- Preface
- Chapter 1: Cisco NCS Overview
- Chapter 2: Getting Started
- Chapter 3: Configuring Security Solutions
- Chapter 4: Performing Maintenance Operations
- Chapter 5: Monitoring Devices
- Chapter 6: Monitoring Maps
- Chapter 7: Managing NCS User Accounts
- Chapter 8: Configuring Mobility Groups
- Chapter 9: Configuring Devices
- Chapter 10: Managing Clients
- Chapter 11: Using Templates
- Chapter 12: Configuring Hybrid REAP
- Chapter 13: Alarm and Event Dictionary
- Chapter 14: Reports
- Chapter 15: Performing Administrative Tasks
- Chapter 16: NCS Services
- Chapter 17: Tools
- Chapter 18: Configuring Virtual Domains
- Chapter 19: wIPS Policy Alarm Encyclopedia
- Appendix A: Troubleshooting and Best Practices
- Appendix B: NCS and End-User Licenses
- Appendix C: Cisco NCS Server Hardening
- Index
Index
Numerics
802.11a/n
Parameters
monitor 5-25
RRM Grouping
monitor 5-26
RRM Groups
monitor 5-30
802.11a/n Parameters 9-117
802.11h 9-127
EDCA 9-126
General 9-117
High Throughput 9-128
Roaming 9-126
RRM Intervals 9-119
RRM Radio Grouping 9-123
RRM Thresholds 9-127
802.11 association diagnostic test 10-28
802.11b/g/n
Parameters
monitor 5-28
802.11b/g/n DTIM period 11-36
802.11b/g/n Parameters 9-129
EDCA 9-136
General 9-130
High Throughput 9-138
Roaming 9-137
RRM Intervals 9-131
RRM Thresholds 9-131
802.11b/g/n Parameters Controller Templates 11-101
802.11b/g RRM interval template 11-94, 11-98
802.11b/g RRM threshold templates 11-96
802.11 Counters
access points 5-54
802.11 counters report 14-144
802.11 General Parameters
configuring 9-112
802.11h
802.11a/n 9-127
802.11h template 11-93
configuring 11-93
802.11 MAC Counters
access points 5-75
802.11n summary reports 14-141
802.11 Parameters
802.11 security trap 11-118
802.1n scaling reports 14-6
802.1X authentication diagnostic test 10-28
802.1X supplicant credentials 11-12
802.3 Bridging
configuring 9-29
802.3x Flow Control 9-29
880 series ISRs 1-8
A
AAA
AAA mode 15-129
active sessions 15-136
AP/MSE Authorization 9-90
General 9-83
LDAP Servers 9-86
local password policy 15-130
MAC Filtering 9-89
RADIUS 15-139
TACACS+ 15-137
TACACS+ Servers 9-87
users 15-130
Web Auth Configuration 9-91
AAA Local Net Users 9-88
AAA Mode 15-129
AAA override 11-30
AAA RADIUS
Acct Servers 9-84
Fallback Parameters 9-85
AAA servers 11-30
AAA traps 11-118
absolute 6-113
Access Control List
Rules 9-98
Access Control Lists
configuring 9-98
access control list template 11-75
access control list templates 11-69
access mode 9-156
access point
configuring 11-59
configuring for hybrid REAP 12-9
credentials 9-152
friendly 11-82
access point authentication and MFP templates 11-63
access point authorization template 11-59
access point icons 6-44
access point load
avoiding 11-88
Access Point Password
Global 9-59
access point positions
changing with import or export of file 6-54, 6-55
Access Points
Cisco APs
configuring 9-110
detecting 5-107
disabling
ineligible 11-144
Monitoring
overview 5-42
radio utilization 5-55
Tx power and channel 5-55
access points
configuring 9-164
configuring for LOMM 9-184
embedded 1-8
positioning 6-54
access points, adding to maps6-34to 6-39
access point threats 3-8
access point threats or attacks 3-8
Access Point Timer Settings 9-63
access point traps 11-118
Account
creating 7-17
ACL
configuring 9-98
Rules 9-98
template 11-69
ACL IP group details 11-70
ACL Protocol Groups
configuring 11-74
ACL template 11-75
configuring 11-75
ACS server
adding NCS to 15-53
ACS View Server credentials 9-229
ACS View Servers
configure 9-229
ACS view server tab 10-26
active interferer count per channel 9-202
active interferers 9-201
active interferers count chart 9-202
Active Sessions 15-136
location server 16-24
active sessions
monitoring 7-4
adaptive scan threshold 11-93
adaptive wIPS alarm report 14-162, 14-164, 14-169, 14-178
adaptive wIPS top 10 APs report 14-167
add config groups 8-16
add group members 8-10
Adding
location server 16-9
MSE 16-5
adding a spectrum expert 9-200
adding autonomous access points
by CSV file 9-160
by device information 9-159
adding autonomous access points to NCS 9-159
adding IOS access points 9-159
by device information 9-159
adding launch points
for Google Earth 6-117
adding NCS as TACACS+ server 15-53
Adding System Interfaces 9-39
adding templates from config group 8-20
Adhoc Rogue
alarm details 5-103
Alarms
overview 5-100
Events
details 5-111
monitoring alarms 5-100
Adhoc Rogues
overview 5-86
adhoc rogues 3-6
adhoc rogues report 14-172
adjusted link metric 6-80
Administration 18-1
location server 16-20
Administrative Tools
overview 2-27
advanced debug 17-7
advanced options 6-93
Advanced Parameters
location server 16-25
Advanced tab
on WLAN template 11-32
age out dual band 9-116
age out suppression 9-116
aggregated historical data 15-81
Aggressive Load Balancing 9-30
aggressive load balancing 9-113
Airopeek
configuring 9-111
Alarm
details 5-86
alarm 5-126
alarm cleanup options 15-73
alarm counts
for access points 5-131
for controllers 5-131
for coverage hole 5-131
for malicious APs 5-132
for mesh links 5-131
for mobility 5-131
for security 5-132
for unclassified APs 5-132
alarm dashboard 5-130
alarm display options 15-73
Alarms
acknowledging 5-134
Adhoc Rogue
details 5-103
overview 5-100
assigning 5-133
cleaning 5-133
deleting 5-133
email notifications 5-138
monitoring 5-1
Rogue AP
details 5-94
Rogue APs 5-90
unassigning 5-133
working with 5-113
alarms 13-1
assigning 3-16
clearing 3-16
config audit 17-12
deleting 3-16
searching 2-36
unassigning 3-16
alarm severity
configuring 5-132
alarm summary 2-27
alarm trigger threshold 11-64
alarm warning 5-134
all groups window 15-54
allow AAA override 9-70
alternate parent report 14-124
altitude 6-113
altitude mode 6-113
anonymous provision 11-54
anonymous provisioning 11-54
AP/MSE Authorization
configuring 9-90
AP authentication
template 11-63
AP Authentication and MFP
configuring 9-109
AP authorization
template 11-60
AP Config
export 9-175
AP-detected interferers
searching 2-43
AP Failover Priority 9-28
AP failover priority
setting 9-152
AP load
avoiding 11-88
AP Location data 6-53
AP manager IP 11-143
applying CLI commands 11-124
applying config groups 8-20
AP policies 3-31
AP policies template 11-78
AP Profile Status
access points 5-55
AP profile status report 14-91
APs
802.11 Counters 5-54
AP Profile Status 5-55
autonomous
templates 11-136
configuration templates 11-127
copy and replace 9-185
Coverage (RSSI) 5-51
Coverage (SNR) 5-51
details 5-56
CDP Neighbors 5-66
interfaces 5-64
Dynamic Power Control 5-49
Edit View 5-45
Export AP config 9-175
Generate Report 5-46
Interference 5-50
lightweight
templates 11-127
lightweight access point template 11-127
monitor
overview 5-42
Noise 5-50
Radio
details 5-68
radio 9-175
remove unassociated 9-186
TSM 5-55
UpTime 5-51
Voice Statistics 5-52
Voice TSM Reports 5-54
Voice TSM Table 5-52
AP Status Report
Scheduled Task 9-211
AP Template
tasks 9-211
AP Template Task
delete 9-212
enable, disable 9-212
history 9-212
modify 9-211
AP Timer Settings 9-63
AP up time 5-77
AP Username Password Controller Templates 11-11
asset matching criteria 16-70
assigning location presence 6-18
assigning virtual domains 7-15, 15-133
association request failures 5-81
association request success 5-81
association request timeouts 5-81
attacks
access points 3-8
attacks detected 3-9
AUDIT_STATUS_DIFFERENCE 13-77
auditing config groups 8-21
auditing H-REAP groups 12-15
Audit Mode
basic audit 15-74
template based audit 15-74
Audit Now 9-20
audit report
for alarms 16-75
audit reports
configuring 9-187
audit status
viewing for access points 9-187
audit trail
viewing 7-8
Authentication Priority
configuring 9-149
authentication priority
template 11-123
authentication process
Hybrid REAP 12-2
authentication request failures 5-81
authentication request success 5-82
authentication request timeout 5-82
auto key generation 11-40
automatic backups, scheduling 4-7
automatic client exclusion 11-34
automatic client troubleshooting 10-32, 15-76
autonomous access points
adding 9-159
adding by CSV file 9-160
downloading images 9-163, 9-164
viewing 9-163
Autonomous AP
Migration Templates
edit 11-140
Autonomous AP Client Authentication Failure 10-6
Autonomous APs
template 11-136
new 11-136
templates 11-136
autonomous to lightweight migration 9-158
autonomous to LWAPP migration support 9-158
auto provisioning filter
editing 15-64
avoid access point load 11-88
avoid Cisco AP load 11-88
avoid foreign AP interference 11-88
avoid non-802.11 noise 11-88
B
background scanning 9-55
on mesh configuration 11-115
on templates 11-115
background scanning in mesh networks
scenarios 9-54
Background Scan parameter 9-55
backhaul interface 5-80
Backup
location server 16-35
backup and restore license B-4
band selection 9-115
battery level
condition type 16-69
best practices A-1
bridge group name 5-80
Bridging link information 6-79, 6-86
bridging link information 6-79, 6-86
bridging mesh statistics 5-80
broadcast deauthentication frame signatures 3-34
bronze 11-32
bronze queue 5-81
buildings
adding to NCS database 6-19
busiest APs report 14-93
busiest client report 14-40
C
CA Certificate
configuring 9-100
CA certificates 4-4
calculating access point requirements 6-90
calibrating client 11-126
CAS 16-1
cascade reboot 8-22
CDP Interface Neighbors
controller ports
monitor 5-14
certificate signing request 3-44
change order buttons 14-12
changing station role
root mode 17-13
Chokepoint
adding to NCS database 9-205
adding to NCS map 9-205
removing from NCS 9-207
removing from NCS map 9-206
chokepoint
condition type 16-70
Chokepoints 5-115
new 9-205
chokepoints
positioning 6-54
CIDR notation 11-70
Cisco Access Points
configuring 9-110
Cisco Adaptive wIPS
alarms 5-139
Cisco Aironet 1510 Access Points
in Mesh network 9-53
Cisco AP load
avoiding 11-88
Cisco Discovery Protocol 9-170
Cisco Unified Network Solution
Cisco Unified Wireless LAN Solution
civic address 6-18
CKIP 9-68
clamped to ground 6-113
classification rule 11-79
Classifying Rogue APs 5-94
clear config 9-173
CLI
template 11-123
CLI commands
applying to template 11-124
Client
disable 10-38
remove 10-39
Sessions Report 10-40
client 10-39
calibrating 11-126
managing 10-1
client alarm summary 10-7
client association failure 10-6
client authentication failure 10-6
client authentication provision 11-54
client authentication type distribution 10-10
client count report 14-43
client detail page 10-15
Client Details
Association History 10-17
CCXv5 Information 10-19
Event Information 10-18
Location Information 10-18
Statistics 10-18
client details
retrieving from access point page 10-33
client devices
connecting to WLANs 12-11
client distribution 10-4
client excluded 10-6
happening automatically 11-34
Client Exclusion Policies
configuring 9-104
client exclusion policies 11-62
template 11-62
client exclusion policies template 11-61
Client Location
current map 10-39
recent map 10-39
client related traps 11-117
client reports 14-40
clients
searching 2-40
client sessions report 14-46
Client Summary
filtering 10-11
client summary report 14-50
client tab 10-3
client traffic 10-7
client troubleshooting
automatic 15-76
enabling 10-32
client WEP key decryption error 10-6
client WPA MIC error counter activated 10-6
CLI Sessions
monitor 5-7
color coding
of obstacles 6-72
command buttons 2-27
compliance reports 14-68
condition type
for event definitions 16-69
config audit 17-11
config audit alarms 17-12
config group
adding controllers 8-18
adding templates 8-20
configuring 8-18
downloading IDS signatures 8-23
downloading sw to controllers 8-23
removing controllers 8-18
removing templates 8-20
config group audits 8-21
config groups
applying 8-20
auditing 8-21
creating 8-16
downloading customized webauth 8-24
rebooting 8-22
reporting 8-22
Config Group Task
delete 9-214
enable,disable 9-214
history 9-214
Config Group Tasks 9-213
modify 9-213
Configuration
scheduled 9-211
configuration audit report 14-69
Configuration Backup 15-25
Configure Access Points
Radio 9-175
Configure APs
copy and replace 9-185
Configure Controllers
802.11
General Parameters 9-112
802.11a/n Parameters 9-117
802.11h 9-127
Dynamic Channel Assignment 9-121, 11-101
EDCA 9-126
General 9-117
High Throughput 9-128
Roaming 9-126
RRM Intervals 9-119
RRM Radio Grouping 9-123
RRM Thresholds 9-127
802.11b/g/n Parameters 9-129
EDCA 9-136
General 9-130
High Throughput 9-138
Roaming 9-137
RRM DCA List 9-133
RRM Radio Grouping 9-133
RRM Thresholds 9-131
Access Control List
Rules 9-98
Access Points
Cisco APs 9-110
Download Customized Web Auth Bundle 9-37
Download IDS signatures 9-37
Downloading Configuration 9-35
Downloading Software 9-35
Download Web Admin Certificate 9-36
H-REAP 9-79
H-REAP AP Groups 9-79
Management 9-143
Authentication Priority 9-149
Local Management Users 9-149
multiple servers 9-147
Syslog 9-147
Telnet SSH 9-146
Trap Receivers 9-143
Web Admin 9-147
Mesh 9-139
Ports 9-142
Rebooting Controllers 9-8, 9-9
Removing Controllers 9-8
Security
AAA 9-82
AAA AP authorization 9-90
AAA Local Net Users 9-88
AAA RADIUS Acct Servers 9-84
AAA RADIUS Auth Servers 9-83
Access Control Lists 9-98
AP Authentication and MFP 9-109
CA Certificate 9-100
Client Exclusion Policies 9-104
CPU Access Control List 9-99
Custom Signatures 9-109
Disabled Clients 9-97
file encryption 9-82
ID Certificate 9-101
IDS Sensor List 9-100
Local EAP 9-93
Local EAP General 9-93
Local EAP general EAP-FAST parameters 9-96
Local EAP General Network Users Priority 9-96
Local EAP Profiles 9-94
Rogue Policies 9-103
Standard Signatures 9-105
User Login Policies 9-97
Web Auth Certificate 9-102
Wireless Protection 9-102
System
DHCP Scopes 9-56
Mobility Groups 9-50
Network Route 9-49
Network Time Protocol 9-53
QoS Profiles 9-56
Spanning Tree Protocol 9-50
System Commands 9-31
System Interfaces 9-38
Uploading Files from Controllers 9-34
Configuring
ACL Protocol Groups 11-74
Wired Guest Access 9-46
Configuring 802.3 Bridging 9-29
configuring access points 9-164
configuring a client exclusion policy template 11-80
configuring a CPU ACL template 11-75
configuring a high throughput template 11-94
configuring alarm severity 13-149
configuring a local EAP general template 11-50
configuring a local EAP profile template 11-51
configuring a manually disabled client template 11-61
configuring a mesh template 11-94, 11-114
configuring an 802.11h template 11-93
configuring an access point 11-59
configuring an access point for hybrid REAP 12-9
configuring an EAP-FAST template 11-53
configuring an RRM interval template 11-98
configuring an RRM threshold template 11-93
configuring a policy name template 11-86
configuring a roaming parameters template 11-90
configuring a TACACS+ server template 11-46
configuring a trusted AP policies template 11-78
configuring a user authentication priority template 11-122
configuring a user login policies template 11-58
configuring config group 8-16
configuring controller WLANs 9-64
configuring EDCA parameters
through a template 11-90
Configuring Existing Controllers 9-23
configuring firewall for NCS 3-30
configuring global credentials 9-152
configuring global email parameters 15-84
configuring H-REAP AP groups 11-36
configuring Hybrid REAP 12-1
configuring hybrid REAP access point groups 12-11
configuring Hybrid-REAP groups 12-13
Configuring IDS 3-33
Configuring IDS signatures 3-33
configuring IDS signatures 3-33
configuring intrusion detection systems 3-33
configuring multiple country codes 8-14
configuring search results 2-46
configuring spectrum experts 9-200
configuring template
ACL 11-61
for rogue AP rule groups 11-80
configuring templates
802.11b/g RRM interval 11-98
access point authentication and MFP 11-78
access point authorization 11-59
file encryption 11-42
guest users 11-56
known rogue access point 11-93
local management user 11-121
MAC filter 11-58
QoS 11-18
RADIUS accounting 11-45
RADIUS authentication 11-43
syslog 11-120
Telnet SSH 11-119
traffic stream metrics QoS 11-20
trap control 11-116
WLAN 11-22
configuring the controller for hybrid REAP 12-6
configuring the switch
for hybrid REAP 12-5
Configuring User Roles 9-57
connecting client devices
to WLANs 12-11
Connecting to the Guest WLAN 3-44
context aware configuring 16-78
context aware planning 16-74
context-aware software 16-1
Controller
General System Parameters 9-25
Multicast Mode 9-62
Template Launch Pad 11-1
Uploading configuration/logs 9-34
controller
configuring for hybrid REAP 12-6
controller details 11-142
Controller DHCP 9-61
configuring 9-61
controller license information 15-9
controller licenses
managing 15-113
searching 2-46
controller operational status 15-26
Controllers
Adding an Interface 9-39
configuring existing 9-23
DHCP Stats
monitor 5-8
Edit View 5-3
monitor
Summary 5-4
monitoring 5-1
search 5-2
System Parameters
monitor 5-3
controllers
adding 9-4
adding to NCS database 4-1
searching 2-38
specified 1-1
Controller Security
monitor 5-15
Controller Templates
802.11b/g/n Parameters 11-101
Adding 11-2
applying 11-2
AP Username Password 11-11
delete 11-2
managing, creating 11-4
SNMP Community 11-9
Viewing 9-20
Voice
802.11b/g/n 9-116, 11-85, 11-89, 11-104
Controller Time and Date 9-34
controller upgrade settings 15-80, 15-82, 15-100
Controller User Roles 9-57
controller WLANs
configuring 9-64
Country Codes
setting multiple 9-113
country codes
multiple 8-14
Coverage (RSSI)
access points 5-51
Coverage (SNR)
access points 5-51
coverage hole 5-83
coverage hole reports 14-147
CPU access control
template 11-75
CPU Access Control Lists
configuring 9-99
CPU ACL
configuring 9-99
Cranite 9-67
Creating Account 7-17
Creating a Lobby Ambassador Account 7-17
Creating guest user accounts 7-9
creating guest user accounts 7-9
creating placemarks 6-114
creating virtual domains 18-2
CSR 3-44
CSV file 9-160
method for adding autonomous access points 9-160
CSV files 6-115
Current building
delete 6-22
edit map 6-21
Custom and Standard Signatures
Global Settings 9-107
customized webauth
downloading 8-24
Customized Web Auth Bundle
download 9-37
Customized WebAuth Bundles
downloads 9-15
Customized Web authentication 3-42
customized web authentication
downloading 11-66
customize report 14-12
Custom signature 3-39
Custom Signatures
configuring 9-109
D
data collection
for RFID tag 11-126
debug commands A-4
debug strategy A-4
default lobby ambassdor credentials
Deleting
MSE 16-6
deleting a license B-4
deleting a WLAN 9-74
deleting guest user templates 7-11
deleting NCS user accounts 7-3
designing a network 6-98
destination type
for report 14-8
Detecting APs 5-107
details
clients 10-41
device certificates 4-3
device information 9-159
method for adding autonomous access points 9-159
device reports 14-88
DHCP
configuring 9-61
DHCP diagnostic test 10-28
DHCP Scopes
configuring 9-56
DHCP server
overriding 11-35
DHCP Stats
controllers
monitor 5-8
diagnostic channel A-1
diagnostic test
802.11 association 10-28
802.1X authentication 10-28
DHCP 10-28
DNS ping 10-28
DNS resolution 10-28
IP connectivity 10-28
profile redirect 10-28
Disable
client 10-38
Disabled Clients
manual 9-97
disabled clients
template 11-61
disabling IDS signatures 3-38
Discovering Templates from Controllers 9-19
Distance
condition type 16-69
DNS ping diagnostic test 10-28
DNS resoltion diagnostic test 10-28
Download
Web Admin Certificate 9-148
Web Auth Certificate 9-148
downloading a customized web authentication page 11-66
downloading autonomous AP images 9-174
Downloading Configurations to Controllers 9-35
downloading customized webauth 8-24
Downloading customized web authentication 3-42
Downloading IDS signatures 3-37
downloading IDS signatures 3-37
from your config group 8-23
downloading images
to autonomous access points 9-163
Downloading Signature Files 9-106
Downloading Software
controllers 9-35
downloading sw to controllers
after adding config group 8-23
downloading vendor CA certificates 4-4
downloading vendor device certificates 4-3
Downloads
Customized WebAuth Bundles 9-15
Vendor CA Certificates 9-17
Vendor Device Certificate 9-16
downstream delay 11-21
downstream packet loss rate 11-21
drawing polygon areas
using map editor 6-70
DTIM 11-87
Dynamic Channel Assignment
dynamic interface 11-15
E
EAP-FAST
template 11-53
EAP-FAST template 11-53
EAPOL flood signature 3-35
EDCA
802.11b/g/n Parameters 9-136
EDCA parameter
template 11-91
EDCA parameters
configuring through a template 11-90
editing saved reports 14-18
editing scheduled run details 14-16
Editing signature parameters 3-40
editing the default lobby ambassador credentials 7-8, 7-13
edit location presence information 6-18
Edit View
access points 5-45
controllers 5-3
general 2-46
egress interface 9-66
configuring parameters 15-84
Email Notifications
alarms 5-138
embedded access points 1-8
emergency
condition type 16-70
enable background audit 8-17
enable enforcement 8-17
enable log module 15-68
enabling 10-39
enabling audit trails
for guest user activities 7-9
enabling IDS signatures 3-38
Enabling Web login 3-41
enabling Web login 3-41
end user license agreementB-7to B-12
Ethernet bridging 9-154
Ethernet Switch
credentials 9-193
remove 9-200
Ethernet Switches
configure 9-220
Ethernet VLAN tagging guidelines 9-155
evaluation license
for controller 15-10
for MSE 15-12
Events
Adhoc Rogue 5-146
details 5-111
monitoring 5-142
overview 5-142
Pre Coverage Holes 5-147
Rogue Alarms 5-108
Rogue AP
details 5-109
Rogue APs 5-145
wIPS 5-147
working with 5-151
events
searching 2-42
exclude device list 15-101
excluded packets 5-80
exclude switch trunk ports 15-101
exclude vendor list 15-102
executive summary report 14-142
Export Asset Information
location server 16-48
exporting a file 6-54
to change access point position 6-54, 6-55
export task list 15-54
extend to ground 6-113
extension license
for controller 15-10
for MSE 15-12
extracting task list 15-60
F
Factory Defaults
restoring 9-33
failover mechanism 15-6
Failover Priority 9-28
feature
of NCS license 15-8
File Encryption
controller 9-82
file encryption template 11-42
filter
editing current auto provisioning 15-64
filtering
using to modify maps 6-87
filtering saved reports 14-17
filtering scheduled run results 14-15
firewall, configuring for NCS 3-30
Floor Areas
delete 6-39
edit 6-39
Floor Plan Editor 1-8
foreign access point interference
avoiding 11-88
foreign AP interference
avoiding 11-88
Frame type 3-39
friendly access point template 11-82
friendly AP
template 11-82
friendly rogue 11-78
friendly rogue access points 3-8
FTP
turning on and off 15-93
G
General Properties
Location Server 16-20
general templates
configuring 11-5
generating migration analysis report 17-13
geographical coordinates 6-112
Global AP Password
configuring 9-59
global credentials
configuring 9-152
Global Settings
Standard and Custom Signatures 9-107
Global settings
for standard and custom signatures 3-40
Global SSID Group
add 9-226
delete 9-227
edit 9-226
gold 11-32
gold queue 5-81
Google Earth
adding launch points 6-117
Google Earth coordinates 6-113
Google KML or CSV
importing into NCS 6-116
GPS markers 6-18
grace period license
for controller 15-10
groups
for hybrid-REAP 12-13
for rogue access point rules 11-80
group setup window on ACS server 15-55
GUEST_USER_ADDED 13-58
GUEST_USER_AUTHENTICATED 13-58
guest account settings 15-82
guest accounts status report 14-116
guest association report 14-118
guest count report 14-119
guest reports 14-116
guest user
template 11-56
guest user account
scheduling 7-11
Guest user accounts
creating 7-9
guest user accounts
creating 7-9
managing 7-11
guest user details
emailing 7-13
print 7-13
Guest Users
monitoring 5-22
guest user sessions report 14-120
guest user templates 11-56
Guest WLAN
connecting 3-44
guidelines
for Ethernet VLAN tagging 9-155
guidelines for using the map editor 6-5
H
heater status 5-77
heat map
described 6-38
Help Menu 2-26
hierarchy
of mesh network 6-85
Hierarchy of Mesh parent to child 6-87
hierarchy of mesh parent to child 6-87
High Throughput
802.11a/n 9-128
802.11b/g/n Parameters 9-138
high throughput
template 11-94
high throughput template
configuring 11-94
historical report type 14-1
History Parameters
location server 16-46
H-REAP AP Groups
configuring 9-79
H-REAP AP groups
configuring 11-38
configuring template 11-38
H-REAP configuration tab 11-39
H-REAP Group
auditing 9-81
H-REAP groups
auditing 12-15
H-REAP local switching 9-70
H-REAP Parameters 9-79
H-REAP Users 11-40
HTTP
turning on and off 15-93
Hybrid REAP
configuring 12-1
hybrid REAP
bandwidth restriction 9-71, 11-33, 12-3
hybrid REAP access point groups 12-11
hybrid-REAP groups 12-12
Hybrid REAP local switching 11-32
hysteresis 11-93
I
ID Certificate
configuring 9-101
identity client 10-16
Identity Services Engine 16-80
IDS 3-33
configuring 3-33
IDS Sensor List
configuring 9-100
IDS sensors 3-33
IDS Signatures
configuring 9-105
download 9-37
IDS signatures 3-33
disabling 3-38
downloading 3-37
downloading from config group 8-23
enabling 3-38
uploading 3-36
images
downloading to autonomous access points 9-163, 9-164
Import Asset Information
location server 16-48
importing a file 6-54
to change access point position 6-54, 6-55
importing coordinates
as CSV file 6-115
into Google Earth 6-113
importing Google KML or CSV into NCS 6-116
Import map 6-53
In/Out
condition type 16-69
information elements
Aironet 11-33
infrastructure MFP 3-31
ingress interface 9-66
Inspect Location Readiness 6-76
Inspect VoWLAN Readiness 6-77
installing a license B-4
insufficient memory 5-80
interface group 11-20
Interferers
summary 5-120
interferers
summary 9-201
inter-subnet roaming 8-4
Intrusion Detection Systems 3-33
intrusion detection systems 3-33
invalid association request 5-82
invalid reassociation request 5-82
inventory reports 14-68, 14-105
IOS access points
adding 9-159
adding by device information 9-159
IOSAP_DOWN 13-117
IOSAP_LINK_DOWN 13-59
IOSAP_LINK_UP 13-58
IOSAP_UP 13-59
IP connectivity diagnostic test 10-28
K
KEK
key encryption key 11-44
key wrap 11-44
KML file 6-113
L
LAG mode 11-7
Latest Network Audit Report 9-22
latitude 6-112
Layer 1 security solutions 3-2
Layer 2 11-25
Layer 2 security solutions 3-2
Layer 3 11-28
Layer 3 security solutions 3-2
Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-29
LBS authorization 11-59
template 11-60
LDAP Servers 9-86
LDAP servers 9-70
template 11-47
LEAP authentication
requirements 8-8
legacy syslog
template 11-120
legacy syslog template 11-120
license
backup and restore B-4
license installation B-4
license management 15-114
licenses B-1
license types B-1
Lightweight AP Protocol Transport Mode 9-29
limitations for high reliability 15-104
Link Aggregation 9-31
link aggregation (LAG)
guidelines 12-4
link metric
adjusted 6-80
unadjusted 6-80
link SNR 6-80
link stats report 14-126
Load
access points 5-48
load 6-97
load balancing 9-113
Lobby Ambassador
account 7-17
creating account 7-17
Lobby ambassador 7-9
Lobby Ambassador Account
creating 7-17
editing 7-18
lobby ambassador defaults
setting 7-6
local authentication
for hybrid-REAP groups 12-13
Local EAP 9-93
General EAP-FAST Parameters 9-96
General Network Users Priority 9-96
General Parameters 9-93
Profiles 9-94
local EAP authorization 9-70
Local EAP check box 11-30
local EAP general
template 11-50
local EAP general template 11-50
local EAP profile template 11-51
Local Management Users
configuring 9-149
local management users
template 11-121
local management user template 11-121, 11-122
Local Net Users
configuring 9-88
local net users
template 11-55
local net users template 11-55
Local Password Policy 15-130
local switching
Hybrid REAP 11-32
Location
calibration 1-11
location servers 9-230
notifications 16-62
notification settings 16-64
notifications summary 16-62
synchronize servers 16-10
location change
condition type 16-70
location configuration
template 11-125
Location History
clients 10-41
location optimized monitor mode 9-168
Location Parameters
location server 16-57
location presence
assigning 6-18
Location Readiness 6-76
Location Server
active sessions 16-24
administration 16-20
advanced parameters 16-25
backup 16-35
export asset information 16-48
general properties 16-20
history parameters 16-46
import asset information 16-48
location parameters 16-57
logs 16-27
maintenance 16-35
NCS alarms 16-33
NCS events 16-33
NMSP parameters 16-22
notification parameters 16-59
restore 16-36
server events 16-32
Location server
adding 16-9
location server
backup historical data 16-36
configuration clearing 16-27
Location Servers 9-230
location upgrade B-2
log analysis 10-25
logging 15-17
logging into the NCS user interface2-11to 2-12
logging options 15-67
logging the lobby ambassador activities 7-8
login.html 3-42
login disclaimer 15-83
login policies
template 11-58
log message levels 15-68
log modules
enabling 15-68
Logs
location server 16-27
LOMM 9-168
configuring access point radios 9-184
longitude 6-114
long preambles, enabling for SpectraLink NetLink phones 4-5
LWAPP
template
edit 11-135
templates 11-127
Transport Mode 9-29
LWAPP migration 9-158
LWAPP template
new 11-127
M
MAC Filtering
configuring 9-89
MAC filtering 11-27
template 11-58
MAC filter template 11-58
MAC frequency 3-39
MAC information 3-39
MACK
message authenticator code keys 11-44
transport type 16-71
mail server configuration 15-84
Maintenance
location server 16-35
malformed neighbor packets 5-80
malicious rogue 11-78
malicious rogue access points 3-5, 3-6
managed network
security index 3-5
management frame flood signatures 3-34
Management Frame Protection 3-31
management frame protection 9-73, 11-63
Management Frame Protection Summary
controllers
monitor 5-19
management interface 11-8
Management Parameters
configuring 9-143
management queue 5-81
managing clients 10-1
managing controller licenses 15-113
managing current reports 14-13
managing MSE licenses 15-115
managing saved reports 14-16
managing virtual domains 18-7
managing WLAN schedules 9-75
mandatory data rates 11-88
manually disabled client
template for 11-61
Manually Disabled Clients
managing 9-97
Map Editor
general notes and guidelines 6-5
map editor
guidelines 6-5
guidelines for using 6-5
using to draw polygon areas 6-70
map editor functions 6-4
map properties
editing 6-14
maps
searching 2-44
using to monitor link stats 6-78
using to monitor mesh AP neighbors 6-83
map size 6-109
map view
updating 6-88
Menu Bar 2-13
Mesh
monitoring health 5-77
statistics for AP 5-78
mesh access point neighbors
monitoring 6-83
mesh access points
monitoring 6-81
mesh configuration
template 11-114
mesh link statistics 6-78
monitoring 6-78
mesh neighbors 6-83
mesh network
monitoring using maps 6-78
mesh network hierarchy 6-85
mesh networks
background scanning 9-53
monitoring 6-78
Mesh Parameters 9-139
mesh parent-child hierarchical view 6-49
mesh reports 14-124
mesh template
configuring 11-114
Mesh tree
viewing 6-85
mesh tree
viewing 6-85
message integrity check information element 11-63
metrics
in QoS 11-21
for clients 3-31
MFP attacks 3-9
MFP client protection 11-35
MFP signature generation 11-35
MFP Summary
controllers
monitor 5-19
MFP templates 11-63
MIC IE 11-63
migration analysis
running 17-13
migration analysis report
generating 17-13
migration analysis summary
viewing 11-141
migration template 11-139
Migration Templates
Autonomous APs
edit 11-140
minimum RSSI 11-92
Mirror Mode 10-39
mirror mode 9-169
missing
condition type 16-69
mobile announce messages 8-8
Mobility 16-1
Mobility Stats
monitor 5-23
service 16-1
mobility 8-1
Mobility Anchor Group Keep Alive Interval 9-31
Mobility Group
Prerequisites 9-51
Mobility Groups
configuring 9-50
Messaging 9-51
mobility groups 8-7
mobility groups, configuring 8-8
mobility scalability 8-11
Mobility Services 16-1
viewing 16-3
mobility services engine
deleting 16-6
Mobility Stats
monitor 5-23
modifying a migration template 11-142
modifying map displays 6-87
using filters 6-87
Monitor
Alarms 5-1
Events 5-142
Ports
overview 5-9
Rogue AP Rules 5-20
Monitor Access Points
details 5-56
edit view 5-45
load 5-48
radio type
802.11 MAC counters 5-75
on demand statistics 5-68
operational parameters 5-72
view alarms 5-76
view events 5-77
radio utilization 5-55
search 5-42
search results 5-43
Tx power and channel 5-55
Monitor Alarms
details 5-86
Monitor APs
802.11 Counters 5-54
AP Profile Status 5-55
Coverage (RSSI) 5-51
Coverage (SNR) 5-51
details
CDP Neighbors 5-66
interfaces 5-64
Dynamic Power Control 5-49
Interference 5-50
Noise 5-50
Radio
details 5-68
TSM 5-55
UpTime 5-51
Voice Statistics 5-52
Voice TSM Reports 5-54
Voice TSM Table 5-52
Monitor Chokepoints 5-115
Monitor Client
detecting APs
details 10-41
disable 10-38
location history 10-41
present map 10-39
recent map 10-39
remove 10-39
roam reason 10-40
v5 statistics 10-35
voice metrics 10-41
Monitor Controllers 5-1
802.11a/n parameters 5-25
802.11a/n RRM Grouping 5-26
802.11a/n RRM Groups 5-30
802.11b/g/n parameters 5-28
CLI Sessions 5-7
ports
general 5-9
spanning tree protocol 5-5
System
summary 5-4
WLANs 5-9
Monitor Events
Details 5-144
search 5-144
Monitoring
Guest Users 5-22
monitoring active sessions 7-4
monitoring channel width 5-83
monitoring mesh access point neighbors 6-82
using maps 6-83
monitoring mesh health 6-85
monitoring mesh link statistics
using maps 6-78
monitoring mesh networks
using maps 6-78
monitoring neighboring channels 9-53
monitoring pre-coverage holes 5-84
monitoring spectrum experts 9-201
monitor mode
location optimized 9-168
Monitor Tags 5-113
most recent audit alarms 17-12
most recent client alarms 10-7
most recent rogue adhocs 3-6
MSE
adding 16-5
deleting 16-6
MSE authorization
template 11-60
MSE license information 15-12
MSE licenses
managing 15-115
multicast mobility mode 8-11
Multicast Mode
controller 9-62
Multiple Country Codes
setting 9-113
multiple country codes
configuring 8-14
multiple syslog
template 11-121
multiple syslog template 11-120
N
N+1 redundancy 8-5
NAC Out-of-Band Integration 9-43
NAC state 9-72
NAT 8-10
NCS
overview 1-2
NCS_EMAIL_FAILURE 13-137
NCS-ADV-SI-SE-10 B-2
NCS Alarm
status 16-33
NCS Alarms
location servers 16-33
NCS database
restoring 4-8
on Linux 4-8
restoring in high availability environment 4-9
scheduling automatic backups 4-7
NCS Events
location servers 16-33
status 16-33
NCS guest operations report 14-122
NCS home 2-11
NCS licenses B-1
NCS Location Calibration 1-11
NCS password
recovering 4-13
NCS user accounts
adding 7-2
changing passwords 7-4
deleting 7-3
NCS user interface 7-10
netmask 11-70
NetStumbler signature 3-35
network address translation 8-10
Network Audit Report
latest 9-22
network design 6-98
network designs 16-10
network protection 3-33
Network Routes
configuring 9-49
Network Summary page 2-12
network summary reports 14-141
Network Time Protocol
configuring 9-53
network users priority
template 11-54
network utilization reports 14-149
new rogue access points report 14-176
NMSP Parameters
location server 16-22
node hops 5-80
nodes report 14-128
noise
avoiding non-802.11 types 11-88
avoid non-802.11 11-88
non-802.11 noise
avoiding 11-88
non-aggregated historical data 15-82
non-Cisco ACS server
for use with RADIUS 15-60
normal mode
for Ethernet port 9-156
North Bound API 7-15
Notification Parameters
location server 16-59
Notifications
location 16-62
Notification Settings
location 16-64
Notifications Summary
location 16-62
NTP configuration 9-53
NTP server template 11-10, 11-14
null probe response signatures 3-34
O
On Demand Statistics
access points 5-68
onstacle color coding 6-72
Operational Parameters
access points 5-72
OUI search 15-101
outdoor location
creating with Google Earth 6-112
overview
Cisco Unified Network Solution1-1to 1-2
NCS 1-2
P
packet error rate link color 6-87
packet error statistics report 14-132
packet jitter 11-21
packet latency 11-21
packet loss 11-21
packet loss rate 11-21
packet queue statistics report 14-134
packet stats report 14-130
parent changes 5-80
Passive Client 9-72
passthrough 11-29
PCI report 14-72
PEAP 11-52
peer-to-peer blocking 11-33
performance reports 14-143
permanent license
for controller 15-10
for MSE 15-12
physical appliance 2-2
placemarks
creating 6-114
placement of access points 6-40
planning mode 6-92
to calculate access point requirements 6-90
planning mode, calculating access point requirements 6-90
platinum 11-32
platinum queue 5-81
PLR 11-21
policy manager solutions 3-2
polygon areas
drawing with map editor 6-70
poor neighbor SNR 5-80
Port Parameters
configuring 9-142
Ports
Monitor
overview 5-9
monitor controllers 5-9
positioning access points 6-54
positioning chokepoints 6-54
positioning Wi-Fi TDOA receivers 6-54
power injector settings 9-171
pre-coverage holes
monitoring 5-84
Preferred Call 9-116
Prerequisites 2-4
Present Map
clients 10-39
print guest user details 7-13
probe cycle count 9-116
Profile
List 9-220
Profile editor 9-222
profile redirect diagnostic test 10-28
protection type 11-64
Q
QoS 11-31
QoS Profiles
configuring 9-56
QoS templates 11-18
queues
silver, gold, platinum, bronze, management 5-81
quick search 2-33
Quiet time 3-39
R
Radio
access points
configuring 9-175
radio resource management 11-88
Radio Status
scheduling and viewing 9-186
radio status
scheduling 9-186
Radio Utilization
access points 5-55
RADIUS 15-139
RADIUS Accounting
controllers
monitor 5-17
RADIUS accounting servers
template 11-45
RADIUS accounting template 11-45
RADIUS and TACACS+ attributes
RADIUS Authentication
controllers
monitor 5-15
RADIUS authentication template 11-43
RADIUS Auth Servers
AAA RADIUS
Auth Servers 9-83
RADIUS fallback
template 11-46
RADIUS fallback mode 11-47
RADIUS servers 9-70
configuring 15-139
reachability status 9-200
Readiness
location 6-76
VoWLAN 6-77
reassociation request failures 5-82
reassociation request success 5-82
reassociation request timeouts 5-82
reauthentication request failures 5-82
reauthentication request success 5-82
reauthentication request timeout 5-82
Rebooting Controllers 9-8, 9-9
recent adhoc rogue alarms 3-9
Recent Map
clients 10-39
recent rogue AP alarms 3-9
recovering the NCS password 4-13
recurrence
for report 14-8
refresh browser 6-98
refresh component icon 2-22
Refresh Config 9-18
refresh from network 6-97, 6-109
relative to ground 6-113
Remove APs 9-186
Remove Controllers 9-8
removing controllers from config group 8-18
removing templates from config group 8-20
report
running new 14-6
report launch pad 14-2
Reports
Rogue AP Events 14-181
reports
scheduled runs 14-14
reset AP now 9-173
Restore
location server 16-36
Restoring Factory Defaults 9-33
restoring NCS database
in high availability environment 4-9
restoring NCS database on Linux 4-8
retain NCS value 8-22
RF calibration model, creating 4-5
RF Calibration Models
apply to maps 6-67
delete 6-67
RFID data collection 11-126
RF profile traps 11-118
RF update traps 11-118
Roaming
802.11b/g/n Parameters 9-137
roaming 8-1
roaming parameter
template 11-92
roaming parameters template
configuring 11-92
roaming time 11-21
Roam Reason
clients 10-40
rogue access point events report 14-183
rogue access point rule groups 11-80
rogue access point rules
configuring a template 11-78
viewing or editing 9-190
rogue access points
friendly 3-8
malicious 3-6
solutions for 3-3
unclassified 3-7
rogue access points report 14-183
rogue adhocs
most recent 3-6
Rogue Alarm Events 5-108
Rogue AP
alarms 5-90
containment 5-152
location 5-152
malicious 5-89
Rules
monitor 5-20
tagging 5-152
Rogue AP Events
report 14-181
rogue AP rule groups
template 11-80
Rogue AP Rules
configuring 9-104
details 5-21
rogue AP rules
template 11-78
Rogue APs
classifying 5-94
friendly 5-89
overview 5-86
unclassified 5-90
Rogue Client
details 5-98
rogue clients
searching 2-44
rogue detector 9-168
Rogue Devices
detecting 5-86
rogue location discovery protocol 11-77
Rogue Policies
configuring 9-103
rogue policies
template 11-77
template for 11-76
role criteria 11-142
root access points (RAPs)
selecting 9-158
root mode
changing from station role 17-13
routing state 5-80
RRM
DCA
802.11b/g/n Parameters 9-133
Radio Grouping
802.11b/g/n Parameters 9-133
RRM DCA 9-121
RRM Intervals
802.11a/n 9-119
802.11b/g/n Parameters 9-131
RRM intervals 11-93
template 11-98
RRM interval template
RRM Radio Grouping
802.11a/n 9-123
RRM threshold
template 11-97
RRM Thresholds
802.11b/g/n Parameters 9-131
RRM threshold template
configuring 11-96
RSSI legend 6-109
rules
for rogue access point 11-78
viewing or editing for rogue access points 9-190
running a new report 14-6
running a saved report 14-18
running migration analysis 17-13
RX neighbor requests 5-80
RX neighbor responses 5-80
S
Save Config to Flash 9-18
saved report
running 14-18
saved reports
editing 14-18
filtering 14-17
managing 14-16
saved searches 2-46
scalability parameters 8-11
scan cycle period threshold 9-116
scan threshold 11-93
Scheduled Configuration 9-211
Schedule details 9-164
scheduled run details
editing 14-16
scheduled run results 14-14
filtering 14-15
Scheduled Task
AP status report 9-211
schedules
managing for WLANs 9-75
scheduling guest user account 7-11
scheduling radio status 9-186
Search
access points 5-42
controller results 5-2
Events 5-144
overview 2-27
search alarm parameters 2-36, 2-39, 5-32
search feature 2-33
using for troubleshooting 10-23
searching access points 2-37
searching AP-detected interferers 2-43
searching clients 2-40
searching controller licenses 2-38
searching controllers 2-39
searching events 2-42
searching maps 2-44
searching rogue clients 2-44
searching SE-detected interferers 2-43
searching shunned clients 2-45
searching tags 2-45
searching Wi-Fi TDOA receivers 2-44
search results
configuring 2-46
secondary NCS operation 15-6
Security
AAA
LDAP servers 9-86
TACACS+ Servers 9-87
Web Auth Configuration 9-91
AAA MAC Filtering 9-89
Local EAP 9-93
security color range 3-5
security configurations
monitoring 5-139
security index 3-5
security mesh statistics 5-81
Security Reports
Rogue AP Events 14-181
security summary 14-185
security tab
interpreting 3-4
security thermometer 3-5
sending mobile announce messages 8-8
sensors
viewing IDS types 3-33
Server Events
location servers 16-32
status 16-32
set sorting buttons 14-12
Set Time
controller 9-34
setting AP failover 9-152
Setting Controller Time and Date 9-34
setting multiple country codes 9-81
shunned clients
searching 2-45
silver 11-32
silver queue 5-81
Sniffer 11-128
Sniffer Feature 9-111
sniffer mode 9-168
SNMP
transport type 16-71
SNMP authentication 11-117
SNMP Community
controller templates 11-9
SNMP mediation 15-68
SNR definition 6-87
SNR down 6-80
SNR UP 6-80
SNR up 6-80
SOAP 16-71
software
downloading config groups to controllers 8-23
software, updating 4-2
Spanning Tree Protocol
configuring 9-50
monitor controllers 5-5
SpectraLink NetLink phones, enabling long preambles 4-5
spectrum expert
adding 9-200
spectrum expert details 9-202
Spectrum Experts
details 5-121
Interferers 5-120
summary 5-119
spectrum experts
configuring 9-200
monitoring 9-201
summary 9-201
SSID Group
add 9-227
add from global list 9-228
add global 9-226
delete 9-228
delete global 9-227
edit 9-228
edit global 9-226
SSID Group List
wIPS 9-225
SSID group list
global 9-225
SSID groups
wIPS 9-227
Standalone Building
adding floor plan 6-32
Standard and Custom Signatures
Global Settings 9-107
Standard signature 3-39
Standard Signature Parameters
configuring 9-105
standard signatures 3-33
static WEP 9-67
Static WEP-802.1X 9-67
station role
changing to root mode 17-13
Status Report
scheduled task 9-213
status schedules
managing for WLANs 9-75
stranded APs report 14-136
supplicant credentials
for AP 802.1X 11-12
supported data rates 11-88
Switch
credentials 9-193
remove 9-200
switch
configuring for hybrid REAP 12-5
Switches
ethernet 9-220
Switch Port Tracing
Details 15-103
Troubleshooting 15-103
symmetric mobility tunneling 11-8
symmetric tunneling 8-5
Synchronize servers
location 16-10
Syslog
configuring individual controller 9-147
Individual controller 9-147
multiple servers 9-147
syslog
transport type 16-71
syslog templates 11-120
System
General Properties 9-25
System Commands
controller 9-31
System Interfaces
Controllers 9-38
System parameters
controllers
monitor 5-3
System requirements 2-5
T
TACACS+ 15-137
TACACS+ server
configuring a template for 11-48
template 11-49
tagged packets 9-158
Tags 5-113
tags
searching 2-45
Task
configuration backup 15-25
status 15-26
Telnet SSH
template 11-117
Telnet SSH Parameters
configuring 9-146
Telnet SSH templates 11-119
temperature 5-77
template
configuring for rogue AP rules 11-78
template for configuring network user credentials 11-54
Template Launch Pad
overview 11-1
Templates
AP Configuration 11-127
delete 11-2
test analysis tab 10-28
TFTP
turning on and off 15-93
TFTP details 11-143
TFTP Server
adding 9-230
TFTP server 3-36
TFTP Servers
configure 9-230
delete 9-230
thermometer color range 3-5
threats
access points 3-8
throughput report 14-56
tilt 6-113
Timer Setting
AP 9-63
total interferer count 9-202
total mismatched controllers 17-12
trace 15-71
traffic indicator message 11-87
Traffic Stream Metrics
access points 5-55
traffic stream metrics QoS status 11-21
traffic stream metrics QoS template 11-20
traffic stream metrics report 14-151
transition time 11-93
Transport Mode
LWAPP 9-29
transport types 16-71
trap
802.11 security 11-118
Trap Control
configuring 9-144
trap control
template 11-117
trap control templates 11-116
trap receiver
template 11-116
Trap Receivers
configuring 9-143
trap receiver template 11-116
traps
AAA 11-118
access point 11-118
client related 11-117
RF profile 11-118
RF update 11-118
unsupported 13-149
traps added in 2.1 13-23
traps added in 2.2 13-28
traps added in 3.0 13-31
traps added in 3.1 13-34
traps added in 3.2 13-38
traps added in 4.0 13-38
traps added in 4.0.96.0 13-44
traps added in 4.1 13-47, 13-57
traps added in release 6.0 13-63
traps added in release 7.0 13-149
trend report type 14-1
Troubleshooting
Switch Port Tracing 15-103
troubleshooting A-1
using logging options 15-71
troubleshooting voice RF coverage 6-97
trunk mode 9-156
trusted AP policies
template for 11-78
trusted AP policies template 11-78
TSM
access points 5-55
tunneling 8-5
TX neighbor requests 5-80
TX neighbor responses 5-80
Tx Power and Channel
access points 5-55
Tx power and channel report 14-154
type
of NCS license 15-9
U
UDI
retrieving on controllers and access points 5-83
unadjusted link metric 6-80
unclassified rogue 11-78
unclassified rogue access points 3-7
understanding virtual domains 18-9
unique clients report 14-64
unique device identifier 5-83
unknown association requests 5-82
unknown reassociation request 5-82
untagged packets 9-158
Update map view 6-88
update map view 6-88
updating system software 4-2
upgrade settings
for controller 15-79
upgrading autonomous access points 11-144
upgrading NCS
in high availability environment 4-12
upgrading the network 4-12
Uploading IDS signatures 3-36
uploading IDS signatures 3-36
Uploading Signature Files 9-106
upstream delay 11-21
upstream packet loss rate 11-21
UpTime
access points 5-51
uptime reports 14-111
User accounts
for guest 7-9
user accounts
for guest 7-9
user authentication priority template
configuring 11-122
user credential retrieval priority 11-54
user details
emailing 7-13
printing 7-13
User Interface
Menu Bar 2-13
User Login Policies
configuring 9-97
user login policies
configuring a template 11-58
template 11-58
user preferences 15-109
User Roles
configuring 9-57
Users 15-130
using logging
for troubleshooting 15-71
using maps
to monitor mesh AP neighbors 6-83
to monitor mesh link statistics 6-78
using maps to monitor mesh networks 6-78
using planning mode 6-70
using template
ACL 11-75
for friendly access point 11-82
using templates
802.11b/g RRM interval 11-94, 11-98
802.11b/g RRM threshold 11-96
access point authentication & MFP 11-63
access point authorization 11-59
file encryption 11-42
for legacy syslog 11-120
for multiple syslog 11-120
guest users 11-56
local management user 11-121, 11-122
local net users 11-55
MAC filter 11-58
password policy 11-68
QoS 11-18
RADIUS accounting 11-45
RADIUS authentication 11-43
syslog 11-120
Telnet SSH 11-119
traffic stream metrics QoS 11-20
trap control 11-116
trap receiver 11-116
web authentication 11-64
WLAN 11-22
utilization reports 14-113
V
V5 client statistics 14-67
V5 Statistics
client 10-35
Vendor CA Certificates
downloads 9-17
vendor CA certificates
downloading 4-4
Vendor Device Certificate
downloads 9-16
vendor device certificates
downloading 4-3
vendor search 15-101
View 2-23
View Alarms
access points 5-76
view in chart icon 2-23
Viewing
Mobility Services 16-3
viewing audit status
for access points 9-187
viewing autonomous access points 9-163
viewing clients
identified as WGBs 5-83
viewing Google Earth maps 6-117
Viewing Mesh tree 5-78
view in grid icon 2-23
Viewing shunned clients 3-33
viewing shunned clients 3-33
Viewing Templates Applied to a Controller 9-20
viewing the audit trail 7-8
viewing the migration analysis 11-141
view list 10-24
virtual appliance 2-2
virtual domains 18-1
creating 18-2
hierarchy 18-3
managing 18-7
understanding 18-9
VLAN tagging 9-154
Voice
802.11b/g/n Controller Templates 9-116, 11-85, 11-89, 11-104
Voice Metrics
clients 10-41
Voice-over-Internet Protocol
snooping 9-72
Voice RF Coverage issues 6-78
Voice Statistics
access points 5-52
voice statistics 14-159
Voice TSM Reports
access points 5-54
Voice TSM Table
access points 5-52
VoIP calls graph 14-156
VoIP calls table 14-157
VoIP snooping 9-72
VoWLAN Readiness 6-77
W
Web Admin
configuring 9-147
Web Admin Certficate
downloading 9-36
Web Auth Certificate
configuring 9-102
Web Auth Configuration 9-91
web authentication
template 11-64
web authentication template 11-64
web authentication type 11-65
Web authentication types 3-41
web auth security A-3
web login
enabling 3-41
web policy 9-69
Wellenreiter signature 3-35
WiFi TDOA Receivers
adding 9-208
configure 9-207
edit 9-210
remove 9-210
tag location 9-208
Wi-Fi TDOA receivers
positiioning 6-54
searching 2-44
wIPS 16-1
planning and configuring 16-80
Profile
add 9-221
Profile Editor 9-222
Profile List 9-220
SSID Group List 9-225
wIPS Alarms
details 5-140
monitoring 5-139
wIPS Profile
apply 9-224
delete 9-224
wIPS Profiles
add 9-221
Wired Client Authentication Failure 10-6
Wired Client Auth fail VLAN Assigned 10-6
Wired Client Authorization Failure 10-6
Wired Client Critical VLAN Assigned 10-6
Wired Client Guest VLAN Assigned 10-6
Wired Client Security Violation 10-6
Wired Guest Access
configuring 9-46
Wireless Management 9-31
Wireless Protection Policies
configuring 9-102
WLAN
adding 9-73
deleting 9-74
WLAN AP groups 11-36
WLAN details
viewing 9-65
WLANs
configuring 9-64
monitor 5-9
web auth security A-3
WLAN status schedules
managing 9-75
WLAN templates 11-22
WMM parameters 9-70
WMM policy 11-32
work group bridge mode 9-164
worst node hops report 14-138
WPA+WPA2 9-68
X
XML mediation 15-69
Z
zoom in or out 6-109