I N D E X 9-2 Numerics , ,

Size: px
Start display at page:

Download "I N D E X 9-2 Numerics , ,"

Transcription

1 INDEX Numerics 40 MHz channel bonding a policy name b/g RRM interval template 11-72, b/g RRM threshold templates b/g voice templates counters report 16-26, h template configuring security trap tags layer n scaling reports X association X authentication bridging configuring series ISRs 1-6 A AAA override AAA servers AAA traps absolute 19-2 Access 9-21 access control list template access control list templates accessing the schedule panel 16-4 access mode 9-6 access point configuring configuring for hybrid REAP 14-8 credentials 9-2 friendly access point/radio templates access point authentication and MFP templates access point authorization template access point configuration importing 9-21 access point inventory report access point layer 5-35 access point load avoiding Access point placement 5-23 access point placement 5-23 access point positions changing with import or export of file 5-32 access point reports 16-5 modifying 16-8 viewing 16-8 access points adding 5-22 configuring 9-16 configuring for LOMM 9-24 converting to LWAPP C-2 detecting disabling ineligible 9-14 embedded 1-6 searching 9-26 selecting access points, adding to maps 5-22 to 5-23 access point security statistics for mesh 6-52 access point templates adding IN-1

2 access point threats 6-12 access point traps acknowledged alarms hiding 15-4 ACL template configuring ACS server adding WCS to 17-5 ACS View Server credentials 6-35 active interferer count per channel 9-30 active interferers 9-29 active interferers count chart 9-30 active sessions monitoring 7-4 adaptive scan threshold add config groups 8-18 add group members 8-10 adding access points 5-21 adding access point templates adding a license B-5 adding a migration template 9-14 adding a mobility services engine 12-2 adding a spectrum expert 9-28 adding autonomous access points by CSV file 9-10 by device information 9-10 adding autonomous access points to WCS 9-10 adding auto-provisioning filter adding controllers 10-1 adding controllers from config group 8-20 adding guest user account 7-15 adding guest user accounts 7-15 adding IOS access points 9-10 by device information 9-10 adding launch points for Google Earth 19-7 adding templates from config group 8-21 adding WCS as TACACS+ server 17-6 adding WCS to ACS server for use with RADIUS adding WCS to an ACS server 17-5 adding WCS to a non-cisco ACS server adding WCS usergroups into ACS for RADIUS into ACS for TACACS add known rogue adhoc rogues 2-23 adjusted link metric 6-43 administration menu 2-27 advanced debug 5-32, 5-49 advanced options 5-17 Advanced tab on WLAN template Aironet IE alarm 15-1 alarm dashboard 2-28, 15-1 alarm monitor 2-28, 6-18 alarms 15-1 config audit 8-25 monitoring 15-4 rogue access point 15-8 rogue adhoc alarm trigger threshold all groups window 17-8 alternate parent for mesh altitude 19-2 altitude mode 19-2 anonymous provisioning antenna gain 6-34 antenna type 6-34 AP attack details 2-19 AP by hop count 2-24 AP failover priority setting 9-1, 10-9 AP join taken time 2-24 AP list by location 16-8 AP list by location report 16-8 IN-2

3 AP list by SSID 16-8 AP manager IP 9-15 AP mesh layer info 5-36 AP parameters tab applying CLI commands applying config groups 8-21 applying controller templates AP policies 3-7 AP policies template AP profile status report 16-8 APs not assigned to maps 2-18 AP status report viewing for scheduled task AP template task history viewing AP template tasks AP up time 6-48 AP uptime 2-23 assigned virtual domain components 18-8 assigning location presence 5-3 assigning virtual domains 7-22 association request failures 6-55 association request success 6-55 association request timeouts 6-55 attacks access points 6-12 audience of document 19 AUDIT_STATUS_DIFFERENCE auditing config groups 8-22 auditing H-REAP groups audit report audit reports 16-9 configuring 9-26, 10-6 audit status 6-51 viewing 10-6 viewing for access points 9-26 viewing for controllers 10-6 audit trail viewing 7-9 audit trails enabling for guest user activities 7-11 authentication order managing 10-6 authentication priority 10-6 authentication process Hybrid REAP 14-2 authentication request failures 6-55 authentication request success 6-55 authentication request timeout 6-55 auto key generation automated upgrade 13-9 automatic backups, scheduling 13-3, 17-1 automatic client exclusion automatic client troubleshooting automatic database synchronization 12-5 autonomous access points adding 9-10 adding by CSV file 9-10 downloading images 9-11 upgrading 9-14 viewing 9-11 autonomous AP images downloading 9-21 autonomous to lightweight migration 9-9 autonomous to LWAPP migration support 9-9 auto provisioning setting auto provisioning device information detailed auto provisioning filter deleting editing auto refresh avoid access point load avoid Cisco AP load avoid foreign AP interference avoid non noise IN-3

4 B background scanning on templates background scanning in mesh networks described to scenarios to?? Background Scan parameter background tasks running 17-1 backhaul interface 6-53 backing up the WCS database on Linux 13-5 on Windows 13-4 backup and restore license B-5 bandwidth making expedited basic auditing 8-23 best practices A-1 bridge group name 6-53 Bridging link information 6-58 bridging link information 6-58 bridging mesh statistics 6-53 broadcast deauthentication frame signatures 3-10 bronze bronze queue 6-55 buildings adding to a campus map 5-2 adding to WCS database 5-4 busiest APs report 16-8 busiest clients report C CAC enabling CA certificates 4-5 CAD files 5-2 calculating access point requirements 5-14 call admission control campus map, adding to WCS database 5-1 CAS 12-1 cascade reboot 8-26 caution, defined 21 CCA sensitivity certificate signing request 3-22 changing access point positions 5-32 by importing or exporting a file 5-32 changing station role root mode 9-14 channel bonding configuring channel change AP 6-80 channel change notifications 6-76 channels monitoring on a floor map 5-41 monitoring on floor map 5-41 channels on a floor map 5-41 channel width monitoring 6-60 checking the status of WCS on Linux 13-2 on Windows 13-1 Cisco Aironet 1510 Access Points in Mesh network Cisco AP load avoiding Cisco Discovery Protocol 9-20 Cisco UDI 5-18 Cisco Unified Wireless Network Solution 5-48 Cisco WCS base B-1 Cisco WCS location B-1 Cisco wired IPS events 2-23 Cisco Wireless LAN Solution overview 1-1 to?? security solutions 3-1 to 3-5 civic address 5-3 clamped to ground 19-2 IN-4

5 classification rule clear config 9-21 CLI commands applying to template client alarms most recent 2-19 client association report client authentication provision client count 2-18 client count graph report 16-5 client count report client devices connecting to WLANs client exclusion happening automatically client exclusion policies template client MFP 3-7 client properties 6-27 client related traps client report creating new client reports modifying 16-9, viewing 16-9, clients finding 6-36 to??, 6-36,?? to 6-39 manually disabled 2-19 map 6-39 monitoring on a floor map 5-43 monitoring on a floormap 5-43 parameters 5-43 clients, monitoring on floor map 5-43 clients detected by location server 2-23 client security component 2-23 client security events 2-23 clients layer 5-37 client statistics 6-39 client tab home page 2-18 client troubleshooting automatic CLI sessions combined inventory report command buttons 2-28 components of virtual domain 18-8 config audit 8-25 config audit alarms 8-25 config group adding controllers 8-20 adding templates 8-21 configuring 8-19 downloading IDS signatures 8-28 downloading sw to controllers 8-27 removing controllers 8-20 removing templates 8-21 config group audits 8-22 config groups applying 8-21 auditing 8-22 creating 8-17 downloading customized webauth 8-29 rebooting 8-26 reporting 8-26 config group task deleting config group task history viewing config group tasks configuration audit summary 8-25 configuration mismatch 6-80 configuration sync 17-4 configure menu 2-26 configuring 40 MHz channel bonding configuring bridging configuring access control lists configuring access points 9-16 configuring a client exclusion policy template IN-5

6 configuring a CPU ACL template configuring a high throughput template configuring alarm severity configuring a local EAP general template configuring a local EAP profile template configuring a manually disabled client template configuring a mesh template 11-74, configuring an h template configuring an access point configuring an access point for hybrid REAP 14-8 configuring an EAP-FAST template configuring an RRM interval template configuring an RRM threshold template configuring a policy name template configuring a roaming parameters template configuring a rogue policies template configuring a TACACS+ server template configuring a TFTP server template configuring a trusted AP policies template configuring audit reports 10-6 configuring a user authentication priority template configuring a user login policies template configuring a video parameter template configuring a voice parameter template configuring config group 8-18 configuring EDCA parameters for individual controllers through a template configuring firewall for WCS 3-6 configuring general templates 11-4 configuring global credentials 9-2 configuring global parameters configuring high availability configuring high density templates configuring H-REAP AP groups configuring Hybrid REAP 12-1, 14-1 configuring hybrid REAP access point groups configuring Hybrid-REAP groups Configuring IDS 3-9 Configuring IDS signatures 3-9 configuring IDS signatures 3-9 configuring intrusion detection systems 3-9 configuring LDAP bind requests 10-3 configuring multiple country codes 8-15 configuring NAC out-of-band configuring radio templates configuring RADIUS servers configuring scheduled configuration tasks configuring SNMPv configuring spectrum experts 9-28 configuring TACACS+ servers configuring template ACL for rogue AP rule groups configuring templates a policy name b/g RRM interval b/g RRM threshold b/g voice access point/radio access point authentication and MFP access point authorization file encryption guest users known rogue access point local management user MAC filter QoS 11-7 RADIUS accounting RADIUS authentication syslog Telnet SSH traffic stream metrics QoS 11-8 trap control trap receiver web authentication WLAN configuring the controller for hybrid REAP 14-5 IN-6

7 configuring the switch for hybrid REAP 14-4 configuring wired guest access connecting client devices to WLANs Connecting to the Guest WLAN 3-21 Containment 6-17 containment of rogue access points 6-17 content customizing 2-22 context aware configuring 12-8 context aware planning 12-8 context-aware software 12-1 controller configuring for hybrid REAP 14-5 controller audit report controller CPU utilization 2-23 controller details 9-15 controller inventory report controller memory utilization 2-23 controllers adding 10-1 adding to WCS database 4-1 pinging network devices 10-9 searching 10-5 specified 1-1 controller status report viewing controller templates applying controller upgrade settings controller utilization report controller values refreshing 10-7 conventions of document 21 converting WLSE autonomous to WCS controller C-1 counters report for country codes multiple 8-15, 10-4 setting 10-4 coverage hole 6-70, 6-80 coverage holes 2-18 finding 5-7 monitoring on a floor map 5-42 to 5-43 monitoring on floormap 5-42 coverage holes, monitoring 5-42 coverage hole summary report Creating 16-8 creating a lobby ambassador account 7-12 creating a network configuration audit Creating a network design 5-26 creating a network design 5-26 creating a new access point report 16-8 creating a new client report creating a new inventory report creating a new mesh report 16-10, creating a new performance report creating a new report for guest association for guest count for guest operations for guest user sessions guest acount status creating a new security report creating a virtual domain 18-1 creating calibration models 5-36 Creating guest user accounts 7-11 creating guest user accounts 7-11 creating placemarks 19-3 creating virtual domains 18-1 CSR 3-22 CSV file 9-10, method for adding autonomous access points 9-10 CSV files 19-4 current AP template task deleting IN-7

8 disabling enabling modifying current config group task disabling enabling modifying currently logged guest users 2-25 current templates viewing customized web auth customized webauth downloading 8-29 Customized Web authentication 3-18 customized web authentication downloading customizing content on WCS Home page 2-22 customizing tabs on WCS Home page 2-21 Custom signature 3-15 D dashboard RRM 6-76 data/coverage 5-18 database synchronization automatic 12-5 data management tasks performing debug commands A-4 debug strategy A-4 default lobby ambassdor credentials editing 7-9 deleting a current AP template task deleting a current config group task Deleting a guest user 3-21 deleting a license B-5 deleting a mobility services engine 12-3 deleting a report 16-3 deleting guest user templates 7-17 deleting WCS user accounts 7-4 designing a network 5-26 detailed auto provisioning device information detecting access points detecting rogue access points 6-18 device certificates 4-5 device information 9-10 method for adding autonomous access points 9-10 DHCP 6-40 DHCP server overriding DHCP statistics 6-72 diagnostic channel A-1 disable report schedule 16-2 disabling a current config group task disabling current AP template task disabling IDS signatures 3-14 disabling ineligible access points 9-14 DNS ping 6-40 DNS resolution 6-40 document audience 1-19 conventions 21 organization 20 downloading a customized web authentication page downloading autonomous AP images 9-21 downloading customized webauth 8-29 Downloading customized web authentication 3-18 Downloading IDS signatures 3-13 downloading IDS signatures 3-13 from your config group 8-28 downloading images to autonomous access points 9-11 downloading sw to controllers after adding config group 8-27 downloading vendor CA certificates 4-5 downloading vendor device certificates 4-5 downstream delay 11-9 IN-8

9 downstream packet loss rate 11-9 drawing polygon areas using map editor 5-12 DTIM E EAP-FAST template EAPOL flood signature 3-11 EDCA parameters configuring for individual controllers configuring through a template editing guest users 7-16 editing home page tabs 2-22 Editing signature parameters 3-16 editing the default lobby ambassador credentials 7-9 edit link 5-7 edit links home page 2-21 edit location presence information 5-3 edit tabs 2-22 edit view configuring parameters notifications monitoring embedded access points 1-6 enable background audit 8-18 enable enforcement 8-18 enable report schedule 16-2 enabling a current config group task enabling audit trails for guest user activities 7-11 enabling current AP template task enabling high density enabling IDS signatures 3-14 enabling load-based CAC 10-8 Enabling Web login 3-17 enabling Web login 3-17 end user license agreement B-8 to?? establishing logging options Ethernet bridging 9-3 Ethernet VLAN tagging guidelines 9-5 event history 6-23 event notification 1-4 Events 15-1 events 15-1 monitoring excluded packets 6-54 executing CLI commands expedited expedited bandwidth exporting a file to change access point position 5-32 exporting WLSE map data 5-45 export task list 17-8 extend to ground 19-2 external web auth extracting task list F failed objects monitoring 15-7 Failover failover mechanism failover scenario feature license B-2 file encryption template filter deleting auto provisiioning editing current auto provisioning filtering using to modify maps 6-58 filter member management filter mode filter properties finding clients 6-35 IN-9

10 finding coverage holes 5-7 firewall, configuring for WCS 3-6 floor plans adding to a campus building 5-8 to 5-10 adding to a standalone building 5-10 to 5-11 enhancing with map editor 5-11 foreign access point interference avoiding foreign AP interference avoiding Frame type 3-15 friendly access point template friendly rogue friendly rogue access points 6-11 friendly rogue APs 2-24 FTP turning on and off G general tab client properties 6-27 home page 2-18 RF properties 6-29 security 6-30 general templates configuring 11-4 generate password generating migration analysis report 9-14 geographical coordinates 19-1 global credentials configuring 9-2 Global settings for standard and custom signatures 3-16 global username and password overriding 9-20 gold gold queue 6-54 Google Earth adding launch points 19-7 Google Earth coordinates 19-2 Google Earth maps 19-1 viewing 6-62 Google KML or CSV importing into WCS 19-5 GPS markers 5-3 groups for hybrid-reap for rogue access point rules group setup window on ACS server GUEST_USER_ADDED GUEST_USER_AUTHENTICATED guest account status guest association guest count guest operations Guest user deleting 3-21 guest user account 2-19 scheduling 7-18 Guest user accounts creating 7-11 guest user accounts adding 7-15 creating 7-11 managing 7-14 guest user activities 7-11 guest user credentials 7-16 guest user details ing 7-19 print 7-19 guest user monitoring 6-74 guest user reports 6-74, guest users currently logged 2-25 viewing and editing 7-16 guest user sessions guest user templates IN-10

11 deleting 7-17 Guest WLAN connecting 3-21 guidelines for Ethernet VLAN tagging 9-5 for NAC out-of-band integration guidelines for using the map editor 5-11 H heater status 6-48 heat map described 5-23 graphic 5-23 help menu 2-27 hide acknowledged alarms 15-4 hierarchy of mesh network 6-57 Hierarchy of Mesh parent to child 6-59 hierarchy of mesh parent to child 6-59 high density enabling high density requirements high density templates high reliability high throughput template configuring historical report type 16-1 Home page customizing content 2-22 customizing tabs 2-21 H-REAP AP groups configuring H-REAP configuration tab H-REAP groups auditing HTTP turning on and off Hybrid REAP configuring 9-1, 10-1, 14-1 hybrid REAP access point groups hybrid-reap groups Hybrid REAP local switching hysteresis I identical audit status 6-51 IDS 3-9 configuring 3-9 IDS sensors 3-9 IDS signature events viewing 3-17 IDS signatures 3-9 disabling 3-14 downloading 3-13 downloading from config group 8-28 enabling 3-14 uploading 3-12 images downloading to autonomous access points 9-11 importing access point configuration 9-21 importing a file to change access point position 5-32 importing coordinates as CSV file 19-4 into Google Earth 19-2 importing Google KML or CSV into WCS 19-5 importing WLSE map data 5-45 indicator of alarms 2-28 information elements Aironet infrastructure MFP 3-7 input type inspect location readiness 5-20 inspect VoWLAN readiness 5-21 installer using to upgrade 13-9 IN-11

12 installing a license B-4 installing WCS for WLSE conversion C-2 insufficient memory 6-54 integrating NAC out-of-band interferers summary 9-29 internal web auth inter-subnet roaming 8-4 Intrusion Detection Systems 3-9 intrusion detection systems 3-9 invalid association request 6-55 invalid reassociation request 6-55 invalid reauthentication request 6-56 inventory detail status 2-18 inventory reports creating modifying viewing inventory status 2-23 IOS access points adding 9-10 adding by device information 9-10 IOSAP_DOWN IOSAP_LINK_DOWN IOSAP_LINK_UP IOSAP_UP IP connectivity 6-40 IPSEC failures 6-13 K KEK key encryption key key wrap KML file 19-2 L laptop icon 6-38 latest network audit report 10-8 latitude 19-2 Layer 1 security solutions 3-1 Layer Layer 2 security solutions 3-2 Layer Layer 3 security solutions 3-2 Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-5 LBS authorization LDAP 10-3 LDAP bind requests configuring 10-3 LEAP authentication requirements 8-8 legacy syslog template license adding B-5 backup and restore B-5 deleting B-5 license agreement B-8 to?? license installation B-4 license management B-4 licenses B-1 license types B-1 licensing on WLSE network management C-4 lifetime 7-17 limitations for high reliability link aggregation 11-6 link aggregation (LAG) guidelines 14-4 to?? link metric adjusted 6-43 unadjusted 6-43 link SNR 6-43 IN-12

13 link stats for mesh Link test running 6-64 link test running 6-64 Link test result 6-66 link test results 6-43 list all filters list filters load 5-33 load-based CAC enabling Lobby ambassador 7-11 lobby ambassador logging activites 7-20 lobby ambassador account creating 7-12 editing 7-13 lobby ambassador defaults setting 7-7 local authentication for hybrid-reap groups Local EAP check box local EAP general template local EAP profile template local management user template 11-83, local net users template local password policy local switching Hybrid REAP locating rogue access points 6-18 location of rogue access points 6-17 location accuracy analyzing 5-48 using testpoints 5-48 location appliance importing 12-3 location appliance functionality 4-3 location appliance importing 12-3 location appliances adding to WCS database 4-2 auto-synchronizing 12-5 relationship with WCS Location 1-4 location menu 2-27 location optimized monitor mode 9-18 location presence assigning 5-3 location readiness inspecting 5-20 location server inventory report location server utilization location tab 6-32 location upgrade B-2 log analysis 6-22 logging 17-4 logging in to the WCS user interface 7-13 logging into the WCS user interface 2-15 to 2-17 logging options logging the lobby ambassador activities 7-20 login.html 3-18 LOMM 9-18 configuring access point radios 9-24 longitude 19-3 long preambles, enabling for SpectraLink NetLink phones 4-6 LWAPP migration 9-9 LWAPP uptime 2-24 M MAC filtering MAC filter template MAC frequency 3-15 MAC information 3-15 MACK IN-13

14 message authenticator code keys Maintain Image Aspect Ratio 5-44 maintaining WCS 13-1 to malformed neighbor packets 6-53 malicious rogue malicious rogue access points 6-3 managed network security index 6-3 management frame flood signatures 3-10 Management Frame Protection 3-7 management frame protection management queue 6-55 managing a virtual domain 18-6 managing guest user accounts 7-14 managing licenses B-4 managing multiple WCSs 1-9 managing user authentication order 10-6 managing virtual domains 18-6 manually disabled client template for manually disabled clients 2-19 manufacturer information 6-34 Map Editor general notes and guidelines 5-11 map editor general notes 5-11 guidelines for using 5-11 using to draw polygon areas 5-12 map editor, enhancing floor plans 5-11 maps creating 5-1 to 5-23 monitoring 5-33, 5-33 to 5-44 searching 5-6 using to monitor link stats 6-41 using to monitor mesh AP neighbors 6-46 map view updating 6-59 menu bar 2-26 mesh access point neighbors monitoring 6-46 mesh access points monitoring 6-44 mesh alarms most recent 2-20 mesh alternate parent mesh health 6-48 monitoring 6-48 mesh link statistics 6-41 monitoring 6-41 mesh link stats mesh neighbors 6-47 mesh network monitoring using maps 6-41 mesh network hierarchy 6-57 mesh networks background scanning monitoring 6-41 mesh node hops mesh packet error statistics mesh packet statistics mesh parent changing AP 2-23 mesh parent-child hierarchical view 5-36 mesh report creating 16-10, mesh reports modifying viewing mesh security statistics for an AP 6-48 mesh statistics for an access point 6-52 mesh stranded APs mesh tab home page 2-20 mesh template configuring Mesh tree viewing 6-57 IN-14

15 mesh tree viewing 6-57 mesh worst node hops mesh worst SNR links message integrity check information element metrics in QoS 11-9 MFP 3-7 for clients 3-7 MFP client protection MFP signature generation MFP templates MIC IE migration analysis running 9-14 migration analysis report generating 9-14 migration analysis summary viewing 9-12 migration template 9-12 minimum RSSI MIR 12-1 mirror mode 9-19 mismatched audit status 6-51 mobile announce messages 8-8 mobile intelligent roaming planning and configuring 12-9 mobility 8-1 mobility anchors 8-13 mobility groups 8-7 prerequisites 14-4 to?? mobility groups, configuring 8-8 mobility scalability 8-11 mobility services 12-1 mobility services engine adding to WCS 12-2 deleting from WCS 12-3 keeping synchronized 12-3 modifying access point reports 16-8 modifying a current AP template task modifying a current config group task modifying a migration template 9-15 modifying audit reports 16-9 modifying client reports 16-9, modifying inventory reports modifying map displays 6-58 using filters 6-58 modifying mesh reports modifying performance reports modifying security reports monitoring active sessions 7-5 monitoring alarms 15-4 monitoring channels on a floor map 5-41 monitoring channel width 6-60 monitoring clients on a floormap 5-43 monitoring coverage holes on a floormap 5-42 monitoring notifications monitoring events monitoring failed objects 15-7 monitoring guest users 6-74 monitoring maps 5-33 monitoring mesh access point neighbors 6-46 using maps 6-46 monitoring mesh health 6-43, 6-48, 6-60 monitoring mesh link statistics using maps 6-41 monitoring mesh networks using maps 6-41 monitoring neighboring channels Monitoring outdoor areas 5-36 monitoring outdoor areas 5-44 monitoring pre-coverage holes 6-70 monitoring predicted coverage 5-34 monitoring rogue access point alarms 15-8 monitoring rogue access point details 15-9 IN-15

16 monitoring rogue access points 6-13 monitoring rogue adhoc alarms monitoring rogue adhocs 6-14 monitoring rogue clients 6-15, monitoring security configurations 15-14, monitoring shunned clients 6-16 monitoring spectrum experts 9-28 monitoring transmit power levels 5-36 on a floormap 5-41 monitor menu 2-26 monitor mode location optimized 9-18 most recent AP alarms 2-23 most recent audit alarms 8-26 most recent client alarms 2-19 most recent mesh alarms 2-20 most recent rogue adhocs 3-4 most recent rogue AP alarms 2-24 most recent security alarms 2-20, 2-24 MSE synchronizing with WCS 12-3 MSE synchronization status 12-7 multicast mobility mode 8-12 multiple country codes configuring 8-15 setting 10-4 multiple syslog template N N+1 redundancy 8-5 NAC out-of-band configuring NAT 8-11 Navigator 1-9 NetStumbler signature 3-11 network address translation 8-11 network audit report viewing latest 10-8 network design 5-26 network protection 3-9 Network Summary page 2-16 new rogue AP count new rogue AP count report new rogue APs new rogue APs report new search 5-6 node hop count worst 2-20 node hops 6-54 for mesh noise avoiding non types avoid non non noise avoiding non-cisco ACS server for use with RADIUS normal mode for Ethernet port 9-6 note, defined 21 notifications of channel change 6-76 of RF grouping 6-77 of transmission power change 6-77 NTP server template 11-3 null probe response signatures 3-10 O optimizing the controller for high density organizationally unique identifier 6-34 organization of document 20 Outdoor areas monitoring 5-44 outdoor areas monitoring 5-44 outdoor areas, adding to a campus map 5-5 to 5-6 IN-16

17 outdoor location creating with Google Earth 19-1 out of sync alarms 12-6 out of sync alerts 12-5 override global username password 9-20 overview Cisco Wireless LAN Solution 1-1 to?? WCS 1-2 P packet error rate worse 2-20 packet error rate link color 6-59 packet error statistics for mesh packet jitter 11-9 packet latency 11-9 packet loss 11-9 packet loss rate 11-9 packets received 6-56 packet statistics for mesh packets transmitted 6-56 parent changes 6-54 parent TSF 6-40 passthrough password rules turning on or off PEAP peer-to-peer blocking guidelines percent time at maximum power 6-81 performance reports creating modifying viewing performing data management tasks pico cell mode pinging network devices from a controller 10-9 placemarks creating 19-3 placement of access points 5-24 planning mode 5-16 to calculate access point requirements 5-14 planning mode, calculating access point requirements 5-14 platinum platinum queue 6-54 PLR 11-9 POE status 6-51 policy manager solutions 3-2 policy name template configuring polygon areas drawing with map editor 5-12 poor neighbor SNR 6-53 power injector setting power injector settings 9-20 power-over-ethernet status 6-51 pre-coverage holes monitoring 6-70 predicted coverage, monitoring 5-34 to??, 5-34 predictive tool distance based 5-20 Prerequisites 2-1 prerequisites for high reliability Present map 6-38 print guest user details 7-19 protection type purpose of document 19 Q QoS QoS templates 11-7 quarantine Queue IN-17

18 queues silver, gold, platinum, bronze, management 6-54 Quiet time 3-15 R radio measurements receiving 6-40 radio receiver sensitivity 6-34 radio resource management Radio Resource Management statistics 6-76 radio status scheduling 9-25 radio templates configuring radio utilization report RADIUS accounting template RADIUS and TACACS+ attributes for virtual domain 7-24, 18-7 virtual domains 7-24, 18-7 RADIUS authentication template RADIUS servers configuring reachability status 9-28 reassociation request failures 6-56 reassociation request success 6-56 reassociation request timeouts 6-56 reauthentication request failures 6-56 reauthentication request success 6-56 reauthentication request timeout 6-56 rebooting config groups 8-23 receiving radio measurements 6-40 recent alarms 2-23 recent coverage holes 2-18 Recent map 6-38 recent rogue adhoc alarm 2-20 recent rogue alarms 2-23 recent rogue AP alarms 2-19 recovering the WCS password refresh automatically refresh browser 5-33 refresh controller values 10-7 refresh from network 5-33 refresh heatmap 5-33 related publications 21 relative to ground 19-2 removing controllers from config group 8-20 removing switches removing templates from config group 8-21 report counters access point inventory busiest APs 16-8 busiest clients client association client count combined inventory controller inventory controller utilization coverage hole summary deleting 16-3 location server inventory location server utilization mesh alternate parent mesh worst node hops radio utilization security summary traffics stream metrics 16-8 traffic stream metrics Tx power level and channel unique client voice statistics Reports 16-7 reports n scaling 16-5 access point type 16-7 disable schedule 16-2 IN-18

19 enable schedule 16-2 mesh link stats mesh node hops mesh packet error statistics mesh packet statistics mesh worst SNR links running 16-1 reset AP now 9-21 restore WCS values 10-7 restoring WCS database on Linux 13-7 retain WCS value 8-23 Retrieving UDI 6-66 RF calibration model, creating 4-7 RF calibration tool 1-9 RF grouping notifications 6-77 RF prediction heat map 5-23 RF profile traps RF properties 6-29 RF update traps RLDP roaming 8-1 roaming parameters template configuring roaming time 11-9 rogue access point alarms monitoring 15-8 rogue access point details 15-9 rogue access point location 6-17 rogue access point rule groups rogue access point rules configuring a template viewing or editing 9-27 rogue access points alarm monitor 6-18 detecting 6-18 detecting and locating 6-18 to 6-19 friendly 6-11 locating 6-18 malicious 6-10 monitoring 6-1 to??, 6-13 solutions for 3-2 unclassified 6-11 rogue adhoc alarm 2-20 rogue adhoc alarms monitoring rogue adhocs monitoring 6-14 most recent 3-4 rogue adhocs event report rogue AP alarms 2-19 rogue AP detail summary 2-24 rogue APs event report rogue APs layer 5-39 rogue APs report rogue clients monitoring 6-15, rogue clients layer 5-40 rogue detail summary 2-24 rogue detector 9-18 rogue location discovery protocol rogue management 3-4 rogue policies template for rogues detected by APs role criteria 9-13 root access points (RAPs) selecting 9-9 root mode changing from station role 9-14 routing state 6-53 RRM RRM dashboard 6-74 RRM DCA RRM intervals 11-72, 11-74, RRM interval template configuring 11-72, RRM thresholds RRM threshold template IN-19

20 configuring rules for rogue access point viewing or editing for rogue access points 9-27 Running 6-64 Running a link test 6-64 running a link test 6-64 running background tasks 17-1 running migration analysis 9-14 running report 16-1 RX neighbor requests 6-54 RX neighbor responses 6-54 Rx sensitivity S saved searches 5-7 scalability parameters 8-11 scaling reports n 16-5 scan threshold scheduled configuration tasks configuring scheduled tasks viewing 9-25 schedule panel accessing 16-4 scheduling guest user account 7-18 scheduling radio status 9-25 search using for alarms 15-6 search clients 6-37 searching controllers 10-5 secondary WCS operation security alarms most recent 2-20 security color range 6-3 security configurations monitoring 15-14, security index 6-3 security index detailed report 6-5 security mesh statistics 6-55 security reports creating modifying viewing security solutions 3-1 to 3-5 security statistics for mesh 6-52 security summary report security summary window 6-2 security tab home page 2-19 selecting access points sending mobile announce messages 8-8 sensors viewing IDS types 3-9 sequence parameter serial number 6-34 server settings setting AP failover 9-1 setting AP failover priority 10-9 setting lobby ambassodor defaults 7-7 setting multiple country codes 10-4 shunned clients monitoring 6-16 shutting switch port sidebar area 2-27 signature attacks 6-12 signature attacks summary 2-19 silver silver queue 6-54 single device skull-and-crossbones indicator 6-19 sniffer sniffer mode 9-19 SNMP authentication SNMPv3 IN-20

21 configuring SNR definition 6-59 SNR down 6-43 SNR link worst 2-20 SNR UP 6-43 SNR up 6-43 software downloading config groups to controllers 8-27 software, updating 4-4 SpectraLink NetLink phones, enabling long preambles 4-6 spectrum expert adding 9-28 spectrum expert details 9-30 spectrum experts configuring 9-28 monitoring 9-28 summary 9-29 Standard signature 3-15 standard signatures 3-10 starting WCS on Linux 2-15 on Windows 2-14 station role changing to root mode 9-14 statistics DHCP 6-72 statistics tab 6-31 status, checking 13-1 status report AP profile 16-8 stopping WCS on Linux 13-3 on Windows 13-2 supported Cisco WLSE management stations C-2 switch configuring for hybrid REAP 14-4 switches removing switch port shutting switch port tracing using symmetric mobility tunneling 11-6 symmetric tunneling 8-5 synchornization of configuration 17-4 synchronization 12-5 viewing information from 12-7 synchronization history 12-7 synchronizing mobility services engines 12-3 synchronizing WCS and MSE 12-3 syslog templates 11-81, System requirements 2-2 T TACACS+ server configuring a template for TACACS+ servers configuring tagged packets 9-8 tagging of rogue access points 6-17 Target 6-40 target TSF 6-40 tasks importing into ACS 17-5 Telnet SSH templates temperature 6-48 template configuring for rogue AP rules template-based auditing 8-23 template for configuring network user credentials templates using 11-1 test analysis 6-40 IN-21

22 Testpoints 5-48 TFTP turning on and off TFTP details 9-15 TFTP server 3-12 TFTP server template configuring thermometer color range 6-3 threats access points 6-12 throughput report 16-6 tilt 19-2 top APs by client count 2-18 top over subscribed AP 2-23 top security issues 6-4 total APs not assigned to maps 2-18 total interferer count 9-30 total mismatched controllers 8-25 trace switch port traffic indicator message traffic stream metrics traffic stream metrics QoS status 11-9 traffic stream metrics QoS template 11-8 traffic stream metrics report 16-8, graphical 16-8 transition time transmission power change notifications 6-77 transmit power level transmit power levels monitoring on a floor map 5-41 monitoring on a floormap 5-41 trap security trap control templates trap receiver template traps AAA access point client related RF profile RF update unsupported WPS traps added in traps added in traps added in traps added in traps added in traps added in traps added in traps added in , trend report type 16-1 troubleshooting A-1 troubleshooting voice RF coverage 5-21 trunk mode 9-6 trusted AP policies template for trusted AP policies template tunneling 8-5 turning password rules on or off Tx channel report TX neighbor requests 6-54 TX neighbor responses 6-54 Tx power level report U UDI retrieving on controllers and access points 6-66 unadjusted link metric 6-43 unclassified rogue unclassified rogue APs 2-24 understanding virtual domains 7-24, 18-8 uninstalling WCS on Linux 13-8 on Windows 13-8 unique client report unique device identifier 6-66 IN-22

23 unknown association requests 6-56 unknown reassociation request 6-56 unknown reauthentication request 6-56 untagged packets 9-8 Update map view 6-59 update map view 6-59 updating system software 4-4 upgrading autonomous access points 9-14 upgrading the network upgrading to Linux 4 during WLSE conversion C-3 upgrading WCS on Linux on Windows Uploading IDS signatures 3-12 uploading IDS signatures 3-12 upstream delay 11-9 upstream packet loss rate 11-9 User accounts for guest 7-11 user accounts for guest 7-11 user authentication order managing 10-6 user authentication priority template configuring user credential retrieval priority user details ing 7-19 printing 7-19 user groups 7-2 User Interface 2-25 user login policies configuring a template user preferences using chokepoints 5-32 to enhance tag location reporting 5-32 using edit view 15-5 using filtering 6-58 using maps to monitor mesh AP neighbors 6-46 to monitor mesh link statistics 6-41 using maps to monitor mesh networks 6-41 using planning mode 5-12 using search 15-6 using template ACL for friendly access point using templates a policy name b/g RRM interval 11-72, b/g RRM threshold b/g voice access point/radio access point authentication & MFP access point authorization file encryption for legacy syslog for multiple syslog guest users local management user 11-83, local net users MAC filter NTP server 11-3 QoS 11-7 RADIUS accounting RADIUS authentication syslog 11-81, Telnet SSH traffic stream metrics QoS 11-8 trap control trap receiver web authentication WLAN using testpoints to analyze element location accuracy 5-48 using the installer to upgrade 13-9 utilization report IN-23

24 V for controllers V5 Client Statistics Report V5 client statistics report vendor CA certificates downloading 4-5 vendor device certificates downloading 4-5 video parameter template configuring video parameter templates configuring view audit reports 10-6 View Filters icon 5-35, 5-41, 5-42, 5-43 viewing access point reports 16-8 viewing all current templates viewing an AP template task history viewing AP status report for scheduled task viewing audit reports 16-9 viewing audit status 10-6 for access points 9-26 viewing autonomous access points 9-11 viewing client reports viewing clients identified as WGBs 6-64 viewing controller status report for the scheduled task viewing DHCP statistics 6-72 viewing Google Earth maps 6-60, 19-6 viewing guest users 7-16 Viewing IDS signature events 3-17 viewing IDS signature events 3-17 viewing inventory reports viewing mesh reports Viewing Mesh tree 6-49 viewing mesh tree 6-52 viewing MFP events 15-4 viewing performance reports view in grid 2-23 viewing security reports Viewing shunned clients 3-9 viewing shunned clients 3-9 viewing synchronization history 12-7 viewing synchronization info 12-7 viewing the audit trail 7-9 viewing the migration analysis 9-12 viewing the RRM dashboard 6-78 virtual domain managing 18-6 virtual domain hierarchy 18-3 virtual domains 18-1 assigning 7-22 attributes 7-24, 18-7 creating 18-1 hierarchy 18-3 managing 18-6 understanding 7-24, 18-8 VLAN tagging 9-3 voice parameter template configuring voice RF coverage troubleshooting 5-21 voice statistics report voice traffic 5-18 VoWLAN readiness inspecting 5-21 W WCS checking status on Linux 13-2 on Windows 13-1 installing 2-4 maintaining 13-1 to IN-24

25 overview 1-2 servers supported 1-2 starting on Linux 2-15 on Windows 2-14 stopping on Linux 13-3 on Windows 13-2 uninstalling on Linux 13-8 on Windows 13-8 upgrading on Linux on Windows versions 1-3 to 1-6 WCS_ _FAILURE WCS-ADV-SI-SE-10 B-2 WCS Base, described 1-3, 1-5 WCS controller deployment from WLSE autonomous C-1 WCS database adding location appliances 4-2 backing up on Linux 13-5 on Windows 13-4 restoring on Linux 13-7 on Windows 13-5 scheduling automatic backups 13-3, 17-1 WCS home 2-16 WCS Home page customizing content 2-22 customizing tabs 2-21 WCS licenses B-1 WCS Location described 1-4 to 1-6 relationship with Cisco location appliances 1-4 WCS Navigator 1-9 WCS on WLSE licensing C-7 WCS password recovering WCS user accounts adding 7-1 changing passwords 7-4 deleting 7-4 WCS user interface 7-14 described 1-2, 1-9 logging into 2-15 to 2-17 WCS values restoring 10-7 web authentication template Web authentication types 3-18 web auth security A-3 web auth types web login enabling 3-17 Wellenreiter signature 3-11 WGB 9-12 WGBs viewing those clients 6-64 wips 12-1 planning and configuring wired guest access configuring Wireless Control System (WCS) See WCS WLANs web auth security A-3 WLAN templates WLSE autonomous deployment conversion C-1 WLSE management stations C-2 WLSE map data exporting 5-45 importing 5-45 WLSE upgrade B-2 WLSE upgrade license C-7 WMM policy IN-25

26 work group bridge mode 9-12 worst node hop count 2-20 worst node hops for mesh worst packet error rate 2-20 worst SNR link 2-20 worst SNR links for mesh WPS traps IN-26

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1 Numerics 802.11 counters report 14-12 802.11 security trap 10-71 802.11 tags layer 5-44 802.11a policy name 10-52 802.11b/g RRM interval template 10-62, 10-64 802.11b/g RRM threshold template 10-61 802.11b/g

More information

Numerics INDEX. AAA AAA mode active sessions AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87

Numerics INDEX. AAA AAA mode active sessions AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87 INDEX Numerics 40 MHz channel bonding 9-123 802.11a/n Parameters monitor 6-19 RRM Grouping monitor 6-20 RRM Groups monitor 6-22 802.11a/n Parameters 9-118 802.11h 9-129 DCA 9-122 EDCA 9-128 General 9-119

More information

Template information can be overridden on individual devices.

Template information can be overridden on individual devices. CHAPTER 12 This chapter describes the Controller Template Launch Pad. It is a hub for all controller templates. Templates provide a way to set parameters that you can then apply to multiple devices without

More information

Template information can be overridden on individual devices.

Template information can be overridden on individual devices. CHAPTER 12 This chapter describes the Controller Template Launch Pad. It is a hub for all controller templates. Templates provide a way to set parameters that you can then apply to multiple devices without

More information

Monitoring Wireless Devices

Monitoring Wireless Devices CHAPTER 6 This chapter describes how to use WCS to monitor your wireless LANs. It contains these sections: Rogue Access Point Location, Tagging, and Containment, page 6-1 Configuring ACS View Server Credentials,

More information

Configuring Hybrid REAP

Configuring Hybrid REAP 13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,

More information

Running Reports CHAPTER

Running Reports CHAPTER CHAPTER 14 WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report

More information

Cisco Questions & Answers

Cisco Questions & Answers Cisco 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 25.6 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing Advanced

More information

Per-WLAN Wireless Settings

Per-WLAN Wireless Settings DTIM Period, page 1 Off-Channel Scanning Deferral, page 3 Cisco Client Extensions, page 10 Client Profiling, page 12 Client Count per WLAN, page 15 DTIM Period Information About DTIM Period In the 802.11

More information

Cisco Wireless LAN Controller Configuration Guide

Cisco Wireless LAN Controller Configuration Guide Cisco Wireless LAN Controller Configuration Guide Software Release 7.0.116.0 April 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Running Reports. Choosing a Report CHAPTER

Running Reports. Choosing a Report CHAPTER 13 CHAPTER WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

Cisco Unified Wireless Network Software Release 5.2

Cisco Unified Wireless Network Software Release 5.2 Cisco Unified Wireless Network Software Release 5.2 PB507140 Overview With Cisco Unified Wireless Network Software Release 5.2, Cisco is delivering critical features for its industry-leading indoor and

More information

Monitoring Wireless Devices

Monitoring Wireless Devices CHAPTER 6 This chapter describes how to use WCS to monitor your wireless LANs. It contains these sections: Monitoring Rogue Access Points, Adhocs, and Clients, page 6-1 Rogue Access Point Location, Tagging,

More information

C H A P T E R Reports Note Cisco Prime Network Control System Configuration Guide OL

C H A P T E R Reports Note Cisco Prime Network Control System Configuration Guide OL CHAPTER 14 The Cisco NCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis.

More information

Performing Administrative Tasks

Performing Administrative Tasks CHAPTER 15 The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

CCIE Wireless v3 Lab Video Series 1 Table of Contents

CCIE Wireless v3 Lab Video Series 1 Table of Contents CCIE Wireless v3 Lab Video Series 1 Table of Contents Section 1: Network Infrastructure Layer 2 Technologies VLANs VTP Layer 2 Interfaces DTP Spanning Tree- Root Election Spanning Tree- Path Control Spanning

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 642-737 Title : Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Vendor : Cisco Version : DEMO Get

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS PrepKing Number: 642-742 Passing Score: 800 Time Limit: 120 min File Version: 61.0 http://www.gratisexam.com/ CISCO 642-742 EXAM QUESTIONS & ANSWERS Exam Name: CCNP Wireless - IUWVN Certkey QUESTION 1

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : 350-050 Title : CCIE Wireless Exam (V2.0) Vendor : Cisco Version : DEMO Get Latest & Valid 350-050 Exam's Question

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-586 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-586 Exam A QUESTION 1 A customer in the United States requires connectivity between

More information

Configure Wireless Technologies

Configure Wireless Technologies Track Tagged Assets Using Optimized Monitor Mode on APs, page 2 Creating a Wireless Chokepoint, page 2 Removing a Wireless Chokepoint from the Network, page 3 Configure Autonomous APs, page 3 Configure

More information

Implementing Cisco Unified Wireless Networking Essentials Volume 1

Implementing Cisco Unified Wireless Networking Essentials Volume 1 Volume 1 I. Course Introduction A. Learner Skills and Knowledge B. Course Goals and Objectives C. Course Flow D. Additional References 1. Cisco Glossary of Terms E. Your Training Curriculum II. Wireless

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

Alarms and Events. Using the Alarm Dashboard CHAPTER

Alarms and Events. Using the Alarm Dashboard CHAPTER CHAPTER 14 This chapter describes the type of events and alarms reported, how to view alarms and events by product or entity and severity, and how to view IDS signature attacks. It contains these sections:

More information

Configure Controller and AP Settings

Configure Controller and AP Settings Configure SNMP Credentials for Rogue AP Tracing, on page 1 Configure Protocols for CLI Sessions, on page 2 Enable Unified AP Ping Reachability Settings on the Prime Infrastructure, on page 2 Refresh Controllers

More information

Cisco Exactexams Questions & Answers

Cisco Exactexams Questions & Answers Cisco Exactexams 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 23.4 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing

More information

Alarms and Events. Using the Alarm Summary CHAPTER

Alarms and Events. Using the Alarm Summary CHAPTER CHAPTER 16 This chapter describes the type of events and alarms reported, how to view alarms and events by product or entity and severity, and how to view IDS signature attacks. It contains these sections:

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo Vendor: Cisco Exam Code: 642-737 Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Version: Demo QUESTION 1 Which statement describes the major difference between PEAP and EAP-FAST

More information

Managing an Enterprise WLAN with Wireless Control System (WCS) BRKEWN-2011

Managing an Enterprise WLAN with Wireless Control System (WCS) BRKEWN-2011 Managing an Enterprise WLAN with Wireless Control System (WCS) BRKEWN-2011 Session Agenda WCS s Role in the Network Life Cycle of a Network Planning and Deploying a Network Monitoring a Network Tools and

More information

CertifyMe. CISCO EXAM QUESTIONS & ANSWERS

CertifyMe.   CISCO EXAM QUESTIONS & ANSWERS CertifyMe Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 28.9 http://www.gratisexam.com/ CISCO 642-737 EXAM QUESTIONS & ANSWERS Exam Name: Implementing Advanced Cisco Unified Wireless

More information

Cisco WCS Overview. The Cisco Unified Wireless Network Solution CHAPTER

Cisco WCS Overview. The Cisco Unified Wireless Network Solution CHAPTER 1 CHAPTER This chapter describes the Cisco Unified Wireless Network Solution (CUWNS) and the Cisco WCS. This chapter contains the following sections: The Cisco Unified Wireless Network Solution, page 1-1

More information

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Last revised: February 1, 2008 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1. 300-365.exam Number: 300-365 Passing Score: 800 Time Limit: 120 min CISCO 300-365 Deploying Cisco Wireless Enterprise Networks Version 1.0 Exam A QUESTION 1 The customer has deployed C7960 phones with

More information

Getting Started. Prerequisites CHAPTER

Getting Started. Prerequisites CHAPTER CHAPTER 2 This chapter describes how to prepare Cisco WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-6 Installing

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 5 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 10 Configuring WLAN-VLAN Mappings on FlexConnect Groups, page 11 Information About FlexConnect

More information

Alarm and Event Dictionary

Alarm and Event Dictionary CHAPTER 13 This chapter describes the event and alarm notifications that the wireless LAN controller, access points, and location appliances can receive. It also identifies specific actions the administrator

More information

CCIE Wireless v3.1 Workbook Volume 1

CCIE Wireless v3.1 Workbook Volume 1 CCIE Wireless v3.1 Workbook Volume 1 Table of Contents Diagrams and Tables 7 Topology Diagram 7 Table 1- VLANs and IP Subnets 8 Table 2- Device Management IPs 9 Table 3- Device Credentials 10 Table 4-

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) Figure 1. Cisco Wireless Control System (WCS) Product Overview Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

Cisco Deploying Basic Wireless LANs

Cisco Deploying Basic Wireless LANs Cisco Deploying Basic Wireless LANs WDBWL v1.2; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course is designed to give you a firm understanding of the Cisco Unified Wireless

More information

Deploying Cisco Wireless Enterprise Networks

Deploying Cisco Wireless Enterprise Networks 300-365 Deploying Cisco Wireless Enterprise Networks NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 300-365 Exam on Deploying Cisco Wireless

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-681 Passing Score: 800 Time Limit: 120 min File Version: 8.5 http://www.gratisexam.com/ CertifyMe 642-681 Exam A QUESTION 1 Select two activities that form part of the wireless migration

More information

Mobility Services CAS. wips CHAPTER

Mobility Services CAS. wips CHAPTER 13 CHAPTER This chapter briefly describes the CAS or wips services that WCS supports and gives steps for mobility procedures that are common across all services. You can refer to the Cisco Context-Aware

More information

Using Templates CHAPTER

Using Templates CHAPTER CHAPTER 9 This chapter describes how to add and apply controller templates. Information on creating (adding) access point templates is also provided. Templates allow you to set parameters that you can

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

Configuring RF Profiles

Configuring RF Profiles Prerequisites for, page 1 Restrictions for, page 1 Information About RF Profiles, page 2 Configuring an RF Profile (GUI), page 5 Configuring an RF Profile (CLI), page 6 Applying an RF Profile to AP Groups

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Overview. About the Cisco Context-Aware Mobility Solution CHAPTER

Overview. About the Cisco Context-Aware Mobility Solution CHAPTER 1 CHAPTER This chapter describes the role of the Cisco 3300 series mobility services engine (MSE), a component of the Cisco Context-Aware Mobility (CAM) solution, within the overall Cisco Unified Wireless

More information

Implementing Cisco Unified Wireless Networking Essentials

Implementing Cisco Unified Wireless Networking Essentials Implementing Cisco Unified Wireless Networking Essentials Course Number: 640-721 (IUWNE) Course Length: 5 Days Course Overview This instructor-led provides students with information and practice activities

More information

CCIE Wireless v3 Workbook Volume 1

CCIE Wireless v3 Workbook Volume 1 CCIE Wireless v3 Workbook Volume 1 Table of Contents Diagrams and Tables 7 Topology Diagram 7 Table 1- VLANs and IP Subnets 8 Table 2- Device Management IPs 9 Table 3- Device Credentials 10 Table 4- Term

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-351 Title : CCIE Wireless Vendor : Cisco Version : DEMO Get Latest & Valid 400-351 Exam's Question and

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Getting Started. Prerequisites CHAPTER

Getting Started. Prerequisites CHAPTER CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Installing WCS

More information

Cisco Actualtests Exam Questions & Answers

Cisco Actualtests Exam Questions & Answers Cisco Actualtests 642-737 Exam Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 25.4 http://www.gratisexam.com/ Sections 1. 1 2. 2 3. 3 4. 4 5. 5 6. 6 Cisco 642-737

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products WLAN Configuration Guide HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G Unified

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,

More information

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B FortiNAC Cisco Airespace Wireless Controller Integration Version: 8.x Date: 8/28/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

Wireless LAN Controller (WLC) Design and Features FAQ

Wireless LAN Controller (WLC) Design and Features FAQ Wireless LAN Controller (WLC) Design and Features FAQ Document ID: 118833 Contents Introduction Design FAQ Features FAQ Related Information Introduction This document provides information on the most frequently

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services

More information

Wireless LAN Controller Mesh Network Configuration Example

Wireless LAN Controller Mesh Network Configuration Example Wireless LAN Controller Mesh Network Configuration Example Document ID: 70531 Introduction Prerequisites Requirements Components Used Conventions Background Information Cisco Aironet 1510 Series Lightweight

More information

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13 INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa

More information

DWS-4000 Series DWL-3600AP DWL-6600AP

DWS-4000 Series DWL-3600AP DWL-6600AP Unified Wired & Wireless Access System Configuration Guide Product Model: Release 1.0 DWS-4000 Series DWL-8600AP DWL-6600AP DWL-3600AP Page 1 Table of Contents 1. Scenario 1 - Basic L2 Edge Setup: 1 Unified

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 3 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 8 Information About FlexConnect Groups To organize and manage your FlexConnect access points,

More information

Trusted AP Policies on a Wireless LAN Controller

Trusted AP Policies on a Wireless LAN Controller Trusted AP Policies on a Wireless LAN Controller Document ID: 100368 Contents Introduction Prerequisites Requirements Conventions Trusted AP Policies What is a Trusted AP? How to Configure an AP as a Trusted

More information

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1 Course Overview Provides students information to troubleshoot Cisco wireless networks. The course provides guidelines for troubleshooting Wi-Fi architectures of Cisco wireless components. Who Should Attend

More information

Certkiller q. Cisco Implementing Advanced Cisco Unified Wireless Security v2.0

Certkiller q. Cisco Implementing Advanced Cisco Unified Wireless Security v2.0 Certkiller.642-737.120q Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 a) I passed the exam yesterday

More information

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee 642-742 Q&As Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0 Pass Cisco 642-742 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

Virtual Domains. Creating a Virtual Domain CHAPTER

Virtual Domains. Creating a Virtual Domain CHAPTER CHAPTER 20 A Cisco WCS virtual domain consists of a set of devices and maps and restricts a user s view to information relevant to these devices and maps. Through a virtual domain, an administrator can

More information

Highlight. Central AP Management with High Scalability

Highlight. Central AP Management with High Scalability WMS-608N/C Wireless LAN Controller with Built-in AAA Radius Based User Access Control, Support 512 AP and 5000 User License (5 Giga Ethernet Switch Ports) PheeNet WMS-608N/C utilizes New Generation Technology

More information

Prerequisites for Wireless Sniffing

Prerequisites for Wireless Sniffing Appendix D Troubleshooting Configuring Wireless Sniffing Wireshark Note The latest version of Wireshark can decode the packets by going to the Anaylze mode. Select decode as, and switch UDP5555 to decode

More information

Getting Started. Prerequisites CHAPTER

Getting Started. Prerequisites CHAPTER CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Installing WCS

More information

Getting Started CHAPTER

Getting Started CHAPTER CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-2 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Configuring WCS

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Dashboard,

More information

Getting Started. NCS Delivery Modes CHAPTER

Getting Started. NCS Delivery Modes CHAPTER CHAPTER 2 This chapter describes information on system requirements, setting up and starting the NCS. The NCS is an application used to configure, manage, and monitor the wired and wireless networks. This

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

] Designing Cisco Wireless Enterprise Networks

] Designing Cisco Wireless Enterprise Networks 300-360] Designing Cisco Wireless Enterprise Networks NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 300-360 Exam on Designing Cisco Wireless

More information

CiscoWorks Wireless LAN Solution Engine Express 2.13

CiscoWorks Wireless LAN Solution Engine Express 2.13 Data Sheet CiscoWorks Wireless LAN Solution Engine Express 2.13 Organizations are adopting wireless LANs (WLANs) to increase business productivity and accessibility. Network managers need a solution that

More information

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/ NXC Series NXC 2500/ 5500 NXC Controllers Firmware Version 5.00 Edition 19, 5/2017 Handbook Default Login Details LAN Port IP Address https://192.168.1.1 User Name admin Password 1234 Copyright 2017 ZyXEL

More information

PrepKing. PrepKing

PrepKing. PrepKing PrepKing Number: 642-587 Passing Score: 800 Time Limit: 120 min File Version: 9.0 http://www.gratisexam.com/ PrepKing 642-587 Exam A QUESTION 1 In order for a controller-based access point to be allowed

More information

Configuring IDS Signatures

Configuring IDS Signatures Information About IDS Signatures, page 1 (GUI), page 3 Viewing IDS Signature Events (GUI), page 6 (CLI), page 7 Viewing IDS Signature Events (CLI), page 8 Information About IDS Signatures You can configure

More information

Add and Organize Devices

Add and Organize Devices This chapter contains the following topics: Add Devices to Prime Infrastructure, on page 1 Import Devices from Another Source, on page 7 Create Device Import CSV Files, on page 7 Add Devices Manually (New

More information

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks What Are Converged Access Workflows?, on page 1 Supported Cisco IOS-XE Platforms, on page 3 Prerequisites for

More information

Monitoring Location Servers and Site

Monitoring Location Servers and Site 8 CHAPTER This chapter describes how to monitor location servers by configuring and viewing alarms, events, and logs. It also describes how to use Cisco WCS to view location server, client and asset tag

More information

Wireless Intrusion Detection System

Wireless Intrusion Detection System Management Frame Protection, on page 1 Client Exclusion Policies, on page 5 Rogue Management, on page 7 Cisco Intrusion Detection System, on page 33 IDS Signatures, on page 37 SNMP, on page 45 wips, on

More information

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9 Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9 Cisco WGBs Information About Cisco A workgroup bridge (WGB) is a mode that can be configured on an autonomous IOS access point to provide wireless

More information

Architecting Network for Branch Offices with Cisco Unified Wireless

Architecting Network for Branch Offices with Cisco Unified Wireless Architecting Network for Branch Offices with Cisco Unified Wireless Karan Sheth - Sr. Technical Marketing Engineer Objective Design & Deploy Branch Network That Increases Business Resiliency 2 Agenda Learn

More information

Mobility Groups. Information About Mobility

Mobility Groups. Information About Mobility Information About Mobility, page 1 Information About, page 5 Prerequisites for Configuring, page 10 Configuring (GUI), page 12 Configuring (CLI), page 13 Information About Mobility Mobility, or roaming,

More information

High Availability (AP SSO) Deployment Guide

High Availability (AP SSO) Deployment Guide High Availability (AP SSO) Deployment Guide Document ID: 113681 Contents Introduction Prerequisites Requirements Components Used Conventions Topology New HA Overview HA Connectivity Using Redundant Port

More information

General Troubleshooting Guidelines

General Troubleshooting Guidelines CHAPTER 2 Common VoWLAN Problems Choppy Audio / No Audio One-Way Audio Clipping, Echo Gaps in Audio / No Audio when Roaming In many cases, all of the above symptoms may be the result of problems within

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product.

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product. Cisco EXAM - 640-722 Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product http://www.examskey.com/640-722.html Examskey Cisco 640-722 exam demo product is here for you to

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services 12 CHAPTER Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access points for wireless domain services (WDS),

More information

Data Collection and Background Tasks

Data Collection and Background Tasks This section contains the following topics: Control Data Collection Jobs, on page 1 How Data Retention Settings Affect Web GUI Data, on page 1 About Historical Data Retention, on page 2 Performance and

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

Connecting the Cisco 1500 Series Mesh Access Points to the Network

Connecting the Cisco 1500 Series Mesh Access Points to the Network Connecting the Cisco 1500 Series Mesh Access Points to the Network This chapter describes how to connect the Cisco 1500 Series mesh access points to the network. The wireless mesh terminates on two points

More information