Numerics INDEX. AAA AAA mode active sessions AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87

Size: px
Start display at page:

Download "Numerics INDEX. AAA AAA mode active sessions AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87"

Transcription

1 INDEX Numerics 40 MHz channel bonding a/n Parameters monitor 6-19 RRM Grouping monitor 6-20 RRM Groups monitor a/n Parameters h DCA EDCA General High Throughput Media 9-125, Roaming RRM Intervals RRM Radio Grouping RRM Thresholds association diagnostic test b/g/n Parameters monitor b/g/n Parameters EDCA General High Throughput Roaming RRM Intervals RRM Thresholds b/g/n Parameters Controller Templates b/g RRM interval template , b/g RRM threshold templates Counters access points counters report General Parameters configuring h a/n h template configuring MAC Counters access points n summary reports Parameters configuring 9-83, security trap n scaling reports X authentication diagnostic test X supplicant credentials Bridging configuring x Flow Control series ISRs 1-7 A AAA AAA mode active sessions AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87 IN-1

2 local password policy MAC Filtering 9-91 RADIUS TACACS TACACS+ Servers 9-89 users Web Auth Configuration 9-92 AAA Local Net Users 9-89 AAA Mode AAA override AAA RADIUS Acct Servers 9-85 Fallback Parameters 9-86 AAA servers AAA traps absolute 19-2 Access Control List Rules 9-99 Access Control Lists configuring 9-98 access control list template access control list templates access mode access point configuring configuring for hybrid REAP 13-9 credentials friendly access point authentication and MFP templates access point authorization template access point icons 5-17 access point load avoiding Access Point Password Global 9-59 access point positions changing with import or export of file 5-56, 5-57 Access Points Cisco APs configuring detecting disabling ineligible Monitoring overview 6-23 radio utilization 6-33 Tx power and channel 6-33 access points configuring configuring for LOMM converting to LWAPP C-2 embedded 1-7 positioning 5-56 searching 2-38, access points, adding to maps 5-48 to 5-53 access point threats 3-9 access point threats or attacks 3-9 Access Point Timer Settings 9-63 access point traps Account creating 7-21 ACL configuring 9-98 Rules 9-99 template ACL IP group details ACL Protocol Groups configuring ACL template configuring ACS server adding WCS to ACS View Server credentials ACS View Servers configure ACS view server tab active interferer count per channel active interferers IN-2

3 active interferers count chart Active Sessions location server active sessions monitoring 7-5 adaptive scan threshold adaptive wips alarm report , , , adaptive wips top 10 APs report add config groups 8-20 add group members 8-10 Adding location server 12-9 MSE 12-5 adding a spectrum expert adding autonomous access points by CSV file by device information adding guest user accounts 7-13 adding IOS access points by device information adding launch points for Google Earth 19-7 Adding System Interfaces 9-38 adding templates from config group 8-23 adding WCS as TACACS+ server Adhoc Rogue alarm details Alarms overview Events details overview monitoring alarms Adhoc Rogues overview 6-88 adhoc rogues 2-26, 3-7 adhoc rogues report adjusted link metric 5-82 Administration 18-1 location server administration menu 2-30 Administrative Tools overview 1-14 advanced debug 17-7 advanced options Advanced Parameters location server advanced search 2-35, Advanced tab on WLAN template age out dual band age out suppression aggregated historical data Aggressive Load Balancing 9-29 aggressive load balancing Aironet IE 9-71, Airopeek configuring Alarm details 6-87 alarm 6-80 alarm cleanup options alarm counts for access points 6-83 for controllers 6-83 for coverage hole 6-83 for malicious APs 6-83 for mesh links 6-83 for mobility 6-83 for security 6-83 for unclassified APs 6-83 for WCS failures 6-83 alarm dashboard 6-80 alarm display options alarm indicator 6-80 Alarms acknowledging Adhoc Rogue IN-3

4 details overview assigning cleaning deleting notifications monitoring 6-1 Rogue AP details 6-96 Rogue APs 6-89 unassigning working with alarms 14-1 assigning 3-24 clearing 3-24 config audit deleting 3-24 searching 2-37 unassigning 3-24 alarm severity configuring 6-84 alarm summary 2-33 alarm trigger threshold alarm warning all groups window allow AAA override 9-70 alternate parent report altitude 19-2 altitude mode 19-2 anonymous provision anonymous provisioning AP/MSE Authorization configuring 9-91 AP attack details 2-20 AP authentication template AP Authentication and MFP configuring AP authorization template AP Config export AP Failover Priority 9-27 AP failover priority setting AP join taken time 10-7 AP load avoiding AP Location data 5-54 AP manager IP applying CLI commands applying config groups 8-23 AP policies 3-39 AP policies template AP Profile Status access points 6-33 AP profile status report APs Counters 6-33 AP Profile Status 6-33 autonomous templates configuration templates copy and replace Coverage (RSSI) 6-30 Coverage (SNR) 6-30 details 6-34 CDP Neighbors 6-40 Current Associated Clients 6-40 general 6-34 interfaces 6-39 Dynamic Power Control 6-28 Edit View 6-25 Export AP config Generate Report 6-26 Interference 6-29 lightweight templates IN-4

5 lightweight access point template monitor overview 6-23 Noise 6-29 Radio details 6-41 radio remove unassociated TSM 6-33 UpTime 6-30 Voice Statistics 6-31 Voice TSM Reports 6-32 Voice TSM Table 6-31 APs not assigned to maps 2-19 AP Status Report Scheduled Task AP Template tasks AP Template Task delete enable, disable history modify AP threats and attacks 10-7 AP Timer Settings 9-63 AP up time 5-88, 6-50 AP uptime 2-26 AP Username Password Controller Templates asset matching criteria assigning location presence 5-31 assigning virtual domains 7-19, association request failures 5-95, 6-54 association request success 5-95, 6-54 association request timeouts 5-95, 6-54 attacks access points 3-9 attacks detected 3-9 AUDIT_STATUS_DIFFERENCE auditing config groups 8-24 auditing H-REAP groups Audit Mode basic audit template based audit Audit Now 9-19 audit report for alarms 6-88, audit reports configuring audit status 5-91 viewing for access points audit trail viewing 7-10 Authentication Priority configuring authentication priority template authentication process Hybrid REAP 13-2 authentication request failures 5-95, 6-54 authentication request success 5-95, 6-54 authentication request timeout 5-95, 6-54 auto key generation automated upgrade 4-15 automatic backups, scheduling 4-9 automatic client exclusion automatic client troubleshooting 10-21, autonomous access points adding adding by CSV file downloading images upgrading viewing Autonomous AP Migration Templates edit autonomous AP images downloading Autonomous APs IN-5

6 template new templates autonomous to lightweight migration autonomous to LWAPP migration support auto provisioning filter editing auto refresh 5-108, avoid access point load avoid Cisco AP load avoid foreign AP interference avoid non noise B background scanning 9-55 on mesh configuration on templates background scanning in mesh networks described 9-53 to 9-55 scenarios 9-54 Background Scan parameter 9-56 backhaul interface 5-93, 6-52 backing up the WCS database on Linux 4-11 on Windows 4-10 Backup location server backup and restore license B-4 band selection battery level condition type best practices A-1 bridge group name 5-93, 6-52 Bridging link information 5-82, 5-98 bridging link information 5-82, 5-98 bridging mesh statistics 5-93, 6-52 broadcast deauthentication frame signatures 3-42 bronze bronze queue 5-95, 6-53 buildings adding to WCS database 5-33 busiest APs report busiest client report C CA Certificate configuring CA certificates 4-5 calculating access point requirements calibrating client CAS 12-1 cascade reboot 8-25 CDP Interface Neighbors controller ports monitor 6-11 certificate signing request 3-52 change order buttons 15-8 changing station role root mode channel bonding configuring channel width monitoring 6-55 checking the status of WCS on Linux 4-7 on Windows 4-6 Chokepoint adding to WCS database adding to WCS map removing from WCS removing from WCS map chokepoint condition type Chokepoints 6-67 new chokepoints IN-6

7 positioning 5-56 CIDR notation Cisco Access Points configuring Cisco Adaptive wips alarms Cisco Aironet 1510 Access Points in Mesh network 9-53 Cisco AP load avoiding Cisco Discovery Protocol Cisco WCS base B-1 Cisco wired IPS events 2-27 Cisco Wireless LAN Solution overview 1-1 to 1-2 security solutions 3-1 to 3-37 civic address 5-32 CKIP 9-68 clamped to ground 19-2 classification rule Classifying Rogue APs 6-93 clear config CLI template CLI commands applying to template Client disable remove Sessions Report client calibrating managing 10-1 client alarm summary 10-5 client association failure 10-5 client authentication failure 10-5 client authentication provision client authentication type distribution 10-6 client count 2-19, 10-4 client count report client detail page Client Details Association History CCXv5 Information Event Information Location Information Statistics client details retrieving from access point page client devices connecting to WLANs client distribution 10-3 client excluded 10-5 client exclusion 9-72, happening automatically Client Exclusion Policies configuring client exclusion policies template client exclusion policies template Client Location current map recent map client MFP 3-39 client protocol distribution 10-3 client related traps client reports clients searching 2-40 clients detected by location server 2-27 client security events 2-27 client sessions report Client Summary filtering client summary report client tab 2-20, 10-2 client tab dashboard client traffic 10-6 IN-7

8 client troubleshooting automatic enabling client WEP key decryption error 10-5 client WPA MIC error counter activated 10-5 CLI Sessions monitor 6-6 CLI sessions 16-71, color coding of obstacles 5-74 command buttons 2-32 compliance reports component options icon 2-29 condition type for event definitions config audit config audit alarms config group adding controllers 8-22 adding templates 8-23 configuring 8-21 downloading IDS signatures 8-27 downloading sw to controllers 8-26 removing controllers 8-22 removing templates 8-23 config group audits 8-24 config groups applying 8-23 auditing 8-24 creating 8-19 downloading customized webauth 8-27 rebooting 8-25 reporting 8-26 Config Group Task delete enable,disable history Config Group Tasks modify Configuration scheduled configuration audit report Configuration Backup Configure Access Points Radio Configure APs copy and replace Configure Controllers General Parameters a/n Parameters h Dynamic Channel Assignment EDCA General High Throughput Media 9-125, Roaming RRM Intervals RRM Radio Grouping RRM Thresholds b/g/n Parameters EDCA General High Throughput Roaming RRM DCA List RRM Radio Grouping RRM Thresholds Parameters 9-83, Access Control List Rules 9-99 Access Points Cisco APs Download Customized Web Auth Bundle 9-36 Download IDS signatures 9-36 Downloading Configuration 9-34 Downloading Software 9-34 IN-8

9 Download Web Admin Certificate 9-35 H-REAP 9-80 H-REAP AP Groups 9-80 Management Authentication Priority Local Management Users Syslog Syslog Servers Telnet SSH Trap Receivers Web Admin Mesh Ports Rebooting Controllers 9-7 Removing Controllers 9-7 Security AAA 9-84 AAA AP authorization 9-91 AAA Local Net Users 9-89 AAA RADIUS Acct Servers 9-85 AAA RADIUS Auth Servers 9-84 Access Control Lists 9-98 AP Authentication and MFP CA Certificate Client Exclusion Policies CPU Access Control List Custom Signatures Disabled Clients 9-98 file encryption 9-83 ID Certificate IDS Sensor List Local EAP 9-94 Local EAP General 9-94 Local EAP general EAP-FAST parameters 9-97 Local EAP General Network Users Priority 9-97 Local EAP Profiles 9-96 Rogue Policies Standard Signatures User Login Policies 9-98 Web Auth Certificate Wireless Protection System DHCP Scopes 9-57 Mobility Groups 9-50 Network Route 9-49 Network Time Protocol 9-53 QoS Profiles 9-56 Spanning Tree Protocol 9-50 System Commands 9-30 System Interfaces 9-37 Uploading Files from Controllers 9-33 configure menu 2-30 Configuring ACL Protocol Groups Wired Guest Access 9-45 Configuring Bridging 9-28 configuring access points configuring a client exclusion policy template configuring a CPU ACL template configuring a high throughput template configuring alarm severity 6-84, configuring a local EAP general template configuring a local EAP profile template configuring a manually disabled client template configuring a mesh template , configuring an h template configuring an access point configuring an access point for hybrid REAP 13-9 configuring an EAP-FAST template configuring an RRM interval template configuring an RRM threshold template configuring a policy name template configuring a roaming parameters template configuring a TACACS+ server template configuring a trusted AP policies template configuring a user authentication priority template configuring a user login policies template configuring config group 8-20 IN-9

10 configuring controller WLANs 9-64 configuring EDCA parameters through a template Configuring Existing Controllers 9-21 configuring firewall for WCS 3-38 configuring global credentials configuring global parameters configuring H-REAP AP groups configuring Hybrid REAP 13-1 configuring hybrid REAP access point groups configuring Hybrid-REAP groups Configuring IDS 3-41 Configuring IDS signatures 3-41 configuring IDS signatures 3-41 configuring intrusion detection systems 3-41 configuring multiple country codes 8-16 configuring search results 2-47 configuring spectrum experts configuring template ACL for rogue AP rule groups configuring templates b/g RRM interval access point authentication and MFP access point authorization file encryption guest users known rogue access point local management user MAC filter QoS RADIUS accounting RADIUS authentication syslog Telnet SSH traffic stream metrics QoS trap control WLAN configuring the controller for hybrid REAP 13-6 configuring the switch for hybrid REAP 13-5 Configuring User Roles 9-58 connecting client devices to WLANs Connecting to the Guest WLAN 3-52 content customizing 2-25 context aware configuring context aware planning context-aware software 12-1 Controller General System Parameters 9-24 Multicast Mode 9-62 Template Launch Pad 11-1 Uploading configuration/logs 9-33 controller configuring for hybrid REAP 13-6 controller CPU utilization 2-27 controller details Controller DHCP 9-61 configuring 9-61 controller license information controller licenses managing searching 2-46 controller memory utilization 2-27 Controllers Adding an Interface 9-38 configuring existing 9-21 DHCP Stats monitor 6-7 Edit View 6-3 monitor Summary 6-4 monitoring 6-1 search 6-2 System Parameters monitor 6-3 IN-10

11 controllers adding 9-4 adding to WCS database 4-2 searching 2-39 specified 1-1 Controller Security monitor 6-12 Controller Templates b/g/n Parameters Adding 11-2 applying 11-2 AP Username Password delete 11-2 managing, creating 11-3 SNMP Community 11-8 Viewing 9-18 Voice b/g/n 9-118, 11-98, , Controller Time and Date 9-33 controller upgrade settings 16-69, 16-71, Controller User Roles 9-58 controller WLANs configuring 9-64 converting WLSE autonomous to WCS controller C-1 Country Codes setting multiple country codes multiple 8-16 Coverage (RSSI) access points 6-30 Coverage (SNR) access points 6-30 coverage hole 6-62 coverage hole reports coverage holes 2-19 CPU access control template CPU Access Control Lists configuring CPU ACL configuring Cranite 9-67 Creating Account 7-21 Creating a Lobby Ambassador Account 7-21 Creating guest user accounts 7-11 creating guest user accounts 7-11 creating placemarks 19-3 creating virtual domains 18-2 CSR 3-52 CSV file method for adding autonomous access points CSV files 19-4 Current building delete 5-35 edit map 5-35 currently logged guest users 2-28 Custom and Standard Signatures Global Settings customized webauth downloading 8-27 Customized Web Auth Bundle download 9-36 Customized WebAuth Bundles downloads 9-14 Customized Web authentication 3-50 customized web authentication downloading customize report 15-7 customizing content on WCS Home page 2-25 customizing tabs on WCS Home page 2-23 Custom signature 3-47 Custom Signatures configuring D data collection for RFID tag IN-11

12 DCA , a/n debug commands A-4 debug strategy A-4, D-11 default lobby ambassdor credentials editing 7-10, 7-17 Deleting MSE 12-6 deleting a license B-4 deleting a WLAN 9-75 deleting guest user templates 7-15 deleting WCS user accounts 7-4 designing a network destination type for report 15-5 Detecting APs details clients device certificates 4-4 device information method for adding autonomous access points device reports DHCP configuring 9-61 DHCP diagnostic test DHCP Scopes configuring 9-57 DHCP server overriding DHCP Stats controllers monitor 6-7 diagnostic channel A-1, D-1 diagnostic test association X authentication DHCP DNS ping DNS resolution IP connectivity profile redirect Disable client Disabled Clients manual 9-98 disabled clients template disabling IDS signatures 3-46 Discovering Templates from Controllers 9-18 Distance condition type DNS ping diagnostic test DNS resoltion diagnostic test Download Web Admin Certificate Web Auth Certificate downloading a customized web authentication page downloading autonomous AP images Downloading Configurations to Controllers 9-34 downloading customized webauth 8-27 Downloading customized web authentication 3-50 Downloading IDS signatures 3-45 downloading IDS signatures 3-45 from your config group 8-27 downloading images to autonomous access points Downloading Signature Files Downloading Software controllers 9-34 downloading sw to controllers after adding config group 8-26 downloading vendor CA certificates 4-5 downloading vendor device certificates 4-4 Downloads Customized WebAuth Bundles 9-14 Vendor CA Certificates 9-16 Vendor Device Certificate 9-15 downstream delay IN-12

13 downstream packet loss rate drawing polygon areas using map editor 5-72 DTIM Dynamic Channel Assignment a/n dynamic interface E EAP-FAST template EAP-FAST template EAPOL flood signature 3-43 EDCA b/g/n Parameters EDCA parameter template EDCA parameters configuring through a template edit content 2-26 edit contents 2-26 editing saved reports editing scheduled run details Editing signature parameters 3-49 editing the default lobby ambassador credentials 7-10, 7-17 edit link 5-71 edit links home page 2-23 edit location presence information 5-31 Edit View access points 6-25 alarms 6-85 controllers 6-3 general 2-47 egress interface configuring parameters Notifications alarms embedded access points 1-7 emergency condition type enable background audit 8-20 enable enforcement 8-20 enable log module enabling enabling audit trails for guest user activities 7-11 enabling IDS signatures 3-46 Enabling Web login 3-49 enabling Web login 3-49 end user license agreement B-7 to B-12 Ethernet bridging Ethernet Switch credentials remove Ethernet Switches configure Ethernet VLAN tagging guidelines evaluation license for controller for MSE event history 6-88, 10-27, event notification 1-5 Events Adhoc Rogue details overview monitoring overview Pre Coverage Holes Rogue Alarms Rogue AP details Rogue APs wips working with IN-13

14 events searching 2-42 exclude device list excluded packets 5-94, 6-52 exclude switch trunk ports exclude vendor list executive summary report Export Asset Information location server exporting a file 5-56 to change access point position 5-56, 5-57 export task list extend to ground 19-2 extension license for controller for MSE extracting task list F Factory Defaults restoring 9-32 failover mechanism 16-6 Failover Priority 9-27 feature of WCS license 16-9 feature license B-2 File Encryption controller 9-83 file encryption template filter editing current auto provisioning filtering using to modify maps 5-98 filtering saved reports filtering scheduled run results firewall, configuring for WCS 3-38 Floor Areas delete 5-53 edit 5-53 Floor Plan Editor 1-14 foreign access point interference avoiding foreign AP interference avoiding Frame type 3-47 friendly access point template friendly AP template friendly rogue friendly rogue access points 3-8 friendly rogue APs 2-27 FTP turning on and off G General Properties Location Server general tab home page 2-19 general templates configuring 11-4 generating migration analysis report geographical coordinates 19-1 Global AP Password configuring 9-59 global credentials configuring Global Settings Standard and Custom Signatures Global settings for standard and custom signatures 3-49 Global SSID Group add delete edit gold IN-14

15 gold queue 5-94, 6-53 Google Earth adding launch points 19-7 Google Earth coordinates 19-2 Google Earth maps 19-1 Google KML or CSV importing into WCS 19-5 GPS markers 5-32 grace period license for controller groups for hybrid-reap for rogue access point rules group setup window on ACS server GUEST_USER_ADDED GUEST_USER_AUTHENTICATED guest account settings guest accounts status report guest association report guest count report guest reports guest user template guest user account scheduling 7-15 Guest user accounts creating 7-11 guest user accounts adding 7-13 creating 7-11 managing 7-13 guest user details ing 7-16 print 7-16 Guest Users monitoring 6-16 guest users currently logged 2-28 guest user sessions report guest user templates Guest WLAN connecting 3-52 guidelines for Ethernet VLAN tagging guidelines for using the map editor 5-19 H heater status 5-88, 6-50 heat map described 5-52 Help Menu 1-13 help menu 2-30 hierarchy of mesh network 5-96 Hierarchy of Mesh parent to child 5-99 hierarchy of mesh parent to child 5-99 High Throughput a/n b/g/n Parameters high throughput template high throughput template configuring historical report type 15-1 History Parameters location server Home Page 2-18 customizing tabs 2-19 Home page customizing content 2-25 customizing tabs 2-23 H-REAP AP Groups configuring 9-80 H-REAP AP groups configuring configuring template H-REAP configuration tab IN-15

16 H-REAP Group auditing 9-83 H-REAP groups auditing H-REAP local switching 9-71 H-REAP Parameters 9-80 H-REAP Users HTTP turning on and off Hybrid REAP configuring 13-1 hybrid REAP bandwidth restriction 9-71, 11-35, 13-3 hybrid REAP access point groups hybrid-reap groups Hybrid REAP local switching hysteresis I ID Certificate configuring identical audit status 5-91 IDS 3-41 configuring 3-41 IDS Sensor List configuring IDS sensors 3-41 IDS Signatures configuring download 9-36 IDS signatures 3-41 disabling 3-46 downloading 3-45 downloading from config group 8-27 enabling 3-46 uploading 3-44 images downloading to autonomous access points Import Asset Information location server importing a file 5-56 to change access point position 5-56, 5-57 importing coordinates as CSV file 19-4 into Google Earth 19-2 importing Google KML or CSV into WCS 19-5 Import map 5-54 In/Out condition type information elements Aironet infrastructure MFP 3-39 ingress interface 9-66 Inspect Location Readiness 5-78 Inspect VoWLAN Readiness 5-79 installer using to upgrade 4-16 installing a license B-4 installing WCS for WLSE conversion C-2 insufficient memory 5-94, 6-52 interface group Interferers summary 6-72, 6-74 interferers summary inter-subnet roaming 8-4 Intrusion Detection Systems 3-41 intrusion detection systems 3-41 invalid association request 5-96, 6-54 invalid reassociation request 5-96, 6-55 inventory detail status 2-19 inventory reports 15-48, inventory status 2-27 IOS access points adding adding by device information IN-16

17 IOSAP_DOWN IOSAP_LINK_DOWN IOSAP_LINK_UP IOSAP_UP IP connectivity diagnostic test K KEK key encryption key key wrap KML file 19-2 L LAG mode 11-6 Latest Network Audit Report 9-20 latitude 19-2 Layer 1 security solutions 3-2 Layer Layer 2 security solutions 3-2 Layer Layer 3 security solutions 3-2 Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-37 LBS authorization template LDAP Servers 9-87 LDAP servers 9-70 template LEAP authentication requirements 8-8 legacy syslog template legacy syslog template license backup and restore B-4 license agreement B-7 to B-12 license installation B-4 license management licenses B-1 license types B-1 licensing on WLSE network management C-4 Lightweight AP Protocol Transport Mode 9-28 limitations for high reliability Link Aggregation 9-30 link aggregation (LAG) guidelines 13-4 link metric adjusted 5-82 unadjusted 5-82 link SNR 5-82 link stats report Load access points 6-27 load load balancing Lobby Ambassador account 7-21 creating account 7-21 Lobby ambassador 7-11 Lobby Ambassador Account creating 7-21 editing 7-22 lobby ambassador defaults setting 7-7 local authentication for hybrid-reap groups Local EAP 9-94 General EAP-FAST Parameters 9-97 General Network Users Priority 9-97 General Parameters 9-94 Profiles 9-96 local EAP authorization 9-70 Local EAP check box local EAP general template IN-17

18 local EAP general template local EAP profile template Local Management Users configuring local management users template local management user template , Local Net Users configuring 9-89 local net users template local net users template Local Password Policy local switching Hybrid REAP Location calibration 1-15 location servers notifications notification settings notifications summary synchronize servers location appliance functionality 4-2 Location Appliances 1-15 location appliances relationship with WCS Location 1-5 location change condition type location configuration template Location History clients location menu 2-30 location optimized monitor mode Location Parameters location server location presence assigning 5-31 Location Readiness 5-78 Location Server active sessions administration advanced parameters backup export asset information general properties history parameters import asset information location parameters logs maintenance NMSP parameters notification parameters restore server events WCS alarms WCS events Location server adding 12-9 location server automatic backup backup historical data configuration clearing reboot hardware Location Servers location upgrade B-2 log analysis logging logging into the WCS user interface 2-16 to 2-18 logging options logging the lobby ambassador activities 7-10 login.html 3-50 login disclaimer login policies template log message levels log modules enabling IN-18

19 Logs location server LOMM configuring access point radios longitude 19-3 long preambles, enabling for SpectraLink NetLink phones 4-5 LWAPP template edit templates Transport Mode 9-28 LWAPP migration LWAPP template new LWAPP uptime 2-27 M MAC Filtering configuring 9-91 MAC filtering template MAC filter template MAC frequency 3-48 MAC information 3-48 MACK message authenticator code keys mail server configuration Maintenance location server malformed neighbor packets 5-94, 6-52 malicious rogue malicious rogue access points 3-5, 3-6 managed network security index 3-5 management frame flood signatures 3-43 Management Frame Protection 3-39 management frame protection 9-73, Management Frame Protection Summary controllers monitor 6-14 management interface 11-7 Management Parameters configuring management queue 5-95, 6-53 managing clients 10-1 managing controller licenses managing current reports 15-9 managing MSE licenses managing multiple WCSs 1-10 managing saved reports managing virtual domains 18-7 managing WLAN schedules 9-76 mandatory data rates manually disabled client template for Manually Disabled Clients managing 9-98 manually disabled clients 2-20 Map Editor general notes and guidelines 5-19 map editor guidelines 5-19 guidelines for using 5-19 using to draw polygon areas 5-72 map editor functions 5-4 map properties editing 5-28 maps searching 2-44 using to monitor link stats 5-80 using to monitor mesh AP neighbors 5-85 map size map view updating 5-99 Menu Bar 1-11 menu bar 2-29 IN-19

20 Mesh monitoring health 5-88 statistics for AP 5-92, 6-51 mesh access point neighbors monitoring 5-85 mesh access points monitoring 5-83 mesh alarms most recent 2-21 mesh configuration template mesh link statistics 5-80 monitoring 5-80 mesh neighbors 5-86 mesh network monitoring using maps 5-80 mesh network hierarchy 5-96 mesh networks background scanning 9-53 monitoring 5-80 Mesh Parameters mesh parent changing AP 2-27 mesh parent-child hierarchical view 5-11 mesh reports mesh tab home page 2-21 mesh template configuring Mesh tree viewing 5-96 mesh tree viewing 5-96 message integrity check information element metrics in QoS MFP 3-39, 9-73 for clients 3-40 MFP attacks 3-9 MFP client protection MFP signature generation MFP Summary controllers monitor 6-14 MFP templates MIC IE migration analysis running migration analysis report generating migration analysis summary viewing Migration Templates Autonomous APs edit minimum RSSI Mirror Mode mirror mode mismatched audit status 5-91 mobile announce messages 8-8 Mobility 12-1 Mobility Stats monitor 6-17 service 12-1 mobility 8-1 Mobility Anchor Group Keep Alive Interval 9-30 mobility anchors 8-13, 9-77 Mobility Group Prerequisites 9-51 Mobility Groups configuring 9-50 Messaging 9-51 mobility groups 8-7 prerequisites 8-8 to 8-9 mobility groups, configuring 8-8 mobility scalability 8-12 Mobility Services 12-1 viewing 12-4 mobility services engine IN-20

21 deleting 12-6 Mobility Stats monitor 6-17 modifying a migration template modifying map displays 5-98 using filters 5-98 Monitor Alarms 6-1 Events Ports overview 6-8 Rogue AP Rules 6-15 Monitor Access Points details 6-34 edit view 6-25 load 6-27 radio type MAC counters 6-48 on demand statistics 6-41 operational parameters 6-45 view alarms 6-49 view events 6-49 radio utilization 6-33 search 6-23 search results 6-24 Tx power and channel 6-33 Monitor Alarms details 6-87 edit view 6-85 Rogue 3-20 Monitor APs Counters 6-33 AP Profile Status 6-33 Coverage (RSSI) 6-30 Coverage (SNR) 6-30 details CDP Neighbors 6-40 Current Associated Clients 6-40 general 6-34 interfaces 6-39 Dynamic Power Control 6-28 Interference 6-29 Noise 6-29 Radio details 6-41 TSM 6-33 UpTime 6-30 Voice Statistics 6-31 Voice TSM Reports 6-32 Voice TSM Table 6-31 Monitor Chokepoints 6-67 Monitor Client detecting APs details disable location history present map recent map remove roam reason v5 statistics voice metrics Monitor Controllers a/n parameters a/n RRM Grouping a/n RRM Groups b/g/n parameters 6-21 CLI Sessions 6-6 ports general 6-8 spanning tree protocol 6-5 System summary 6-4 WLANs 6-8 Monitor Events Details search Monitoring IN-21

22 Guest Users 6-16 monitoring active sessions 7-6 monitoring channel width 6-55 monitoring mesh access point neighbors 5-85 using maps 5-85 monitoring mesh health 5-88, 6-55 monitoring mesh link statistics using maps 5-80 monitoring mesh networks using maps 5-80 monitoring neighboring channels 9-53 monitoring pre-coverage holes 6-62 monitoring rogue access point alarms 6-84 monitoring spectrum experts monitor menu 2-29 monitor mode location optimized Monitor Spectrum Experts 6-71 Monitor Tags 6-64 most recent AP alarms 2-27 most recent audit alarms most recent client alarms 10-6 most recent mesh alarms 2-21 most recent rogue adhocs 3-7 most recent security alarms 2-20, 2-28 MSE adding 12-5 deleting 12-6 MSE authorization template MSE license information MSE licenses managing multicast mobility mode 8-12 Multicast Mode controller 9-62 Multiple Country Codes setting multiple country codes configuring 8-16 multiple syslog template multiple syslog template N N+1 redundancy 8-5 NAC Out-of-Band Integration 9-43 NAC support 9-72 NAT 8-11 Navigator 1-10 netmask NetStumbler signature 3-43 network address translation 8-11 Network Audit Report latest 9-20 network design network designs network protection 3-41 Network Routes configuring 9-49 Network Summary page 2-17 network summary reports Network Time Protocol configuring 9-53 network users priority template network utilization reports new rogue access points report new search 5-71 NMSP Parameters location server node hop count worst 2-21 node hops 5-94, 6-53 nodes report noise avoiding non types IN-22

23 avoid non non noise avoiding non-aggregated historical data non-cisco ACS server for use with RADIUS normal mode for Ethernet port Notification Parameters location server Notifications location Notification Settings location Notifications Summary location NTP configuration 9-53 NTP server template 11-9, null probe response signatures 3-43 O On Demand Statistics access points 6-41 onstacle color coding 5-74 Operational Parameters access points 6-45 OUI search outdoor location creating with Google Earth 19-1 overview Cisco Wireless LAN Solution 1-1 to 1-2 WCS 1-2 P packet error rate worse 2-21 packet error rate link color 5-98 packet error statistics report packet jitter packet latency packet loss packet loss rate packet queue statistics report packet stats report parent changes 5-94, 6-52 Passive Client 9-72 passthrough PCI report PEAP peer-to-peer blocking performance reports permanent license for controller for MSE placemarks creating 19-3 placement of access points 5-54 planning mode to calculate access point requirements planning mode, calculating access point requirements platinum platinum queue 5-94, 6-53 PLR POE status 5-91 policy manager solutions 3-2 polygon areas drawing with map editor 5-72 poor neighbor SNR 5-94, 6-52 Port Parameters configuring Ports Monitor overview 6-8 monitor controllers 6-8 IN-23

24 positioning access points 5-56 positioning chokepoints 5-56 positioning Wi-Fi TDOA receivers 5-56 power injector settings power-over-ethernet status 5-91 pre-coverage holes monitoring 6-62 Preferred Call Prerequisites 2-1 Present Map clients print guest user details 7-16 probe cycle count Profile List Profile editor profile redirect diagnostic test protection type Q QoS QoS Profiles configuring 9-56 QoS templates queues silver, gold, platinum, bronze, management 5-94, 6-53 quick search 2-34 Quiet time 3-48 R Radio access points configuring radio resource management Radio Status scheduling and viewing radio status scheduling Radio Utilization access points 6-33 RADIUS RADIUS Accounting controllers monitor 6-13 RADIUS accounting servers template RADIUS accounting template RADIUS and TACACS+ attributes virtual domains 7-20, RADIUS Authentication controllers monitor 6-12 RADIUS authentication template 11-46, RADIUS Auth Servers AAA RADIUS Auth Servers 9-84 RADIUS fallback template RADIUS fallback mode RADIUS servers 9-70 configuring reachability status Readiness location 5-78 VoWLAN 5-79 reassociation request failures 5-95, 6-54 reassociation request success 5-96, 6-54 reassociation request timeouts 5-95, 6-54 reauthentication request failures 5-96, 6-54 reauthentication request success 5-96, 6-54 reauthentication request timeout 5-96, 6-54 rebooting config groups 8-25 Rebooting Controllers 9-7 recent adhoc rogue alarms 3-9 recent alarms 2-27, 2-28 IN-24

25 recent coverage holes 2-19 Recent Map clients recent rogue adhoc alarm 2-20 recent rogue alarms 2-27 recent rogue AP alarms 2-20, 3-9 recovering the WCS password 4-22 recurrence for report 15-5 refresh browser refresh component icon 2-29 Refresh Config 9-17 refresh from network 5-108, relative to ground 19-2 Remove APs Remove Controllers 9-7 removing controllers from config group 8-22 removing templates from config group 8-23 report running new 15-3 report launch pad 15-2 Reports Rogue AP Events reports scheduled runs 15-9 reset AP now Restore location server Restoring Factory Defaults 9-32 restoring WCS database in high availability environment 4-14 restoring WCS database on Linux 4-13 retain WCS value 8-25 Retrieving UDI 6-59 RF calibration model, creating 4-6 RF Calibration Models apply to maps 5-68 delete 5-69 RFID data collection RF profile traps RF update traps Roaming b/g/n Parameters roaming 8-1 roaming parameter template roaming parameters template configuring roaming time 11-20, Roam Reason clients rogue access point events report rogue access point rule groups rogue access point rules configuring a template viewing or editing rogue access points friendly 3-8 malicious 3-6 monitoring 3-10 solutions for 3-3 unclassified 3-7 rogue access points report rogue adhoc alarm 2-20 rogue adhocs most recent 3-7 Rogue Alarm Events Rogue AP alarm details 6-96, alarms 6-89 containment location malicious 6-95 Rules monitor 6-15 tagging rogue AP alarms 2-20 rogue AP detail summary 2-27 IN-25

26 Rogue AP Events report rogue AP rule groups template Rogue AP Rules configuring details 6-16 rogue AP rules template Rogue APs classification types 6-95 classifying 6-93 friendly 6-95 overview 6-88 unclassified 6-96 Rogue Client details rogue clients searching 2-44 rogue detector Rogue Devices detecting 6-89 rogue location discovery protocol Rogue Policies configuring rogue policies template template for role criteria root mode changing from station role routing state 5-93, 6-52 RRM DCA b/g/n Parameters Radio Grouping b/g/n Parameters RRM DCA RRM Intervals a/n b/g/n Parameters RRM intervals template RRM interval template configuring , RRM Radio Grouping a/n RRM threshold template RRM Thresholds b/g/n Parameters RRM threshold template configuring RSSI legend rules for rogue access point viewing or editing for rogue access points Running a link test 6-58 running a new report 15-3 running a saved report running migration analysis RX neighbor requests 5-94, 6-52 RX neighbor responses 5-94, 6-52 S Save Config to Flash 9-17 saved report running saved reports editing filtering managing saved searches 2-46, 5-71 scalability parameters 8-12 scan cycle period threshold scan threshold Scheduled Configuration IN-26

27 Schedule details scheduled run details editing scheduled run results 15-9 filtering Scheduled Task AP status report schedules managing for WLANs 9-76 scheduling guest user account 7-15 scheduling radio status Search access points 6-23 controller results 6-2 Events overview 1-14 search feature 2-34 using for troubleshooting searching clients 2-40 searching controller licenses 2-46 searching events 2-42 searching maps 2-44 searching rogue clients 2-44 searching SE-detected interferers 2-42 searching shunned clients 2-45 searching tags 2-45 searching Wi-Fi TDOA receivers 2-43 search results configuring 2-47 secondary WCS operation 16-6 Security AAA LDAP servers 9-87 TACACS+ Servers 9-89 Web Auth Configuration 9-92 AAA MAC Filtering 9-91 Local EAP 9-94 security alarms most recent 2-20 security color range 3-5 security configurations monitoring security index 3-5 security mesh statistics 5-95, 6-53 Security Reports Rogue AP Events security solutions 3-1 to 3-37 security summary security tab home page 2-20 interpreting 3-4 security thermometer 3-5 SE-detected interferers searching 2-42 sending mobile announce messages 8-8 sensors viewing IDS types 3-41 Server Events location servers status set sorting buttons 15-8 Set Time controller 9-33 setting AP failover Setting Controller Time and Date 9-33 setting multiple country codes 9-83 shunned clients searching 2-44 sidebar area 2-32 signature attacks summary 2-20 silver silver queue 5-94, 6-53 Sniffer Sniffer Feature sniffer mode SNMP authentication SNMP Community controller templates 11-8 IN-27

28 SNR definition 5-98 SNR down 5-82 SNR link worst 2-21 SNR UP 5-82 SNR up 5-82 software downloading config groups to controllers 8-26 software, updating 4-3 Spanning Tree Protocol configuring 9-50 monitor controllers 6-5 SpectraLink NetLink phones, enabling long preambles 4-5 spectrum expert adding spectrum expert details Spectrum Experts 6-71 details 6-73 Interferers 6-72, 6-74 summary 6-72 spectrum experts configuring monitoring summary SSID Group add add from global list add global delete delete global edit edit global SSID Group List wips SSID group list global SSID groups wips Standalone Building adding floor plan 5-46 Standard and Custom Signatures Global Settings Standard signature 3-47 Standard Signature Parameters configuring standard signatures 3-42 starting WCS on Linux 2-16 on Windows 2-15 static WEP 9-67 Static WEP-802.1X 9-67 station role changing to root mode status, checking 4-7 Status Report scheduled task status schedules managing for WLANs 9-76 stopping WCS on Linux 4-9 on Windows 4-7 stranded APs report supplicant credentials for AP 802.1X supported Cisco WLSE management stations C-2 supported data rates Switch credentials remove switch configuring for hybrid REAP 13-5 Switches ethernet Switch Port Tracing Details Troubleshooting symmetric mobility tunneling 11-7 IN-28

29 symmetric tunneling 8-5 Synchronize servers location Syslog configuring individual controller Individual controller multiple servers syslog templates , System General Properties 9-24 System Commands controller 9-30 System Interfaces Controllers 9-37 System parameters controllers monitor 6-3 System requirements 2-2 T TACACS TACACS+ server configuring a template for template tagged packets Tags 6-64 tags searching 2-45 Task configuration backup Telnet SSH template Telnet SSH Parameters configuring Telnet SSH templates temperature 5-88, 6-50 template configuring for rogue AP rules template for configuring network user credentials Template Launch Pad overview 11-1 Templates AP Configuration delete 11-2 test analysis tab TFTP turning on and off TFTP details TFTP Server adding TFTP server 3-44 TFTP Servers configure delete thermometer color range 3-5 threats access points 3-9 throughput report tilt 19-2 Timer Setting AP 9-63 tools menu 2-30 top APs by client count 10-3 total APs not assigned to maps 2-19 total interferer count total mismatched controllers TPC , trace traffic indicator message Traffic Stream Metrics access points 6-33 traffic stream metrics QoS status traffic stream metrics QoS template traffic stream metrics report transition time Transport Mode LWAPP 9-28 IN-29

30 transport types trap security Trap Control configuring trap control template trap control templates trap receiver template Trap Receivers configuring trap receiver template traps AAA access point client related RF profile RF update unsupported traps added in traps added in traps added in traps added in traps added in traps added in traps added in traps added in , traps added in release traps added in release trend report type 15-1 Troubleshooting Switch Port Tracing troubleshooting A-1, D-1 using logging options troubleshooting voice RF coverage trunk mode trusted AP policies template for trusted AP policies template TSM access points 6-33 tunneling 8-5 TX neighbor requests 5-94, 6-52 TX neighbor responses 5-94, 6-52 Tx Power and Channel access points 6-33 Tx power and channel report type of WCS license U UDI retrieving on controllers and access points 6-59 unadjusted link metric 5-82 unclassified rogue unclassified rogue access points 3-7 unclassified rogue APs 2-28 understanding virtual domains uninstalling WCS on Linux 4-15 on Windows 4-14 unique clients report unique device identifier 6-59 unknown association requests 5-96, 6-55 unknown reassociation request 5-96, 6-55 untagged packets Update map view 5-99 update map view 5-99 updating system software 4-3 upgrade settings for controller upgrading autonomous access points upgrading the network 4-21 upgrading to Linux 4 during WLSE conversion C-3 upgrading WCS IN-30

31 in high availability environment 4-21 on Linux 4-20 on Windows 4-20 Uploading IDS signatures 3-44 uploading IDS signatures 3-44 Uploading Signature Files upstream delay upstream packet loss rate UpTime access points 6-30 uptime reports User accounts for guest 7-11 user accounts for guest 7-11 user authentication priority template configuring user credential retrieval priority user details ing 7-16 printing 7-16 User Interface 2-29 Menu Bar 1-11 User Login Policies configuring 9-98 user login policies configuring a template template User Preferences 7-1, 16-7 user preferences User Roles configuring 9-58 Users using Edit View for alarms 6-84 using filtering 5-82, 5-98 using logging for troubleshooting using maps to monitor mesh AP neighbors 5-85 to monitor mesh link statistics 5-80 using maps to monitor mesh networks 5-80 using planning mode 5-72 using search 6-85 using template ACL for friendly access point using templates b/g RRM interval , b/g RRM threshold access point authentication & MFP access point authorization file encryption for legacy syslog for multiple syslog guest users local management user , local net users MAC filter NTP server 11-9, password policy QoS RADIUS accounting RADIUS authentication syslog , Telnet SSH traffic stream metrics QoS trap control trap receiver web authentication WLAN using the installer to upgrade 4-16 utilization reports V V5 client statistics V5 Statistics IN-31

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1 Numerics 802.11 counters report 14-12 802.11 security trap 10-71 802.11 tags layer 5-44 802.11a policy name 10-52 802.11b/g RRM interval template 10-62, 10-64 802.11b/g RRM threshold template 10-61 802.11b/g

More information

I N D E X 9-2 Numerics , ,

I N D E X 9-2 Numerics , , INDEX Numerics 40 MHz channel bonding 10-16 802.11a policy name 11-60 802.11b/g RRM interval template 11-72, 11-74 802.11b/g RRM threshold templates 11-70 802.11b/g voice templates 11-65 802.11 counters

More information

Template information can be overridden on individual devices.

Template information can be overridden on individual devices. CHAPTER 12 This chapter describes the Controller Template Launch Pad. It is a hub for all controller templates. Templates provide a way to set parameters that you can then apply to multiple devices without

More information

Template information can be overridden on individual devices.

Template information can be overridden on individual devices. CHAPTER 12 This chapter describes the Controller Template Launch Pad. It is a hub for all controller templates. Templates provide a way to set parameters that you can then apply to multiple devices without

More information

Configuring Hybrid REAP

Configuring Hybrid REAP 13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,

More information

Cisco Wireless LAN Controller Configuration Guide

Cisco Wireless LAN Controller Configuration Guide Cisco Wireless LAN Controller Configuration Guide Software Release 7.0.116.0 April 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Questions & Answers

Cisco Questions & Answers Cisco 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 25.6 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing Advanced

More information

C H A P T E R Reports Note Cisco Prime Network Control System Configuration Guide OL

C H A P T E R Reports Note Cisco Prime Network Control System Configuration Guide OL CHAPTER 14 The Cisco NCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis.

More information

Running Reports CHAPTER

Running Reports CHAPTER CHAPTER 14 WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report

More information

Performing Administrative Tasks

Performing Administrative Tasks CHAPTER 15 The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

Per-WLAN Wireless Settings

Per-WLAN Wireless Settings DTIM Period, page 1 Off-Channel Scanning Deferral, page 3 Cisco Client Extensions, page 10 Client Profiling, page 12 Client Count per WLAN, page 15 DTIM Period Information About DTIM Period In the 802.11

More information

CCIE Wireless v3 Lab Video Series 1 Table of Contents

CCIE Wireless v3 Lab Video Series 1 Table of Contents CCIE Wireless v3 Lab Video Series 1 Table of Contents Section 1: Network Infrastructure Layer 2 Technologies VLANs VTP Layer 2 Interfaces DTP Spanning Tree- Root Election Spanning Tree- Path Control Spanning

More information

Cisco Unified Wireless Network Software Release 5.2

Cisco Unified Wireless Network Software Release 5.2 Cisco Unified Wireless Network Software Release 5.2 PB507140 Overview With Cisco Unified Wireless Network Software Release 5.2, Cisco is delivering critical features for its industry-leading indoor and

More information

Cisco Exactexams Questions & Answers

Cisco Exactexams Questions & Answers Cisco Exactexams 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 23.4 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

Monitoring Wireless Devices

Monitoring Wireless Devices CHAPTER 6 This chapter describes how to use WCS to monitor your wireless LANs. It contains these sections: Monitoring Rogue Access Points, Adhocs, and Clients, page 6-1 Rogue Access Point Location, Tagging,

More information

Running Reports. Choosing a Report CHAPTER

Running Reports. Choosing a Report CHAPTER 13 CHAPTER WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report

More information

Getting Started. Prerequisites CHAPTER

Getting Started. Prerequisites CHAPTER CHAPTER 2 This chapter describes how to prepare Cisco WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-6 Installing

More information

Mobility Services CAS. wips CHAPTER

Mobility Services CAS. wips CHAPTER 13 CHAPTER This chapter briefly describes the CAS or wips services that WCS supports and gives steps for mobility procedures that are common across all services. You can refer to the Cisco Context-Aware

More information

Configure Controller and AP Settings

Configure Controller and AP Settings Configure SNMP Credentials for Rogue AP Tracing, on page 1 Configure Protocols for CLI Sessions, on page 2 Enable Unified AP Ping Reachability Settings on the Prime Infrastructure, on page 2 Refresh Controllers

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : 350-050 Title : CCIE Wireless Exam (V2.0) Vendor : Cisco Version : DEMO Get Latest & Valid 350-050 Exam's Question

More information

CertifyMe. CISCO EXAM QUESTIONS & ANSWERS

CertifyMe.   CISCO EXAM QUESTIONS & ANSWERS CertifyMe Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 28.9 http://www.gratisexam.com/ CISCO 642-737 EXAM QUESTIONS & ANSWERS Exam Name: Implementing Advanced Cisco Unified Wireless

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 642-737 Title : Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Vendor : Cisco Version : DEMO Get

More information

Alarms and Events. Using the Alarm Dashboard CHAPTER

Alarms and Events. Using the Alarm Dashboard CHAPTER CHAPTER 14 This chapter describes the type of events and alarms reported, how to view alarms and events by product or entity and severity, and how to view IDS signature attacks. It contains these sections:

More information

Configure Wireless Technologies

Configure Wireless Technologies Track Tagged Assets Using Optimized Monitor Mode on APs, page 2 Creating a Wireless Chokepoint, page 2 Removing a Wireless Chokepoint from the Network, page 3 Configure Autonomous APs, page 3 Configure

More information

Alarms and Events. Using the Alarm Summary CHAPTER

Alarms and Events. Using the Alarm Summary CHAPTER CHAPTER 16 This chapter describes the type of events and alarms reported, how to view alarms and events by product or entity and severity, and how to view IDS signature attacks. It contains these sections:

More information

Implementing Cisco Unified Wireless Networking Essentials Volume 1

Implementing Cisco Unified Wireless Networking Essentials Volume 1 Volume 1 I. Course Introduction A. Learner Skills and Knowledge B. Course Goals and Objectives C. Course Flow D. Additional References 1. Cisco Glossary of Terms E. Your Training Curriculum II. Wireless

More information

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13 INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-351 Title : CCIE Wireless Vendor : Cisco Version : DEMO Get Latest & Valid 400-351 Exam's Question and

More information

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Last revised: February 1, 2008 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless

More information

Monitoring Wireless Devices

Monitoring Wireless Devices CHAPTER 6 This chapter describes how to use WCS to monitor your wireless LANs. It contains these sections: Rogue Access Point Location, Tagging, and Containment, page 6-1 Configuring ACS View Server Credentials,

More information

CCIE Wireless v3 Workbook Volume 1

CCIE Wireless v3 Workbook Volume 1 CCIE Wireless v3 Workbook Volume 1 Table of Contents Diagrams and Tables 7 Topology Diagram 7 Table 1- VLANs and IP Subnets 8 Table 2- Device Management IPs 9 Table 3- Device Credentials 10 Table 4- Term

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 5 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 10 Configuring WLAN-VLAN Mappings on FlexConnect Groups, page 11 Information About FlexConnect

More information

CCIE Wireless v3.1 Workbook Volume 1

CCIE Wireless v3.1 Workbook Volume 1 CCIE Wireless v3.1 Workbook Volume 1 Table of Contents Diagrams and Tables 7 Topology Diagram 7 Table 1- VLANs and IP Subnets 8 Table 2- Device Management IPs 9 Table 3- Device Credentials 10 Table 4-

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

Getting Started. Prerequisites CHAPTER

Getting Started. Prerequisites CHAPTER CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Installing WCS

More information

Managing an Enterprise WLAN with Wireless Control System (WCS) BRKEWN-2011

Managing an Enterprise WLAN with Wireless Control System (WCS) BRKEWN-2011 Managing an Enterprise WLAN with Wireless Control System (WCS) BRKEWN-2011 Session Agenda WCS s Role in the Network Life Cycle of a Network Planning and Deploying a Network Monitoring a Network Tools and

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo Vendor: Cisco Exam Code: 642-737 Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Version: Demo QUESTION 1 Which statement describes the major difference between PEAP and EAP-FAST

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Cisco Actualtests Exam Questions & Answers

Cisco Actualtests Exam Questions & Answers Cisco Actualtests 642-737 Exam Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 25.4 http://www.gratisexam.com/ Sections 1. 1 2. 2 3. 3 4. 4 5. 5 6. 6 Cisco 642-737

More information

Cisco WCS Overview. The Cisco Unified Wireless Network Solution CHAPTER

Cisco WCS Overview. The Cisco Unified Wireless Network Solution CHAPTER 1 CHAPTER This chapter describes the Cisco Unified Wireless Network Solution (CUWNS) and the Cisco WCS. This chapter contains the following sections: The Cisco Unified Wireless Network Solution, page 1-1

More information

Monitoring Location Servers and Site

Monitoring Location Servers and Site 8 CHAPTER This chapter describes how to monitor location servers by configuring and viewing alarms, events, and logs. It also describes how to use Cisco WCS to view location server, client and asset tag

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Overview. About the Cisco Context-Aware Mobility Solution CHAPTER

Overview. About the Cisco Context-Aware Mobility Solution CHAPTER 1 CHAPTER This chapter describes the role of the Cisco 3300 series mobility services engine (MSE), a component of the Cisco Context-Aware Mobility (CAM) solution, within the overall Cisco Unified Wireless

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,

More information

Using Templates CHAPTER

Using Templates CHAPTER CHAPTER 9 This chapter describes how to add and apply controller templates. Information on creating (adding) access point templates is also provided. Templates allow you to set parameters that you can

More information

Cisco Deploying Basic Wireless LANs

Cisco Deploying Basic Wireless LANs Cisco Deploying Basic Wireless LANs WDBWL v1.2; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course is designed to give you a firm understanding of the Cisco Unified Wireless

More information

Wireless LAN Controller (WLC) Design and Features FAQ

Wireless LAN Controller (WLC) Design and Features FAQ Wireless LAN Controller (WLC) Design and Features FAQ Document ID: 118833 Contents Introduction Design FAQ Features FAQ Related Information Introduction This document provides information on the most frequently

More information

Alarm and Event Dictionary

Alarm and Event Dictionary CHAPTER 13 This chapter describes the event and alarm notifications that the wireless LAN controller, access points, and location appliances can receive. It also identifies specific actions the administrator

More information

DWS-4000 Series DWL-3600AP DWL-6600AP

DWS-4000 Series DWL-3600AP DWL-6600AP Unified Wired & Wireless Access System Configuration Guide Product Model: Release 1.0 DWS-4000 Series DWL-8600AP DWL-6600AP DWL-3600AP Page 1 Table of Contents 1. Scenario 1 - Basic L2 Edge Setup: 1 Unified

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1. 300-365.exam Number: 300-365 Passing Score: 800 Time Limit: 120 min CISCO 300-365 Deploying Cisco Wireless Enterprise Networks Version 1.0 Exam A QUESTION 1 The customer has deployed C7960 phones with

More information

Deploying Cisco Wireless Enterprise Networks

Deploying Cisco Wireless Enterprise Networks 300-365 Deploying Cisco Wireless Enterprise Networks NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 300-365 Exam on Deploying Cisco Wireless

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

Wireless LAN Controller Mesh Network Configuration Example

Wireless LAN Controller Mesh Network Configuration Example Wireless LAN Controller Mesh Network Configuration Example Document ID: 70531 Introduction Prerequisites Requirements Components Used Conventions Background Information Cisco Aironet 1510 Series Lightweight

More information

Prerequisites for Wireless Sniffing

Prerequisites for Wireless Sniffing Appendix D Troubleshooting Configuring Wireless Sniffing Wireshark Note The latest version of Wireshark can decode the packets by going to the Anaylze mode. Select decode as, and switch UDP5555 to decode

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS PrepKing Number: 642-742 Passing Score: 800 Time Limit: 120 min File Version: 61.0 http://www.gratisexam.com/ CISCO 642-742 EXAM QUESTIONS & ANSWERS Exam Name: CCNP Wireless - IUWVN Certkey QUESTION 1

More information

Getting Started. Prerequisites CHAPTER

Getting Started. Prerequisites CHAPTER CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Installing WCS

More information

Implementing Cisco Unified Wireless Networking Essentials

Implementing Cisco Unified Wireless Networking Essentials Implementing Cisco Unified Wireless Networking Essentials Course Number: 640-721 (IUWNE) Course Length: 5 Days Course Overview This instructor-led provides students with information and practice activities

More information

PrepKing. PrepKing

PrepKing. PrepKing PrepKing Number: 642-587 Passing Score: 800 Time Limit: 120 min File Version: 9.0 http://www.gratisexam.com/ PrepKing 642-587 Exam A QUESTION 1 In order for a controller-based access point to be allowed

More information

Configuring RF Profiles

Configuring RF Profiles Prerequisites for, page 1 Restrictions for, page 1 Information About RF Profiles, page 2 Configuring an RF Profile (GUI), page 5 Configuring an RF Profile (CLI), page 6 Applying an RF Profile to AP Groups

More information

Getting Started. NCS Delivery Modes CHAPTER

Getting Started. NCS Delivery Modes CHAPTER CHAPTER 2 This chapter describes information on system requirements, setting up and starting the NCS. The NCS is an application used to configure, manage, and monitor the wired and wireless networks. This

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Dashboard,

More information

Getting Started CHAPTER

Getting Started CHAPTER CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-2 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Configuring WCS

More information

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1 Course Overview Provides students information to troubleshoot Cisco wireless networks. The course provides guidelines for troubleshooting Wi-Fi architectures of Cisco wireless components. Who Should Attend

More information

Certkiller q. Cisco Implementing Advanced Cisco Unified Wireless Security v2.0

Certkiller q. Cisco Implementing Advanced Cisco Unified Wireless Security v2.0 Certkiller.642-737.120q Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 a) I passed the exam yesterday

More information

Using the Web Graphical User Interface

Using the Web Graphical User Interface Prerequisites for Using the Web GUI, page 1 Information About Using The Web GUI, page 1 Connecting the Console Port of the Device, page 3 Logging On to the Web GUI, page 3 Enabling Web and Secure Web Modes,

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) Figure 1. Cisco Wireless Control System (WCS) Product Overview Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products WLAN Configuration Guide HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G Unified

More information

Using the Web Graphical User Interface

Using the Web Graphical User Interface Prerequisites for Using the Web GUI, page 1 Information About Using The Web GUI, page 2 Connecting the Console Port of the Switch, page 3 Logging On to the GUI, page 4 Enabling Web and Secure Web Modes,

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-586 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-586 Exam A QUESTION 1 A customer in the United States requires connectivity between

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Using the CLI to Configure the Syslog Server for Access Points

Using the CLI to Configure the Syslog Server for Access Points Chapter 8 Autonomous Access Points Converted to Lightweight Mode Using the CLI to Configure the Syslog Server for Access Points To configure the syslog server for access points using the controller CLI,

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 3 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 8 Information About FlexConnect Groups To organize and manage your FlexConnect access points,

More information

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks What Are Converged Access Workflows?, on page 1 Supported Cisco IOS-XE Platforms, on page 3 Prerequisites for

More information

Mobility Groups. Information About Mobility

Mobility Groups. Information About Mobility Information About Mobility, page 1 Information About, page 5 Prerequisites for Configuring, page 10 Configuring (GUI), page 12 Configuring (CLI), page 13 Information About Mobility Mobility, or roaming,

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee 642-742 Q&As Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0 Pass Cisco 642-742 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services 12 CHAPTER Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access points for wireless domain services (WDS),

More information

Highlight. Central AP Management with High Scalability

Highlight. Central AP Management with High Scalability WMS-608N/C Wireless LAN Controller with Built-in AAA Radius Based User Access Control, Support 512 AP and 5000 User License (5 Giga Ethernet Switch Ports) PheeNet WMS-608N/C utilizes New Generation Technology

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide

Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide Table of Contents INTRODUCTION... 4 DISCOVER AND PAIR GWN76XX ACCESS POINTS... 5 Discover GWN76xx... 5 Method 1: Discover

More information

Configuring WLANsWireless Device Access

Configuring WLANsWireless Device Access CHAPTER 6 This chapter describes how to configure up to 16 WLANs for your Cisco UWN Solution. It contains these sections: WLAN Overview, page 6-2 Configuring WLANs, page 6-2 6-1 WLAN Overview Chapter 6

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200

More information

VIEW Certified Configuration Guide. Cisco

VIEW Certified Configuration Guide. Cisco VIEW Certified Configuration Guide Cisco 4400 Series Wireless LAN Controller (WLC), Wireless Services Module (WiSM), and 3750G Integrated Wireless LAN Controller with 1100, 1200, 1300 Series APs January

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-681 Passing Score: 800 Time Limit: 120 min File Version: 8.5 http://www.gratisexam.com/ CertifyMe 642-681 Exam A QUESTION 1 Select two activities that form part of the wireless migration

More information

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B FortiNAC Cisco Airespace Wireless Controller Integration Version: 8.x Date: 8/28/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

Navigating Cisco EPN Manager

Navigating Cisco EPN Manager Navigating Cisco EPN Manager Cisco EPN Manager 1.2 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Port-Based and Client-Based Access Control (802.1X) 9 Configuring Port-Based and Client-Based Access Control (802.1X) Contents Overview..................................................... 9-3 Why Use Port-Based or Client-Based Access Control?............

More information

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product.

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product. Cisco EXAM - 640-722 Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product http://www.examskey.com/640-722.html Examskey Cisco 640-722 exam demo product is here for you to

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

High Availability (AP SSO) Deployment Guide

High Availability (AP SSO) Deployment Guide High Availability (AP SSO) Deployment Guide Document ID: 113681 Contents Introduction Prerequisites Requirements Components Used Conventions Topology New HA Overview HA Connectivity Using Redundant Port

More information

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?

More information

Securing Cisco Wireless Enterprise Networks ( )

Securing Cisco Wireless Enterprise Networks ( ) Securing Cisco Wireless Enterprise Networks (300-375) Exam Description: The 300-375 Securing Wireless Enterprise Networks (WISECURE) exam is a 90minute, 60-70 question assessment that is associated with

More information

ENH900EXT N Dual Radio Concurrent AP. 2.4GHz/5GHz 900Mbps a/b/g/n Flexible Application

ENH900EXT N Dual Radio Concurrent AP. 2.4GHz/5GHz 900Mbps a/b/g/n Flexible Application ENH900EXT equips with two powerful independent RF interfaces which support 802.11a/n (3T3R) and 802.11b/g/n (3T3R). With certified IP-67 protection, it is designed to deliver high reliability under harsh

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information