter 7-25 13-45, 13-46 6-38 configuring Aironet IEs using the CLI 7-55 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-5 Index using the GUI described link test using the GUI 7-53 overview 7-52 10-22 10-22 using with local EAP 8-121 viewing a client’s version 6-43, 6-49 Certificate File Name parameter using the CLI 7-55 Certificate File Path parameter using the GUI 7-53 to 7-55 Certificate Issuer parameter CCX Layer 2 client roaming 11-8 6-47 Certificate Password parameter configuring Certificate Type parameter 10-20, 11-8 8-51 using the CLI 4-66 Change Filter link using the GUI 4-64 to 4-66 Change Rules Priority parameter debugging using the CLI described 8-10, 8-32, 8-56 4-66 CCX radio management Channel parameter 13-50 Channel Quiet Mode parameter using the GUI 13-49 to 13-50 channels 13-52 13-48 hybrid-REAP considerations obtaining information using the CLI 13-50 to 13-52 CCXv5 clients enabling location presence 7-54 CDP > AP Neighbors page 4-104 13-32 to 13-36 13-18 Channel Width parameter 9-71, 13-33 CDP > Interface Neighbors page 4-102 6-112 CIDS Sensors List page 6-112 CDP Advertisement Version parameter configuring described 4-102 6-47 4-109 6-116 7-27, 7-28 7-26 Cisco 2100 Series Wireless LAN Controllers 4-105 4-100 AutoInstall interfaces described 4-103 CDP Protocol Status parameter CIDS Sensor Add page 6-47 ciphers 4-100 CDP > Interface Neighbors > Detail page CDP > Traffic Metrics page 13-24 Channel Width Parameter CIDS Shun List page 4-104 CDP > Global Configuration page 4-100 4-101 Certificate Authority (CA) certificates downloading using the CLI statically assigning using the GUI chokepoints for RFID tag tracking CDP > AP Neighbors > Detail page CDP State parameter 13-37 Check Certificate Date Validity parameter D-32 CDP AP Neighbors page statically assigning using the CLI Check Against CA Certificates parameter 4-117 D-25 to D-39 CCX Version parameter 13-34 4-38 Channel Scan Duration parameter 13-48 9-70, 13-17 13-33, D-47 using the CLI debugging using the CLI 9-71, 13-19 Channel Assignment Method parameter channel bonding in the 5-GHz band configuring CCXv5 Req button 4-38 Channel Assignment Leader parameter 4-63 to 4-64 troubleshooting 6-99 Channel Announcement parameter 4-67 obtaining information using the CLI features 11-8 1-7 FCC statement B-3 features not supported network connections ports 10-23 to 10-25 2-26 1-7 1-16 3-2, 3-3 Cisco 2500 Series Controller 1-8 Cisco Wireless LAN Controller Configuration Guide IN-6 OL-21524-02 Index Cisco 2500 Series Controllers License SKUs Cisco 7921 Wireless IP Phones Cisco Adaptive Wireless Path Protocol (AWPP) 4-4 Cisco 28/37/38xx Integrated Services Router described ports 3-3, 3-5, 4-123 using 4-123 operating with mesh access points 9-129 using the GUI to configure 9-128 Cisco 3300 Series Mobility Services Engine (MSE), using with wIPS 6-128 Cisco 4400 Series Wireless LAN Controllers AutoInstall interfaces using the CLI 4-105 to 4-106 using the GUI 4-99 to 4-101 described 4-96 enabling using the GUI sample network B-3 network connections 4-99 supported devices 4-97 using the CLI 4-106 to 4-107 using the GUI 4-101 to 4-105 using the CLI 4-107 using the GUI 4-105 Cisco Discovery Protocol parameter 1-17 Cisco 5500 Series Wireless LAN Controllers and the controller license agent using to register PAKs choosing between link aggregation and multiple AP-manager interfaces 3-36 to 3-46 Cisco Licensing website CPUs Cisco Logo parameter 11-12 Cisco NAC Appliance 7-68 D-5 1-9 B-3 features not supported 1-9 3-48 3-4 multiple AP-manager interfaces ports 4-6 4-21 Cisco Spectrum Intelligence licenses. See licenses network connections 4-26 CiscoSecure Access Control Server (ACS) interface configuration example models 4-101 Cisco License Manager (CLM) 3-2, 3-3, 3-4 FCC statement 4-100 to 4-101 viewing traffic information 1-9 3-4 described 4-108 viewing neighbors 2-26 choosing between link aggregation and multiple AP-manager interfaces 3-36 to 3-46 ports 12-1 debugging using the CLI using the CLI to configure models Cisco CleanAir 7-68 configuring 9-127 FCC statement Cisco Clean Access (CCA) Cisco Discovery Protocol (CDP) Cisco 3200 Series Mobile Access Router (MAR) described 7-62, 7-63, 7-64 Cisco Client Extensions (CCX). See CCX 1-12 described Cisco AV-pairs 9-12 Cisco Centralized Key Management (CCKM). See CCKM 1-12 logical connectivity diagram and associated software commands E-3 versions 7-40 3-47 to 3-48 1-17 Cisco 7920 Wireless IP Phones 12-24 Cisco Unified Wireless Network (UWN) Solution described 1-1 to 1-4 illustrated 1-2 Cisco Wireless Control System (WCS) 1-2 Cisco WiSM 3-2, 3-4 using the USB console port 6-4 configuring the Supervisor 720 3-34 to 3-35 described 7-40 guidelines 4-121 to ?? 1-10 to 1-12 4-122 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-7 Index logical connectivity diagram and associated software commands E-1 to E-3 ports 3-3, 3-4 connecting to WLANs 8-44 CKIP configuring using the CLI 8-137 using the GUI 8-133 to 8-137 viewing CCX version using the CLI 7-30 using the GUI 7-29 to 7-30 7-29 CleanAir Benefits Clear Config button 8-87 using the GUI 7-53 to 7-55 configuring client reporting viewing client details clearing the controller configuration 10-34 14-20 8-56 viewing the status of workgroup bridges performing a link test logging into 2-25 viewing clients 2-37 2-23 to 2-25 logging out 6-47 client exclusion policies, configuring using the CLI 6-81 to 6-82 using the GUI 6-80 to 6-81 Client Exclusion Policies page 6-80 ClientLink. See beamforming client location, using WCS 4-81 conditional web redirect 15-23 4-44 7-62 configuring using the CLI 7-65 using the GUI 7-64 to 7-65 described 7-63 7-65 Configuration File Encryption parameter 6-73 4-124 comma-separated values (CSV) file, uploading Conditional Web Redirect parameter 1-7 8-91 8-92, 8-93 Community Name parameter Client Certificate Required parameter 10-30 configuration files Client Protection parameter 6-77 client reporting configuring using the CLI D-34 to D-37 configuring using the GUI D-31 to D-34 D-26 Client Reporting page viewing the status of workgroup bridges Commands > Reset to Factory Defaults page D-6 to D-7 2-22 to 2-25 described 8-133 Client Type parameter 2-25 troubleshooting commands client MFP 4-82 8-123 viewing voice and video settings 2-25 navigating 8-91 Clients page CLI enabling wireless connections 7-54 8-92, 8-136 viewing voice and video settings Clear Stats on All APs button basic commands 4-83 D-32 viewing a client’s CCX version 7-8, 8-12, 8-32, 8-57 Clear Stats button 7-55 Clients > Detail page 12-4 Clear Filter link using the CLI Clients > AP > Traffic Stream Metrics page 12-2 CleanAir guidelines using 15-18 viewing SSC key-hash described clients downloading using the CLI 10-31 to 10-32 using the GUI 10-30 to 10-31 editing 10-33 to 10-34 uploading D-33 client roaming, configuring using the CLI 4-62 to 4-67 10-29 to 10-30 configuration wizard Cisco Wireless LAN Controller Configuration Guide IN-8 OL-21524-02 Index CLI version described described 2-13 to 2-16 guidelines 2-1 GUI version 8-2 8-2 viewing MTU information 2-2 to 2-13 Configuration Wizard - 802.11 Configuration page Configuration Wizard Completed page 2-11 baud rate versions Configuration Wizard - Miscellaneous Configuration page 2-7 Configuration Wizard - Service Interface Configuration page 2-5 2-4, 2-6 Configuration Wizard - System Information page 3-5 controllers configuration clearing 2-3 10-34 10-34 saving 10-33 connections 1-13 Configuration Wizard - Virtual Interface Configuration page 2-8 discovery process Configure multiple-controller deployment 12-1 Configure Dynamic Anchoring of Static IP Clients Using the CLI 14-31 Configure option for RRM override 13-33 Configure RF Group Using CLI Configuring a Spectrum Expert 12-23 12-5 platforms 1-7 to 1-13 resetting factory default settings 4-124 upgrading software using the CLI 10-8 to 10-10 using the GUI 10-5 to 10-7 14-31 Control Path parameter 3-31 6-77 14-23 core dump files D-45 described D-18 uploading automatically to an FTP server 15-12 using the CLI D-19 Console Log Level parameter D-9 using the GUI D-18 console port 2-1 to 2-2 Control and Provisioning of Wireless Access Points protocol (CAPWAP) 1-5 8-7 4-114 1-15 Confirm Password parameter debugging 1-2 to 1-3 Controller Time Source Valid parameter Configuring Sniffing on an Access Point connecting 1-3 to 1-4 Controller Spanning Tree Configuration page 12-8 Configuring Dynamic Anchoring of Static IP Clients Using the GUI 1-6 to 1-7 types of memory Configuring Cisco Cleanair Using the GUI overview B-1 to B-2 synchronizing with location appliance Configuring Cisco CleanAir Using the CLI guidelines for operating in Japan single-controller deployment 13-11 Using the GUI 8-7 using the GUI 13-12 Configure RF Group Mode Using GUI 8-95 3-3 erasing 2-12 Configuration Wizard - SNMP Summary page controller failure detection time, reducing controller network module 2-13 Configuration Wizard - Management Interface Configuration page 2-6 Configuration Wizard - Set Time page 8-6 uploading from a 5500 series controller to a TFTP or FTP server D-20 Core Dump page D-18 Country Code parameter 8-108 country codes Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-9 Index configuring configuring using the CLI 8-109 to 8-111 using the CLI 8-5 to 8-6 using the GUI 8-107 to 8-108 using the GUI 8-4 to 8-5 described Japanese for OfficeExtend access points 8-106 Data Encryption parameter 8-112 viewing using the CLI Country page 8-5, 8-82 Datagram Transport Layer Security 8-110 8-107 Coverage Exception Level per AP parameter 13-21 coverage hole detection Data Path parameter 14-23 Data Rates parameter 4-31 configuring manually 2-31 using the CLI 13-27 configuring through NTP server using the GUI 13-20 to 13-22 setting disabling on a WLAN described 8-26 date configuring per controller using the CLI 2-29 2-32 DCA Channel Sensitivity parameter 7-67 using the CLI 7-68 DCA Channels parameter using the GUI 7-67 to 7-68 debug commands, sending coverage hole detection and correction CPU Access Control Lists page CPUs, 5500 series controllers 9-71, 13-18 9-71, 13-19 8-60 debug facility 13-4 Coverage Hole Detection Enabled parameter 7-67 configuring described 6-68 D-41 to D-44 D-40 to D-41 default enable password D-5 crash files 8-33 default-group access point group uploading create 8-82 7-57 Default Mobility Group parameter 14-12 using the CLI D-17 Default Routers parameter using the GUI D-16 to D-17 Delivery Traffic Indication Map (DTIM). See DTIM period 3-50 Deny Counters parameter create interface group using GUI Description parameter 3-50 Create Interface Groups using CLI 3-51 CLI 3-51 GUI 3-50 6-34, 9-25, 15-12 3-32 DES IPSec data encryption 6-9 6-64 Destination Port parameter 6-65 Detect and Report Ad-Hoc Networks parameter Current Channel parameter Custom Signatures page 6-65 Designated Root parameter Destination parameter Creating Interface Groups 7-15 device certificates 13-36 downloading 6-121 using the CLI 10-21 using the GUI 10-19 to 10-20 overview 10-19 using with local EAP data encryption and OfficeExtend access points 6-93 8-84 6-43, 6-49 DHCP Cisco Wireless LAN Controller Configuration Guide IN-10 OL-21524-02 Index configuring using the CLI 7-13 Diagnostic Channel parameter configuring using the GUI 7-12 directed roam request debugging Direction parameter 7-13 DHCP Addr. Assignment Required parameter DHCP Allocated Lease page 4-64 6-65 disabled clients, configuring a timeout 7-12 discovery request timer, configuring 7-16 DHCP option 43, in controller discovery process distribution system ports 8-8 DHCP option 82 Diversity parameter configuring 6-61 DNS IP Address parameter using the GUI 6-60 DNS Servers parameter example Domain Name parameter 7-15 8-67 7-15 8-67 domain name server (DNS) discovery 6-59 DHCP Option 82 Remote ID Field Format parameter DHCP Parameters page 4-40, 4-41, 6-60 DHCP proxy 6-60 downloading a CA certificate 10-23 4-41 using the GUI 4-39 to 4-40, ?? to 4-41, ?? to 4-94 downloading a device certificate downloading a signature file 4-39 DHCP Scope > Edit page 10-31 downloading a customized web authentication login page 11-22 using the CLI described 8-8 Download button downloading a configuration file configuring 10-20 6-120 Download File to Controller page 7-15 10-17 downloading a customized web authentication login page 11-21 DHCP scopes configuring downloading CA certificates using the CLI 7-16 to 7-17 using the GUI 7-14 to 7-15 described 7-14 DHCP Scopes page 10-30 downloading device certificates 10-20 downloading login banner file 8-8 DHCP Server IP Addr parameter DHCP servers 7-12 DSCP parameter internal 7-10 10-16 11-7 6-65 DTIM period, configuring for MAC filtering DTLS 7-10 to 7-12 6-120 Download SSL Certificate parameter 7-12 DHCP Server Override parameter external 10-23 downloading configuration files downloading IDS signatures 7-14 DHCP server discovery 7-19 4-2, 8-26 DTLS data encryption. See data encryption DTPC Support parameter DHCP Timeout 4-30 Dynamic Anchoring for Clients with Static IP Addresses configurie using GUI 4-41 diagnostic channel Configuring 14-30 dynamic AP management configuring for dynamic interface using the CLI D-27 to D-31 using the GUI D-26 to D-27 described 8-99, 9-31 13-35 DNS Domain Name parameter 6-59 7-18 3-3 to 3-5 using the CLI described D-27 3-21 for the management interface 3-15 Dynamic AP Management parameter 3-9 D-25 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-11 Index for dynamic interface Enable Controller Management to be accessible from Wireless Clients parameter 2-37, 6-58 3-20 for management interface 3-13 dynamic AP-manager interface Enable Counters parameter 3-10 Enable Coverage Hole Detection parameter dynamic channel assignment (DCA) 20-MHz channelization 13-4, 13-19 40-MHz channelization 13-4, 13-19 Enable CPU ACL parameter Enable DHCP Proxy parameter using the CLI 13-25 to 13-27 using the GUI 9-69 to 9-72, 13-16 to 13-20 sensitivity thresholds dynamic frequency selection 3-46 Enable EAP-FAST Authentication parameter 15-24 Enable Link Latency parameter Enable Listener parameter configuring 3-21 to 3-22 using the GUI 3-18 to 3-21 Enable NAT Address parameter 3-9 Enable Notification parameter 3-48 dynamic WEP, configuring 4-30 Dynamic WEP Key Index parameter 4-95 4-27 8-81 7-77 Enable Password parameter 6-45 8-47 3-12 Enable OfficeExtend AP parameter Enable passive client 7-24 8-34 Enable Server Status parameter 6-38 Enable Tracking Optimization parameter EAP-FAST Method Parameters page EAP-FAST parameter EAPOL-Key Timeout parameter EAP Profile Name parameter Edit QoS Profile page C-1 to C-4 4-8 4-95 to 4-96 enhanced neighbor list 6-49 described 4-63, 9-92 request (E2E) 4-63 Enter Saved Permission Ticket File Name parameter 4-68 Edit QoS Role Data Rates page Email Input parameter end user license agreement configuring using the CLI 6-45 4-95 Egress Interface parameter 7-30 8-117 enhanced distributed channel access (EDCA) parameters 6-45 6-46 EDCA Profile parameter Encryption Key parameter end-user license agreement (EULA) 6-46 EAPOL-Key Max Retries parameter EAP-TLS parameter 6-48 8-82 4-27 Enable LSC on Controller parameter dynamic transmit power control, configuring 15-24 8-82, 8-125, 8-126 Enable Low Latency MAC parameter using the CLI dynamic interface example 4-59 Enable Least Latency Controller Join parameter 8-115 to 8-116 dynamic interface described Enable Dynamic AP Management parameter Enable LEAP Authentication parameter 9-71 4-27 4-40 Enable IGMP Snooping parameter 13-3 13-21 6-68 Enable Default Authentication parameter configuring described 6-63 EoIP port 4-72 epings 11-30 Enable AP Local Authentication parameter Enable Authentication for Listener parameter 14-23, 14-29 14-23, 14-29 erasing the controller configuration 11-31 15-23 4-27 Enable Check for All Standard and Custom Signatures parameter 6-122 4-23 error codes, for failed VoIP calls 10-34 7-45 to 7-47 Ethernet connection, using remotely Ethernet Multicast Mode parameter 2-24 to 2-25 4-59 evaluation licenses Cisco Wireless LAN Controller Configuration Guide IN-12 OL-21524-02 Index installed on 5500 series controllers event reporting for MFP described 4-3 fast SSID changing 6-73 Excessive 802.11 Association Failures parameter 6-81 Excessive 802.11 Authentication Failures parameter 6-81 Excessive 802.1X Authentication Failures parameter 6-81 Excessive Web Authentication Failures parameter Expedited Bandwidth parameter 6-81 4-54 configuring using the GUI 4-54 15-5 FCC statement 4-78 4-76 enabling configuring using the CLI fault tolerance expedited bandwidth requests described 8-95 2100 series controllers B-3 4400 series controllers B-3 5500 series controllers B-3 Federal Information Processing Standards (FIPS) using the GUI File Compression parameter 4-78 8-63 Expiration Timeout for Rogue AP and Rogue Client Entries parameter 6-93 File Name to Save Credentials parameter Extensible Authentication Protocol (EAP) File Type parameter configuring file transfers 7-24 6-50 to 6-51 per access point per client extension channel 6-53 downloading a device certificate 13-36 Login Banner 4-124 failover priority for access points upgrading controller software 10-7 uploading a configuration file 10-28 uploading packet capture files D-22 10-25 filter, using to view clients Fingerprint parameter 8-134 to 8-135 6-113 flashing LEDs, configuring configuring 8-132 using the CLI 8-102 Forward Delay parameter using the GUI 8-101 to 8-102 forwarding plane architecture viewing using the CLI 8-103 fragmented pings 4-55 Fallback Mode parameter 6-133 4-30 3-6 Friendly Rogue > Create page 1-15 fake access point detection Fast Ethernet port 3-32, 3-33 Fragmentation Threshold parameter 8-101 failover protection 10-20 10-17 uploading PACs factory default settings resetting using the GUI 10-30 downloading a customized web authentication login page 11-21 6-53 described 10-23 downloading a configuration file timeout and failure counters 4-21 1-14 downloading a CA certificate setting local timers 6-12 FTP server guidelines 6-99 10-2 6-10 3-5 fast heartbeat timer configuring General (controller) page using the CLI 8-99 configuring 802.3 bridging using the GUI 8-97 configuring an RF group 4-56 13-8 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-13 Index enabling link aggregation General (security) page General page logging out of 3-40 using 6-31 Generate Password parameter Generate Rehost Ticket button GUI to configure passive client 11-4 3-5 7-75 8-102 Global Configuration page Headline parameter configuring backup controllers 8-96, 9-29 configuring failover priority for access points 11-13 Hello Time parameter 8-101 configuring global credentials for access points global credentials for access points 8-34 help, obtaining 3-32, 3-33 2-17 hex2pcap sample output Holdtime parameter configuring D-43 3-32, 4-100 Honeypot access point detection using the CLI 8-35 to 8-36 using the GUI 8-33 to 8-35 6-133 HREAP Groups > Edit (Local Authentication > Local Users) page 15-23 HREAP Groups > Edit (Local Authentication > Protocols) page 15-24 8-33 overriding HREAP Groups > Edit page using the CLI 8-35 using the GUI 8-34 Global multicast mode 7-76 Group Mode parameter 13-10, 14-18 Group Name parameter 14-13, 15-22 HREAP Groups page 15-22 15-21 HREAP Group Support 15-21 H-REAP Local Switching parameter 15-10 H-REAP Mode AP Fast Heartbeat Timeout parameter 8-97 Group Setup page (on CiscoSecure ACS) 6-23 Guest LAN parameter 11-29 H-REAP Mode AP Fast Heartbeat Timer State parameter 8-97 guest N+1 redundancy 14-21 H-REAP parameter 8-80 HTTP Access parameter guest user accounts creating 10-12 4-23 Global AP Failover Priority parameter described 2-16 Guidelines and Limitations for Predownloading 6-44 gigabit Ethernet port 2-17 11-1 to 11-6 creating as a lobby ambassador 11-3 to 11-5 2-18 HTTP Configuration page 2-18 HTTPS Access parameter 2-19 hybrid REAP viewing using the CLI 11-6 access points supported using the GUI 11-5 to 11-6 authentication process Guest User parameter Guest User Role parameter guest WLAN, creating bandwidth restriction 6-33, 15-12 6-33, 15-12 11-5 GUI browsers supported guidelines logging into 15-2 to 15-5 15-2, 15-3 configuring access points using the CLI 15-16 to 15-17 access points using the GUI 15-13 to 15-16 controller using the GUI 2-17 enabling wireless connections 15-1 2-37 2-17 2-17 guidelines 15-6 illustrated 15-2 15-8 to 15-12 number of access points supported 15-2 Cisco Wireless LAN Controller Configuration Guide IN-14 OL-21524-02 Index overview measurement interval 15-1 hybrid-REAP pattern debugging hybrid-REAP groups viewing configuring using the CLI 15-25 using the GUI 15-21 to 15-25 example 6-122 uploading or downloading using the GUI 6-119 to 6-120 15-20 15-20 described 6-123, 6-125 tracking method backup RADIUS server CCKM 6-122 quiet time 15-13, 15-17 6-122 using the CLI 6-126 to 6-128 using the GUI 6-123 to 6-124 IGMP Snooping 15-19 7-77 IGMP Timeout parameter 15-19 local authentication Hysteresis parameter IKE Diffie Hellman Group parameter 15-20 Hybrid-REAP Groups and OKC 4-59 IKE Phase 1 parameter 15-20 Image pre-download 4-65 6-10 6-10 8-27 Index parameter for IDS 6-113 indoor access points converting to mesh access points infrastructure MFP identity networking configuring overview components 6-82 to 6-86 described 6-82 to 6-83 RADIUS attributes 6-83 to 6-86 Identity Request Max Retries parameter Identity Request Timeout parameter IDS 6-45 6-45 6-73 6-72 Infrastructure Protection parameter 6-77 Infrastructure Validation parameter 6-77 Ingress Interface parameter 11-30 Injector Switch MAC Address parameter 6-112 inline power IDS sensors using the CLI 6-114 to 6-115 using the GUI 6-112 to 6-114 described 4-62 14-2 Interface Groups IDS signature events viewing using the CLI 6-126 to 6-128 viewing using the GUI 6-123 to 6-124 4-8 inter-controller roaming example 6-112 using GUI Interface groups 3-50 3-50 3-50 Interface Name parameter IDS signatures Interface parameter configuring using the CLI 6-124 to 6-126 using the GUI 6-119 to 6-123 described 6-117 frequency 6-123 MAC frequency 8-130 8-128 Install License button configuring described 9-124 7-59, 7-70, 7-73, 9-25 7-12 interfaces and identity networking assigning WLANs 6-84 7-18 configuring 6-123, 6-125 using the CLI 3-14 to 3-17 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-15 Index using the GUI overview described 3-11 to 3-14 guidelines 3-6 to 3-9 Interfaces > Edit page IPv6 Enable parameter 6-67 configuring dynamic interfaces creating multiple AP-manager interfaces Interfaces > New page 7-71 3-45 3-18, 3-45 7-52 Japanese country codes 3-12 8-112 Japanese regulations for migrating access points from the -J to the -U regulatory domain 8-111 to 8-114 13-3 Interferences 7-51 3-19 configuring NAC out-of-band integration interference 7-49 IPv6 bridging and IPv4 web authentication example applying an ACL to an interface Interfaces page 7-49 12-2 Interference threshold parameter 13-23 Internet Group Management Protocol (IGMP) Keep Alive Count parameter configuring 14-22 using the CLI 4-61 Keep Alive Interval parameter using the GUI 4-59 Key Encryption Key (KEK) parameter snooping Key Format parameter 4-57 inter-release mobility 14-10 Key Index parameter inter-subnet mobility 14-7 key permutation configuring inter-subnet roaming described described 4-63 illustrated 14-3 to 14-4 Interval parameter described 4-62 illustrated 14-1 Inventory page 6-8 9-70, 13-17 13-13 IP address-to-MAC address binding LAG. See link aggregation (LAG) LAG Mode on Next Reboot parameter 3-40 Last Auto Channel Assignment parameter 4-67 Last Power Level Assignment parameter 4-67 IPSec parameter 6-8 Invoke Power Update Now button IP Mask parameter 7-30 7-30 Key Wrap parameter Invoke Channel Update Now button described 7-29 Key Wrap Format parameter 8-120 configuring 7-30 7-30, 7-31 Key Size parameter intra-controller roaming 6-8 7-30 Key Permutation parameter 9-70, 13-18, 13-49 14-22 Layer 1 security 4-44 9-71, 13-19 13-14 6-2 Layer 2 6-9 IP Theft or IP Reuse parameter 6-81 operation 1-5 security IPv6 bridging configuring configuring using the CLI 7-52 using the GUI 7-51 to 7-52 described 7-24 to 7-31 6-2 Layer 2 Security parameter 7-27, 7-30, 7-65 Cisco Wireless LAN Controller Configuration Guide IN-16 OL-21524-02 Index Layer 3 license level, changing operation 1-5 security configuring described 4-16 using the GUI 4-15 License Level page 7-32 to 7-34 Layer 3 Security parameter for VPN passthrough activating ap-count evaluation licenses 7-33, 7-36 for web authentication 7-34 using the CLI 4-19 to 4-20 using the GUI 4-17 to 4-19 choosing feature set 7-65 for wired guest access 11-30 LDAP choosing server priority order 6-38 configuring using the CLI 6-40 to 6-41 using the GUI 6-36 to 6-39 using the CLI 4-16 using the GUI 4-14 to 4-16 installing using the CLI 4-8 to 4-9 using the GUI 4-7 to 4-8 obtaining LDAP server 4-3 to 4-7 rehosting assigning to WLANs described 6-39 choosing local authentication bind method using the CLI 6-40 using the GUI 6-38 LDAP Servers > New page LDAP Servers page LEAP parameter 6-37 using the CLI 4-23 to 4-25 using the GUI 4-21 to 4-23 using the CLI 4-8 using the GUI 4-10 required for OfficeExtend access points 6-49 Learn Client IP Address parameter 15-11 7-15 LEDs using the CLI 4-9 using the GUI 4-8 SKUs configuring 8-132 interpreting D-1 8-80 saving 6-46 Lease Time parameter 4-20 removing 6-37 LDAP Servers parameter 4-5, 4-6 transferring to a replacement controller after an RMA 4-25 to 4-26 viewing license agent configuring using the CLI 4-28 to 4-29 using the GUI 4-26 to 4-28 described 4-14 licenses 6-2 for web redirect using the CLI using the GUI 4-9 to 4-11 4-9, 4-15, 4-17 licensing portal, using to register PAKs License Agent Configuration page 4-27 License Commands page 4-7 4-10, 4-18 Lifetime parameter 4-6 6-33, 11-4, 15-12 Lightweight Access Point Protocol (LWAPP) C-1 to C-4 License Commands (Rehost) page License Detail page 4-11 to 4-14 Licenses page 4-26 license agreement using the CLI 4-21 1-5, 8-2 lightweight mode, reverting to autonomous mode limited warranty 8-44 C-4 to C-6 link aggregation (LAG) Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-17 Index configuring neighboring devices described Lobby Ambassador Guest Management > Guest Users List page 11-3, 11-5 3-41 3-36 to 3-37 Local Auth Active Timeout parameter enabling local authentication, local switching using the CLI 3-41 using the GUI 3-40 to 3-41 example using the GUI 3-39 to 3-40 illustrated 3-39 configuring 3-41 link latency and OfficeExtend access points using the CLI 6-49 to 6-54 using the GUI 6-43 to 6-49 debugging 8-82, 8-84 6-54 described configuring using the CLI 8-126 to 8-127 using the GUI 8-125 to 8-126 example 6-42 to 6-43 6-43 viewing information using the CLI Local EAP Authentication parameter 8-124 Link Status parameter Local EAP Profiles > Edit page 3-25 Local EAP Profiles page Link Test 8-123 option 8-123, 9-122 11-2 11-1 Local Mode AP Fast Heartbeat Timer parameter Local Net Users > New page link test Local Net Users page 8-121 8-97 8-97 6-33, 15-12 6-32, 11-6 local network users performing using the CLI 8-124 using the GUI 8-122 to 8-123, 9-122 types of packets Link Trap parameter 6-34 to 6-35 configuring using the GUI 6-32 to 6-34 configuring 3-25, 3-26 Load-based AC parameter configuring using the CLI local significant certificate (LSC) 8-121 Listener Message Processing URL parameter 4-27 4-78 using the CLI 8-49 to 8-50 using the GUI 8-46 to 8-48 described load-based CAC described 6-46 Local Mode AP Fast Heartbeat Timeout parameter 9-122 described 6-49 6-45 Local Management Users page 8-123 window 6-52 Local Management Users > New page button page 15-17 local EAP verifying settings using the CLI described 15-3 Local Authentication on a WLAN 3-37 guidelines 6-45 8-46 Local Significant Certificates (LSC) - AP Provisioning page 8-47 4-75 to 4-76 enabling Local Significant Certificates (LSC) - General page using the GUI 4-78 local user database, capacity lobby ambassador account 8-46 11-1 location creating using the CLI 11-3 creating using the GUI 11-1 to 11-3 Lobby Ambassador Guest Management > Guest Users List > New page 11-4 calibration 13-49 configuring settings using the CLI viewing settings using the CLI 4-114 to 4-116 4-116 to 4-118 Cisco Wireless LAN Controller Configuration Guide IN-18 OL-21524-02 Index location appliance sending crash information to controller installing certificate location-based services location presence uploading 4-113 to 4-114 synchronizing with controller access point core dumps 4-114 radio core dumps 13-48 Catalyst 3750G Integrated Wireless LAN Controller Switch E-4 Cisco 28/37/38xx Integrated Services Router E-3 E-1 MAC address of access point adding to controller filter list ?? to 9-25 displayed on controller GUI 10-18 to 10-19 described 8-61 to 8-62 using the GUI login banner file clearing 8-63 to 8-64 4-117 logical connectivity diagram Cisco WiSM 8-60 MAC Address parameter 10-15 9-25 MAC filtering downloading configuring on WLANs using the CLI 10-17 to 10-18 using the GUI 10-16 to 10-17 Login Banner page 8-65 DTIM period 7-19 MAC Filtering page 10-19 9-24 MAC Filters > New page logs 7-17 to 7-18 9-24 management frame protection (MFP) roaming D-26, D-37 configuring RSNA D-26, D-37 to D-38 syslog D-26, D-37 to D-38 uploading D-17 using the GUI D-16 to D-17 using the GUI 6-74 to 6-76 described guidelines long preambles types 6-54 using the CLI 6-55 using the GUI 6-54 6-72 to ?? 6-74 6-72 debug commands management frame validation 6-77 6-73 management interface configuring 8-66 8-44 MAC addresses displayed on controller GUI 8-65 radio core dumps using the CLI 3-14 using the GUI 3-11 to 3-14 described 3-7 Management IP Address parameter 8-60 8-80 management over wireless receiving debug commands from controller retrieving radio core dumps 6-77 Management Frame Protection Settings page 8-60 disabling the reset button 6-78 to 6-80 Management Frame Protection parameter LWAPP-enabled access points described 6-80 viewing settings enabling on SpectraLink NetLink phones guidelines 6-77 debugging using the CLI described using the CLI 8-61 reverting to autonomous mode 8-44 to 8-45 8-60 described 6-58 enabling using the CLI 6-59 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-19 Index using the GUI using the GUI to configure 6-58 Master Controller Configuration page Master Controller Mode parameter Max Age parameter roles 8-9 mesh network hierarchy 3-32 Maximum Age parameter mesh node statistics 3-33 mesh routing configuring using the CLI 6-31 configuring using the GUI 6-31 Maximum Number of Sessions parameter Maximum RF Usage Per AP parameter 6-31 9-117 9-12 message logs configuring 4-27 4-69 Max-Login Ignore Identity Response parameter 6-45 using the CLI D-11 to D-14 using the GUI D-8 viewing 4-78, 4-80 4-34 Member MAC Address parameter 9-119 to 9-120 Message Authentication Code Key (MACK) parameter 6-8, 6-12 Maximum Local Database Entries parameter Max RF Bandwidth parameter 9-12 9-3 mesh node security statistics 4-27 maximum local database entries MCS data rates 9-2 mesh neighbors, parents, and children 8-9 Max HTTP Message Size parameter 9-128 14-13 using the CLI D-14 using the GUI D-10 to D-11 See also system logging memory types Message Logs page 1-15 memory leaks, monitoring D-10 Message parameter for web authentication D-24 to D-25 Metrics Collection parameter mesh network example 9-101 parameters configuring using the CLI 9-40, 9-64 configuring using the GUI 9-35 to 9-40 statistics 6-76 MFP Frame Validation parameter 6-76 7-25, 7-29 migrating access points from the -J to the -U regulatory domain 8-111 to 8-114 Min Failed Client Count per AP parameter viewing for an access point using the CLI ?? to 9-104, 9-120 to 9-121 viewing for an access point using the GUI 9-116 to 9-120 Mesh > LinkTest Results page and CAPWAP 9-126 7-30, 7-31 7-29 7-30 Mobile Announce messages 14-7 mobility 9-1 failover 9-3 operating with Cisco 3200 Series Mobile Access Routers configuration guidelines described 4-65 MMH MIC MMH Mode parameter 9-12 13-21 mirror mode. See port mirroring, configuring described converting to non-mesh access points network access Minimum RSSI parameter configuring 9-122 mesh access points models 4-79 MFP Client Protection parameter MIC 11-13 9-127 9-127 using the CLI to configure overview 14-21 14-1 Mobility Anchor Config page Mobility Anchor Create button 14-28 14-23 mobility anchors. See auto-anchor mobility 9-129 Cisco Wireless LAN Controller Configuration Guide IN-20 OL-21524-02 Index Mobility Anchors option Mobility Anchors page multicast groups 14-23 14-23 Mobility Group Member > New page 14-12 Mobility Group Members > Edit All page 14-14 viewing using the CLI 4-61 viewing using the GUI 4-60 Multicast Groups page mobility groups multicast mode configuring configuring 4-60 using the CLI 14-15 using the CLI 4-60 using the GUI 14-11 to 14-14 using the GUI 4-59 with one NAT device 14-8 with two NAT devices 14-9 determining when to include controllers difference from RF groups examples 14-7 multicast-multicast 7-75 7-75 3-52 4-59 Multicast VLAN 14-7 number of controllers supported 14-5 14-5 Using the CLI 3-53 using the GUI 3-52 multiple AP-manager interfaces 14-9 to 14-10 using with NAT devices 5500 series controller example 14-8 to 14-9 mobility group statistics types 4-58, 8-88 Multicast page number of access points supported prerequisites guidelines Multicast Optimization 14-5 messaging among 4-57 to 4-58 Multicast-Multicast mode 13-5 14-7 illustrated described 3-47 to 3-48 multiple country codes configuration guidelines 14-17 viewing 8-106 configuring using the CLI 14-20 using the CLI 8-109 using the GUI 14-17 to 14-20 using the GUI 8-107 to 8-108 mobility list detecting failed members 14-21 number of controllers supported ping requests to members 14-21 NAC in-band mode Mobility Multicast Messaging > Edit page Mobility Multicast Messaging page mobility ping tests, running Mobility Statistics page Monitoring 14-14 NAC out-of-band integration 15-7 configuring 8-45, 8-66 4-65, 13-49 using the CLI 7-73 to 7-74 using the GUI 7-70 to 7-73 described 12-18 diagram 14-23, 14-29 13-24 guidelines 7-68 to 7-69 7-69 7-69 to 7-70 NAC out-of-band support Multicast Appliance Mode parameter multicast client table, viewing 7-68 and hybrid REAP 14-29 monitor intervals, configuring using the GUI mpings 14-15 14-18 MODE access point button Mode parameter 14-7 4-62 3-26 configuring for a specific access point group using the CLI 7-74 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-21 Index using the GUI NAC State parameter and NAT 7-72 8-69 configuring 7-59, 7-72, 7-73 NAT address a personal SSID for dynamic interface 3-19, 3-22 for management interface 3-12, 3-15 NAT devices in mobility groups using the CLI 8-83 to 8-85 using the GUI 8-80 to 8-83 described 14-8 to 14-9 8-85 to 8-87 8-69 Native VLAN ID parameter 15-15 firewall requirements Neighbor Discovery Packet 13-31 implementing security for neighbor information licensing requirements viewing for an access point using the CLI Neighbor Information option trap logs enabling 9-123 viewing for an access point using the GUI 9-121 to 9-123 Netbios Name Servers parameter Netmask parameter 8-87 to 8-88 OfficeExtend AP neighbor statistics viewing for an access point using the CLI 7-15 8-24 OfficeExtend AP parameter online help, using 2-17 open source terms C-8 OpenSSL license issues 7-15 Network Mobility Services Protocol (NMSP) 8-69 8-69 viewing statistics 13-24 8-80 8-80 typical setup 9-121 Neighbor Packet Frequency parameter 8-79 supported access point models 9-123 viewing for an access point using the GUI 9-121 to 9-123 debugging 8-79 4-109 8-82 C-6 to C-8 operating system security 4-121 software 1-4 to 1-5 1-4 modifying the notification interval for clients, RFID tags, and rogues 4-118 Order Used for Authentication parameter viewing settings Override Global Config parameter Network parameter 4-118 to 4-121 11-24, 11-31 Over-ride Global Credentials parameter 7-15 6-11, 6-26 8-35, 8-39, 8-82, 8-83 NTP server configuring to obtain time and date 2-30 Number of Attempts to LSC parameter 8-48 Number of Hits parameter Override Interface ACL parameter oversized access point images 8-68 over-the-air provisioning (OTAP) 6-65 Overview of CleanAir 6-69 8-8 12-1 OfficeExtend Access Point Configuration page OfficeExtend Access Point Home page 8-86 8-85 OfficeExtend Access Points LEDs D-51 OfficeExtend access points 7-23 packet capture files described D-51 positioning P2P Blocking parameter D-21 sample output in Wireshark D-21 uploading using the CLI D-23 Cisco Wireless LAN Controller Configuration Guide IN-22 OL-21524-02 Index using the GUI Params parameter Passive clients for LDAP server D-22 for RADIUS server 8-47 6-9 for TACACS+ server 7-75 password 6-25 for wired guest access restoring Port parameter for IDS 4-42 password guidelines configuring for access point authentication for access points for PACs 8-38 8-34 for local net users 6-33, 15-12 passwords viewing in clear text 6-46 on 2100 series controllers 3-2, 3-3 on 4400 series controllers 3-2, 3-3, 3-4 on 5500 series controllers 3-2, 3-4 4-114 on Cisco WiSM overview peer-to-peer blocking Ports page configuring 3-3, 3-4 3-1 to 3-6 3-23 Power Assignment Leader parameter using the CLI 7-23 to 7-24 using the GUI 7-22 to 7-23 described 7-21 examples 7-22 guidelines Power Injector Selection parameter 8-130 8-130 13-14 Power over Ethernet (PoE) Personal SSID parameter 8-86 Physical Mode parameter 3-25, 3-26 Physical Status parameter 3-25 configuring using the CLI 8-131 using the GUI 8-129 to 8-131 described 1-14, 8-128 Power Over Ethernet (PoE) parameter 8-121 Power Threshold parameter 14-29 3-25 13-13 preauthentication access control list (ACL) 13-6 PMK cache lifetime timer 7-28 7-28 PoE Status parameter 8-130 Pool End Address parameter Pool Start Address parameter Port > Configure page Port Number parameter 3-25 7-15 7-15 applying to a WLAN using the CLI 6-72 using the GUI 6-69 to 6-70 for external web server 3-27 to 3-28 11-19, 15-11 Preauthentication ACL parameter pre-download 3-24 port mirroring, configuring for controller 13-14 B-2 Power Neighbor Count parameter 7-22, 7-69 PMKID caching power cable warning for Japan Power Injector State parameter permanent licenses, installed on 5500 series controllers 4-3 ping tests 3-23 to 3-34 on Cisco 28/37/38xx Series Integrated Services Router 3-3 to 3-5, 4-123, 8-54 D-7 path loss measurement (S60), CLI command ping link test 6-113 on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-5 10-26 PEAP parameter 11-29 ports 8-38 Password parameter pinning 6-37 6-70, 7-65 8-27 Predownloading an image 10-11 Primary Controller Name parameter Primary Controller parameters 8-80 8-80, 8-98, 9-30 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-23 Index primary image pre-download guidelines 8-27 Primary RADIUS Server parameter priming access points QoS 15-22 identity networking 8-8 Priority Order > Local-Auth page levels 6-38, 6-44 Priority Order > Management User page Priority parameter 7-40 4-68, 7-37 translation values 6-11, 6-26 with CAC 3-33 Privacy Protocol parameter 7-37 4-75 QoS profiles 4-46 probe request forwarding, configuring probe requests, described 6-83 assigning to a WLAN 8-119 8-119 using the CLI 7-38 product authorization key (PAK) using the GUI 7-38 obtaining for license upgrade registering configuring 4-3 4-6 product ID for controller, finding product ID of controller, finding 4-24 Profile Details page 4-68 to 4-70 7-5, 7-83, 9-25, 11-29, 15-9 using the CLI 4-73 to 4-74 using the GUI 4-71 to 4-73 QoS Roles for Guest Users page 10-25 uploading using the CLI 10-26 to 10-27 using the GUI 10-25 using with local EAP configuring using 3-12, 3-19 15-10 with hybrid REAP 6-75, 13-42 15-5 with NAC out-of-band integration 6-64 Protocol Type parameter for dynamic interface 3-19 for management interface 7-27 3-12 NAC out-of-band integration 7-25 PSK Format parameter Query Interval parameter 7-27 public key cryptography (PKC), with mobility 7-71 Quarantine parameter 4-70 PSK described 7-38 quarantined VLAN 6-43, 15-24 Protection Type parameter configuring 4-72 Quality of Service (QoS) parameter Protocol parameter 15-12 configuring protected access credentials (PACs) overview using the GUI assigning for use with hybrid REAP 4-22 D-34 Profile Name parameter 4-70 to 4-71 QoS roles 4-22 Product License Registration page using the CLI 14-7 Queue Depth parameter queue statistics 7-71 6-113 4-69 9-118 QBSS configuring Radio > Statistics page using the CLI 7-41 using the GUI 7-40 to 7-41 described 7-39 7-44 radio core dumps described 8-60 retrieving 8-61 Cisco Wireless LAN Controller Configuration Guide IN-24 OL-21524-02 Index uploading accounting 6-3 using the CLI 8-62 authentication using the GUI 8-61 to 8-62 choosing authentication priority order radio measurement requests 13-50 on the GUI 13-49 overview 6-11 to 6-15 using the GUI 6-6 to 6-11 described viewing status using the CLI 6-12 KEK parameter 6-54 6-12 MACK parameter 13-5 CCX features. See CCX radio management configuring 6-4 6-3 FIPS standard 13-51 radio resource management (RRM) benefits using the CLI configuring on ACS 13-48 radio preamble 6-12 server fallback behavior 6-10, 6-13 using with hybrid REAP 15-20 RADIUS > Fallback Parameters page monitor intervals using the GUI RADIUS accounting attributes 13-24 6-10 6-18 to 6-19 using the CLI 13-24 to 13-28 RADIUS authentication attributes using the GUI 13-11 to 13-24 Range (RootAP to MeshAP) parameter coverage hole detection 13-27 configuring per controller using the GUI 13-20 to 13-22 debugging 13-4 13-30 disabling dynamic channel and power assignment using the CLI 13-40 using the GUI 13-39 overriding RRM overview 13-32 to 13-40 13-1 9-69 to 9-71, 13-16 to 13-19 statically assigning channel and transmit power settings using the CLI 13-37 using the GUI 13-32 to 13-36 update interval 13-7, 13-10 Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC parameter 13-13 radio resource management (RRM) settings viewing using the CLI radio resource monitoring RADIUS Refresh-time Interval parameter Regenerate Certificate button 13-28 to 13-30 13-2 9-37 11-12 4-100 11-7 regulatory information for 2100 series controllers B-3 for 4400 series controllers B-3 for lightweight access points ?? to B-2 rehosting a license. See licenses Rehost Ticket File Name parameter 4-23 Remote Authentication Dial-In User Service. See RADIUS Request Max Retries parameter specifying channels 6-15 to 6-18 Redirect URL After Login parameter configuring per controller using the CLI described 6-11 configuring configuring on the CLI 6-3 Request Timeout parameter 6-45 6-45 Reserved Roaming Bandwidth parameter Reset Link Latency button 8-126 Reset Personal SSID parameter resetting the controller restoring passwords Re-sync button 4-78 8-81 10-35 4-42 6-116 reverse path filtering (RPF) 14-27 RF Channel Assignment parameter 13-39 RF Group Leader Auto mode, Static Mode 13-6 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-25 Index RF group leader described automatically containing 13-6 RF group name described entering using the CLI 6-95 using the GUI 6-93 classification mapping table 13-7 classifying 13-8 RF groups 6-90 configuring RLDP cascading using the CLI 13-8 using the GUI 13-8 using the CLI 13-42 to 13-43 using the GUI 13-41 to 13-42 managing difference from mobility groups pinning 6-89 rule-based classification support 13-5 using the CLI 13-10 using the GUI 13-9 to 13-10 RF Group support using the CLI 6-107 to 6-111 using the GUI 6-102 to 6-107 WCS support for rule-based classification Rogue AP Detail page 13-5 RFID tags number supported per controller 4-110 tracking configuring using the CLI debugging using the CLI 8-118 using the GUI 8-116 to 8-117 RF-Network Name parameter 4-111 to 4-112 configuring using the GUI 6-96 to 6-100 13-8 roaming and real-time diagnostics D-37 to D-39 6-93, 6-94 and OfficeExtend access points Rogue Detection parameter logs 6-93, 8-81 using the CLI 6-94 to 6-96 using the GUI ?? to 6-94 defined 6-89 Rogue Location Discovery Protocol parameter Rogue Policies page 6-94 6-98 Rogue Rules > Priority page D-37 rogue states 4-64 9-92 rogue access points 13-42 6-93 6-93 Rogue Rule > Edit page D-26 roam reason report, described 8-81, 8-84 configuring Rogue on Wire parameter D-26 roam reason report 6-105 Rogue Location Discovery Protocol (RLDP) RLDP. See Rogue Location Discovery Protocol (RLDP) configuring using the CLI 6-100 to 6-102 rogue detection 4-112 RFID tracking on access points, optimizing using the CLI configuring using the CLI Rogue Client Detail page 4-110 viewing information using the CLI viewing 6-107 rogue classification rules 4-109 described 6-92 6-103 Rogue AP Ignore-List page described 6-89 viewing and classifying 13-6 described 6-90 tagging, location, and containment 13-5 to 13-7 viewing status alarm 6-93 to 6-96 detecting 13-6 configuring overview 6-91 6-99 6-91, 6-92 Role Name parameter 4-72 Role of the Controller 12-1 Role parameter 6-33, 15-12 Cisco Wireless LAN Controller Configuration Guide IN-26 OL-21524-02 Index root bridge serial number of controller, finding 3-28 Root Cost parameter 3-32 Root Port parameter 3-32 serial port baud rate setting RRM. See radio resource management (RRM) timeout RSNA logs 2-24 2-24 Server Address parameter configuring 6-113 Server Index (Priority) parameter D-37 to D-38 described for LDAP server 6-37 for RADIUS server 6-8 for TACACS+ server for wireless sniffer A-1 to A-26 Save and Reboot button Save Licenses button Server Key parameter 10-20, 10-23 Scan Threshold parameter service port 4-65 8-10, 8-32, 8-56 configuring 8-134 Search WLANs window 7-8, 8-10, 8-32 Secondary Controller parameters 6-9, 6-25 6-9, 6-26, 6-38 using the CLI 3-17 using the GUI 3-11 to 3-14 described 8-98, 9-30 Secondary RADIUS Server parameter SE-Connect 6-48, 15-24 3-5 service-port interface Search Clients page D-47 Server Timeout parameter 10-33 7-14 Scope Name parameter 6-25 Server Status parameter 4-8 saving configuration settings Search AP window 3-9 session timeout 15-22 configuring 12-4, 12-24 secure web mode using the CLI 7-32 described using the GUI 7-31 2-18 described enabling 7-31 using the CLI 2-19 Set Priority button using the GUI 2-18 Set reboot time 4-18 10-14 Set to Factory Default button security 13-24 overview 6-2 Severity Level Filtering parameter solutions 6-1 to 6-2 Shared Secret Format parameter Security Mode parameter Shared Secret parameter 9-38 Security Policy Completed parameter short preambles local and external authentication used to authorize access points 8-45 6-64 serial number for controller, finding 15-22 4-24 6-55 6-54 8-92 shunned clients described self-signed certificate (SSC) 6-8, 6-25 6-8, 6-25 Show Wired Clients option 9-36 Select APs from Current Controller parameter D-8 Short Preamble Enabled parameter 7-51 security settings Sequence parameter 6-8, 6-25, 6-37 Server IP Address parameter D-26 safety warnings 4-22 6-115 viewing using the CLI 6-116 using the GUI 6-116 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-27 Index Signature Events Detail page Signature Events Summary page SSC key-hash on Cisco WiSM 4-44 to 4-45 changing default values using the GUI 4-43 to 4-44 using the CLI SNMP v1 / v2c Community page 4-44 using the CLI D-49 to D-50 using the GUI D-48 to D-49 SSH parameter 4-43 SNMP v3 users 2-36 to 2-37 troubleshooting access points 4-43 SNMP v1 / v2c Community > New page D-49 SSID changing default values using the CLI 4-47 changing default values using the GUI 4-45 to 4-47 SNMP V3 Users > New page SNMP V3 Users page 4-46 configuring using the CLI 7-6 using the GUI 7-5 described 4-45 software, upgrading 7-2 SSL certificate generating 10-1 to 10-3 using the CLI 10-8 to 10-10 using the GUI 10-5 to 10-7 using the CLI 10-3 to 10-5 Source parameter for ACLs Source Port parameter using the CLI 2-21 to 2-22 using the GUI 2-20 to 2-21 SSL protocol 6-64 2-18 SSLv2, configuring for web administration 6-65 Spanning Tree Algorithm parameter 2-20 loading software, upgrading in mesh networks guidelines 3-33 Spanning Tree Protocol (STP) SSLv2 for web authentication, disabling Standard Signature > Detail page configuring Standard Signatures page 3-33 to 3-34 stateful DHCPv6 IP addressing using the GUI 3-29 to 3-33 State parameter 6-122 7-50 6-113, 6-123 configuring 3-28 Spanning Tree Specification parameter 3-32 SpectraLink NetLink phones enabling long preambles using the CLI 8-67 to 8-68 using the GUI 8-66 to 8-67 described 8-66 using the CLI 6-55 Static IP parameter using the GUI 6-54 Static Mobility Group Members page overview 11-12 static IP address 3-28 spanning-tree root 2-19 6-121 using the CLI described 8-82, 8-84 configuring changing default values using the CLI guidelines 8-44 and OfficeExtend access points 4-42 to 4-43 SNMP community string SNMP engine Id 7-65 SSH D-47 SNMP, configuring 7-63 Splash Page Web Redirect parameter D-44 4-95 12-23 splash page web redirect 6-124 6-38 sniffing. See wireless sniffing Sniff parameter Spectrum Expert 6-123 Signature Events Track Detail page Simple Bind parameter Spectralink Voice Priority parameter 6-124 6-54 Statistics option 8-67 14-12 9-116 Cisco Wireless LAN Controller Configuration Guide IN-28 OL-21524-02 Index Status parameter removing from controller for DHCP scopes for guest LANs configuring 3-30 STP Port Designated Bridge parameter 3-29 STP Port Designated Cost parameter 3-29 STP Port Designated Port parameter 3-30 STP Port Designated Root parameter STP Port Path Cost parameter STP Port Priority parameter STP State parameter strong passwords Summary page 3-30 described 3-30 8-38 2-36 system resources viewing using the CLI D-5 viewing using the GUI D-5 6-20 authentication 4-121 to ?? 6-19 authorization 4-121 6-19 choosing authentication priority order 15-7 to 15-8 3-4 using the CLI 6-26 to 6-28 using the GUI 6-24 to 6-26 configuring on ACS 14-27 described 14-26 to 14-28 roles 6-20 to 6-24 6-19 to 6-20 6-19, 6-23 viewing administration server logs using the CLI 14-28 using the GUI 14-28 6-26 configuring 14-23 verifying status 6-29 to 6-30 TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 6-25 Symmetric Mobility Tunneling Mode parameter syslog logs D-5 accounting symmetric mobility tunneling levels System Resource Information page TACACS+ SX/LC/T small form-factor plug-in (SFP) modules described D-9 3-29 Switch IP Address (Anchor) parameter overview D-8 to D-10 3-31 switch, configuring at the remote site illustrated using the GUI D-14 3-30 Supervisor 720 configuring D-11 to D-14 system logs, viewing using the CLI 3-29 STP Port Path Cost Mode parameter using the CLI setting severity level 3-29 STP Port Forward Transitions Count parameter STP Port ID parameter D-8 system logging 4-44 7-6, 7-83 STP Mode parameter D-8 Syslog Server IP Address parameter 11-30 for SNMP community for WLANs severity level filtering 7-15 D-8 14-28 TACACS+ (Authentication, Authorization, or Accounting) Servers page 6-24 TACACS+ (Cisco) page (on CiscoSecure ACS) D-26 TACACS+ Administration .csv page (on CiscoSecure ACS) 6-29, 6-30 D-9 D-37 to D-38 Syslog Configuration page Syslog Facility parameter 6-22 TCP MSS D-8 configuring D-9 described syslog server number supported by controller 8-127 to 8-128 8-127 Telnet D-8 Cisco Wireless LAN Controller Configuration Guide OL-21524-02 IN-29 Index and OfficeExtend access points 8-82, 8-84 troubleshooting access points using the CLI D-49 to D-50 using the GUI D-48 to D-49 Telnet parameter using the CLI 4-90 to 4-91 using the GUI 4-83 to 4-85 Transfer Mode parameter downloading a CA certificate downloading a configuration file D-49 Telnet sessions using the CLI 2-36 to 2-37 using the GUI 2-34 to 2-36 Telnet-SSH Configuration page Tertiary Controller parameters text2pcap sample output downloading a device certificate 2-35 10-7 uploading a configuration file 10-28 10-26 uploading packet capture files Transition Time parameter 10-2 10-20 upgrading controller software uploading a PAC 8-98, 9-31 D-43 TFTP server guidelines D-22 4-65 transmit power time, configuring using the CLI 2-32 using the NTP server 2-29 time-length-values (TLVs), supported for CDP timeout, configuring for disabled clients Time Since Topology Changed parameter 4-97 7-18 3-32 statically assigning using the CLI 13-37 statically assigning using the GUI 13-32 to 13-36 transmit power levels for OfficeExtend access points Time to Live for the PAC parameter troubleshooting time zone 8-80 4-3, 7-44 access point join process configuring using the CLI 2-32 CCXv5 clients configuring using the GUI 2-32 problems TKIP 13-25 trap logs Trap Logs page 6-48, 15-24 13-36 transmit power threshold, decreasing timestamps, enabling or disabling in log and debug messages D-13 To 10-30 downloading a customized web authentication login page 11-21 configuring 8-53 to 8-60 D-25 to D-39 D-6 to D-7 Troubleshooting OEAPs configuring 10-23 D-51 tunnel attributes and identity networking 7-27, 7-28 described 7-25 Tx Power Level Assignment parameter parameter 7-27 Type parameter 6-85 to 6-86 13-40 7-5, 7-83, 11-29, 15-9 6-66 Topology Change Count parameter 3-32 traffic specifications (TSPEC) request described 4-76 examples 4-76 U-APSD described traffic stream metrics (TSM) configuring using the GUI described 4-79 4-77 viewing statistics 4-77 viewing status using the CLI 4-90 using the GUI 4-82 UDP, use in RADIUS UDP port 6-3 14-23, 14-29 Cisco Wireless LAN Controller Configuration Guide IN-30 OL-21524-02
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Tagged PDF : Yes XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04 Modify Date : 2011:08:02 09:59:04-04:00 Create Date : 2011:08:02 09:59:02-04:00 Metadata Date : 2011:08:02 09:59:04-04:00 Creator Tool : FrameMaker 7.2 Format : application/pdf Document ID : uuid:3c3f3864-ad4c-4efb-b476-0a8c12fcc3b3 Instance ID : uuid:3816c896-b339-47cf-9b80-d300287d8af6 Producer : Acrobat Distiller 9.0.0 (Windows) Page Count : 46 Creator : FrameMaker 7.2EXIF Metadata provided by EXIF.tools