Numerics INDEX. AAA AAA mode active sessions AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87

Similar documents
Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1

I N D E X 9-2 Numerics , ,

Template information can be overridden on individual devices.

Template information can be overridden on individual devices.

Configuring Hybrid REAP

Cisco Wireless LAN Controller Configuration Guide

Cisco Questions & Answers

C H A P T E R Reports Note Cisco Prime Network Control System Configuration Guide OL

Running Reports CHAPTER

Performing Administrative Tasks

Per-WLAN Wireless Settings

CCIE Wireless v3 Lab Video Series 1 Table of Contents

Cisco Unified Wireless Network Software Release 5.2

Cisco Exactexams Questions & Answers

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Configuring OfficeExtend Access Points

Monitoring Wireless Devices

Running Reports. Choosing a Report CHAPTER

Getting Started. Prerequisites CHAPTER

Mobility Services CAS. wips CHAPTER

Configure Controller and AP Settings

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

CertifyMe. CISCO EXAM QUESTIONS & ANSWERS

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Alarms and Events. Using the Alarm Dashboard CHAPTER

Configure Wireless Technologies

Alarms and Events. Using the Alarm Summary CHAPTER

Implementing Cisco Unified Wireless Networking Essentials Volume 1

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Real4Test. Real IT Certification Exam Study materials/braindumps

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Monitoring Wireless Devices

CCIE Wireless v3 Workbook Volume 1

Configuring FlexConnect Groups

CCIE Wireless v3.1 Workbook Volume 1

Managing WCS User Accounts

Getting Started. Prerequisites CHAPTER

Managing an Enterprise WLAN with Wireless Control System (WCS) BRKEWN-2011

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

Cisco Actualtests Exam Questions & Answers

Cisco WCS Overview. The Cisco Unified Wireless Network Solution CHAPTER

Monitoring Location Servers and Site

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Overview. About the Cisco Context-Aware Mobility Solution CHAPTER

Configuring Security Solutions

Using Templates CHAPTER

Cisco Deploying Basic Wireless LANs

Wireless LAN Controller (WLC) Design and Features FAQ

Alarm and Event Dictionary

DWS-4000 Series DWL-3600AP DWL-6600AP

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

Deploying Cisco Wireless Enterprise Networks

Configuring Layer2 Security

Wireless LAN Controller Mesh Network Configuration Example

Prerequisites for Wireless Sniffing

CISCO EXAM QUESTIONS & ANSWERS

Getting Started. Prerequisites CHAPTER

Implementing Cisco Unified Wireless Networking Essentials

PrepKing. PrepKing

Configuring RF Profiles

Getting Started. NCS Delivery Modes CHAPTER

Configuring Security Solutions

Getting Started CHAPTER

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1

Certkiller q. Cisco Implementing Advanced Cisco Unified Wireless Security v2.0

Using the Web Graphical User Interface

Cisco Wireless Control System (WCS)

HP Unified Wired-WLAN Products

Using the Web Graphical User Interface

CertifyMe. CertifyMe

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

Managing NCS User Accounts

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Using the CLI to Configure the Syslog Server for Access Points

Configuring FlexConnect Groups

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks

Mobility Groups. Information About Mobility

Managing Rogue Devices

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Highlight. Central AP Management with High Scalability

Managing WCS User Accounts

Grandstream Networks, Inc. GWN76xx Wi-Fi Access Points Master/Slave Architecture Guide

Configuring WLANsWireless Device Access

TestsDumps. Latest Test Dumps for IT Exam Certification

VIEW Certified Configuration Guide. Cisco

CertifyMe. CertifyMe

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

Navigating Cisco EPN Manager

Cisco Exam Questions & Answers

Configuring Port-Based and Client-Based Access Control (802.1X)

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product.

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

High Availability (AP SSO) Deployment Guide

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Securing Cisco Wireless Enterprise Networks ( )

ENH900EXT N Dual Radio Concurrent AP. 2.4GHz/5GHz 900Mbps a/b/g/n Flexible Application

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Transcription:

INDEX Numerics 40 MHz channel bonding 9-123 802.11a/n Parameters monitor 6-19 RRM Grouping monitor 6-20 RRM Groups monitor 6-22 802.11a/n Parameters 9-118 802.11h 9-129 DCA 9-122 EDCA 9-128 General 9-119 High Throughput 9-130 Media 9-125, 9-136 Roaming 9-128 RRM Intervals 9-121 RRM Radio Grouping 9-125 RRM Thresholds 9-129 802.11 association diagnostic test 10-31 802.11b/g/n Parameters monitor 6-21 802.11b/g/n Parameters 9-131 EDCA 9-138 General 9-132 High Throughput 9-140 Roaming 9-139 RRM Intervals 9-134 RRM Thresholds 9-133 802.11b/g/n Parameters Controller Templates 11-116 802.11b/g RRM interval template 11-108, 11-112 802.11b/g RRM threshold templates 11-111 802.11 Counters access points 6-33 802.11 counters report 15-120 802.11 General Parameters configuring 9-113 802.11h 802.11a/n 9-129 802.11h template 11-107 configuring 11-107 802.11 MAC Counters access points 6-48 802.11n summary reports 15-114 802.11 Parameters configuring 9-83, 9-113 802.11 security trap 11-134 802.1n scaling reports 15-3 802.1X authentication diagnostic test 10-31 802.1X supplicant credentials 11-11 802.3 Bridging configuring 9-28 802.3x Flow Control 9-28 880 series ISRs 1-7 A AAA AAA mode 16-116 active sessions 16-124 AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87 IN-1

local password policy 16-118 MAC Filtering 9-91 RADIUS 16-126 TACACS+ 16-124 TACACS+ Servers 9-89 users 16-118 Web Auth Configuration 9-92 AAA Local Net Users 9-89 AAA Mode 16-116 AAA override 11-32 AAA RADIUS Acct Servers 9-85 Fallback Parameters 9-86 AAA servers 11-31 AAA traps 11-134 absolute 19-2 Access Control List Rules 9-99 Access Control Lists configuring 9-98 access control list template 11-87 access control list templates 11-80 access mode 9-158 access point configuring 11-68 configuring for hybrid REAP 13-9 credentials 9-154 friendly 11-94 access point authentication and MFP templates 11-72 access point authorization template 11-68 access point icons 5-17 access point load avoiding 11-101 Access Point Password Global 9-59 access point positions changing with import or export of file 5-56, 5-57 Access Points Cisco APs configuring 9-111 detecting 6-110 disabling ineligible 9-166 Monitoring overview 6-23 radio utilization 6-33 Tx power and channel 6-33 access points configuring 9-166 configuring for LOMM 9-185 converting to LWAPP C-2 embedded 1-7 positioning 5-56 searching 2-38, 9-188 access points, adding to maps 5-48 to 5-53 access point threats 3-9 access point threats or attacks 3-9 Access Point Timer Settings 9-63 access point traps 11-134 Account creating 7-21 ACL configuring 9-98 Rules 9-99 template 11-80 ACL IP group details 11-81 ACL Protocol Groups configuring 11-85 ACL template 11-87 configuring 11-87 ACS server adding WCS to 16-41 ACS View Server credentials 9-222 ACS View Servers configure 9-221 ACS view server tab 10-28 active interferer count per channel 9-195 active interferers 9-194 IN-2

active interferers count chart 9-195 Active Sessions 16-124 location server 12-24 active sessions monitoring 7-5 adaptive scan threshold 11-106 adaptive wips alarm report 15-139, 15-141, 15-146, 15-155 adaptive wips top 10 APs report 15-143 add config groups 8-20 add group members 8-10 Adding location server 12-9 MSE 12-5 adding a spectrum expert 9-193 adding autonomous access points by CSV file 9-162 by device information 9-162 adding guest user accounts 7-13 adding IOS access points 9-161 by device information 9-162 adding launch points for Google Earth 19-7 Adding System Interfaces 9-38 adding templates from config group 8-23 adding WCS as TACACS+ server 16-42 Adhoc Rogue alarm details 6-108 Alarms overview 6-103 Events details 6-115 overview 6-114 monitoring alarms 6-103 Adhoc Rogues overview 6-88 adhoc rogues 2-26, 3-7 adhoc rogues report 15-149 adjusted link metric 5-82 Administration 18-1 location server 12-20 administration menu 2-30 Administrative Tools overview 1-14 advanced debug 17-7 advanced options 5-104 Advanced Parameters location server 12-25 advanced search 2-35, 6-106 Advanced tab on WLAN template 11-34 age out dual band 9-117 age out suppression 9-117 aggregated historical data 16-71 Aggressive Load Balancing 9-29 aggressive load balancing 9-114 Aironet IE 9-71, 11-35 Airopeek configuring 9-112 Alarm details 6-87 alarm 6-80 alarm cleanup options 16-62 alarm counts for access points 6-83 for controllers 6-83 for coverage hole 6-83 for malicious APs 6-83 for mesh links 6-83 for mobility 6-83 for security 6-83 for unclassified APs 6-83 for WCS failures 6-83 alarm dashboard 6-80 alarm display options 16-63 alarm indicator 6-80 Alarms acknowledging 6-121 Adhoc Rogue IN-3

details 6-108 overview 6-103 assigning 6-120 cleaning 6-120 deleting 6-120 email notifications 6-116 monitoring 6-1 Rogue AP details 6-96 Rogue APs 6-89 unassigning 6-120 working with 6-120 alarms 14-1 assigning 3-24 clearing 3-24 config audit 17-21 deleting 3-24 searching 2-37 unassigning 3-24 alarm severity configuring 6-84 alarm summary 2-33 alarm trigger threshold 11-73 alarm warning 6-121 all groups window 16-43 allow AAA override 9-70 alternate parent report 15-97 altitude 19-2 altitude mode 19-2 anonymous provision 11-60 anonymous provisioning 11-60 AP/MSE Authorization configuring 9-91 AP attack details 2-20 AP authentication template 11-72 AP Authentication and MFP configuring 9-110 AP authorization template 11-68 AP Config export 9-176 AP Failover Priority 9-27 AP failover priority setting 9-154 AP join taken time 10-7 AP load avoiding 11-101 AP Location data 5-54 AP manager IP 11-157 applying CLI commands 11-140 applying config groups 8-23 AP policies 3-39 AP policies template 11-90 AP Profile Status access points 6-33 AP profile status report 15-71 APs 802.11 Counters 6-33 AP Profile Status 6-33 autonomous templates 11-152 configuration templates 11-143 copy and replace 9-186 Coverage (RSSI) 6-30 Coverage (SNR) 6-30 details 6-34 CDP Neighbors 6-40 Current Associated Clients 6-40 general 6-34 interfaces 6-39 Dynamic Power Control 6-28 Edit View 6-25 Export AP config 9-176 Generate Report 6-26 Interference 6-29 lightweight templates 11-143 IN-4

lightweight access point template 11-143 monitor overview 6-23 Noise 6-29 Radio details 6-41 radio 9-176 remove unassociated 9-186 TSM 6-33 UpTime 6-30 Voice Statistics 6-31 Voice TSM Reports 6-32 Voice TSM Table 6-31 APs not assigned to maps 2-19 AP Status Report Scheduled Task 9-204 AP Template tasks 9-204 AP Template Task delete 9-205 enable, disable 9-204 history 9-205 modify 9-204 AP threats and attacks 10-7 AP Timer Settings 9-63 AP up time 5-88, 6-50 AP uptime 2-26 AP Username Password Controller Templates 11-10 asset matching criteria 12-66 assigning location presence 5-31 assigning virtual domains 7-19, 16-121 association request failures 5-95, 6-54 association request success 5-95, 6-54 association request timeouts 5-95, 6-54 attacks access points 3-9 attacks detected 3-9 AUDIT_STATUS_DIFFERENCE 14-54 auditing config groups 8-24 auditing H-REAP groups 13-16 Audit Mode basic audit 16-64 template based audit 16-64 Audit Now 9-19 audit report for alarms 6-88, 12-71 audit reports configuring 9-188 audit status 5-91 viewing for access points 9-188 audit trail viewing 7-10 Authentication Priority configuring 9-151 authentication priority template 11-139 authentication process Hybrid REAP 13-2 authentication request failures 5-95, 6-54 authentication request success 5-95, 6-54 authentication request timeout 5-95, 6-54 auto key generation 11-43 automated upgrade 4-15 automatic backups, scheduling 4-9 automatic client exclusion 11-36 automatic client troubleshooting 10-21, 16-66 autonomous access points adding 9-161 adding by CSV file 9-162 downloading images 9-164 upgrading 9-164 viewing 9-163 Autonomous AP Migration Templates edit 11-155 autonomous AP images downloading 9-175 Autonomous APs IN-5

template new 11-152 templates 11-152 autonomous to lightweight migration 9-161 autonomous to LWAPP migration support 9-161 auto provisioning filter editing 16-53 auto refresh 5-108, 5-121 avoid access point load 11-101 avoid Cisco AP load 11-101 avoid foreign AP interference 11-101 avoid non-802.11 noise 11-101 B background scanning 9-55 on mesh configuration 11-130 on templates 11-130 background scanning in mesh networks described 9-53 to 9-55 scenarios 9-54 Background Scan parameter 9-56 backhaul interface 5-93, 6-52 backing up the WCS database on Linux 4-11 on Windows 4-10 Backup location server 12-35 backup and restore license B-4 band selection 9-115 battery level condition type 12-65 best practices A-1 bridge group name 5-93, 6-52 Bridging link information 5-82, 5-98 bridging link information 5-82, 5-98 bridging mesh statistics 5-93, 6-52 broadcast deauthentication frame signatures 3-42 bronze 11-34 bronze queue 5-95, 6-53 buildings adding to WCS database 5-33 busiest APs report 15-73 busiest client report 15-24 C CA Certificate configuring 9-101 CA certificates 4-5 calculating access point requirements 5-102 calibrating client 11-142 CAS 12-1 cascade reboot 8-25 CDP Interface Neighbors controller ports monitor 6-11 certificate signing request 3-52 change order buttons 15-8 changing station role root mode 9-165 channel bonding configuring 9-123 channel width monitoring 6-55 checking the status of WCS on Linux 4-7 on Windows 4-6 Chokepoint adding to WCS database 9-197 adding to WCS map 9-198 removing from WCS 9-199 removing from WCS map 9-199 chokepoint condition type 12-65 Chokepoints 6-67 new 9-197 chokepoints IN-6

positioning 5-56 CIDR notation 11-81 Cisco Access Points configuring 9-111 Cisco Adaptive wips alarms 6-117 Cisco Aironet 1510 Access Points in Mesh network 9-53 Cisco AP load avoiding 11-101 Cisco Discovery Protocol 9-171 Cisco WCS base B-1 Cisco wired IPS events 2-27 Cisco Wireless LAN Solution overview 1-1 to 1-2 security solutions 3-1 to 3-37 civic address 5-32 CKIP 9-68 clamped to ground 19-2 classification rule 11-91 Classifying Rogue APs 6-93 clear config 9-174 CLI template 11-139 CLI commands applying to template 11-140 Client disable 10-36 remove 10-37 Sessions Report 10-38 client 10-37 calibrating 11-142 managing 10-1 client alarm summary 10-5 client association failure 10-5 client authentication failure 10-5 client authentication provision 11-60 client authentication type distribution 10-6 client count 2-19, 10-4 client count report 15-26 client detail page 10-10 Client Details Association History 10-18 CCXv5 Information 10-19 Event Information 10-19 Location Information 10-19 Statistics 10-18 client details retrieving from access point page 10-21 client devices connecting to WLANs 13-12 client distribution 10-3 client excluded 10-5 client exclusion 9-72, 11-36 happening automatically 11-36 Client Exclusion Policies configuring 9-105 client exclusion policies 11-70 template 11-70 client exclusion policies template 11-70 Client Location current map 10-38 recent map 10-37 client MFP 3-39 client protocol distribution 10-3 client related traps 11-133 client reports 15-23 clients searching 2-40 clients detected by location server 2-27 client security events 2-27 client sessions report 15-29 Client Summary filtering 10-11 client summary report 15-33 client tab 2-20, 10-2 client tab dashboard 10-22 client traffic 10-6 IN-7

client troubleshooting automatic 16-66 enabling 10-21 client WEP key decryption error 10-5 client WPA MIC error counter activated 10-5 CLI Sessions monitor 6-6 CLI sessions 16-71, 16-90 color coding of obstacles 5-74 command buttons 2-32 compliance reports 15-48 component options icon 2-29 condition type for event definitions 12-65 config audit 17-20 config audit alarms 17-21 config group adding controllers 8-22 adding templates 8-23 configuring 8-21 downloading IDS signatures 8-27 downloading sw to controllers 8-26 removing controllers 8-22 removing templates 8-23 config group audits 8-24 config groups applying 8-23 auditing 8-24 creating 8-19 downloading customized webauth 8-27 rebooting 8-25 reporting 8-26 Config Group Task delete 9-207 enable,disable 9-206 history 9-207 Config Group Tasks 9-205 modify 9-206 Configuration scheduled 9-203 configuration audit report 15-49 Configuration Backup 16-22 Configure Access Points Radio 9-176 Configure APs copy and replace 9-186 Configure Controllers 802.11 General Parameters 9-113 802.11a/n Parameters 9-118 802.11h 9-129 Dynamic Channel Assignment 9-122 EDCA 9-128 General 9-119 High Throughput 9-130 Media 9-125, 9-136 Roaming 9-128 RRM Intervals 9-121 RRM Radio Grouping 9-125 RRM Thresholds 9-129 802.11b/g/n Parameters 9-131 EDCA 9-138 General 9-132 High Throughput 9-140 Roaming 9-139 RRM DCA List 9-135 RRM Radio Grouping 9-135 RRM Thresholds 9-133 802.11 Parameters 9-83, 9-113 Access Control List Rules 9-99 Access Points Cisco APs 9-111 Download Customized Web Auth Bundle 9-36 Download IDS signatures 9-36 Downloading Configuration 9-34 Downloading Software 9-34 IN-8

Download Web Admin Certificate 9-35 H-REAP 9-80 H-REAP AP Groups 9-80 Management 9-145 Authentication Priority 9-151 Local Management Users 9-151 Syslog 9-149 Syslog Servers 9-149 Telnet SSH 9-148 Trap Receivers 9-145 Web Admin 9-149 Mesh 9-141 Ports 9-144 Rebooting Controllers 9-7 Removing Controllers 9-7 Security AAA 9-84 AAA AP authorization 9-91 AAA Local Net Users 9-89 AAA RADIUS Acct Servers 9-85 AAA RADIUS Auth Servers 9-84 Access Control Lists 9-98 AP Authentication and MFP 9-110 CA Certificate 9-101 Client Exclusion Policies 9-105 CPU Access Control List 9-100 Custom Signatures 9-109 Disabled Clients 9-98 file encryption 9-83 ID Certificate 9-102 IDS Sensor List 9-101 Local EAP 9-94 Local EAP General 9-94 Local EAP general EAP-FAST parameters 9-97 Local EAP General Network Users Priority 9-97 Local EAP Profiles 9-96 Rogue Policies 9-104 Standard Signatures 9-106 User Login Policies 9-98 Web Auth Certificate 9-103 Wireless Protection 9-103 System DHCP Scopes 9-57 Mobility Groups 9-50 Network Route 9-49 Network Time Protocol 9-53 QoS Profiles 9-56 Spanning Tree Protocol 9-50 System Commands 9-30 System Interfaces 9-37 Uploading Files from Controllers 9-33 configure menu 2-30 Configuring ACL Protocol Groups 11-85 Wired Guest Access 9-45 Configuring 802.3 Bridging 9-28 configuring access points 9-166 configuring a client exclusion policy template 11-92 configuring a CPU ACL template 11-87 configuring a high throughput template 11-108 configuring alarm severity 6-84, 14-64 configuring a local EAP general template 11-55 configuring a local EAP profile template 11-56 configuring a manually disabled client template 11-69 configuring a mesh template 11-108, 11-129 configuring an 802.11h template 11-107 configuring an access point 11-68 configuring an access point for hybrid REAP 13-9 configuring an EAP-FAST template 11-58 configuring an RRM interval template 11-112 configuring an RRM threshold template 11-107 configuring a policy name template 11-99 configuring a roaming parameters template 11-104 configuring a TACACS+ server template 11-50 configuring a trusted AP policies template 11-90 configuring a user authentication priority template 11-139 configuring a user login policies template 11-65 configuring config group 8-20 IN-9

configuring controller WLANs 9-64 configuring EDCA parameters through a template 11-104 Configuring Existing Controllers 9-21 configuring firewall for WCS 3-38 configuring global credentials 9-154 configuring global email parameters 16-74 configuring H-REAP AP groups 11-38 configuring Hybrid REAP 13-1 configuring hybrid REAP access point groups 13-12 configuring Hybrid-REAP groups 13-14 Configuring IDS 3-41 Configuring IDS signatures 3-41 configuring IDS signatures 3-41 configuring intrusion detection systems 3-41 configuring multiple country codes 8-16 configuring search results 2-47 configuring spectrum experts 9-193 configuring template ACL 11-69 for rogue AP rule groups 11-92 configuring templates 802.11b/g RRM interval 11-112 access point authentication and MFP 11-90 access point authorization 11-68 file encryption 11-45 guest users 11-63 known rogue access point 11-107 local management user 11-137 MAC filter 11-66 QoS 11-16 RADIUS accounting 11-49 RADIUS authentication 11-46 syslog 11-136 Telnet SSH 11-135 traffic stream metrics QoS 11-20 trap control 11-132 WLAN 11-22 configuring the controller for hybrid REAP 13-6 configuring the switch for hybrid REAP 13-5 Configuring User Roles 9-58 connecting client devices to WLANs 13-12 Connecting to the Guest WLAN 3-52 content customizing 2-25 context aware configuring 12-74 context aware planning 12-69 context-aware software 12-1 Controller General System Parameters 9-24 Multicast Mode 9-62 Template Launch Pad 11-1 Uploading configuration/logs 9-33 controller configuring for hybrid REAP 13-6 controller CPU utilization 2-27 controller details 11-157 Controller DHCP 9-61 configuring 9-61 controller license information 16-10 controller licenses managing 16-101 searching 2-46 controller memory utilization 2-27 Controllers Adding an Interface 9-38 configuring existing 9-21 DHCP Stats monitor 6-7 Edit View 6-3 monitor Summary 6-4 monitoring 6-1 search 6-2 System Parameters monitor 6-3 IN-10

controllers adding 9-4 adding to WCS database 4-2 searching 2-39 specified 1-1 Controller Security monitor 6-12 Controller Templates 802.11b/g/n Parameters 11-116 Adding 11-2 applying 11-2 AP Username Password 11-10 delete 11-2 managing, creating 11-3 SNMP Community 11-8 Viewing 9-18 Voice 802.11b/g/n 9-118, 11-98, 11-102, 11-119 Controller Time and Date 9-33 controller upgrade settings 16-69, 16-71, 16-91 Controller User Roles 9-58 controller WLANs configuring 9-64 converting WLSE autonomous to WCS controller C-1 Country Codes setting multiple 9-113 country codes multiple 8-16 Coverage (RSSI) access points 6-30 Coverage (SNR) access points 6-30 coverage hole 6-62 coverage hole reports 15-123 coverage holes 2-19 CPU access control template 11-87 CPU Access Control Lists configuring 9-100 CPU ACL configuring 9-100 Cranite 9-67 Creating Account 7-21 Creating a Lobby Ambassador Account 7-21 Creating guest user accounts 7-11 creating guest user accounts 7-11 creating placemarks 19-3 creating virtual domains 18-2 CSR 3-52 CSV file 9-162 method for adding autonomous access points 9-162 CSV files 19-4 Current building delete 5-35 edit map 5-35 currently logged guest users 2-28 Custom and Standard Signatures Global Settings 9-108 customized webauth downloading 8-27 Customized Web Auth Bundle download 9-36 Customized WebAuth Bundles downloads 9-14 Customized Web authentication 3-50 customized web authentication downloading 11-76 customize report 15-7 customizing content on WCS Home page 2-25 customizing tabs on WCS Home page 2-23 Custom signature 3-47 Custom Signatures configuring 9-109 D data collection for RFID tag 11-142 IN-11

DCA 11-114, 11-127 802.11a/n 9-122 debug commands A-4 debug strategy A-4, D-11 default lobby ambassdor credentials editing 7-10, 7-17 Deleting MSE 12-6 deleting a license B-4 deleting a WLAN 9-75 deleting guest user templates 7-15 deleting WCS user accounts 7-4 designing a network 5-109 destination type for report 15-5 Detecting APs 6-110 details clients 10-39 device certificates 4-4 device information 9-162 method for adding autonomous access points 9-162 device reports 15-69 DHCP configuring 9-61 DHCP diagnostic test 10-30 DHCP Scopes configuring 9-57 DHCP server overriding 11-38 DHCP Stats controllers monitor 6-7 diagnostic channel A-1, D-1 diagnostic test 802.11 association 10-31 802.1X authentication 10-31 DHCP 10-30 DNS ping 10-31 DNS resolution 10-31 IP connectivity 10-30 profile redirect 10-31 Disable client 10-36 Disabled Clients manual 9-98 disabled clients template 11-69 disabling IDS signatures 3-46 Discovering Templates from Controllers 9-18 Distance condition type 12-65 DNS ping diagnostic test 10-31 DNS resoltion diagnostic test 10-31 Download Web Admin Certificate 9-150 Web Auth Certificate 9-150 downloading a customized web authentication page 11-76 downloading autonomous AP images 9-175 Downloading Configurations to Controllers 9-34 downloading customized webauth 8-27 Downloading customized web authentication 3-50 Downloading IDS signatures 3-45 downloading IDS signatures 3-45 from your config group 8-27 downloading images to autonomous access points 9-164 Downloading Signature Files 9-107 Downloading Software controllers 9-34 downloading sw to controllers after adding config group 8-26 downloading vendor CA certificates 4-5 downloading vendor device certificates 4-4 Downloads Customized WebAuth Bundles 9-14 Vendor CA Certificates 9-16 Vendor Device Certificate 9-15 downstream delay 11-21 IN-12

downstream packet loss rate 11-21 drawing polygon areas using map editor 5-72 DTIM 11-100 Dynamic Channel Assignment 802.11a/n 9-122 dynamic interface 11-14 E EAP-FAST template 11-59 EAP-FAST template 11-58 EAPOL flood signature 3-43 EDCA 802.11b/g/n Parameters 9-138 EDCA parameter template 11-104 EDCA parameters configuring through a template 11-104 edit content 2-26 edit contents 2-26 editing saved reports 15-13 editing scheduled run details 15-11 Editing signature parameters 3-49 editing the default lobby ambassador credentials 7-10, 7-17 edit link 5-71 edit links home page 2-23 edit location presence information 5-31 Edit View access points 6-25 alarms 6-85 controllers 6-3 general 2-47 egress interface 9-66 email configuring parameters 16-73 Email Notifications alarms 6-116 embedded access points 1-7 emergency condition type 12-65 enable background audit 8-20 enable enforcement 8-20 enable log module 16-57 enabling 10-37 enabling audit trails for guest user activities 7-11 enabling IDS signatures 3-46 Enabling Web login 3-49 enabling Web login 3-49 end user license agreement B-7 to B-12 Ethernet bridging 9-156 Ethernet Switch credentials 9-190 remove 9-192 Ethernet Switches configure 9-212 Ethernet VLAN tagging guidelines 9-157 evaluation license for controller 16-11 for MSE 16-13 event history 6-88, 10-27, 12-71 event notification 1-5 Events Adhoc Rogue 6-128 details 6-115 overview 6-114 monitoring 6-124 overview 6-124 Pre Coverage Holes 6-129 Rogue Alarms 6-111 Rogue AP details 6-112 Rogue APs 6-127 wips 6-129 working with 6-134 IN-13

events searching 2-42 exclude device list 16-92 excluded packets 5-94, 6-52 exclude switch trunk ports 16-92 exclude vendor list 16-92 executive summary report 15-116 Export Asset Information location server 12-45 exporting a file 5-56 to change access point position 5-56, 5-57 export task list 16-43 extend to ground 19-2 extension license for controller 16-11 for MSE 16-13 extracting task list 16-48 F Factory Defaults restoring 9-32 failover mechanism 16-6 Failover Priority 9-27 feature of WCS license 16-9 feature license B-2 File Encryption controller 9-83 file encryption template 11-45 filter editing current auto provisioning 16-53 filtering using to modify maps 5-98 filtering saved reports 15-12 filtering scheduled run results 15-10 firewall, configuring for WCS 3-38 Floor Areas delete 5-53 edit 5-53 Floor Plan Editor 1-14 foreign access point interference avoiding 11-101 foreign AP interference avoiding 11-101 Frame type 3-47 friendly access point template 11-94 friendly AP template 11-94 friendly rogue 11-90 friendly rogue access points 3-8 friendly rogue APs 2-27 FTP turning on and off 16-82 G General Properties Location Server 12-20 general tab home page 2-19 general templates configuring 11-4 generating migration analysis report 9-165 geographical coordinates 19-1 Global AP Password configuring 9-59 global credentials configuring 9-154 Global Settings Standard and Custom Signatures 9-108 Global settings for standard and custom signatures 3-49 Global SSID Group add 9-218 delete 9-219 edit 9-219 gold 11-34 IN-14

gold queue 5-94, 6-53 Google Earth adding launch points 19-7 Google Earth coordinates 19-2 Google Earth maps 19-1 Google KML or CSV importing into WCS 19-5 GPS markers 5-32 grace period license for controller 16-11 groups for hybrid-reap 13-14 for rogue access point rules 11-92 group setup window on ACS server 16-44 GUEST_USER_ADDED 14-51 GUEST_USER_AUTHENTICATED 14-52 guest account settings 16-71 guest accounts status report 15-89 guest association report 15-91 guest count report 15-92 guest reports 15-89 guest user template 11-63 guest user account scheduling 7-15 Guest user accounts creating 7-11 guest user accounts adding 7-13 creating 7-11 managing 7-13 guest user details emailing 7-16 print 7-16 Guest Users monitoring 6-16 guest users currently logged 2-28 guest user sessions report 15-94 guest user templates 11-63 Guest WLAN connecting 3-52 guidelines for Ethernet VLAN tagging 9-157 guidelines for using the map editor 5-19 H heater status 5-88, 6-50 heat map described 5-52 Help Menu 1-13 help menu 2-30 hierarchy of mesh network 5-96 Hierarchy of Mesh parent to child 5-99 hierarchy of mesh parent to child 5-99 High Throughput 802.11a/n 9-130 802.11b/g/n Parameters 9-140 high throughput template 11-108 high throughput template configuring 11-108 historical report type 15-1 History Parameters location server 12-43 Home Page 2-18 customizing tabs 2-19 Home page customizing content 2-25 customizing tabs 2-23 H-REAP AP Groups configuring 9-80 H-REAP AP groups configuring 11-41 configuring template 11-41 H-REAP configuration tab 11-42 IN-15

H-REAP Group auditing 9-83 H-REAP groups auditing 13-16 H-REAP local switching 9-71 H-REAP Parameters 9-80 H-REAP Users 11-43 HTTP turning on and off 16-82 Hybrid REAP configuring 13-1 hybrid REAP bandwidth restriction 9-71, 11-35, 13-3 hybrid REAP access point groups 13-12 hybrid-reap groups 13-13 Hybrid REAP local switching 11-35 hysteresis 11-106 I ID Certificate configuring 9-102 identical audit status 5-91 IDS 3-41 configuring 3-41 IDS Sensor List configuring 9-101 IDS sensors 3-41 IDS Signatures configuring 9-106 download 9-36 IDS signatures 3-41 disabling 3-46 downloading 3-45 downloading from config group 8-27 enabling 3-46 uploading 3-44 images downloading to autonomous access points 9-164 Import Asset Information location server 12-44 importing a file 5-56 to change access point position 5-56, 5-57 importing coordinates as CSV file 19-4 into Google Earth 19-2 importing Google KML or CSV into WCS 19-5 Import map 5-54 In/Out condition type 12-65 information elements Aironet 11-35 infrastructure MFP 3-39 ingress interface 9-66 Inspect Location Readiness 5-78 Inspect VoWLAN Readiness 5-79 installer using to upgrade 4-16 installing a license B-4 installing WCS for WLSE conversion C-2 insufficient memory 5-94, 6-52 interface group 11-19 Interferers summary 6-72, 6-74 interferers summary 9-194 inter-subnet roaming 8-4 Intrusion Detection Systems 3-41 intrusion detection systems 3-41 invalid association request 5-96, 6-54 invalid reassociation request 5-96, 6-55 inventory detail status 2-19 inventory reports 15-48, 15-78 inventory status 2-27 IOS access points adding 9-161 adding by device information 9-162 IN-16

IOSAP_DOWN 14-53 IOSAP_LINK_DOWN 14-52 IOSAP_LINK_UP 14-52 IOSAP_UP 14-53 IP connectivity diagnostic test 10-30 K KEK key encryption key 11-48 key wrap 11-48 KML file 19-2 L LAG mode 11-6 Latest Network Audit Report 9-20 latitude 19-2 Layer 1 security solutions 3-2 Layer 2 11-25 Layer 2 security solutions 3-2 Layer 3 11-29 Layer 3 security solutions 3-2 Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-37 LBS authorization 11-68 template 11-68 LDAP Servers 9-87 LDAP servers 9-70 template 11-52 LEAP authentication requirements 8-8 legacy syslog template 11-136 legacy syslog template 11-136 license backup and restore B-4 license agreement B-7 to B-12 license installation B-4 license management 16-102 licenses B-1 license types B-1 licensing on WLSE network management C-4 Lightweight AP Protocol Transport Mode 9-28 limitations for high reliability 16-95 Link Aggregation 9-30 link aggregation (LAG) guidelines 13-4 link metric adjusted 5-82 unadjusted 5-82 link SNR 5-82 link stats report 15-98 Load access points 6-27 load 5-108 load balancing 9-114 Lobby Ambassador account 7-21 creating account 7-21 Lobby ambassador 7-11 Lobby Ambassador Account creating 7-21 editing 7-22 lobby ambassador defaults setting 7-7 local authentication for hybrid-reap groups 13-14 Local EAP 9-94 General EAP-FAST Parameters 9-97 General Network Users Priority 9-97 General Parameters 9-94 Profiles 9-96 local EAP authorization 9-70 Local EAP check box 11-32 local EAP general template 11-55 IN-17

local EAP general template 11-55 local EAP profile template 11-56 Local Management Users configuring 9-151 local management users template 11-138 local management user template 11-138, 11-139 Local Net Users configuring 9-89 local net users template 11-62 local net users template 11-61 Local Password Policy 16-118 local switching Hybrid REAP 11-35 Location calibration 1-15 location servers 9-223 notifications 12-58 notification settings 12-59 notifications summary 12-58 synchronize servers 12-10 location appliance functionality 4-2 Location Appliances 1-15 location appliances relationship with WCS Location 1-5 location change condition type 12-65 location configuration template 11-141 Location History clients 10-39 location menu 2-30 location optimized monitor mode 9-169 Location Parameters location server 12-53 location presence assigning 5-31 Location Readiness 5-78 Location Server active sessions 12-24 administration 12-20 advanced parameters 12-25 backup 12-35 export asset information 12-45 general properties 12-20 history parameters 12-43 import asset information 12-44 location parameters 12-53 logs 12-27 maintenance 12-35 NMSP parameters 12-22 notification parameters 12-56 restore 12-36 server events 12-32 WCS alarms 12-33 WCS events 12-33 Location server adding 12-9 location server automatic backup 12-36 backup historical data 12-35 configuration clearing 12-27 reboot hardware 12-26 Location Servers 9-223 location upgrade B-2 log analysis 10-26 logging 16-18 logging into the WCS user interface 2-16 to 2-18 logging options 16-56 logging the lobby ambassador activities 7-10 login.html 3-50 login disclaimer 16-72 login policies template 11-65 log message levels 16-57 log modules enabling 16-57 IN-18

Logs location server 12-27 LOMM 9-169 configuring access point radios 9-185 longitude 19-3 long preambles, enabling for SpectraLink NetLink phones 4-5 LWAPP template edit 11-151 templates 11-143 Transport Mode 9-28 LWAPP migration 9-161 LWAPP template new 11-143 LWAPP uptime 2-27 M MAC Filtering configuring 9-91 MAC filtering 11-28 template 11-66 MAC filter template 11-66 MAC frequency 3-48 MAC information 3-48 MACK message authenticator code keys 11-48 mail server configuration 16-73 Maintenance location server 12-35 malformed neighbor packets 5-94, 6-52 malicious rogue 11-90 malicious rogue access points 3-5, 3-6 managed network security index 3-5 management frame flood signatures 3-43 Management Frame Protection 3-39 management frame protection 9-73, 11-72 Management Frame Protection Summary controllers monitor 6-14 management interface 11-7 Management Parameters configuring 9-145 management queue 5-95, 6-53 managing clients 10-1 managing controller licenses 16-101 managing current reports 15-9 managing MSE licenses 16-103 managing multiple WCSs 1-10 managing saved reports 15-11 managing virtual domains 18-7 managing WLAN schedules 9-76 mandatory data rates 11-101 manually disabled client template for 11-69 Manually Disabled Clients managing 9-98 manually disabled clients 2-20 Map Editor general notes and guidelines 5-19 map editor guidelines 5-19 guidelines for using 5-19 using to draw polygon areas 5-72 map editor functions 5-4 map properties editing 5-28 maps searching 2-44 using to monitor link stats 5-80 using to monitor mesh AP neighbors 5-85 map size 5-121 map view updating 5-99 Menu Bar 1-11 menu bar 2-29 IN-19

Mesh monitoring health 5-88 statistics for AP 5-92, 6-51 mesh access point neighbors monitoring 5-85 mesh access points monitoring 5-83 mesh alarms most recent 2-21 mesh configuration template 11-129 mesh link statistics 5-80 monitoring 5-80 mesh neighbors 5-86 mesh network monitoring using maps 5-80 mesh network hierarchy 5-96 mesh networks background scanning 9-53 monitoring 5-80 Mesh Parameters 9-141 mesh parent changing AP 2-27 mesh parent-child hierarchical view 5-11 mesh reports 15-97 mesh tab home page 2-21 mesh template configuring 11-129 Mesh tree viewing 5-96 mesh tree viewing 5-96 message integrity check information element 11-72 metrics in QoS 11-20 MFP 3-39, 9-73 for clients 3-40 MFP attacks 3-9 MFP client protection 11-38 MFP signature generation 11-38 MFP Summary controllers monitor 6-14 MFP templates 11-72 MIC IE 11-72 migration analysis running 9-165 migration analysis report generating 9-165 migration analysis summary viewing 11-156 Migration Templates Autonomous APs edit 11-155 minimum RSSI 11-106 Mirror Mode 10-37 mirror mode 9-170 mismatched audit status 5-91 mobile announce messages 8-8 Mobility 12-1 Mobility Stats monitor 6-17 service 12-1 mobility 8-1 Mobility Anchor Group Keep Alive Interval 9-30 mobility anchors 8-13, 9-77 Mobility Group Prerequisites 9-51 Mobility Groups configuring 9-50 Messaging 9-51 mobility groups 8-7 prerequisites 8-8 to 8-9 mobility groups, configuring 8-8 mobility scalability 8-12 Mobility Services 12-1 viewing 12-4 mobility services engine IN-20

deleting 12-6 Mobility Stats monitor 6-17 modifying a migration template 11-157 modifying map displays 5-98 using filters 5-98 Monitor Alarms 6-1 Events 6-124 Ports overview 6-8 Rogue AP Rules 6-15 Monitor Access Points details 6-34 edit view 6-25 load 6-27 radio type 802.11 MAC counters 6-48 on demand statistics 6-41 operational parameters 6-45 view alarms 6-49 view events 6-49 radio utilization 6-33 search 6-23 search results 6-24 Tx power and channel 6-33 Monitor Alarms details 6-87 edit view 6-85 Rogue 3-20 Monitor APs 802.11 Counters 6-33 AP Profile Status 6-33 Coverage (RSSI) 6-30 Coverage (SNR) 6-30 details CDP Neighbors 6-40 Current Associated Clients 6-40 general 6-34 interfaces 6-39 Dynamic Power Control 6-28 Interference 6-29 Noise 6-29 Radio details 6-41 TSM 6-33 UpTime 6-30 Voice Statistics 6-31 Voice TSM Reports 6-32 Voice TSM Table 6-31 Monitor Chokepoints 6-67 Monitor Client detecting APs details 10-39 disable 10-36 location history 10-39 present map 10-38 recent map 10-37 remove 10-37 roam reason 10-38 v5 statistics 10-33 voice metrics 10-39 Monitor Controllers 6-1 802.11a/n parameters 6-19 802.11a/n RRM Grouping 6-20 802.11a/n RRM Groups 6-22 802.11b/g/n parameters 6-21 CLI Sessions 6-6 ports general 6-8 spanning tree protocol 6-5 System summary 6-4 WLANs 6-8 Monitor Events Details 6-127 search 6-126 Monitoring IN-21

Guest Users 6-16 monitoring active sessions 7-6 monitoring channel width 6-55 monitoring mesh access point neighbors 5-85 using maps 5-85 monitoring mesh health 5-88, 6-55 monitoring mesh link statistics using maps 5-80 monitoring mesh networks using maps 5-80 monitoring neighboring channels 9-53 monitoring pre-coverage holes 6-62 monitoring rogue access point alarms 6-84 monitoring spectrum experts 9-193 monitor menu 2-29 monitor mode location optimized 9-169 Monitor Spectrum Experts 6-71 Monitor Tags 6-64 most recent AP alarms 2-27 most recent audit alarms 17-21 most recent client alarms 10-6 most recent mesh alarms 2-21 most recent rogue adhocs 3-7 most recent security alarms 2-20, 2-28 MSE adding 12-5 deleting 12-6 MSE authorization template 11-68 MSE license information 16-13 MSE licenses managing 16-103 multicast mobility mode 8-12 Multicast Mode controller 9-62 Multiple Country Codes setting 9-113 multiple country codes configuring 8-16 multiple syslog template 11-137 multiple syslog template 11-137 N N+1 redundancy 8-5 NAC Out-of-Band Integration 9-43 NAC support 9-72 NAT 8-11 Navigator 1-10 netmask 11-81 NetStumbler signature 3-43 network address translation 8-11 Network Audit Report latest 9-20 network design 5-109 network designs 12-10 network protection 3-41 Network Routes configuring 9-49 Network Summary page 2-17 network summary reports 15-114 Network Time Protocol configuring 9-53 network users priority template 11-60 network utilization reports 15-125 new rogue access points report 15-153 new search 5-71 NMSP Parameters location server 12-22 node hop count worst 2-21 node hops 5-94, 6-53 nodes report 15-101 noise avoiding non-802.11 types 11-101 IN-22

avoid non-802.11 11-101 non-802.11 noise avoiding 11-101 non-aggregated historical data 16-71 non-cisco ACS server for use with RADIUS 16-48 normal mode for Ethernet port 9-158 Notification Parameters location server 12-56 Notifications location 12-58 Notification Settings location 12-59 Notifications Summary location 12-58 NTP configuration 9-53 NTP server template 11-9, 11-13 null probe response signatures 3-43 O On Demand Statistics access points 6-41 onstacle color coding 5-74 Operational Parameters access points 6-45 OUI search 16-92 outdoor location creating with Google Earth 19-1 overview Cisco Wireless LAN Solution 1-1 to 1-2 WCS 1-2 P packet error rate worse 2-21 packet error rate link color 5-98 packet error statistics report 15-105 packet jitter 11-20 packet latency 11-20 packet loss 11-20 packet loss rate 11-21 packet queue statistics report 15-107 packet stats report 15-103 parent changes 5-94, 6-52 Passive Client 9-72 passthrough 11-30 PCI report 15-52 PEAP 11-58 peer-to-peer blocking 11-35 performance reports 15-119 permanent license for controller 16-11 for MSE 16-13 placemarks creating 19-3 placement of access points 5-54 planning mode 5-103 to calculate access point requirements 5-102 planning mode, calculating access point requirements 5-102 platinum 11-34 platinum queue 5-94, 6-53 PLR 11-21 POE status 5-91 policy manager solutions 3-2 polygon areas drawing with map editor 5-72 poor neighbor SNR 5-94, 6-52 Port Parameters configuring 9-144 Ports Monitor overview 6-8 monitor controllers 6-8 IN-23

positioning access points 5-56 positioning chokepoints 5-56 positioning Wi-Fi TDOA receivers 5-56 power injector settings 9-172 power-over-ethernet status 5-91 pre-coverage holes monitoring 6-62 Preferred Call 9-117 Prerequisites 2-1 Present Map clients 10-38 print guest user details 7-16 probe cycle count 9-116 Profile List 9-213 Profile editor 9-215 profile redirect diagnostic test 10-31 protection type 11-73 Q QoS 11-33 QoS Profiles configuring 9-56 QoS templates 11-16 queues silver, gold, platinum, bronze, management 5-94, 6-53 quick search 2-34 Quiet time 3-48 R Radio access points configuring 9-176 radio resource management 11-101 Radio Status scheduling and viewing 9-187 radio status scheduling 9-187 Radio Utilization access points 6-33 RADIUS 16-126 RADIUS Accounting controllers monitor 6-13 RADIUS accounting servers template 11-49 RADIUS accounting template 11-49 RADIUS and TACACS+ attributes virtual domains 7-20, 18-10 RADIUS Authentication controllers monitor 6-12 RADIUS authentication template 11-46, 11-47 RADIUS Auth Servers AAA RADIUS Auth Servers 9-84 RADIUS fallback template 11-51 RADIUS fallback mode 11-51 RADIUS servers 9-70 configuring 16-126 reachability status 9-193 Readiness location 5-78 VoWLAN 5-79 reassociation request failures 5-95, 6-54 reassociation request success 5-96, 6-54 reassociation request timeouts 5-95, 6-54 reauthentication request failures 5-96, 6-54 reauthentication request success 5-96, 6-54 reauthentication request timeout 5-96, 6-54 rebooting config groups 8-25 Rebooting Controllers 9-7 recent adhoc rogue alarms 3-9 recent alarms 2-27, 2-28 IN-24

recent coverage holes 2-19 Recent Map clients 10-37 recent rogue adhoc alarm 2-20 recent rogue alarms 2-27 recent rogue AP alarms 2-20, 3-9 recovering the WCS password 4-22 recurrence for report 15-5 refresh browser 5-109 refresh component icon 2-29 Refresh Config 9-17 refresh from network 5-108, 5-121 relative to ground 19-2 Remove APs 9-186 Remove Controllers 9-7 removing controllers from config group 8-22 removing templates from config group 8-23 report running new 15-3 report launch pad 15-2 Reports Rogue AP Events 15-157 reports scheduled runs 15-9 reset AP now 9-174 Restore location server 12-36 Restoring Factory Defaults 9-32 restoring WCS database in high availability environment 4-14 restoring WCS database on Linux 4-13 retain WCS value 8-25 Retrieving UDI 6-59 RF calibration model, creating 4-6 RF Calibration Models apply to maps 5-68 delete 5-69 RFID data collection 11-142 RF profile traps 11-134 RF update traps 11-134 Roaming 802.11b/g/n Parameters 9-139 roaming 8-1 roaming parameter template 11-105 roaming parameters template configuring 11-105 roaming time 11-20, 11-21 Roam Reason clients 10-38 rogue access point events report 15-159 rogue access point rule groups 11-92 rogue access point rules configuring a template 11-90 viewing or editing 9-190 rogue access points friendly 3-8 malicious 3-6 monitoring 3-10 solutions for 3-3 unclassified 3-7 rogue access points report 15-159 rogue adhoc alarm 2-20 rogue adhocs most recent 3-7 Rogue Alarm Events 6-111 Rogue AP alarm details 6-96, 6-112 alarms 6-89 containment 6-110 location 6-110 malicious 6-95 Rules monitor 6-15 tagging 6-110 rogue AP alarms 2-20 rogue AP detail summary 2-27 IN-25

Rogue AP Events report 15-157 rogue AP rule groups template 11-92 Rogue AP Rules configuring 9-105 details 6-16 rogue AP rules template 11-90 Rogue APs classification types 6-95 classifying 6-93 friendly 6-95 overview 6-88 unclassified 6-96 Rogue Client details 6-101 rogue clients searching 2-44 rogue detector 9-169 Rogue Devices detecting 6-89 rogue location discovery protocol 11-89 Rogue Policies configuring 9-104 rogue policies template 11-89 template for 11-89 role criteria 11-156 root mode changing from station role 9-165 routing state 5-93, 6-52 RRM DCA 802.11b/g/n Parameters 9-135 Radio Grouping 802.11b/g/n Parameters 9-135 RRM DCA 9-123 RRM Intervals 802.11a/n 9-121 802.11b/g/n Parameters 9-134 RRM intervals 11-107 template 11-112 RRM interval template configuring 11-108, 11-112 RRM Radio Grouping 802.11a/n 9-125 RRM threshold template 11-111 RRM Thresholds 802.11b/g/n Parameters 9-133 RRM threshold template configuring 11-111 RSSI legend 5-121 rules for rogue access point 11-90 viewing or editing for rogue access points 9-190 Running a link test 6-58 running a new report 15-3 running a saved report 15-13 running migration analysis 9-165 RX neighbor requests 5-94, 6-52 RX neighbor responses 5-94, 6-52 S Save Config to Flash 9-17 saved report running 15-13 saved reports editing 15-13 filtering 15-12 managing 15-11 saved searches 2-46, 5-71 scalability parameters 8-12 scan cycle period threshold 9-116 scan threshold 11-106 Scheduled Configuration 9-203 IN-26

Schedule details 9-166 scheduled run details editing 15-11 scheduled run results 15-9 filtering 15-10 Scheduled Task AP status report 9-204 schedules managing for WLANs 9-76 scheduling guest user account 7-15 scheduling radio status 9-187 Search access points 6-23 controller results 6-2 Events 6-126 overview 1-14 search feature 2-34 using for troubleshooting 10-22 searching clients 2-40 searching controller licenses 2-46 searching events 2-42 searching maps 2-44 searching rogue clients 2-44 searching SE-detected interferers 2-42 searching shunned clients 2-45 searching tags 2-45 searching Wi-Fi TDOA receivers 2-43 search results configuring 2-47 secondary WCS operation 16-6 Security AAA LDAP servers 9-87 TACACS+ Servers 9-89 Web Auth Configuration 9-92 AAA MAC Filtering 9-91 Local EAP 9-94 security alarms most recent 2-20 security color range 3-5 security configurations monitoring 6-116 security index 3-5 security mesh statistics 5-95, 6-53 Security Reports Rogue AP Events 15-157 security solutions 3-1 to 3-37 security summary 15-162 security tab home page 2-20 interpreting 3-4 security thermometer 3-5 SE-detected interferers searching 2-42 sending mobile announce messages 8-8 sensors viewing IDS types 3-41 Server Events location servers 12-32 status 12-32 set sorting buttons 15-8 Set Time controller 9-33 setting AP failover 9-154 Setting Controller Time and Date 9-33 setting multiple country codes 9-83 shunned clients searching 2-44 sidebar area 2-32 signature attacks summary 2-20 silver 11-34 silver queue 5-94, 6-53 Sniffer 11-144 Sniffer Feature 9-111 sniffer mode 9-169 SNMP authentication 11-133 SNMP Community controller templates 11-8 IN-27

SNR definition 5-98 SNR down 5-82 SNR link worst 2-21 SNR UP 5-82 SNR up 5-82 software downloading config groups to controllers 8-26 software, updating 4-3 Spanning Tree Protocol configuring 9-50 monitor controllers 6-5 SpectraLink NetLink phones, enabling long preambles 4-5 spectrum expert adding 9-193 spectrum expert details 9-195 Spectrum Experts 6-71 details 6-73 Interferers 6-72, 6-74 summary 6-72 spectrum experts configuring 9-193 monitoring 9-193 summary 9-194 SSID Group add 9-220 add from global list 9-220 add global 9-218 delete 9-221 delete global 9-219 edit 9-221 edit global 9-219 SSID Group List wips 9-218 SSID group list global 9-218 SSID groups wips 9-220 Standalone Building adding floor plan 5-46 Standard and Custom Signatures Global Settings 9-108 Standard signature 3-47 Standard Signature Parameters configuring 9-106 standard signatures 3-42 starting WCS on Linux 2-16 on Windows 2-15 static WEP 9-67 Static WEP-802.1X 9-67 station role changing to root mode 9-165 status, checking 4-7 Status Report scheduled task 9-206 status schedules managing for WLANs 9-76 stopping WCS on Linux 4-9 on Windows 4-7 stranded APs report 15-109 supplicant credentials for AP 802.1X 11-11 supported Cisco WLSE management stations C-2 supported data rates 11-101 Switch credentials 9-190 remove 9-192 switch configuring for hybrid REAP 13-5 Switches ethernet 9-212 Switch Port Tracing Details 16-93 Troubleshooting 16-93 symmetric mobility tunneling 11-7 IN-28

symmetric tunneling 8-5 Synchronize servers location 12-10 Syslog configuring individual controller 9-149 Individual controller 9-149 multiple servers 9-149 syslog templates 11-136, 11-137 System General Properties 9-24 System Commands controller 9-30 System Interfaces Controllers 9-37 System parameters controllers monitor 6-3 System requirements 2-2 T TACACS+ 16-124 TACACS+ server configuring a template for 11-54 template 11-54 tagged packets 9-160 Tags 6-64 tags searching 2-45 Task configuration backup 16-22 Telnet SSH template 11-132 Telnet SSH Parameters configuring 9-148 Telnet SSH templates 11-135 temperature 5-88, 6-50 template configuring for rogue AP rules 11-90 template for configuring network user credentials 11-60 Template Launch Pad overview 11-1 Templates AP Configuration 11-143 delete 11-2 test analysis tab 10-30 TFTP turning on and off 16-82 TFTP details 11-157 TFTP Server adding 9-223 TFTP server 3-44 TFTP Servers configure 9-222 delete 9-223 thermometer color range 3-5 threats access points 3-9 throughput report 15-38 tilt 19-2 Timer Setting AP 9-63 tools menu 2-30 top APs by client count 10-3 total APs not assigned to maps 2-19 total interferer count 9-195 total mismatched controllers 17-21 TPC 11-115, 11-128 trace 16-60 traffic indicator message 11-100 Traffic Stream Metrics access points 6-33 traffic stream metrics QoS status 11-21 traffic stream metrics QoS template 11-20 traffic stream metrics report 15-127 transition time 11-107 Transport Mode LWAPP 9-28 IN-29

transport types 12-67 trap 802.11 security 11-134 Trap Control configuring 9-146 trap control template 11-132 trap control templates 11-132 trap receiver template 11-131 Trap Receivers configuring 9-145 trap receiver template 11-131 traps AAA 11-134 access point 11-134 client related 11-133 RF profile 11-134 RF update 11-134 unsupported 14-63 traps added in 2.1 14-22 traps added in 2.2 14-26 traps added in 3.0 14-29 traps added in 3.1 14-31 traps added in 3.2 14-35 traps added in 4.0 14-36 traps added in 4.0.96.0 14-42 traps added in 4.1 14-44, 14-51 traps added in release 6.0 14-59 traps added in release 7.0 14-64 trend report type 15-1 Troubleshooting Switch Port Tracing 16-93 troubleshooting A-1, D-1 using logging options 16-60 troubleshooting voice RF coverage 5-108 trunk mode 9-158 trusted AP policies template for 11-90 trusted AP policies template 11-90 TSM access points 6-33 tunneling 8-5 TX neighbor requests 5-94, 6-52 TX neighbor responses 5-94, 6-52 Tx Power and Channel access points 6-33 Tx power and channel report 15-130 type of WCS license 16-10 U UDI retrieving on controllers and access points 6-59 unadjusted link metric 5-82 unclassified rogue 11-90 unclassified rogue access points 3-7 unclassified rogue APs 2-28 understanding virtual domains 18-10 uninstalling WCS on Linux 4-15 on Windows 4-14 unique clients report 15-44 unique device identifier 6-59 unknown association requests 5-96, 6-55 unknown reassociation request 5-96, 6-55 untagged packets 9-160 Update map view 5-99 update map view 5-99 updating system software 4-3 upgrade settings for controller 16-69 upgrading autonomous access points 9-164 upgrading the network 4-21 upgrading to Linux 4 during WLSE conversion C-3 upgrading WCS IN-30

in high availability environment 4-21 on Linux 4-20 on Windows 4-20 Uploading IDS signatures 3-44 uploading IDS signatures 3-44 Uploading Signature Files 9-107 upstream delay 11-21 upstream packet loss rate 11-21 UpTime access points 6-30 uptime reports 15-85 User accounts for guest 7-11 user accounts for guest 7-11 user authentication priority template configuring 11-139 user credential retrieval priority 11-60 user details emailing 7-16 printing 7-16 User Interface 2-29 Menu Bar 1-11 User Login Policies configuring 9-98 user login policies configuring a template 11-65 template 11-65 User Preferences 7-1, 16-7 user preferences 16-99 User Roles configuring 9-58 Users 16-118 using Edit View for alarms 6-84 using filtering 5-82, 5-98 using logging for troubleshooting 16-60 using maps to monitor mesh AP neighbors 5-85 to monitor mesh link statistics 5-80 using maps to monitor mesh networks 5-80 using planning mode 5-72 using search 6-85 using template ACL 11-87 for friendly access point 11-94 using templates 802.11b/g RRM interval 11-108, 11-112 802.11b/g RRM threshold 11-111 access point authentication & MFP 11-72 access point authorization 11-68 file encryption 11-45 for legacy syslog 11-136 for multiple syslog 11-137 guest users 11-63 local management user 11-138, 11-139 local net users 11-61 MAC filter 11-66 NTP server 11-9, 11-13 password policy 11-78 QoS 11-16 RADIUS accounting 11-49 RADIUS authentication 11-46 syslog 11-136, 11-137 Telnet SSH 11-135 traffic stream metrics QoS 11-20 trap control 11-132 trap receiver 11-131 web authentication 11-73 WLAN 11-22 using the installer to upgrade 4-16 utilization reports 15-86 V V5 client statistics 15-47 V5 Statistics IN-31