Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

Index

Numerics

802.11a/n

Parameters

monitor 5-25

RRM Grouping

monitor 5-26

RRM Groups

monitor 5-30

802.11a/n Parameters 9-117

802.11h 9-127

DCA 9-121, 11-101

EDCA 9-126

General 9-117

High Throughput 9-128

Media 9-123, 9-134

Roaming 9-126

RRM Intervals 9-119

RRM Radio Grouping 9-123

RRM Thresholds 9-127

802.11 association diagnostic test 10-28

802.11b/g/n

Parameters

monitor 5-28

802.11b/g/n DTIM period 11-36

802.11b/g/n Parameters 9-129

EDCA 9-136

General 9-130

High Throughput 9-138

Roaming 9-137

RRM Intervals 9-131

RRM Thresholds 9-131

802.11b/g/n Parameters Controller Templates 11-101

802.11b/g RRM interval template 11-94, 11-98

802.11b/g RRM threshold templates 11-96

802.11 Counters

access points 5-54

802.11 counters report 14-144

802.11 General Parameters

configuring 9-112

802.11h

802.11a/n 9-127

802.11h template 11-93

configuring 11-93

802.11 MAC Counters

access points 5-75

802.11n summary reports 14-141

802.11 Parameters

configuring 9-81, 9-112

802.11 security trap 11-118

802.1n scaling reports 14-6

802.1X authentication diagnostic test 10-28

802.1X supplicant credentials 11-12

802.3 Bridging

configuring 9-29

802.3x Flow Control 9-29

880 series ISRs 1-8

A

AAA

AAA mode 15-129

active sessions 15-136

AP/MSE Authorization 9-90

General 9-83

LDAP Servers 9-86

local password policy 15-130

MAC Filtering 9-89

RADIUS 15-139

TACACS+ 15-137

TACACS+ Servers 9-87

users 15-130

Web Auth Configuration 9-91

AAA Local Net Users 9-88

AAA Mode 15-129

AAA override 11-30

AAA RADIUS

Acct Servers 9-84

Fallback Parameters 9-85

AAA servers 11-30

AAA traps 11-118

absolute 6-113

Access Control List

Rules 9-98

Access Control Lists

configuring 9-98

access control list template 11-75

access control list templates 11-69

access mode 9-156

access point

configuring 11-59

configuring for hybrid REAP 12-9

credentials 9-152

friendly 11-82

access point authentication and MFP templates 11-63

access point authorization template 11-59

access point icons 6-44

access point load

avoiding 11-88

Access Point Password

Global 9-59

access point positions

changing with import or export of file 6-54, 6-55

Access Points

Cisco APs

configuring 9-110

detecting 5-107

disabling

ineligible 11-144

Monitoring

overview 5-42

radio utilization 5-55

Tx power and channel 5-55

access points

configuring 9-164

configuring for LOMM 9-184

embedded 1-8

positioning 6-54

searching 2-37, 9-188

access points, adding to maps6-34to 6-39

access point threats 3-8

access point threats or attacks 3-8

Access Point Timer Settings 9-63

access point traps 11-118

Account

creating 7-17

ACL

configuring 9-98

Rules 9-98

template 11-69

ACL IP group details 11-70

ACL Protocol Groups

configuring 11-74

ACL template 11-75

configuring 11-75

ACS server

adding NCS to 15-53

ACS View Server credentials 9-229

ACS View Servers

configure 9-229

ACS view server tab 10-26

active interferer count per channel 9-202

active interferers 9-201

active interferers count chart 9-202

Active Sessions 15-136

location server 16-24

active sessions

monitoring 7-4

adaptive scan threshold 11-93

adaptive wIPS alarm report 14-162, 14-164, 14-169, 14-178

adaptive wIPS top 10 APs report 14-167

add config groups 8-16

add group members 8-10

Adding

location server 16-9

MSE 16-5

adding a spectrum expert 9-200

adding autonomous access points

by CSV file 9-160

by device information 9-159

adding autonomous access points to NCS 9-159

adding IOS access points 9-159

by device information 9-159

adding launch points

for Google Earth 6-117

adding NCS as TACACS+ server 15-53

Adding System Interfaces 9-39

adding templates from config group 8-20

Adhoc Rogue

alarm details 5-103

Alarms

overview 5-100

Events

details 5-111

monitoring alarms 5-100

Adhoc Rogues

overview 5-86

adhoc rogues 3-6

adhoc rogues report 14-172

adjusted link metric 6-80

Administration 18-1

location server 16-20

Administrative Tools

overview 2-27

advanced debug 17-7

advanced options 6-93

Advanced Parameters

location server 16-25

advanced search 2-34, 5-105

Advanced tab

on WLAN template 11-32

age out dual band 9-116

age out suppression 9-116

aggregated historical data 15-81

Aggressive Load Balancing 9-30

aggressive load balancing 9-113

Aironet IE 9-71, 11-33

Airopeek

configuring 9-111

Alarm

details 5-86

alarm 5-126

alarm cleanup options 15-73

alarm counts

for access points 5-131

for controllers 5-131

for coverage hole 5-131

for malicious APs 5-132

for mesh links 5-131

for mobility 5-131

for security 5-132

for unclassified APs 5-132

alarm dashboard 5-130

alarm display options 15-73

Alarms

acknowledging 5-134

Adhoc Rogue

details 5-103

overview 5-100

assigning 5-133

cleaning 5-133

deleting 5-133

email notifications 5-138

monitoring 5-1

Rogue AP

details 5-94

Rogue APs 5-90

unassigning 5-133

working with 5-113

alarms 13-1

assigning 3-16

clearing 3-16

config audit 17-12

deleting 3-16

searching 2-36

unassigning 3-16

alarm severity

configuring 5-132

alarm summary 2-27

alarm trigger threshold 11-64

alarm warning 5-134

all groups window 15-54

allow AAA override 9-70

alternate parent report 14-124

altitude 6-113

altitude mode 6-113

anonymous provision 11-54

anonymous provisioning 11-54

AP/MSE Authorization

configuring 9-90

AP authentication

template 11-63

AP Authentication and MFP

configuring 9-109

AP authorization

template 11-60

AP Config

export 9-175

AP-detected interferers

searching 2-43

AP Failover Priority 9-28

AP failover priority

setting 9-152

AP load

avoiding 11-88

AP Location data 6-53

AP manager IP 11-143

applying CLI commands 11-124

applying config groups 8-20

AP policies 3-31

AP policies template 11-78

AP Profile Status

access points 5-55

AP profile status report 14-91

APs

802.11 Counters 5-54

AP Profile Status 5-55

autonomous

templates 11-136

configuration templates 11-127

copy and replace 9-185

Coverage (RSSI) 5-51

Coverage (SNR) 5-51

details 5-56

CDP Neighbors 5-66

general 5-56, 5-57, 5-62

interfaces 5-64

Dynamic Power Control 5-49

Edit View 5-45

Export AP config 9-175

Generate Report 5-46

Interference 5-50

lightweight

templates 11-127

lightweight access point template 11-127

monitor

overview 5-42

Noise 5-50

Radio

details 5-68

radio 9-175

remove unassociated 9-186

TSM 5-55

UpTime 5-51

Voice Statistics 5-52

Voice TSM Reports 5-54

Voice TSM Table 5-52

AP Status Report

Scheduled Task 9-211

AP Template

tasks 9-211

AP Template Task

delete 9-212

enable, disable 9-212

history 9-212

modify 9-211

AP Timer Settings 9-63

AP up time 5-77

AP Username Password Controller Templates 11-11

asset matching criteria 16-70

assigning location presence 6-18

assigning virtual domains 7-15, 15-133

association request failures 5-81

association request success 5-81

association request timeouts 5-81

attacks

access points 3-8

attacks detected 3-9

AUDIT_STATUS_DIFFERENCE 13-77

auditing config groups 8-21

auditing H-REAP groups 12-15

Audit Mode

basic audit 15-74

template based audit 15-74

Audit Now 9-20

audit report

for alarms 16-75

audit reports

configuring 9-187

audit status

viewing for access points 9-187

audit trail

viewing 7-8

Authentication Priority

configuring 9-149

authentication priority

template 11-123

authentication process

Hybrid REAP 12-2

authentication request failures 5-81

authentication request success 5-82

authentication request timeout 5-82

auto key generation 11-40

automatic backups, scheduling 4-7

automatic client exclusion 11-34

automatic client troubleshooting 10-32, 15-76

autonomous access points

adding 9-159

adding by CSV file 9-160

downloading images 9-163, 9-164

viewing 9-163

Autonomous AP

Migration Templates

edit 11-140

Autonomous AP Client Authentication Failure 10-6

Autonomous APs

template 11-136

new 11-136

templates 11-136

autonomous to lightweight migration 9-158

autonomous to LWAPP migration support 9-158

auto provisioning filter

editing 15-64

auto refresh 6-97, 6-109

avoid access point load 11-88

avoid Cisco AP load 11-88

avoid foreign AP interference 11-88

avoid non-802.11 noise 11-88

B

background scanning 9-55

on mesh configuration 11-115

on templates 11-115

background scanning in mesh networks

described9-53to 9-55

scenarios 9-54

Background Scan parameter 9-55

backhaul interface 5-80

Backup

location server 16-35

backup and restore license B-4

band selection 9-115

battery level

condition type 16-69

best practices A-1

bridge group name 5-80

Bridging link information 6-79, 6-86

bridging link information 6-79, 6-86

bridging mesh statistics 5-80

broadcast deauthentication frame signatures 3-34

bronze 11-32

bronze queue 5-81

buildings

adding to NCS database 6-19

busiest APs report 14-93

busiest client report 14-40

C

CA Certificate

configuring 9-100

CA certificates 4-4

calculating access point requirements 6-90

calibrating client 11-126

CAS 16-1

cascade reboot 8-22

CDP Interface Neighbors

controller ports

monitor 5-14

certificate signing request 3-44

change order buttons 14-12

changing station role

root mode 17-13

Chokepoint

adding to NCS database 9-205

adding to NCS map 9-205

removing from NCS 9-207

removing from NCS map 9-206

chokepoint

condition type 16-70

Chokepoints 5-115

new 9-205

chokepoints

positioning 6-54

CIDR notation 11-70

Cisco Access Points

configuring 9-110

Cisco Adaptive wIPS

alarms 5-139

Cisco Aironet 1510 Access Points

in Mesh network 9-53

Cisco AP load

avoiding 11-88

Cisco Discovery Protocol 9-170

Cisco Unified Network Solution

overview1-1to 1-2

Cisco Unified Wireless LAN Solution

security solutions3-1to 3-29

civic address 6-18

CKIP 9-68

clamped to ground 6-113

classification rule 11-79

Classifying Rogue APs 5-94

clear config 9-173

CLI

template 11-123

CLI commands

applying to template 11-124

Client

disable 10-38

remove 10-39

Sessions Report 10-40

client 10-39

calibrating 11-126

managing 10-1

client alarm summary 10-7

client association failure 10-6

client authentication failure 10-6

client authentication provision 11-54

client authentication type distribution 10-10

client count report 14-43

client detail page 10-15

Client Details

Association History 10-17

CCXv5 Information 10-19

Event Information 10-18

Location Information 10-18

Statistics 10-18

client details

retrieving from access point page 10-33

client devices

connecting to WLANs 12-11

client distribution 10-4

client excluded 10-6

client exclusion 9-72, 11-34

happening automatically 11-34

Client Exclusion Policies

configuring 9-104

client exclusion policies 11-62

template 11-62

client exclusion policies template 11-61

Client Location

current map 10-39

recent map 10-39

client related traps 11-117

client reports 14-40

clients

searching 2-40

client sessions report 14-46

Client Summary

filtering 10-11

client summary report 14-50

client tab 10-3

client traffic 10-7

client troubleshooting

automatic 15-76

enabling 10-32

client WEP key decryption error 10-6

client WPA MIC error counter activated 10-6

CLI Sessions

monitor 5-7

CLI sessions 15-82, 15-100

color coding

of obstacles 6-72

command buttons 2-27

compliance reports 14-68

condition type

for event definitions 16-69

config audit 17-11

config audit alarms 17-12

config group

adding controllers 8-18

adding templates 8-20

configuring 8-18

downloading IDS signatures 8-23

downloading sw to controllers 8-23

removing controllers 8-18

removing templates 8-20

config group audits 8-21

config groups

applying 8-20

auditing 8-21

creating 8-16

downloading customized webauth 8-24

rebooting 8-22

reporting 8-22

Config Group Task

delete 9-214

enable,disable 9-214

history 9-214

Config Group Tasks 9-213

modify 9-213

Configuration

scheduled 9-211

configuration audit report 14-69

Configuration Backup 15-25

Configure Access Points

Radio 9-175

Configure APs

copy and replace 9-185

Configure Controllers

802.11

General Parameters 9-112

802.11a/n Parameters 9-117

802.11h 9-127

Dynamic Channel Assignment 9-121, 11-101

EDCA 9-126

General 9-117

High Throughput 9-128

Media 9-123, 9-134

Roaming 9-126

RRM Intervals 9-119

RRM Radio Grouping 9-123

RRM Thresholds 9-127

802.11b/g/n Parameters 9-129

EDCA 9-136

General 9-130

High Throughput 9-138

Roaming 9-137

RRM DCA List 9-133

RRM Radio Grouping 9-133

RRM Thresholds 9-131

802.11 Parameters 9-81, 9-112

Access Control List

Rules 9-98

Access Points

Cisco APs 9-110

Download Customized Web Auth Bundle 9-37

Download IDS signatures 9-37

Downloading Configuration 9-35

Downloading Software 9-35

Download Web Admin Certificate 9-36

H-REAP 9-79

H-REAP AP Groups 9-79

Management 9-143

Authentication Priority 9-149

Local Management Users 9-149

multiple servers 9-147

Syslog 9-147

Telnet SSH 9-146

Trap Receivers 9-143

Web Admin 9-147

Mesh 9-139

Ports 9-142

Rebooting Controllers 9-8, 9-9

Removing Controllers 9-8

Security

AAA 9-82

AAA AP authorization 9-90

AAA Local Net Users 9-88

AAA RADIUS Acct Servers 9-84

AAA RADIUS Auth Servers 9-83

Access Control Lists 9-98

AP Authentication and MFP 9-109

CA Certificate 9-100

Client Exclusion Policies 9-104

CPU Access Control List 9-99

Custom Signatures 9-109

Disabled Clients 9-97

file encryption 9-82

ID Certificate 9-101

IDS Sensor List 9-100

Local EAP 9-93

Local EAP General 9-93

Local EAP general EAP-FAST parameters 9-96

Local EAP General Network Users Priority 9-96

Local EAP Profiles 9-94

Rogue Policies 9-103

Standard Signatures 9-105

User Login Policies 9-97

Web Auth Certificate 9-102

Wireless Protection 9-102

System

DHCP Scopes 9-56

Mobility Groups 9-50

Network Route 9-49

Network Time Protocol 9-53

QoS Profiles 9-56

Spanning Tree Protocol 9-50

System Commands 9-31

System Interfaces 9-38

Uploading Files from Controllers 9-34

Configuring

ACL Protocol Groups 11-74

Wired Guest Access 9-46

Configuring 802.3 Bridging 9-29

configuring access points 9-164

configuring a client exclusion policy template 11-80

configuring a CPU ACL template 11-75

configuring a high throughput template 11-94

configuring alarm severity 13-149

configuring a local EAP general template 11-50

configuring a local EAP profile template 11-51

configuring a manually disabled client template 11-61

configuring a mesh template 11-94, 11-114

configuring an 802.11h template 11-93

configuring an access point 11-59

configuring an access point for hybrid REAP 12-9

configuring an EAP-FAST template 11-53

configuring an RRM interval template 11-98

configuring an RRM threshold template 11-93

configuring a policy name template 11-86

configuring a roaming parameters template 11-90

configuring a TACACS+ server template 11-46

configuring a trusted AP policies template 11-78

configuring a user authentication priority template 11-122

configuring a user login policies template 11-58

configuring config group 8-16

configuring controller WLANs 9-64

configuring EDCA parameters

through a template 11-90

Configuring Existing Controllers 9-23

configuring firewall for NCS 3-30

configuring global credentials 9-152

configuring global email parameters 15-84

configuring H-REAP AP groups 11-36

configuring Hybrid REAP 12-1

configuring hybrid REAP access point groups 12-11

configuring Hybrid-REAP groups 12-13

Configuring IDS 3-33

Configuring IDS signatures 3-33

configuring IDS signatures 3-33

configuring intrusion detection systems 3-33

configuring multiple country codes 8-14

configuring search results 2-46

configuring spectrum experts 9-200

configuring template

ACL 11-61

for rogue AP rule groups 11-80

configuring templates

802.11b/g RRM interval 11-98

access point authentication and MFP 11-78

access point authorization 11-59

file encryption 11-42

guest users 11-56

known rogue access point 11-93

local management user 11-121

MAC filter 11-58

QoS 11-18

RADIUS accounting 11-45

RADIUS authentication 11-43

syslog 11-120

Telnet SSH 11-119

traffic stream metrics QoS 11-20

trap control 11-116

WLAN 11-22

configuring the controller for hybrid REAP 12-6

configuring the switch

for hybrid REAP 12-5

Configuring User Roles 9-57

connecting client devices

to WLANs 12-11

Connecting to the Guest WLAN 3-44

context aware configuring 16-78

context aware planning 16-74

context-aware software 16-1

Controller

General System Parameters 9-25

Multicast Mode 9-62

Template Launch Pad 11-1

Uploading configuration/logs 9-34

controller

configuring for hybrid REAP 12-6

controller details 11-142

Controller DHCP 9-61

configuring 9-61

controller license information 15-9

controller licenses

managing 15-113

searching 2-46

controller operational status 15-26

Controllers

Adding an Interface 9-39

configuring existing 9-23

DHCP Stats

monitor 5-8

Edit View 5-3

monitor

Summary 5-4

monitoring 5-1

search 5-2

System Parameters

monitor 5-3

controllers

adding 9-4

adding to NCS database 4-1

searching 2-38

specified 1-1

Controller Security

monitor 5-15

Controller Templates

802.11b/g/n Parameters 11-101

Adding 11-2

applying 11-2

AP Username Password 11-11

delete 11-2

managing, creating 11-4

SNMP Community 11-9

Viewing 9-20

Voice

802.11b/g/n 9-116, 11-85, 11-89, 11-104

Controller Time and Date 9-34

controller upgrade settings 15-80, 15-82, 15-100

Controller User Roles 9-57

controller WLANs

configuring 9-64

Country Codes

setting multiple 9-113

country codes

multiple 8-14

Coverage (RSSI)

access points 5-51

Coverage (SNR)

access points 5-51

coverage hole 5-83

coverage hole reports 14-147

CPU access control

template 11-75

CPU Access Control Lists

configuring 9-99

CPU ACL

configuring 9-99

Cranite 9-67

Creating Account 7-17

Creating a Lobby Ambassador Account 7-17

Creating guest user accounts 7-9

creating guest user accounts 7-9

creating placemarks 6-114

creating virtual domains 18-2

CSR 3-44

CSV file 9-160

method for adding autonomous access points 9-160

CSV files 6-115

Current building

delete 6-22

edit map 6-21

Custom and Standard Signatures

Global Settings 9-107

customized webauth

downloading 8-24

Customized Web Auth Bundle

download 9-37

Customized WebAuth Bundles

downloads 9-15

Customized Web authentication 3-42

customized web authentication

downloading 11-66

customize report 14-12

Custom signature 3-39

Custom Signatures

configuring 9-109

D

data collection

for RFID tag 11-126

DCA 11-99, 11-112

802.11a/n 9-121, 11-101

debug commands A-4

debug strategy A-4

default lobby ambassdor credentials

editing 7-8, 7-13

Deleting

MSE 16-6

deleting a license B-4

deleting a WLAN 9-74

deleting guest user templates 7-11

deleting NCS user accounts 7-3

designing a network 6-98

destination type

for report 14-8

Detecting APs 5-107

details

clients 10-41

device certificates 4-3

device information 9-159

method for adding autonomous access points 9-159

device reports 14-88

DHCP

configuring 9-61

DHCP diagnostic test 10-28

DHCP Scopes

configuring 9-56

DHCP server

overriding 11-35

DHCP Stats

controllers

monitor 5-8

diagnostic channel A-1

diagnostic test

802.11 association 10-28

802.1X authentication 10-28

DHCP 10-28

DNS ping 10-28

DNS resolution 10-28

IP connectivity 10-28

profile redirect 10-28

Disable

client 10-38

Disabled Clients

manual 9-97

disabled clients

template 11-61

disabling IDS signatures 3-38

Discovering Templates from Controllers 9-19

Distance

condition type 16-69

DNS ping diagnostic test 10-28

DNS resoltion diagnostic test 10-28

Download

Web Admin Certificate 9-148

Web Auth Certificate 9-148

downloading a customized web authentication page 11-66

downloading autonomous AP images 9-174

Downloading Configurations to Controllers 9-35

downloading customized webauth 8-24

Downloading customized web authentication 3-42

Downloading IDS signatures 3-37

downloading IDS signatures 3-37

from your config group 8-23

downloading images

to autonomous access points 9-163

Downloading Signature Files 9-106

Downloading Software

controllers 9-35

downloading sw to controllers

after adding config group 8-23

downloading vendor CA certificates 4-4

downloading vendor device certificates 4-3

Downloads

Customized WebAuth Bundles 9-15

Vendor CA Certificates 9-17

Vendor Device Certificate 9-16

downstream delay 11-21

downstream packet loss rate 11-21

drawing polygon areas

using map editor 6-70

DTIM 11-87

Dynamic Channel Assignment

802.11a/n 9-121, 11-101

dynamic interface 11-15

E

EAP-FAST

template 11-53

EAP-FAST template 11-53

EAPOL flood signature 3-35

EDCA

802.11b/g/n Parameters 9-136

EDCA parameter

template 11-91

EDCA parameters

configuring through a template 11-90

editing saved reports 14-18

editing scheduled run details 14-16

Editing signature parameters 3-40

editing the default lobby ambassador credentials 7-8, 7-13

edit location presence information 6-18

Edit View

access points 5-45

controllers 5-3

general 2-46

egress interface 9-66

email

configuring parameters 15-84

Email Notifications

alarms 5-138

embedded access points 1-8

emergency

condition type 16-70

enable background audit 8-17

enable enforcement 8-17

enable log module 15-68

enabling 10-39

enabling audit trails

for guest user activities 7-9

enabling IDS signatures 3-38

Enabling Web login 3-41

enabling Web login 3-41

end user license agreementB-7to B-12

Ethernet bridging 9-154

Ethernet Switch

credentials 9-193

remove 9-200

Ethernet Switches

configure 9-220

Ethernet VLAN tagging guidelines 9-155

evaluation license

for controller 15-10

for MSE 15-12

event history 10-25, 16-75

Events

Adhoc Rogue 5-146

details 5-111

monitoring 5-142

overview 5-142

Pre Coverage Holes 5-147

Rogue Alarms 5-108

Rogue AP

details 5-109

Rogue APs 5-145

wIPS 5-147

working with 5-151

events

searching 2-42

exclude device list 15-101

excluded packets 5-80

exclude switch trunk ports 15-101

exclude vendor list 15-102

executive summary report 14-142

Export Asset Information

location server 16-48

exporting a file 6-54

to change access point position 6-54, 6-55

export task list 15-54

extend to ground 6-113

extension license

for controller 15-10

for MSE 15-12

extracting task list 15-60

F

Factory Defaults

restoring 9-33

failover mechanism 15-6

Failover Priority 9-28

feature

of NCS license 15-8

File Encryption

controller 9-82

file encryption template 11-42

filter

editing current auto provisioning 15-64

filtering

using to modify maps 6-87

filtering saved reports 14-17

filtering scheduled run results 14-15

firewall, configuring for NCS 3-30

Floor Areas

delete 6-39

edit 6-39

Floor Plan Editor 1-8

foreign access point interference

avoiding 11-88

foreign AP interference

avoiding 11-88

Frame type 3-39

friendly access point template 11-82

friendly AP

template 11-82

friendly rogue 11-78

friendly rogue access points 3-8

FTP

turning on and off 15-93

G

General Properties

Location Server 16-20

general templates

configuring 11-5

generating migration analysis report 17-13

geographical coordinates 6-112

Global AP Password

configuring 9-59

global credentials

configuring 9-152

Global Settings

Standard and Custom Signatures 9-107

Global settings

for standard and custom signatures 3-40

Global SSID Group

add 9-226

delete 9-227

edit 9-226

gold 11-32

gold queue 5-81

Google Earth

adding launch points 6-117

Google Earth coordinates 6-113

Google KML or CSV

importing into NCS 6-116

GPS markers 6-18

grace period license

for controller 15-10

groups

for hybrid-REAP 12-13

for rogue access point rules 11-80

group setup window on ACS server 15-55

GUEST_USER_ADDED 13-58

GUEST_USER_AUTHENTICATED 13-58

guest account settings 15-82

guest accounts status report 14-116

guest association report 14-118

guest count report 14-119

guest reports 14-116

guest user

template 11-56

guest user account

scheduling 7-11

Guest user accounts

creating 7-9

guest user accounts

creating 7-9

managing 7-11

guest user details

emailing 7-13

print 7-13

Guest Users

monitoring 5-22

guest user sessions report 14-120

guest user templates 11-56

Guest WLAN

connecting 3-44

guidelines

for Ethernet VLAN tagging 9-155

guidelines for using the map editor 6-5

H

heater status 5-77

heat map

described 6-38

Help Menu 2-26

hierarchy

of mesh network 6-85

Hierarchy of Mesh parent to child 6-87

hierarchy of mesh parent to child 6-87

High Throughput

802.11a/n 9-128

802.11b/g/n Parameters 9-138

high throughput

template 11-94

high throughput template

configuring 11-94

historical report type 14-1

History Parameters

location server 16-46

H-REAP AP Groups

configuring 9-79

H-REAP AP groups

configuring 11-38

configuring template 11-38

H-REAP configuration tab 11-39

H-REAP Group

auditing 9-81

H-REAP groups

auditing 12-15

H-REAP local switching 9-70

H-REAP Parameters 9-79

H-REAP Users 11-40

HTTP

turning on and off 15-93

Hybrid REAP

configuring 12-1

hybrid REAP

bandwidth restriction 9-71, 11-33, 12-3

hybrid REAP access point groups 12-11

hybrid-REAP groups 12-12

Hybrid REAP local switching 11-32

hysteresis 11-93

I

ID Certificate

configuring 9-101

identity client 10-16

Identity Services Engine 16-80

IDS 3-33

configuring 3-33

IDS Sensor List

configuring 9-100

IDS sensors 3-33

IDS Signatures

configuring 9-105

download 9-37

IDS signatures 3-33

disabling 3-38

downloading 3-37

downloading from config group 8-23

enabling 3-38

uploading 3-36

images

downloading to autonomous access points 9-163, 9-164

Import Asset Information

location server 16-48

importing a file 6-54

to change access point position 6-54, 6-55

importing coordinates

as CSV file 6-115

into Google Earth 6-113

importing Google KML or CSV into NCS 6-116

Import map 6-53

In/Out

condition type 16-69

information elements

Aironet 11-33

infrastructure MFP 3-31

ingress interface 9-66

Inspect Location Readiness 6-76

Inspect VoWLAN Readiness 6-77

installing a license B-4

insufficient memory 5-80

interface group 11-20

Interferers

summary 5-120

interferers

summary 9-201

inter-subnet roaming 8-4

Intrusion Detection Systems 3-33

intrusion detection systems 3-33

invalid association request 5-82

invalid reassociation request 5-82

inventory reports 14-68, 14-105

IOS access points

adding 9-159

adding by device information 9-159

IOSAP_DOWN 13-117

IOSAP_LINK_DOWN 13-59

IOSAP_LINK_UP 13-58

IOSAP_UP 13-59

IP connectivity diagnostic test 10-28

K

KEK

key encryption key 11-44

key wrap 11-44

KML file 6-113

L

LAG mode 11-7

Latest Network Audit Report 9-22

latitude 6-112

Layer 1 security solutions 3-2

Layer 2 11-25

Layer 2 security solutions 3-2

Layer 3 11-28

Layer 3 security solutions 3-2

Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-29

LBS authorization 11-59

template 11-60

LDAP Servers 9-86

LDAP servers 9-70

template 11-47

LEAP authentication

requirements 8-8

legacy syslog

template 11-120

legacy syslog template 11-120

license

backup and restore B-4

license agreementB-7to B-12

license installation B-4

license management 15-114

licenses B-1

license types B-1

Lightweight AP Protocol Transport Mode 9-29

limitations for high reliability 15-104

Link Aggregation 9-31

link aggregation (LAG)

guidelines 12-4

link metric

adjusted 6-80

unadjusted 6-80

link SNR 6-80

link stats report 14-126

Load

access points 5-48

load 6-97

load balancing 9-113

Lobby Ambassador

account 7-17

creating account 7-17

Lobby ambassador 7-9

Lobby Ambassador Account

creating 7-17

editing 7-18

lobby ambassador defaults

setting 7-6

local authentication

for hybrid-REAP groups 12-13

Local EAP 9-93

General EAP-FAST Parameters 9-96

General Network Users Priority 9-96

General Parameters 9-93

Profiles 9-94

local EAP authorization 9-70

Local EAP check box 11-30

local EAP general

template 11-50

local EAP general template 11-50

local EAP profile template 11-51

Local Management Users

configuring 9-149

local management users

template 11-121

local management user template 11-121, 11-122

Local Net Users

configuring 9-88

local net users

template 11-55

local net users template 11-55

Local Password Policy 15-130

local switching

Hybrid REAP 11-32

Location

calibration 1-11

location servers 9-230

notifications 16-62

notification settings 16-64

notifications summary 16-62

synchronize servers 16-10

location change

condition type 16-70

location configuration

template 11-125

Location History

clients 10-41

location optimized monitor mode 9-168

Location Parameters

location server 16-57

location presence

assigning 6-18

Location Readiness 6-76

Location Server

active sessions 16-24

administration 16-20

advanced parameters 16-25

backup 16-35

export asset information 16-48

general properties 16-20

history parameters 16-46

import asset information 16-48

location parameters 16-57

logs 16-27

maintenance 16-35

NCS alarms 16-33

NCS events 16-33

NMSP parameters 16-22

notification parameters 16-59

restore 16-36

server events 16-32

Location server

adding 16-9

location server

backup historical data 16-36

configuration clearing 16-27

reboot hardware 16-26, 16-27

Location Servers 9-230

location upgrade B-2

log analysis 10-25

logging 15-17

logging into the NCS user interface2-11to 2-12

logging options 15-67

logging the lobby ambassador activities 7-8

login.html 3-42

login disclaimer 15-83

login policies

template 11-58

log message levels 15-68

log modules

enabling 15-68

Logs

location server 16-27

LOMM 9-168

configuring access point radios 9-184

longitude 6-114

long preambles, enabling for SpectraLink NetLink phones 4-5

LWAPP

template

edit 11-135

templates 11-127

Transport Mode 9-29

LWAPP migration 9-158

LWAPP template

new 11-127

M

MAC Filtering

configuring 9-89

MAC filtering 11-27

template 11-58

MAC filter template 11-58

MAC frequency 3-39

MAC information 3-39

MACK

message authenticator code keys 11-44

mail

transport type 16-71

mail server configuration 15-84

Maintenance

location server 16-35

malformed neighbor packets 5-80

malicious rogue 11-78

malicious rogue access points 3-5, 3-6

managed network

security index 3-5

management frame flood signatures 3-34

Management Frame Protection 3-31

management frame protection 9-73, 11-63

Management Frame Protection Summary

controllers

monitor 5-19

management interface 11-8

Management Parameters

configuring 9-143

management queue 5-81

managing clients 10-1

managing controller licenses 15-113

managing current reports 14-13

managing MSE licenses 15-115

managing saved reports 14-16

managing virtual domains 18-7

managing WLAN schedules 9-75

mandatory data rates 11-88

manually disabled client

template for 11-61

Manually Disabled Clients

managing 9-97

Map Editor

general notes and guidelines 6-5

map editor

guidelines 6-5

guidelines for using 6-5

using to draw polygon areas 6-70

map editor functions 6-4

map properties

editing 6-14

maps

searching 2-44

using to monitor link stats 6-78

using to monitor mesh AP neighbors 6-83

map size 6-109

map view

updating 6-88

Menu Bar 2-13

Mesh

monitoring health 5-77

statistics for AP 5-78

mesh access point neighbors

monitoring 6-83

mesh access points

monitoring 6-81

mesh configuration

template 11-114

mesh link statistics 6-78

monitoring 6-78

mesh neighbors 6-83

mesh network

monitoring using maps 6-78

mesh network hierarchy 6-85

mesh networks

background scanning 9-53

monitoring 6-78

Mesh Parameters 9-139

mesh parent-child hierarchical view 6-49

mesh reports 14-124

mesh template

configuring 11-114

Mesh tree

viewing 6-85

mesh tree

viewing 6-85

message integrity check information element 11-63

metrics

in QoS 11-21

MFP 3-31, 9-73

for clients 3-31

MFP attacks 3-9

MFP client protection 11-35

MFP signature generation 11-35

MFP Summary

controllers

monitor 5-19

MFP templates 11-63

MIC IE 11-63

migration analysis

running 17-13

migration analysis report

generating 17-13

migration analysis summary

viewing 11-141

migration template 11-139

Migration Templates

Autonomous APs

edit 11-140

minimum RSSI 11-92

Mirror Mode 10-39

mirror mode 9-169

missing

condition type 16-69

mobile announce messages 8-8

Mobility 16-1

Mobility Stats

monitor 5-23

service 16-1

mobility 8-1

Mobility Anchor Group Keep Alive Interval 9-31

mobility anchors 8-12, 9-76

Mobility Group

Prerequisites 9-51

Mobility Groups

configuring 9-50

Messaging 9-51

mobility groups 8-7

prerequisites8-8to 8-9

mobility groups, configuring 8-8

mobility scalability 8-11

Mobility Services 16-1

viewing 16-3

mobility services engine

deleting 16-6

Mobility Stats

monitor 5-23

modifying a migration template 11-142

modifying map displays 6-87

using filters 6-87

Monitor

Alarms 5-1

Events 5-142

Ports

overview 5-9

Rogue AP Rules 5-20

Monitor Access Points

details 5-56

edit view 5-45

load 5-48

radio type

802.11 MAC counters 5-75

on demand statistics 5-68

operational parameters 5-72

view alarms 5-76

view events 5-77

radio utilization 5-55

search 5-42

search results 5-43

Tx power and channel 5-55

Monitor Alarms

details 5-86

Monitor APs

802.11 Counters 5-54

AP Profile Status 5-55

Coverage (RSSI) 5-51

Coverage (SNR) 5-51

details

CDP Neighbors 5-66

general 5-56, 5-62

interfaces 5-64

Dynamic Power Control 5-49

Interference 5-50

Noise 5-50

Radio

details 5-68

TSM 5-55

UpTime 5-51

Voice Statistics 5-52

Voice TSM Reports 5-54

Voice TSM Table 5-52

Monitor Chokepoints 5-115

Monitor Client

detecting APs

details 10-41

disable 10-38

location history 10-41

present map 10-39

recent map 10-39

remove 10-39

roam reason 10-40

v5 statistics 10-35

voice metrics 10-41

Monitor Controllers 5-1

802.11a/n parameters 5-25

802.11a/n RRM Grouping 5-26

802.11a/n RRM Groups 5-30

802.11b/g/n parameters 5-28

CLI Sessions 5-7

ports

general 5-9

spanning tree protocol 5-5

System

summary 5-4

WLANs 5-9

Monitor Events

Details 5-144

search 5-144

Monitoring

Guest Users 5-22

monitoring active sessions 7-4

monitoring channel width 5-83

monitoring mesh access point neighbors 6-82

using maps 6-83

monitoring mesh health 6-85

monitoring mesh link statistics

using maps 6-78

monitoring mesh networks

using maps 6-78

monitoring neighboring channels 9-53

monitoring pre-coverage holes 5-84

monitoring spectrum experts 9-201

monitor mode

location optimized 9-168

Monitor Tags 5-113

most recent audit alarms 17-12

most recent client alarms 10-7

most recent rogue adhocs 3-6

MSE

adding 16-5

deleting 16-6

MSE authorization

template 11-60

MSE license information 15-12

MSE licenses

managing 15-115

multicast mobility mode 8-11

Multicast Mode

controller 9-62

Multiple Country Codes

setting 9-113

multiple country codes

configuring 8-14

multiple syslog

template 11-121

multiple syslog template 11-120

N

N+1 redundancy 8-5

NAC Out-of-Band Integration 9-43

NAC state 9-72

NAT 8-10

NCS

overview 1-2

NCS_EMAIL_FAILURE 13-137

NCS-ADV-SI-SE-10 B-2

NCS Alarm

status 16-33

NCS Alarms

location servers 16-33

NCS database

restoring 4-8

on Linux 4-8

restoring in high availability environment 4-9

scheduling automatic backups 4-7

NCS Events

location servers 16-33

status 16-33

NCS guest operations report 14-122

NCS home 2-11

NCS licenses B-1

NCS Location Calibration 1-11

NCS password

recovering 4-13

NCS user accounts

adding 7-2

changing passwords 7-4

deleting 7-3

NCS user interface 7-10

logging into2-11to 2-12

netmask 11-70

NetStumbler signature 3-35

network address translation 8-10

Network Audit Report

latest 9-22

network design 6-98

network designs 16-10

network protection 3-33

Network Routes

configuring 9-49

Network Summary page 2-12

network summary reports 14-141

Network Time Protocol

configuring 9-53

network users priority

template 11-54

network utilization reports 14-149

new rogue access points report 14-176

NMSP Parameters

location server 16-22

node hops 5-80

nodes report 14-128

noise

avoiding non-802.11 types 11-88

avoid non-802.11 11-88

non-802.11 noise

avoiding 11-88

non-aggregated historical data 15-82

non-Cisco ACS server

for use with RADIUS 15-60

normal mode

for Ethernet port 9-156

North Bound API 7-15

Notification Parameters

location server 16-59

Notifications

location 16-62

Notification Settings

location 16-64

Notifications Summary

location 16-62

NTP configuration 9-53

NTP server template 11-10, 11-14

null probe response signatures 3-34

O

On Demand Statistics

access points 5-68

onstacle color coding 6-72

Operational Parameters

access points 5-72

OUI search 15-101

outdoor location

creating with Google Earth 6-112

overview

Cisco Unified Network Solution1-1to 1-2

NCS 1-2

P

packet error rate link color 6-87

packet error statistics report 14-132

packet jitter 11-21

packet latency 11-21

packet loss 11-21

packet loss rate 11-21

packet queue statistics report 14-134

packet stats report 14-130

parent changes 5-80

Passive Client 9-72

passthrough 11-29

PCI report 14-72

PEAP 11-52

peer-to-peer blocking 11-33

performance reports 14-143

permanent license

for controller 15-10

for MSE 15-12

physical appliance 2-2

placemarks

creating 6-114

placement of access points 6-40

planning mode 6-92

to calculate access point requirements 6-90

planning mode, calculating access point requirements 6-90

platinum 11-32

platinum queue 5-81

PLR 11-21

policy manager solutions 3-2

polygon areas

drawing with map editor 6-70

poor neighbor SNR 5-80

Port Parameters

configuring 9-142

Ports

Monitor

overview 5-9

monitor controllers 5-9

positioning access points 6-54

positioning chokepoints 6-54

positioning Wi-Fi TDOA receivers 6-54

power injector settings 9-171

pre-coverage holes

monitoring 5-84

Preferred Call 9-116

Prerequisites 2-4

Present Map

clients 10-39

print guest user details 7-13

probe cycle count 9-116

Profile

List 9-220

Profile editor 9-222

profile redirect diagnostic test 10-28

protection type 11-64

Q

QoS 11-31

QoS Profiles

configuring 9-56

QoS templates 11-18

queues

silver, gold, platinum, bronze, management 5-81

quick search 2-33

Quiet time 3-39

R

Radio

access points

configuring 9-175

radio resource management 11-88

Radio Status

scheduling and viewing 9-186

radio status

scheduling 9-186

Radio Utilization

access points 5-55

RADIUS 15-139

RADIUS Accounting

controllers

monitor 5-17

RADIUS accounting servers

template 11-45

RADIUS accounting template 11-45

RADIUS and TACACS+ attributes

virtual domains 7-16, 18-9

RADIUS Authentication

controllers

monitor 5-15

RADIUS authentication template 11-43

RADIUS Auth Servers

AAA RADIUS

Auth Servers 9-83

RADIUS fallback

template 11-46

RADIUS fallback mode 11-47

RADIUS servers 9-70

configuring 15-139

reachability status 9-200

Readiness

location 6-76

VoWLAN 6-77

reassociation request failures 5-82

reassociation request success 5-82

reassociation request timeouts 5-82

reauthentication request failures 5-82

reauthentication request success 5-82

reauthentication request timeout 5-82

Rebooting Controllers 9-8, 9-9

recent adhoc rogue alarms 3-9

Recent Map

clients 10-39

recent rogue AP alarms 3-9

recovering the NCS password 4-13

recurrence

for report 14-8

refresh browser 6-98

refresh component icon 2-22

Refresh Config 9-18

refresh from network 6-97, 6-109

relative to ground 6-113

Remove APs 9-186

Remove Controllers 9-8

removing controllers from config group 8-18

removing templates from config group 8-20

report

running new 14-6

report launch pad 14-2

Reports

Rogue AP Events 14-181

reports

scheduled runs 14-14

reset AP now 9-173

Restore

location server 16-36

Restoring Factory Defaults 9-33

restoring NCS database

in high availability environment 4-9

restoring NCS database on Linux 4-8

retain NCS value 8-22

RF calibration model, creating 4-5

RF Calibration Models

apply to maps 6-67

delete 6-67

RFID data collection 11-126

RF profile traps 11-118

RF update traps 11-118

Roaming

802.11b/g/n Parameters 9-137

roaming 8-1

roaming parameter

template 11-92

roaming parameters template

configuring 11-92

roaming time 11-21

Roam Reason

clients 10-40

rogue access point events report 14-183

rogue access point rule groups 11-80

rogue access point rules

configuring a template 11-78

viewing or editing 9-190

rogue access points

friendly 3-8

malicious 3-6

monitoring3-9to 3-10

solutions for 3-3

unclassified 3-7

rogue access points report 14-183

rogue adhocs

most recent 3-6

Rogue Alarm Events 5-108

Rogue AP

alarm details 5-94, 5-109

alarms 5-90

containment 5-152

location 5-152

malicious 5-89

Rules

monitor 5-20

tagging 5-152

Rogue AP Events

report 14-181

rogue AP rule groups

template 11-80

Rogue AP Rules

configuring 9-104

details 5-21

rogue AP rules

template 11-78

Rogue APs

classifying 5-94

friendly 5-89

overview 5-86

unclassified 5-90

Rogue Client

details 5-98

rogue clients

searching 2-44

rogue detector 9-168

Rogue Devices

detecting 5-86

rogue location discovery protocol 11-77

Rogue Policies

configuring 9-103

rogue policies

template 11-77

template for 11-76

role criteria 11-142

root access points (RAPs)

selecting 9-158

root mode

changing from station role 17-13

routing state 5-80

RRM

DCA

802.11b/g/n Parameters 9-133

Radio Grouping

802.11b/g/n Parameters 9-133

RRM DCA 9-121

RRM Intervals

802.11a/n 9-119

802.11b/g/n Parameters 9-131

RRM intervals 11-93

template 11-98

RRM interval template

configuring 11-94, 11-98

RRM Radio Grouping

802.11a/n 9-123

RRM threshold

template 11-97

RRM Thresholds

802.11b/g/n Parameters 9-131

RRM threshold template

configuring 11-96

RSSI legend 6-109

rules

for rogue access point 11-78

viewing or editing for rogue access points 9-190

running a new report 14-6

running a saved report 14-18

running migration analysis 17-13

RX neighbor requests 5-80

RX neighbor responses 5-80

S

Save Config to Flash 9-18

saved report

running 14-18

saved reports

editing 14-18

filtering 14-17

managing 14-16

saved searches 2-46

scalability parameters 8-11

scan cycle period threshold 9-116

scan threshold 11-93

Scheduled Configuration 9-211

Schedule details 9-164

scheduled run details

editing 14-16

scheduled run results 14-14

filtering 14-15

Scheduled Task

AP status report 9-211

schedules

managing for WLANs 9-75

scheduling guest user account 7-11

scheduling radio status 9-186

Search

access points 5-42

controller results 5-2

Events 5-144

overview 2-27

search alarm parameters 2-36, 2-39, 5-32

search feature 2-33

using for troubleshooting 10-23

searching access points 2-37

searching AP-detected interferers 2-43

searching clients 2-40

searching controller licenses 2-38

searching controllers 2-39

searching events 2-42

searching maps 2-44

searching rogue clients 2-44

searching SE-detected interferers 2-43

searching shunned clients 2-45

searching tags 2-45

searching Wi-Fi TDOA receivers 2-44

search results

configuring 2-46

secondary NCS operation 15-6

Security

AAA

LDAP servers 9-86

TACACS+ Servers 9-87

Web Auth Configuration 9-91

AAA MAC Filtering 9-89

Local EAP 9-93

security color range 3-5

security configurations

monitoring 5-139

security index 3-5

security mesh statistics 5-81

Security Reports

Rogue AP Events 14-181

security solutions3-1to 3-29

security summary 14-185

security tab

interpreting 3-4

security thermometer 3-5

sending mobile announce messages 8-8

sensors

viewing IDS types 3-33

Server Events

location servers 16-32

status 16-32

set sorting buttons 14-12

Set Time

controller 9-34

setting AP failover 9-152

Setting Controller Time and Date 9-34

setting multiple country codes 9-81

shunned clients

searching 2-45

silver 11-32

silver queue 5-81

Sniffer 11-128

Sniffer Feature 9-111

sniffer mode 9-168

SNMP

transport type 16-71

SNMP authentication 11-117

SNMP Community

controller templates 11-9

SNMP mediation 15-68

SNR definition 6-87

SNR down 6-80

SNR UP 6-80

SNR up 6-80

SOAP 16-71

software

downloading config groups to controllers 8-23

software, updating 4-2

Spanning Tree Protocol

configuring 9-50

monitor controllers 5-5

SpectraLink NetLink phones, enabling long preambles 4-5

spectrum expert

adding 9-200

spectrum expert details 9-202

Spectrum Experts

details 5-121

Interferers 5-120

summary 5-119

spectrum experts

configuring 9-200

monitoring 9-201

summary 9-201

SSID Group

add 9-227

add from global list 9-228

add global 9-226

delete 9-228

delete global 9-227

edit 9-228

edit global 9-226

SSID Group List

wIPS 9-225

SSID group list

global 9-225

SSID groups

wIPS 9-227

Standalone Building

adding floor plan 6-32

Standard and Custom Signatures

Global Settings 9-107

Standard signature 3-39

Standard Signature Parameters

configuring 9-105

standard signatures 3-33

static WEP 9-67

Static WEP-802.1X 9-67

station role

changing to root mode 17-13

Status Report

scheduled task 9-213

status schedules

managing for WLANs 9-75

stranded APs report 14-136

supplicant credentials

for AP 802.1X 11-12

supported data rates 11-88

Switch

credentials 9-193

remove 9-200

switch

configuring for hybrid REAP 12-5

Switches

ethernet 9-220

Switch Port Tracing

Details 15-103

Troubleshooting 15-103

symmetric mobility tunneling 11-8

symmetric tunneling 8-5

Synchronize servers

location 16-10

Syslog

configuring individual controller 9-147

Individual controller 9-147

multiple servers 9-147

syslog

transport type 16-71

syslog templates 11-120

System

General Properties 9-25

System Commands

controller 9-31

System Interfaces

Controllers 9-38

System parameters

controllers

monitor 5-3

System requirements 2-5

T

TACACS+ 15-137

TACACS+ server

configuring a template for 11-48

template 11-49

tagged packets 9-158

Tags 5-113

tags

searching 2-45

Task

configuration backup 15-25

status 15-26

Telnet SSH

template 11-117

Telnet SSH Parameters

configuring 9-146

Telnet SSH templates 11-119

temperature 5-77

template

configuring for rogue AP rules 11-78

template for configuring network user credentials 11-54

Template Launch Pad

overview 11-1

Templates

AP Configuration 11-127

delete 11-2

test analysis tab 10-28

TFTP

turning on and off 15-93

TFTP details 11-143

TFTP Server

adding 9-230

TFTP server 3-36

TFTP Servers

configure 9-230

delete 9-230

thermometer color range 3-5

threats

access points 3-8

throughput report 14-56

tilt 6-113

Timer Setting

AP 9-63

total interferer count 9-202

total mismatched controllers 17-12

TPC 11-100, 11-113

trace 15-71

traffic indicator message 11-87

Traffic Stream Metrics

access points 5-55

traffic stream metrics QoS status 11-21

traffic stream metrics QoS template 11-20

traffic stream metrics report 14-151

transition time 11-93

Transport Mode

LWAPP 9-29

transport types 16-71

trap

802.11 security 11-118

Trap Control

configuring 9-144

trap control

template 11-117

trap control templates 11-116

trap receiver

template 11-116

Trap Receivers

configuring 9-143

trap receiver template 11-116

traps

AAA 11-118

access point 11-118

client related 11-117

RF profile 11-118

RF update 11-118

unsupported 13-149

traps added in 2.1 13-23

traps added in 2.2 13-28

traps added in 3.0 13-31

traps added in 3.1 13-34

traps added in 3.2 13-38

traps added in 4.0 13-38

traps added in 4.0.96.0 13-44

traps added in 4.1 13-47, 13-57

traps added in release 6.0 13-63

traps added in release 7.0 13-149

trend report type 14-1

Troubleshooting

Switch Port Tracing 15-103

troubleshooting A-1

using logging options 15-71

troubleshooting voice RF coverage 6-97

trunk mode 9-156

trusted AP policies

template for 11-78

trusted AP policies template 11-78

TSM

access points 5-55

tunneling 8-5

TX neighbor requests 5-80

TX neighbor responses 5-80

Tx Power and Channel

access points 5-55

Tx power and channel report 14-154

type

of NCS license 15-9

U

UDI

retrieving on controllers and access points 5-83

unadjusted link metric 6-80

unclassified rogue 11-78

unclassified rogue access points 3-7

understanding virtual domains 18-9

unique clients report 14-64

unique device identifier 5-83

unknown association requests 5-82

unknown reassociation request 5-82

untagged packets 9-158

Update map view 6-88

update map view 6-88

updating system software 4-2

upgrade settings

for controller 15-79

upgrading autonomous access points 11-144

upgrading NCS

in high availability environment 4-12

upgrading the network 4-12

Uploading IDS signatures 3-36

uploading IDS signatures 3-36

Uploading Signature Files 9-106

upstream delay 11-21

upstream packet loss rate 11-21

UpTime

access points 5-51

uptime reports 14-111

User accounts

for guest 7-9

user accounts

for guest 7-9

user authentication priority template

configuring 11-122

user credential retrieval priority 11-54

user details

emailing 7-13

printing 7-13

User Interface

Menu Bar 2-13

User Login Policies

configuring 9-97

user login policies

configuring a template 11-58

template 11-58

User Preferences 7-1, 15-7

user preferences 15-109

User Roles

configuring 9-57

Users 15-130

using filtering 6-79, 6-86

using logging

for troubleshooting 15-71

using maps

to monitor mesh AP neighbors 6-83

to monitor mesh link statistics 6-78

using maps to monitor mesh networks 6-78

using planning mode 6-70

using template

ACL 11-75

for friendly access point 11-82

using templates

802.11b/g RRM interval 11-94, 11-98

802.11b/g RRM threshold 11-96

access point authentication & MFP 11-63

access point authorization 11-59

file encryption 11-42

for legacy syslog 11-120

for multiple syslog 11-120

guest users 11-56

local management user 11-121, 11-122

local net users 11-55

MAC filter 11-58

NTP server 11-10, 11-14

password policy 11-68

QoS 11-18

RADIUS accounting 11-45

RADIUS authentication 11-43

syslog 11-120

Telnet SSH 11-119

traffic stream metrics QoS 11-20

trap control 11-116

trap receiver 11-116

web authentication 11-64

WLAN 11-22

utilization reports 14-113

V

V5 client statistics 14-67

V5 Statistics

client 10-35

Vendor CA Certificates

downloads 9-17

vendor CA certificates

downloading 4-4

Vendor Device Certificate

downloads 9-16

vendor device certificates

downloading 4-3

vendor search 15-101

View 2-23

View Alarms

access points 5-76

view in chart icon 2-23

Viewing

Mobility Services 16-3

viewing audit status

for access points 9-187

viewing autonomous access points 9-163

viewing clients

identified as WGBs 5-83

viewing Google Earth maps 6-117

Viewing Mesh tree 5-78

view in grid icon 2-23

Viewing shunned clients 3-33

viewing shunned clients 3-33

Viewing Templates Applied to a Controller 9-20

viewing the audit trail 7-8

viewing the migration analysis 11-141

view list 10-24

virtual appliance 2-2

virtual domains 18-1

assigning 7-15, 15-133

attributes 7-16, 18-9

creating 18-2

hierarchy 18-3

managing 18-7

understanding 18-9

VLAN tagging 9-154

Voice

802.11b/g/n Controller Templates 9-116, 11-85, 11-89, 11-104

Voice Metrics

clients 10-41

Voice-over-Internet Protocol

snooping 9-72

Voice RF Coverage issues 6-78

Voice Statistics

access points 5-52

voice statistics 14-159

Voice TSM Reports

access points 5-54

Voice TSM Table

access points 5-52

VoIP calls graph 14-156

VoIP calls table 14-157

VoIP snooping 9-72

VoWLAN Readiness 6-77

W

Web Admin

configuring 9-147

Web Admin Certficate

downloading 9-36

Web Auth Certificate

configuring 9-102

Web Auth Configuration 9-91

web authentication

template 11-64

web authentication template 11-64

web authentication type 11-65

Web authentication types 3-41

web auth security A-3

web login

enabling 3-41

web policy 9-69

Wellenreiter signature 3-35

WiFi TDOA Receivers

adding 9-208

configure 9-207

edit 9-210

remove 9-210

tag location 9-208

Wi-Fi TDOA receivers

positiioning 6-54

searching 2-44

wIPS 16-1

planning and configuring 16-80

Profile

add 9-221

Profile Editor 9-222

Profile List 9-220

SSID Group List 9-225

wIPS Alarms

details 5-140

monitoring 5-139

wIPS Profile

apply 9-224

delete 9-224

wIPS Profiles

add 9-221

configure 9-200, 9-220

Wired Client Authentication Failure 10-6

Wired Client Auth fail VLAN Assigned 10-6

Wired Client Authorization Failure 10-6

Wired Client Critical VLAN Assigned 10-6

Wired Client Guest VLAN Assigned 10-6

Wired Client Security Violation 10-6

Wired Guest Access

configuring 9-46

Wireless Management 9-31

Wireless Protection Policies

configuring 9-102

WLAN

adding 9-73

deleting 9-74

WLAN AP groups 11-36

WLAN details

viewing 9-65

WLANs

configuring 9-64

monitor 5-9

web auth security A-3

WLAN status schedules

managing 9-75

WLAN templates 11-22

WMM parameters 9-70

WMM policy 11-32

work group bridge mode 9-164

worst node hops report 14-138

WPA+WPA2 9-68

X

XML mediation 15-69

Z

zoom in or out 6-109