INDEX Numerics 40 MHz channel bonding 9-123 802.11a/n Parameters monitor 6-19 RRM Grouping monitor 6-20 RRM Groups monitor 6-22 802.11a/n Parameters 9-118 802.11h 9-129 DCA 9-122 EDCA 9-128 General 9-119 High Throughput 9-130 Media 9-125, 9-136 Roaming 9-128 RRM Intervals 9-121 RRM Radio Grouping 9-125 RRM Thresholds 9-129 802.11 association diagnostic test 10-31 802.11b/g/n Parameters monitor 6-21 802.11b/g/n Parameters 9-131 EDCA 9-138 General 9-132 High Throughput 9-140 Roaming 9-139 RRM Intervals 9-134 RRM Thresholds 9-133 802.11b/g/n Parameters Controller Templates 11-116 802.11b/g RRM interval template 11-108, 11-112 802.11b/g RRM threshold templates 11-111 802.11 Counters access points 6-33 802.11 counters report 15-120 802.11 General Parameters configuring 9-113 802.11h 802.11a/n 9-129 802.11h template 11-107 configuring 11-107 802.11 MAC Counters access points 6-48 802.11n summary reports 15-114 802.11 Parameters configuring 9-83, 9-113 802.11 security trap 11-134 802.1n scaling reports 15-3 802.1X authentication diagnostic test 10-31 802.1X supplicant credentials 11-11 802.3 Bridging configuring 9-28 802.3x Flow Control 9-28 880 series ISRs 1-7 A AAA AAA mode 16-116 active sessions 16-124 AP/MSE Authorization 9-91 General 9-84 LDAP Servers 9-87 IN-1
local password policy 16-118 MAC Filtering 9-91 RADIUS 16-126 TACACS+ 16-124 TACACS+ Servers 9-89 users 16-118 Web Auth Configuration 9-92 AAA Local Net Users 9-89 AAA Mode 16-116 AAA override 11-32 AAA RADIUS Acct Servers 9-85 Fallback Parameters 9-86 AAA servers 11-31 AAA traps 11-134 absolute 19-2 Access Control List Rules 9-99 Access Control Lists configuring 9-98 access control list template 11-87 access control list templates 11-80 access mode 9-158 access point configuring 11-68 configuring for hybrid REAP 13-9 credentials 9-154 friendly 11-94 access point authentication and MFP templates 11-72 access point authorization template 11-68 access point icons 5-17 access point load avoiding 11-101 Access Point Password Global 9-59 access point positions changing with import or export of file 5-56, 5-57 Access Points Cisco APs configuring 9-111 detecting 6-110 disabling ineligible 9-166 Monitoring overview 6-23 radio utilization 6-33 Tx power and channel 6-33 access points configuring 9-166 configuring for LOMM 9-185 converting to LWAPP C-2 embedded 1-7 positioning 5-56 searching 2-38, 9-188 access points, adding to maps 5-48 to 5-53 access point threats 3-9 access point threats or attacks 3-9 Access Point Timer Settings 9-63 access point traps 11-134 Account creating 7-21 ACL configuring 9-98 Rules 9-99 template 11-80 ACL IP group details 11-81 ACL Protocol Groups configuring 11-85 ACL template 11-87 configuring 11-87 ACS server adding WCS to 16-41 ACS View Server credentials 9-222 ACS View Servers configure 9-221 ACS view server tab 10-28 active interferer count per channel 9-195 active interferers 9-194 IN-2
active interferers count chart 9-195 Active Sessions 16-124 location server 12-24 active sessions monitoring 7-5 adaptive scan threshold 11-106 adaptive wips alarm report 15-139, 15-141, 15-146, 15-155 adaptive wips top 10 APs report 15-143 add config groups 8-20 add group members 8-10 Adding location server 12-9 MSE 12-5 adding a spectrum expert 9-193 adding autonomous access points by CSV file 9-162 by device information 9-162 adding guest user accounts 7-13 adding IOS access points 9-161 by device information 9-162 adding launch points for Google Earth 19-7 Adding System Interfaces 9-38 adding templates from config group 8-23 adding WCS as TACACS+ server 16-42 Adhoc Rogue alarm details 6-108 Alarms overview 6-103 Events details 6-115 overview 6-114 monitoring alarms 6-103 Adhoc Rogues overview 6-88 adhoc rogues 2-26, 3-7 adhoc rogues report 15-149 adjusted link metric 5-82 Administration 18-1 location server 12-20 administration menu 2-30 Administrative Tools overview 1-14 advanced debug 17-7 advanced options 5-104 Advanced Parameters location server 12-25 advanced search 2-35, 6-106 Advanced tab on WLAN template 11-34 age out dual band 9-117 age out suppression 9-117 aggregated historical data 16-71 Aggressive Load Balancing 9-29 aggressive load balancing 9-114 Aironet IE 9-71, 11-35 Airopeek configuring 9-112 Alarm details 6-87 alarm 6-80 alarm cleanup options 16-62 alarm counts for access points 6-83 for controllers 6-83 for coverage hole 6-83 for malicious APs 6-83 for mesh links 6-83 for mobility 6-83 for security 6-83 for unclassified APs 6-83 for WCS failures 6-83 alarm dashboard 6-80 alarm display options 16-63 alarm indicator 6-80 Alarms acknowledging 6-121 Adhoc Rogue IN-3
details 6-108 overview 6-103 assigning 6-120 cleaning 6-120 deleting 6-120 email notifications 6-116 monitoring 6-1 Rogue AP details 6-96 Rogue APs 6-89 unassigning 6-120 working with 6-120 alarms 14-1 assigning 3-24 clearing 3-24 config audit 17-21 deleting 3-24 searching 2-37 unassigning 3-24 alarm severity configuring 6-84 alarm summary 2-33 alarm trigger threshold 11-73 alarm warning 6-121 all groups window 16-43 allow AAA override 9-70 alternate parent report 15-97 altitude 19-2 altitude mode 19-2 anonymous provision 11-60 anonymous provisioning 11-60 AP/MSE Authorization configuring 9-91 AP attack details 2-20 AP authentication template 11-72 AP Authentication and MFP configuring 9-110 AP authorization template 11-68 AP Config export 9-176 AP Failover Priority 9-27 AP failover priority setting 9-154 AP join taken time 10-7 AP load avoiding 11-101 AP Location data 5-54 AP manager IP 11-157 applying CLI commands 11-140 applying config groups 8-23 AP policies 3-39 AP policies template 11-90 AP Profile Status access points 6-33 AP profile status report 15-71 APs 802.11 Counters 6-33 AP Profile Status 6-33 autonomous templates 11-152 configuration templates 11-143 copy and replace 9-186 Coverage (RSSI) 6-30 Coverage (SNR) 6-30 details 6-34 CDP Neighbors 6-40 Current Associated Clients 6-40 general 6-34 interfaces 6-39 Dynamic Power Control 6-28 Edit View 6-25 Export AP config 9-176 Generate Report 6-26 Interference 6-29 lightweight templates 11-143 IN-4
lightweight access point template 11-143 monitor overview 6-23 Noise 6-29 Radio details 6-41 radio 9-176 remove unassociated 9-186 TSM 6-33 UpTime 6-30 Voice Statistics 6-31 Voice TSM Reports 6-32 Voice TSM Table 6-31 APs not assigned to maps 2-19 AP Status Report Scheduled Task 9-204 AP Template tasks 9-204 AP Template Task delete 9-205 enable, disable 9-204 history 9-205 modify 9-204 AP threats and attacks 10-7 AP Timer Settings 9-63 AP up time 5-88, 6-50 AP uptime 2-26 AP Username Password Controller Templates 11-10 asset matching criteria 12-66 assigning location presence 5-31 assigning virtual domains 7-19, 16-121 association request failures 5-95, 6-54 association request success 5-95, 6-54 association request timeouts 5-95, 6-54 attacks access points 3-9 attacks detected 3-9 AUDIT_STATUS_DIFFERENCE 14-54 auditing config groups 8-24 auditing H-REAP groups 13-16 Audit Mode basic audit 16-64 template based audit 16-64 Audit Now 9-19 audit report for alarms 6-88, 12-71 audit reports configuring 9-188 audit status 5-91 viewing for access points 9-188 audit trail viewing 7-10 Authentication Priority configuring 9-151 authentication priority template 11-139 authentication process Hybrid REAP 13-2 authentication request failures 5-95, 6-54 authentication request success 5-95, 6-54 authentication request timeout 5-95, 6-54 auto key generation 11-43 automated upgrade 4-15 automatic backups, scheduling 4-9 automatic client exclusion 11-36 automatic client troubleshooting 10-21, 16-66 autonomous access points adding 9-161 adding by CSV file 9-162 downloading images 9-164 upgrading 9-164 viewing 9-163 Autonomous AP Migration Templates edit 11-155 autonomous AP images downloading 9-175 Autonomous APs IN-5
template new 11-152 templates 11-152 autonomous to lightweight migration 9-161 autonomous to LWAPP migration support 9-161 auto provisioning filter editing 16-53 auto refresh 5-108, 5-121 avoid access point load 11-101 avoid Cisco AP load 11-101 avoid foreign AP interference 11-101 avoid non-802.11 noise 11-101 B background scanning 9-55 on mesh configuration 11-130 on templates 11-130 background scanning in mesh networks described 9-53 to 9-55 scenarios 9-54 Background Scan parameter 9-56 backhaul interface 5-93, 6-52 backing up the WCS database on Linux 4-11 on Windows 4-10 Backup location server 12-35 backup and restore license B-4 band selection 9-115 battery level condition type 12-65 best practices A-1 bridge group name 5-93, 6-52 Bridging link information 5-82, 5-98 bridging link information 5-82, 5-98 bridging mesh statistics 5-93, 6-52 broadcast deauthentication frame signatures 3-42 bronze 11-34 bronze queue 5-95, 6-53 buildings adding to WCS database 5-33 busiest APs report 15-73 busiest client report 15-24 C CA Certificate configuring 9-101 CA certificates 4-5 calculating access point requirements 5-102 calibrating client 11-142 CAS 12-1 cascade reboot 8-25 CDP Interface Neighbors controller ports monitor 6-11 certificate signing request 3-52 change order buttons 15-8 changing station role root mode 9-165 channel bonding configuring 9-123 channel width monitoring 6-55 checking the status of WCS on Linux 4-7 on Windows 4-6 Chokepoint adding to WCS database 9-197 adding to WCS map 9-198 removing from WCS 9-199 removing from WCS map 9-199 chokepoint condition type 12-65 Chokepoints 6-67 new 9-197 chokepoints IN-6
positioning 5-56 CIDR notation 11-81 Cisco Access Points configuring 9-111 Cisco Adaptive wips alarms 6-117 Cisco Aironet 1510 Access Points in Mesh network 9-53 Cisco AP load avoiding 11-101 Cisco Discovery Protocol 9-171 Cisco WCS base B-1 Cisco wired IPS events 2-27 Cisco Wireless LAN Solution overview 1-1 to 1-2 security solutions 3-1 to 3-37 civic address 5-32 CKIP 9-68 clamped to ground 19-2 classification rule 11-91 Classifying Rogue APs 6-93 clear config 9-174 CLI template 11-139 CLI commands applying to template 11-140 Client disable 10-36 remove 10-37 Sessions Report 10-38 client 10-37 calibrating 11-142 managing 10-1 client alarm summary 10-5 client association failure 10-5 client authentication failure 10-5 client authentication provision 11-60 client authentication type distribution 10-6 client count 2-19, 10-4 client count report 15-26 client detail page 10-10 Client Details Association History 10-18 CCXv5 Information 10-19 Event Information 10-19 Location Information 10-19 Statistics 10-18 client details retrieving from access point page 10-21 client devices connecting to WLANs 13-12 client distribution 10-3 client excluded 10-5 client exclusion 9-72, 11-36 happening automatically 11-36 Client Exclusion Policies configuring 9-105 client exclusion policies 11-70 template 11-70 client exclusion policies template 11-70 Client Location current map 10-38 recent map 10-37 client MFP 3-39 client protocol distribution 10-3 client related traps 11-133 client reports 15-23 clients searching 2-40 clients detected by location server 2-27 client security events 2-27 client sessions report 15-29 Client Summary filtering 10-11 client summary report 15-33 client tab 2-20, 10-2 client tab dashboard 10-22 client traffic 10-6 IN-7
client troubleshooting automatic 16-66 enabling 10-21 client WEP key decryption error 10-5 client WPA MIC error counter activated 10-5 CLI Sessions monitor 6-6 CLI sessions 16-71, 16-90 color coding of obstacles 5-74 command buttons 2-32 compliance reports 15-48 component options icon 2-29 condition type for event definitions 12-65 config audit 17-20 config audit alarms 17-21 config group adding controllers 8-22 adding templates 8-23 configuring 8-21 downloading IDS signatures 8-27 downloading sw to controllers 8-26 removing controllers 8-22 removing templates 8-23 config group audits 8-24 config groups applying 8-23 auditing 8-24 creating 8-19 downloading customized webauth 8-27 rebooting 8-25 reporting 8-26 Config Group Task delete 9-207 enable,disable 9-206 history 9-207 Config Group Tasks 9-205 modify 9-206 Configuration scheduled 9-203 configuration audit report 15-49 Configuration Backup 16-22 Configure Access Points Radio 9-176 Configure APs copy and replace 9-186 Configure Controllers 802.11 General Parameters 9-113 802.11a/n Parameters 9-118 802.11h 9-129 Dynamic Channel Assignment 9-122 EDCA 9-128 General 9-119 High Throughput 9-130 Media 9-125, 9-136 Roaming 9-128 RRM Intervals 9-121 RRM Radio Grouping 9-125 RRM Thresholds 9-129 802.11b/g/n Parameters 9-131 EDCA 9-138 General 9-132 High Throughput 9-140 Roaming 9-139 RRM DCA List 9-135 RRM Radio Grouping 9-135 RRM Thresholds 9-133 802.11 Parameters 9-83, 9-113 Access Control List Rules 9-99 Access Points Cisco APs 9-111 Download Customized Web Auth Bundle 9-36 Download IDS signatures 9-36 Downloading Configuration 9-34 Downloading Software 9-34 IN-8
Download Web Admin Certificate 9-35 H-REAP 9-80 H-REAP AP Groups 9-80 Management 9-145 Authentication Priority 9-151 Local Management Users 9-151 Syslog 9-149 Syslog Servers 9-149 Telnet SSH 9-148 Trap Receivers 9-145 Web Admin 9-149 Mesh 9-141 Ports 9-144 Rebooting Controllers 9-7 Removing Controllers 9-7 Security AAA 9-84 AAA AP authorization 9-91 AAA Local Net Users 9-89 AAA RADIUS Acct Servers 9-85 AAA RADIUS Auth Servers 9-84 Access Control Lists 9-98 AP Authentication and MFP 9-110 CA Certificate 9-101 Client Exclusion Policies 9-105 CPU Access Control List 9-100 Custom Signatures 9-109 Disabled Clients 9-98 file encryption 9-83 ID Certificate 9-102 IDS Sensor List 9-101 Local EAP 9-94 Local EAP General 9-94 Local EAP general EAP-FAST parameters 9-97 Local EAP General Network Users Priority 9-97 Local EAP Profiles 9-96 Rogue Policies 9-104 Standard Signatures 9-106 User Login Policies 9-98 Web Auth Certificate 9-103 Wireless Protection 9-103 System DHCP Scopes 9-57 Mobility Groups 9-50 Network Route 9-49 Network Time Protocol 9-53 QoS Profiles 9-56 Spanning Tree Protocol 9-50 System Commands 9-30 System Interfaces 9-37 Uploading Files from Controllers 9-33 configure menu 2-30 Configuring ACL Protocol Groups 11-85 Wired Guest Access 9-45 Configuring 802.3 Bridging 9-28 configuring access points 9-166 configuring a client exclusion policy template 11-92 configuring a CPU ACL template 11-87 configuring a high throughput template 11-108 configuring alarm severity 6-84, 14-64 configuring a local EAP general template 11-55 configuring a local EAP profile template 11-56 configuring a manually disabled client template 11-69 configuring a mesh template 11-108, 11-129 configuring an 802.11h template 11-107 configuring an access point 11-68 configuring an access point for hybrid REAP 13-9 configuring an EAP-FAST template 11-58 configuring an RRM interval template 11-112 configuring an RRM threshold template 11-107 configuring a policy name template 11-99 configuring a roaming parameters template 11-104 configuring a TACACS+ server template 11-50 configuring a trusted AP policies template 11-90 configuring a user authentication priority template 11-139 configuring a user login policies template 11-65 configuring config group 8-20 IN-9
configuring controller WLANs 9-64 configuring EDCA parameters through a template 11-104 Configuring Existing Controllers 9-21 configuring firewall for WCS 3-38 configuring global credentials 9-154 configuring global email parameters 16-74 configuring H-REAP AP groups 11-38 configuring Hybrid REAP 13-1 configuring hybrid REAP access point groups 13-12 configuring Hybrid-REAP groups 13-14 Configuring IDS 3-41 Configuring IDS signatures 3-41 configuring IDS signatures 3-41 configuring intrusion detection systems 3-41 configuring multiple country codes 8-16 configuring search results 2-47 configuring spectrum experts 9-193 configuring template ACL 11-69 for rogue AP rule groups 11-92 configuring templates 802.11b/g RRM interval 11-112 access point authentication and MFP 11-90 access point authorization 11-68 file encryption 11-45 guest users 11-63 known rogue access point 11-107 local management user 11-137 MAC filter 11-66 QoS 11-16 RADIUS accounting 11-49 RADIUS authentication 11-46 syslog 11-136 Telnet SSH 11-135 traffic stream metrics QoS 11-20 trap control 11-132 WLAN 11-22 configuring the controller for hybrid REAP 13-6 configuring the switch for hybrid REAP 13-5 Configuring User Roles 9-58 connecting client devices to WLANs 13-12 Connecting to the Guest WLAN 3-52 content customizing 2-25 context aware configuring 12-74 context aware planning 12-69 context-aware software 12-1 Controller General System Parameters 9-24 Multicast Mode 9-62 Template Launch Pad 11-1 Uploading configuration/logs 9-33 controller configuring for hybrid REAP 13-6 controller CPU utilization 2-27 controller details 11-157 Controller DHCP 9-61 configuring 9-61 controller license information 16-10 controller licenses managing 16-101 searching 2-46 controller memory utilization 2-27 Controllers Adding an Interface 9-38 configuring existing 9-21 DHCP Stats monitor 6-7 Edit View 6-3 monitor Summary 6-4 monitoring 6-1 search 6-2 System Parameters monitor 6-3 IN-10
controllers adding 9-4 adding to WCS database 4-2 searching 2-39 specified 1-1 Controller Security monitor 6-12 Controller Templates 802.11b/g/n Parameters 11-116 Adding 11-2 applying 11-2 AP Username Password 11-10 delete 11-2 managing, creating 11-3 SNMP Community 11-8 Viewing 9-18 Voice 802.11b/g/n 9-118, 11-98, 11-102, 11-119 Controller Time and Date 9-33 controller upgrade settings 16-69, 16-71, 16-91 Controller User Roles 9-58 controller WLANs configuring 9-64 converting WLSE autonomous to WCS controller C-1 Country Codes setting multiple 9-113 country codes multiple 8-16 Coverage (RSSI) access points 6-30 Coverage (SNR) access points 6-30 coverage hole 6-62 coverage hole reports 15-123 coverage holes 2-19 CPU access control template 11-87 CPU Access Control Lists configuring 9-100 CPU ACL configuring 9-100 Cranite 9-67 Creating Account 7-21 Creating a Lobby Ambassador Account 7-21 Creating guest user accounts 7-11 creating guest user accounts 7-11 creating placemarks 19-3 creating virtual domains 18-2 CSR 3-52 CSV file 9-162 method for adding autonomous access points 9-162 CSV files 19-4 Current building delete 5-35 edit map 5-35 currently logged guest users 2-28 Custom and Standard Signatures Global Settings 9-108 customized webauth downloading 8-27 Customized Web Auth Bundle download 9-36 Customized WebAuth Bundles downloads 9-14 Customized Web authentication 3-50 customized web authentication downloading 11-76 customize report 15-7 customizing content on WCS Home page 2-25 customizing tabs on WCS Home page 2-23 Custom signature 3-47 Custom Signatures configuring 9-109 D data collection for RFID tag 11-142 IN-11
DCA 11-114, 11-127 802.11a/n 9-122 debug commands A-4 debug strategy A-4, D-11 default lobby ambassdor credentials editing 7-10, 7-17 Deleting MSE 12-6 deleting a license B-4 deleting a WLAN 9-75 deleting guest user templates 7-15 deleting WCS user accounts 7-4 designing a network 5-109 destination type for report 15-5 Detecting APs 6-110 details clients 10-39 device certificates 4-4 device information 9-162 method for adding autonomous access points 9-162 device reports 15-69 DHCP configuring 9-61 DHCP diagnostic test 10-30 DHCP Scopes configuring 9-57 DHCP server overriding 11-38 DHCP Stats controllers monitor 6-7 diagnostic channel A-1, D-1 diagnostic test 802.11 association 10-31 802.1X authentication 10-31 DHCP 10-30 DNS ping 10-31 DNS resolution 10-31 IP connectivity 10-30 profile redirect 10-31 Disable client 10-36 Disabled Clients manual 9-98 disabled clients template 11-69 disabling IDS signatures 3-46 Discovering Templates from Controllers 9-18 Distance condition type 12-65 DNS ping diagnostic test 10-31 DNS resoltion diagnostic test 10-31 Download Web Admin Certificate 9-150 Web Auth Certificate 9-150 downloading a customized web authentication page 11-76 downloading autonomous AP images 9-175 Downloading Configurations to Controllers 9-34 downloading customized webauth 8-27 Downloading customized web authentication 3-50 Downloading IDS signatures 3-45 downloading IDS signatures 3-45 from your config group 8-27 downloading images to autonomous access points 9-164 Downloading Signature Files 9-107 Downloading Software controllers 9-34 downloading sw to controllers after adding config group 8-26 downloading vendor CA certificates 4-5 downloading vendor device certificates 4-4 Downloads Customized WebAuth Bundles 9-14 Vendor CA Certificates 9-16 Vendor Device Certificate 9-15 downstream delay 11-21 IN-12
downstream packet loss rate 11-21 drawing polygon areas using map editor 5-72 DTIM 11-100 Dynamic Channel Assignment 802.11a/n 9-122 dynamic interface 11-14 E EAP-FAST template 11-59 EAP-FAST template 11-58 EAPOL flood signature 3-43 EDCA 802.11b/g/n Parameters 9-138 EDCA parameter template 11-104 EDCA parameters configuring through a template 11-104 edit content 2-26 edit contents 2-26 editing saved reports 15-13 editing scheduled run details 15-11 Editing signature parameters 3-49 editing the default lobby ambassador credentials 7-10, 7-17 edit link 5-71 edit links home page 2-23 edit location presence information 5-31 Edit View access points 6-25 alarms 6-85 controllers 6-3 general 2-47 egress interface 9-66 email configuring parameters 16-73 Email Notifications alarms 6-116 embedded access points 1-7 emergency condition type 12-65 enable background audit 8-20 enable enforcement 8-20 enable log module 16-57 enabling 10-37 enabling audit trails for guest user activities 7-11 enabling IDS signatures 3-46 Enabling Web login 3-49 enabling Web login 3-49 end user license agreement B-7 to B-12 Ethernet bridging 9-156 Ethernet Switch credentials 9-190 remove 9-192 Ethernet Switches configure 9-212 Ethernet VLAN tagging guidelines 9-157 evaluation license for controller 16-11 for MSE 16-13 event history 6-88, 10-27, 12-71 event notification 1-5 Events Adhoc Rogue 6-128 details 6-115 overview 6-114 monitoring 6-124 overview 6-124 Pre Coverage Holes 6-129 Rogue Alarms 6-111 Rogue AP details 6-112 Rogue APs 6-127 wips 6-129 working with 6-134 IN-13
events searching 2-42 exclude device list 16-92 excluded packets 5-94, 6-52 exclude switch trunk ports 16-92 exclude vendor list 16-92 executive summary report 15-116 Export Asset Information location server 12-45 exporting a file 5-56 to change access point position 5-56, 5-57 export task list 16-43 extend to ground 19-2 extension license for controller 16-11 for MSE 16-13 extracting task list 16-48 F Factory Defaults restoring 9-32 failover mechanism 16-6 Failover Priority 9-27 feature of WCS license 16-9 feature license B-2 File Encryption controller 9-83 file encryption template 11-45 filter editing current auto provisioning 16-53 filtering using to modify maps 5-98 filtering saved reports 15-12 filtering scheduled run results 15-10 firewall, configuring for WCS 3-38 Floor Areas delete 5-53 edit 5-53 Floor Plan Editor 1-14 foreign access point interference avoiding 11-101 foreign AP interference avoiding 11-101 Frame type 3-47 friendly access point template 11-94 friendly AP template 11-94 friendly rogue 11-90 friendly rogue access points 3-8 friendly rogue APs 2-27 FTP turning on and off 16-82 G General Properties Location Server 12-20 general tab home page 2-19 general templates configuring 11-4 generating migration analysis report 9-165 geographical coordinates 19-1 Global AP Password configuring 9-59 global credentials configuring 9-154 Global Settings Standard and Custom Signatures 9-108 Global settings for standard and custom signatures 3-49 Global SSID Group add 9-218 delete 9-219 edit 9-219 gold 11-34 IN-14
gold queue 5-94, 6-53 Google Earth adding launch points 19-7 Google Earth coordinates 19-2 Google Earth maps 19-1 Google KML or CSV importing into WCS 19-5 GPS markers 5-32 grace period license for controller 16-11 groups for hybrid-reap 13-14 for rogue access point rules 11-92 group setup window on ACS server 16-44 GUEST_USER_ADDED 14-51 GUEST_USER_AUTHENTICATED 14-52 guest account settings 16-71 guest accounts status report 15-89 guest association report 15-91 guest count report 15-92 guest reports 15-89 guest user template 11-63 guest user account scheduling 7-15 Guest user accounts creating 7-11 guest user accounts adding 7-13 creating 7-11 managing 7-13 guest user details emailing 7-16 print 7-16 Guest Users monitoring 6-16 guest users currently logged 2-28 guest user sessions report 15-94 guest user templates 11-63 Guest WLAN connecting 3-52 guidelines for Ethernet VLAN tagging 9-157 guidelines for using the map editor 5-19 H heater status 5-88, 6-50 heat map described 5-52 Help Menu 1-13 help menu 2-30 hierarchy of mesh network 5-96 Hierarchy of Mesh parent to child 5-99 hierarchy of mesh parent to child 5-99 High Throughput 802.11a/n 9-130 802.11b/g/n Parameters 9-140 high throughput template 11-108 high throughput template configuring 11-108 historical report type 15-1 History Parameters location server 12-43 Home Page 2-18 customizing tabs 2-19 Home page customizing content 2-25 customizing tabs 2-23 H-REAP AP Groups configuring 9-80 H-REAP AP groups configuring 11-41 configuring template 11-41 H-REAP configuration tab 11-42 IN-15
H-REAP Group auditing 9-83 H-REAP groups auditing 13-16 H-REAP local switching 9-71 H-REAP Parameters 9-80 H-REAP Users 11-43 HTTP turning on and off 16-82 Hybrid REAP configuring 13-1 hybrid REAP bandwidth restriction 9-71, 11-35, 13-3 hybrid REAP access point groups 13-12 hybrid-reap groups 13-13 Hybrid REAP local switching 11-35 hysteresis 11-106 I ID Certificate configuring 9-102 identical audit status 5-91 IDS 3-41 configuring 3-41 IDS Sensor List configuring 9-101 IDS sensors 3-41 IDS Signatures configuring 9-106 download 9-36 IDS signatures 3-41 disabling 3-46 downloading 3-45 downloading from config group 8-27 enabling 3-46 uploading 3-44 images downloading to autonomous access points 9-164 Import Asset Information location server 12-44 importing a file 5-56 to change access point position 5-56, 5-57 importing coordinates as CSV file 19-4 into Google Earth 19-2 importing Google KML or CSV into WCS 19-5 Import map 5-54 In/Out condition type 12-65 information elements Aironet 11-35 infrastructure MFP 3-39 ingress interface 9-66 Inspect Location Readiness 5-78 Inspect VoWLAN Readiness 5-79 installer using to upgrade 4-16 installing a license B-4 installing WCS for WLSE conversion C-2 insufficient memory 5-94, 6-52 interface group 11-19 Interferers summary 6-72, 6-74 interferers summary 9-194 inter-subnet roaming 8-4 Intrusion Detection Systems 3-41 intrusion detection systems 3-41 invalid association request 5-96, 6-54 invalid reassociation request 5-96, 6-55 inventory detail status 2-19 inventory reports 15-48, 15-78 inventory status 2-27 IOS access points adding 9-161 adding by device information 9-162 IN-16
IOSAP_DOWN 14-53 IOSAP_LINK_DOWN 14-52 IOSAP_LINK_UP 14-52 IOSAP_UP 14-53 IP connectivity diagnostic test 10-30 K KEK key encryption key 11-48 key wrap 11-48 KML file 19-2 L LAG mode 11-6 Latest Network Audit Report 9-20 latitude 19-2 Layer 1 security solutions 3-2 Layer 2 11-25 Layer 2 security solutions 3-2 Layer 3 11-29 Layer 3 security solutions 3-2 Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-37 LBS authorization 11-68 template 11-68 LDAP Servers 9-87 LDAP servers 9-70 template 11-52 LEAP authentication requirements 8-8 legacy syslog template 11-136 legacy syslog template 11-136 license backup and restore B-4 license agreement B-7 to B-12 license installation B-4 license management 16-102 licenses B-1 license types B-1 licensing on WLSE network management C-4 Lightweight AP Protocol Transport Mode 9-28 limitations for high reliability 16-95 Link Aggregation 9-30 link aggregation (LAG) guidelines 13-4 link metric adjusted 5-82 unadjusted 5-82 link SNR 5-82 link stats report 15-98 Load access points 6-27 load 5-108 load balancing 9-114 Lobby Ambassador account 7-21 creating account 7-21 Lobby ambassador 7-11 Lobby Ambassador Account creating 7-21 editing 7-22 lobby ambassador defaults setting 7-7 local authentication for hybrid-reap groups 13-14 Local EAP 9-94 General EAP-FAST Parameters 9-97 General Network Users Priority 9-97 General Parameters 9-94 Profiles 9-96 local EAP authorization 9-70 Local EAP check box 11-32 local EAP general template 11-55 IN-17
local EAP general template 11-55 local EAP profile template 11-56 Local Management Users configuring 9-151 local management users template 11-138 local management user template 11-138, 11-139 Local Net Users configuring 9-89 local net users template 11-62 local net users template 11-61 Local Password Policy 16-118 local switching Hybrid REAP 11-35 Location calibration 1-15 location servers 9-223 notifications 12-58 notification settings 12-59 notifications summary 12-58 synchronize servers 12-10 location appliance functionality 4-2 Location Appliances 1-15 location appliances relationship with WCS Location 1-5 location change condition type 12-65 location configuration template 11-141 Location History clients 10-39 location menu 2-30 location optimized monitor mode 9-169 Location Parameters location server 12-53 location presence assigning 5-31 Location Readiness 5-78 Location Server active sessions 12-24 administration 12-20 advanced parameters 12-25 backup 12-35 export asset information 12-45 general properties 12-20 history parameters 12-43 import asset information 12-44 location parameters 12-53 logs 12-27 maintenance 12-35 NMSP parameters 12-22 notification parameters 12-56 restore 12-36 server events 12-32 WCS alarms 12-33 WCS events 12-33 Location server adding 12-9 location server automatic backup 12-36 backup historical data 12-35 configuration clearing 12-27 reboot hardware 12-26 Location Servers 9-223 location upgrade B-2 log analysis 10-26 logging 16-18 logging into the WCS user interface 2-16 to 2-18 logging options 16-56 logging the lobby ambassador activities 7-10 login.html 3-50 login disclaimer 16-72 login policies template 11-65 log message levels 16-57 log modules enabling 16-57 IN-18
Logs location server 12-27 LOMM 9-169 configuring access point radios 9-185 longitude 19-3 long preambles, enabling for SpectraLink NetLink phones 4-5 LWAPP template edit 11-151 templates 11-143 Transport Mode 9-28 LWAPP migration 9-161 LWAPP template new 11-143 LWAPP uptime 2-27 M MAC Filtering configuring 9-91 MAC filtering 11-28 template 11-66 MAC filter template 11-66 MAC frequency 3-48 MAC information 3-48 MACK message authenticator code keys 11-48 mail server configuration 16-73 Maintenance location server 12-35 malformed neighbor packets 5-94, 6-52 malicious rogue 11-90 malicious rogue access points 3-5, 3-6 managed network security index 3-5 management frame flood signatures 3-43 Management Frame Protection 3-39 management frame protection 9-73, 11-72 Management Frame Protection Summary controllers monitor 6-14 management interface 11-7 Management Parameters configuring 9-145 management queue 5-95, 6-53 managing clients 10-1 managing controller licenses 16-101 managing current reports 15-9 managing MSE licenses 16-103 managing multiple WCSs 1-10 managing saved reports 15-11 managing virtual domains 18-7 managing WLAN schedules 9-76 mandatory data rates 11-101 manually disabled client template for 11-69 Manually Disabled Clients managing 9-98 manually disabled clients 2-20 Map Editor general notes and guidelines 5-19 map editor guidelines 5-19 guidelines for using 5-19 using to draw polygon areas 5-72 map editor functions 5-4 map properties editing 5-28 maps searching 2-44 using to monitor link stats 5-80 using to monitor mesh AP neighbors 5-85 map size 5-121 map view updating 5-99 Menu Bar 1-11 menu bar 2-29 IN-19
Mesh monitoring health 5-88 statistics for AP 5-92, 6-51 mesh access point neighbors monitoring 5-85 mesh access points monitoring 5-83 mesh alarms most recent 2-21 mesh configuration template 11-129 mesh link statistics 5-80 monitoring 5-80 mesh neighbors 5-86 mesh network monitoring using maps 5-80 mesh network hierarchy 5-96 mesh networks background scanning 9-53 monitoring 5-80 Mesh Parameters 9-141 mesh parent changing AP 2-27 mesh parent-child hierarchical view 5-11 mesh reports 15-97 mesh tab home page 2-21 mesh template configuring 11-129 Mesh tree viewing 5-96 mesh tree viewing 5-96 message integrity check information element 11-72 metrics in QoS 11-20 MFP 3-39, 9-73 for clients 3-40 MFP attacks 3-9 MFP client protection 11-38 MFP signature generation 11-38 MFP Summary controllers monitor 6-14 MFP templates 11-72 MIC IE 11-72 migration analysis running 9-165 migration analysis report generating 9-165 migration analysis summary viewing 11-156 Migration Templates Autonomous APs edit 11-155 minimum RSSI 11-106 Mirror Mode 10-37 mirror mode 9-170 mismatched audit status 5-91 mobile announce messages 8-8 Mobility 12-1 Mobility Stats monitor 6-17 service 12-1 mobility 8-1 Mobility Anchor Group Keep Alive Interval 9-30 mobility anchors 8-13, 9-77 Mobility Group Prerequisites 9-51 Mobility Groups configuring 9-50 Messaging 9-51 mobility groups 8-7 prerequisites 8-8 to 8-9 mobility groups, configuring 8-8 mobility scalability 8-12 Mobility Services 12-1 viewing 12-4 mobility services engine IN-20
deleting 12-6 Mobility Stats monitor 6-17 modifying a migration template 11-157 modifying map displays 5-98 using filters 5-98 Monitor Alarms 6-1 Events 6-124 Ports overview 6-8 Rogue AP Rules 6-15 Monitor Access Points details 6-34 edit view 6-25 load 6-27 radio type 802.11 MAC counters 6-48 on demand statistics 6-41 operational parameters 6-45 view alarms 6-49 view events 6-49 radio utilization 6-33 search 6-23 search results 6-24 Tx power and channel 6-33 Monitor Alarms details 6-87 edit view 6-85 Rogue 3-20 Monitor APs 802.11 Counters 6-33 AP Profile Status 6-33 Coverage (RSSI) 6-30 Coverage (SNR) 6-30 details CDP Neighbors 6-40 Current Associated Clients 6-40 general 6-34 interfaces 6-39 Dynamic Power Control 6-28 Interference 6-29 Noise 6-29 Radio details 6-41 TSM 6-33 UpTime 6-30 Voice Statistics 6-31 Voice TSM Reports 6-32 Voice TSM Table 6-31 Monitor Chokepoints 6-67 Monitor Client detecting APs details 10-39 disable 10-36 location history 10-39 present map 10-38 recent map 10-37 remove 10-37 roam reason 10-38 v5 statistics 10-33 voice metrics 10-39 Monitor Controllers 6-1 802.11a/n parameters 6-19 802.11a/n RRM Grouping 6-20 802.11a/n RRM Groups 6-22 802.11b/g/n parameters 6-21 CLI Sessions 6-6 ports general 6-8 spanning tree protocol 6-5 System summary 6-4 WLANs 6-8 Monitor Events Details 6-127 search 6-126 Monitoring IN-21
Guest Users 6-16 monitoring active sessions 7-6 monitoring channel width 6-55 monitoring mesh access point neighbors 5-85 using maps 5-85 monitoring mesh health 5-88, 6-55 monitoring mesh link statistics using maps 5-80 monitoring mesh networks using maps 5-80 monitoring neighboring channels 9-53 monitoring pre-coverage holes 6-62 monitoring rogue access point alarms 6-84 monitoring spectrum experts 9-193 monitor menu 2-29 monitor mode location optimized 9-169 Monitor Spectrum Experts 6-71 Monitor Tags 6-64 most recent AP alarms 2-27 most recent audit alarms 17-21 most recent client alarms 10-6 most recent mesh alarms 2-21 most recent rogue adhocs 3-7 most recent security alarms 2-20, 2-28 MSE adding 12-5 deleting 12-6 MSE authorization template 11-68 MSE license information 16-13 MSE licenses managing 16-103 multicast mobility mode 8-12 Multicast Mode controller 9-62 Multiple Country Codes setting 9-113 multiple country codes configuring 8-16 multiple syslog template 11-137 multiple syslog template 11-137 N N+1 redundancy 8-5 NAC Out-of-Band Integration 9-43 NAC support 9-72 NAT 8-11 Navigator 1-10 netmask 11-81 NetStumbler signature 3-43 network address translation 8-11 Network Audit Report latest 9-20 network design 5-109 network designs 12-10 network protection 3-41 Network Routes configuring 9-49 Network Summary page 2-17 network summary reports 15-114 Network Time Protocol configuring 9-53 network users priority template 11-60 network utilization reports 15-125 new rogue access points report 15-153 new search 5-71 NMSP Parameters location server 12-22 node hop count worst 2-21 node hops 5-94, 6-53 nodes report 15-101 noise avoiding non-802.11 types 11-101 IN-22
avoid non-802.11 11-101 non-802.11 noise avoiding 11-101 non-aggregated historical data 16-71 non-cisco ACS server for use with RADIUS 16-48 normal mode for Ethernet port 9-158 Notification Parameters location server 12-56 Notifications location 12-58 Notification Settings location 12-59 Notifications Summary location 12-58 NTP configuration 9-53 NTP server template 11-9, 11-13 null probe response signatures 3-43 O On Demand Statistics access points 6-41 onstacle color coding 5-74 Operational Parameters access points 6-45 OUI search 16-92 outdoor location creating with Google Earth 19-1 overview Cisco Wireless LAN Solution 1-1 to 1-2 WCS 1-2 P packet error rate worse 2-21 packet error rate link color 5-98 packet error statistics report 15-105 packet jitter 11-20 packet latency 11-20 packet loss 11-20 packet loss rate 11-21 packet queue statistics report 15-107 packet stats report 15-103 parent changes 5-94, 6-52 Passive Client 9-72 passthrough 11-30 PCI report 15-52 PEAP 11-58 peer-to-peer blocking 11-35 performance reports 15-119 permanent license for controller 16-11 for MSE 16-13 placemarks creating 19-3 placement of access points 5-54 planning mode 5-103 to calculate access point requirements 5-102 planning mode, calculating access point requirements 5-102 platinum 11-34 platinum queue 5-94, 6-53 PLR 11-21 POE status 5-91 policy manager solutions 3-2 polygon areas drawing with map editor 5-72 poor neighbor SNR 5-94, 6-52 Port Parameters configuring 9-144 Ports Monitor overview 6-8 monitor controllers 6-8 IN-23
positioning access points 5-56 positioning chokepoints 5-56 positioning Wi-Fi TDOA receivers 5-56 power injector settings 9-172 power-over-ethernet status 5-91 pre-coverage holes monitoring 6-62 Preferred Call 9-117 Prerequisites 2-1 Present Map clients 10-38 print guest user details 7-16 probe cycle count 9-116 Profile List 9-213 Profile editor 9-215 profile redirect diagnostic test 10-31 protection type 11-73 Q QoS 11-33 QoS Profiles configuring 9-56 QoS templates 11-16 queues silver, gold, platinum, bronze, management 5-94, 6-53 quick search 2-34 Quiet time 3-48 R Radio access points configuring 9-176 radio resource management 11-101 Radio Status scheduling and viewing 9-187 radio status scheduling 9-187 Radio Utilization access points 6-33 RADIUS 16-126 RADIUS Accounting controllers monitor 6-13 RADIUS accounting servers template 11-49 RADIUS accounting template 11-49 RADIUS and TACACS+ attributes virtual domains 7-20, 18-10 RADIUS Authentication controllers monitor 6-12 RADIUS authentication template 11-46, 11-47 RADIUS Auth Servers AAA RADIUS Auth Servers 9-84 RADIUS fallback template 11-51 RADIUS fallback mode 11-51 RADIUS servers 9-70 configuring 16-126 reachability status 9-193 Readiness location 5-78 VoWLAN 5-79 reassociation request failures 5-95, 6-54 reassociation request success 5-96, 6-54 reassociation request timeouts 5-95, 6-54 reauthentication request failures 5-96, 6-54 reauthentication request success 5-96, 6-54 reauthentication request timeout 5-96, 6-54 rebooting config groups 8-25 Rebooting Controllers 9-7 recent adhoc rogue alarms 3-9 recent alarms 2-27, 2-28 IN-24
recent coverage holes 2-19 Recent Map clients 10-37 recent rogue adhoc alarm 2-20 recent rogue alarms 2-27 recent rogue AP alarms 2-20, 3-9 recovering the WCS password 4-22 recurrence for report 15-5 refresh browser 5-109 refresh component icon 2-29 Refresh Config 9-17 refresh from network 5-108, 5-121 relative to ground 19-2 Remove APs 9-186 Remove Controllers 9-7 removing controllers from config group 8-22 removing templates from config group 8-23 report running new 15-3 report launch pad 15-2 Reports Rogue AP Events 15-157 reports scheduled runs 15-9 reset AP now 9-174 Restore location server 12-36 Restoring Factory Defaults 9-32 restoring WCS database in high availability environment 4-14 restoring WCS database on Linux 4-13 retain WCS value 8-25 Retrieving UDI 6-59 RF calibration model, creating 4-6 RF Calibration Models apply to maps 5-68 delete 5-69 RFID data collection 11-142 RF profile traps 11-134 RF update traps 11-134 Roaming 802.11b/g/n Parameters 9-139 roaming 8-1 roaming parameter template 11-105 roaming parameters template configuring 11-105 roaming time 11-20, 11-21 Roam Reason clients 10-38 rogue access point events report 15-159 rogue access point rule groups 11-92 rogue access point rules configuring a template 11-90 viewing or editing 9-190 rogue access points friendly 3-8 malicious 3-6 monitoring 3-10 solutions for 3-3 unclassified 3-7 rogue access points report 15-159 rogue adhoc alarm 2-20 rogue adhocs most recent 3-7 Rogue Alarm Events 6-111 Rogue AP alarm details 6-96, 6-112 alarms 6-89 containment 6-110 location 6-110 malicious 6-95 Rules monitor 6-15 tagging 6-110 rogue AP alarms 2-20 rogue AP detail summary 2-27 IN-25
Rogue AP Events report 15-157 rogue AP rule groups template 11-92 Rogue AP Rules configuring 9-105 details 6-16 rogue AP rules template 11-90 Rogue APs classification types 6-95 classifying 6-93 friendly 6-95 overview 6-88 unclassified 6-96 Rogue Client details 6-101 rogue clients searching 2-44 rogue detector 9-169 Rogue Devices detecting 6-89 rogue location discovery protocol 11-89 Rogue Policies configuring 9-104 rogue policies template 11-89 template for 11-89 role criteria 11-156 root mode changing from station role 9-165 routing state 5-93, 6-52 RRM DCA 802.11b/g/n Parameters 9-135 Radio Grouping 802.11b/g/n Parameters 9-135 RRM DCA 9-123 RRM Intervals 802.11a/n 9-121 802.11b/g/n Parameters 9-134 RRM intervals 11-107 template 11-112 RRM interval template configuring 11-108, 11-112 RRM Radio Grouping 802.11a/n 9-125 RRM threshold template 11-111 RRM Thresholds 802.11b/g/n Parameters 9-133 RRM threshold template configuring 11-111 RSSI legend 5-121 rules for rogue access point 11-90 viewing or editing for rogue access points 9-190 Running a link test 6-58 running a new report 15-3 running a saved report 15-13 running migration analysis 9-165 RX neighbor requests 5-94, 6-52 RX neighbor responses 5-94, 6-52 S Save Config to Flash 9-17 saved report running 15-13 saved reports editing 15-13 filtering 15-12 managing 15-11 saved searches 2-46, 5-71 scalability parameters 8-12 scan cycle period threshold 9-116 scan threshold 11-106 Scheduled Configuration 9-203 IN-26
Schedule details 9-166 scheduled run details editing 15-11 scheduled run results 15-9 filtering 15-10 Scheduled Task AP status report 9-204 schedules managing for WLANs 9-76 scheduling guest user account 7-15 scheduling radio status 9-187 Search access points 6-23 controller results 6-2 Events 6-126 overview 1-14 search feature 2-34 using for troubleshooting 10-22 searching clients 2-40 searching controller licenses 2-46 searching events 2-42 searching maps 2-44 searching rogue clients 2-44 searching SE-detected interferers 2-42 searching shunned clients 2-45 searching tags 2-45 searching Wi-Fi TDOA receivers 2-43 search results configuring 2-47 secondary WCS operation 16-6 Security AAA LDAP servers 9-87 TACACS+ Servers 9-89 Web Auth Configuration 9-92 AAA MAC Filtering 9-91 Local EAP 9-94 security alarms most recent 2-20 security color range 3-5 security configurations monitoring 6-116 security index 3-5 security mesh statistics 5-95, 6-53 Security Reports Rogue AP Events 15-157 security solutions 3-1 to 3-37 security summary 15-162 security tab home page 2-20 interpreting 3-4 security thermometer 3-5 SE-detected interferers searching 2-42 sending mobile announce messages 8-8 sensors viewing IDS types 3-41 Server Events location servers 12-32 status 12-32 set sorting buttons 15-8 Set Time controller 9-33 setting AP failover 9-154 Setting Controller Time and Date 9-33 setting multiple country codes 9-83 shunned clients searching 2-44 sidebar area 2-32 signature attacks summary 2-20 silver 11-34 silver queue 5-94, 6-53 Sniffer 11-144 Sniffer Feature 9-111 sniffer mode 9-169 SNMP authentication 11-133 SNMP Community controller templates 11-8 IN-27
SNR definition 5-98 SNR down 5-82 SNR link worst 2-21 SNR UP 5-82 SNR up 5-82 software downloading config groups to controllers 8-26 software, updating 4-3 Spanning Tree Protocol configuring 9-50 monitor controllers 6-5 SpectraLink NetLink phones, enabling long preambles 4-5 spectrum expert adding 9-193 spectrum expert details 9-195 Spectrum Experts 6-71 details 6-73 Interferers 6-72, 6-74 summary 6-72 spectrum experts configuring 9-193 monitoring 9-193 summary 9-194 SSID Group add 9-220 add from global list 9-220 add global 9-218 delete 9-221 delete global 9-219 edit 9-221 edit global 9-219 SSID Group List wips 9-218 SSID group list global 9-218 SSID groups wips 9-220 Standalone Building adding floor plan 5-46 Standard and Custom Signatures Global Settings 9-108 Standard signature 3-47 Standard Signature Parameters configuring 9-106 standard signatures 3-42 starting WCS on Linux 2-16 on Windows 2-15 static WEP 9-67 Static WEP-802.1X 9-67 station role changing to root mode 9-165 status, checking 4-7 Status Report scheduled task 9-206 status schedules managing for WLANs 9-76 stopping WCS on Linux 4-9 on Windows 4-7 stranded APs report 15-109 supplicant credentials for AP 802.1X 11-11 supported Cisco WLSE management stations C-2 supported data rates 11-101 Switch credentials 9-190 remove 9-192 switch configuring for hybrid REAP 13-5 Switches ethernet 9-212 Switch Port Tracing Details 16-93 Troubleshooting 16-93 symmetric mobility tunneling 11-7 IN-28
symmetric tunneling 8-5 Synchronize servers location 12-10 Syslog configuring individual controller 9-149 Individual controller 9-149 multiple servers 9-149 syslog templates 11-136, 11-137 System General Properties 9-24 System Commands controller 9-30 System Interfaces Controllers 9-37 System parameters controllers monitor 6-3 System requirements 2-2 T TACACS+ 16-124 TACACS+ server configuring a template for 11-54 template 11-54 tagged packets 9-160 Tags 6-64 tags searching 2-45 Task configuration backup 16-22 Telnet SSH template 11-132 Telnet SSH Parameters configuring 9-148 Telnet SSH templates 11-135 temperature 5-88, 6-50 template configuring for rogue AP rules 11-90 template for configuring network user credentials 11-60 Template Launch Pad overview 11-1 Templates AP Configuration 11-143 delete 11-2 test analysis tab 10-30 TFTP turning on and off 16-82 TFTP details 11-157 TFTP Server adding 9-223 TFTP server 3-44 TFTP Servers configure 9-222 delete 9-223 thermometer color range 3-5 threats access points 3-9 throughput report 15-38 tilt 19-2 Timer Setting AP 9-63 tools menu 2-30 top APs by client count 10-3 total APs not assigned to maps 2-19 total interferer count 9-195 total mismatched controllers 17-21 TPC 11-115, 11-128 trace 16-60 traffic indicator message 11-100 Traffic Stream Metrics access points 6-33 traffic stream metrics QoS status 11-21 traffic stream metrics QoS template 11-20 traffic stream metrics report 15-127 transition time 11-107 Transport Mode LWAPP 9-28 IN-29
transport types 12-67 trap 802.11 security 11-134 Trap Control configuring 9-146 trap control template 11-132 trap control templates 11-132 trap receiver template 11-131 Trap Receivers configuring 9-145 trap receiver template 11-131 traps AAA 11-134 access point 11-134 client related 11-133 RF profile 11-134 RF update 11-134 unsupported 14-63 traps added in 2.1 14-22 traps added in 2.2 14-26 traps added in 3.0 14-29 traps added in 3.1 14-31 traps added in 3.2 14-35 traps added in 4.0 14-36 traps added in 4.0.96.0 14-42 traps added in 4.1 14-44, 14-51 traps added in release 6.0 14-59 traps added in release 7.0 14-64 trend report type 15-1 Troubleshooting Switch Port Tracing 16-93 troubleshooting A-1, D-1 using logging options 16-60 troubleshooting voice RF coverage 5-108 trunk mode 9-158 trusted AP policies template for 11-90 trusted AP policies template 11-90 TSM access points 6-33 tunneling 8-5 TX neighbor requests 5-94, 6-52 TX neighbor responses 5-94, 6-52 Tx Power and Channel access points 6-33 Tx power and channel report 15-130 type of WCS license 16-10 U UDI retrieving on controllers and access points 6-59 unadjusted link metric 5-82 unclassified rogue 11-90 unclassified rogue access points 3-7 unclassified rogue APs 2-28 understanding virtual domains 18-10 uninstalling WCS on Linux 4-15 on Windows 4-14 unique clients report 15-44 unique device identifier 6-59 unknown association requests 5-96, 6-55 unknown reassociation request 5-96, 6-55 untagged packets 9-160 Update map view 5-99 update map view 5-99 updating system software 4-3 upgrade settings for controller 16-69 upgrading autonomous access points 9-164 upgrading the network 4-21 upgrading to Linux 4 during WLSE conversion C-3 upgrading WCS IN-30
in high availability environment 4-21 on Linux 4-20 on Windows 4-20 Uploading IDS signatures 3-44 uploading IDS signatures 3-44 Uploading Signature Files 9-107 upstream delay 11-21 upstream packet loss rate 11-21 UpTime access points 6-30 uptime reports 15-85 User accounts for guest 7-11 user accounts for guest 7-11 user authentication priority template configuring 11-139 user credential retrieval priority 11-60 user details emailing 7-16 printing 7-16 User Interface 2-29 Menu Bar 1-11 User Login Policies configuring 9-98 user login policies configuring a template 11-65 template 11-65 User Preferences 7-1, 16-7 user preferences 16-99 User Roles configuring 9-58 Users 16-118 using Edit View for alarms 6-84 using filtering 5-82, 5-98 using logging for troubleshooting 16-60 using maps to monitor mesh AP neighbors 5-85 to monitor mesh link statistics 5-80 using maps to monitor mesh networks 5-80 using planning mode 5-72 using search 6-85 using template ACL 11-87 for friendly access point 11-94 using templates 802.11b/g RRM interval 11-108, 11-112 802.11b/g RRM threshold 11-111 access point authentication & MFP 11-72 access point authorization 11-68 file encryption 11-45 for legacy syslog 11-136 for multiple syslog 11-137 guest users 11-63 local management user 11-138, 11-139 local net users 11-61 MAC filter 11-66 NTP server 11-9, 11-13 password policy 11-78 QoS 11-16 RADIUS accounting 11-49 RADIUS authentication 11-46 syslog 11-136, 11-137 Telnet SSH 11-135 traffic stream metrics QoS 11-20 trap control 11-132 trap receiver 11-131 web authentication 11-73 WLAN 11-22 using the installer to upgrade 4-16 utilization reports 15-86 V V5 client statistics 15-47 V5 Statistics IN-31