Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

Index

Numerics

802.11a/n

Parameters

monitor 5-25

RRM Grouping

monitor 5-27

RRM Groups

monitor 5-30

802.11a/n Parameters 9-124

DCA 9-127

EDCA 9-132

General 9-124

High Throughput 9-134, 9-135

Media 9-130, 9-140

Roaming 9-133

RRM Intervals 9-126

RRM Radio Grouping 9-129

RRM Thresholds 9-134

802.11 association diagnostic test 10-30

802.11b/g/n

Parameters

monitor 5-29

802.11b/g/n DTIM period 11-37

802.11b/g/n Parameters 9-136

EDCA 9-143

General 9-136

High Throughput 9-144, 9-145

Roaming 9-143

RRM Intervals 9-138

RRM Thresholds 9-138

802.11b/g/n Parameters Controller Templates 11-107

802.11b/g RRM interval template 11-104

802.11b/g RRM threshold templates 11-102

802.11 Counters

access points 5-55

802.11 counters report 14-150

802.11 General Parameters

configuring 9-117

802.11h template 11-99

configuring 11-99

802.11 MAC Counters

access points 5-79

802.11n summary reports 14-146

802.11 Parameters

configuring 9-117

802.11 security trap 11-125

802.1n scaling reports 14-6

802.1X authentication diagnostic test 10-30

802.1X supplicant credentials 11-12

802.3 Bridging

configuring 9-30

802.3x Flow Control 9-30

880 series ISRs 1-7

A

AAA

AAA mode 15-87

active sessions 15-95

AP/MSE Authorization 9-94

General 9-87

LDAP Servers 9-90

local password policy 15-88

MAC Filtering 9-93

RADIUS 15-98

TACACS+ 15-95

TACACS+ Servers 9-91

users 15-89

Web Auth Configuration 9-95

AAA Local Net Users 9-92

AAA Mode 15-87

AAA override 11-31

AAA RADIUS

Acct Servers 9-88

Fallback Parameters 9-89

AAA servers 11-30

AAA traps 11-125

absolute 6-114

Access Control List

Rules 9-102

Access Control Lists

configuring 9-102

access control list template 11-79

access control list templates 11-72

access mode 9-166

access point

configuring for FlexConnect 12-8

credentials 9-162

friendly 11-86

access point authorization template 11-62

access point icons 6-45

access point load

avoiding 11-94

Access Point Password

Global 9-60

access point positions

changing with import or export of file 6-56, 6-57

Access Points

Cisco APs

configuring 9-115

detecting 5-112

disabling

ineligible 11-154

Monitoring

overview 5-43

radio utilization 5-56

Tx power and channel 5-56

access points

configuring 9-174

configuring for LOMM 9-194

embedded 1-7

positioning 6-56

searching 2-37, 9-198

access points, adding to maps6-34to 6-39

access point threats 3-8

access point threats or attacks 3-8

Access Point Timer Settings 9-64

access point traps 11-124

Account

creating 7-17

ACL

configuring 9-102

Rules 9-102

ACL IP group details 11-72

ACL Protocol Groups

configuring 11-78

ACL template 11-79

configuring 11-79

ACS View Server credentials 9-247

ACS View Servers

configure 9-246

ACS view server tab 10-28

active interferer count per channel 9-212

active interferers 9-211

active interferers count chart 9-212

Active Sessions 15-95

active sessions

monitoring 7-4

adaptive scan threshold 11-99

adaptive wIPS alarm report 14-168, 14-170, 14-175, 14-184

adaptive wIPS top 10 APs report 14-173

add config groups 8-16

add group members 8-10

adding a spectrum expert 9-210

adding autonomous access points

by CSV file 9-170

by device information 9-169

adding autonomous access points to NCS 9-169

adding IOS access points 9-169

by device information 9-169

adding launch points

for Google Earth 6-118

adding NCS as TACACS+ server 15-103

Adding System Interfaces 9-40

adding templates from config group 8-19

Adhoc Rogue

alarm details 5-108

Alarms

overview 5-105

Events

details 5-116

monitoring alarms 5-106

adhoc rogues 3-6

adhoc rogues report 14-178

adjusted link metric 6-82

Administrative Tools

overview 2-27

advanced debug 17-7

advanced options 6-94

Advanced Parameters 16-33

advanced search 2-34, 5-110

Advanced tab

on WLAN template 11-33

age out dual band 9-121

age out suppression 9-121

aggregated historical data 15-60

Aggressive Load Balancing 9-31

aggressive load balancing 9-118

Aironet IE 9-73, 11-34

Airopeek

configuring 9-116

Alarm

details 5-91

alarm 5-132

alarm cleanup options 15-52

alarm counts

for access points 5-138

for controllers 5-138

for coverage hole 5-138

for malicious APs 5-138

for mesh links 5-138

for mobility 5-138

for security 5-138

for unclassified APs 5-138

alarm dashboard 5-137

alarm display options 15-52

Alarms

acknowledging 5-140

Adhoc Rogue

details 5-108

overview 5-105

assigning 5-139

cleaning 5-140

deleting 5-140

email notifications 5-145

monitoring 5-1

Rogue APs 5-95

unassigning 5-139

alarms 13-1

assigning 3-16

clearing 3-16

config audit 17-11

deleting 3-16

searching 2-36

unassigning 3-16

alarm severity

configuring 5-139

alarm summary 2-27

alarm trigger threshold 11-66

alarm warning 5-141

all groups window 15-106

allow AAA override 9-71

alternate parent report 14-130

altitude 6-114

altitude mode 6-114

anonymous provision 11-57

anonymous provisioning 11-57

AP/MSE Authorization

configuring 9-94

AP authentication

template 11-65

AP Authentication and MFP

configuring 9-114

AP authorization

template 11-62

AP Config

export 9-185

AP-detected interferers

searching 2-43

AP Failover Priority 9-29

AP failover priority

setting 9-162

AP load

avoiding 11-94

AP Location data 6-55

AP manager IP 11-152

applying CLI commands 11-130

applying config groups 8-19

AP policies 3-31

AP policies template 11-82

AP Profile Status

access points 5-56

AP profile status report 14-92

APs

802.11 Counters 5-55

AP Profile Status 5-56

autonomous

templates 11-146

configuration templates 11-136

copy and replace 9-195

Coverage (RSSI) 5-52

Coverage (SNR) 5-52

details 5-57

CDP Neighbors 5-69

general 5-58, 5-65

interfaces 5-67

Dynamic Power Control 5-50

Edit View 5-46

Export AP config 9-185

Generate Report 5-47

Interference 5-51

lightweight

templates 11-137

lightweight access point template 11-137

monitor

overview 5-43

Noise 5-51

Radio

details 5-71

radio 9-185

remove unassociated 9-195

TSM 5-56

UpTime 5-52

Voice Statistics 5-53

Voice TSM Reports 5-55

Voice TSM Table 5-53

AP Status Report

Scheduled Task 9-221

AP Template

tasks 9-221

AP Template Task

delete 9-222

enable, disable 9-222

history 9-222

modify 9-221

AP Timer Settings 9-64

AP up time 5-81

AP Username Password Controller Templates 11-11

asset matching criteria 16-77

assigning location presence 6-18

assigning virtual domains 7-16, 15-92

association request failures 5-85

association request success 5-85

association request timeouts 5-85

attacks

access points 3-8

attacks detected 3-9

AUDIT_STATUS_DIFFERENCE 13-87

auditing config groups 8-20

auditing FlexConnect groups 12-13

Audit Mode

basic audit 15-54

template based audit 15-54

Audit Now 9-21

audit report

for alarms 16-89

audit trail

viewing 7-9

Authentication Priority

configuring 9-156

authentication priority

template 11-129

authentication process

FlexConnect 12-2

authentication request failures 5-85

authentication request success 5-85

authentication request timeout 5-85

auto key generation 11-42

automatic backups, scheduling 4-7

automatic client exclusion 11-35

automatic client troubleshooting 10-34, 15-55

autonomous access points

downloading images 9-174

Autonomous AP

Migration Templates

edit 11-150

Autonomous AP Client Authentication Failure 10-6

Autonomous APs

template 11-146

new 11-146

templates 11-146

autonomous to lightweight migration 9-168

autonomous to LWAPP migration support 9-168

auto provisioning filter

editing 9-234

auto refresh 6-98, 6-110

avoid access point load 11-94

avoid Cisco AP load 11-94

avoid foreign AP interference 11-94

avoid non-802.11 noise 11-94

B

background scanning 9-56

on mesh configuration 11-122

on templates 11-122

background scanning in mesh networks

described9-54to 9-55

scenarios 9-55

Background Scan parameter 9-56

backhaul interface 5-83

band selection 9-120

battery level

condition type 16-76

bridge group name 5-83

Bridging link information 6-81, 6-88

bridging link information 6-81, 6-88

bridging mesh statistics 5-83

broadcast deauthentication frame signatures 3-34

bronze 11-32

bronze queue 5-85

buildings

adding to NCS database 6-19

busiest APs report 14-95

busiest client report 14-41

C

CA Certificate

configuring 9-105

CA certificates 4-4

calculating access point requirements 6-92

calibrating client 11-133

CAS 16-1

cascade reboot 8-21

CCX client statistics report 14-68

CDP Interface Neighbors

controller ports

monitor 5-14

certificate signing request 3-44

change order buttons 14-13

Chokepoint

adding to NCS database 9-215

adding to NCS map 9-215

removing from NCS 9-217

removing from NCS map 9-216

chokepoint

condition type 16-77

Chokepoints 5-120

new 9-215

chokepoints

positioning 6-56

CIDR notation 11-72

Cisco Access Points

configuring 9-115

Cisco Adaptive wIPS

alarms 5-146

Cisco Aironet 1510 Access Points

in Mesh network 9-54

Cisco AP load

avoiding 11-94

Cisco Discovery Protocol 9-180

Cisco Unified Network Solution

overview1-1to 1-2

Cisco Unified Wireless LAN Solution

security solutions3-1to 3-29

civic address 6-18

CKIP 9-70

clamped to ground 6-114

classification rule 11-83

Classifying Rogue APs 5-99

clear config 9-183

CLI

template 11-129

CLI commands

applying to template 11-130

Client

disable 10-40

remove 10-40

Sessions Report 10-41

client 10-41

calibrating 11-133

managing 10-2

client alarm summary 10-7

client association failure 10-6

client authentication failure 10-6

client authentication provision 11-57

client authentication type distribution 10-10

client count report 14-44

client detail page 10-16

Client Details

Association History 10-18

CCXv5 Information 10-20

Location Information 10-19

Statistics 10-19

client details

retrieving from access point page 10-34

client devices

connecting to WLANs 12-9

client distribution 10-4

client excluded 10-6

client exclusion 9-74, 11-35

happening automatically 11-35

Client Exclusion Policies

configuring 9-109

client exclusion policies 11-64

template 11-64

client exclusion policies template 11-64

Client Location

current map 10-41

recent map 10-41

client related traps 11-124

client reports 14-40

clients

searching 2-40

client sessions report 14-47

Client Summary

filtering 10-11

client summary report 14-51

client tab 10-3

client traffic 10-7

client traffic stream metrics report 14-57

client troubleshooting

automatic 15-55

enabling 10-34

client WEP key decryption error 10-6

client WPA MIC error counter activated 10-6

CLI Sessions

monito 5-7

CLI sessions 15-61, 15-78

color coding

of obstacles 6-74

compliance report 14-70

concept 17-11

condition type

for event definitions 16-76

config audit 17-11

config audit alarms 17-11

config group

adding templates 8-19

configuring 8-18

downloading IDS signatures 8-23

downloading sw to controllers 8-22

removing controllers 8-18

removing templates 8-19

config group audits 8-20

config groups

applying 8-19

auditing 8-20

creating 8-16

downloading customized webauth 8-23

rebooting 8-21

reporting 8-22

Config Group Task

delete 9-224

enable,disable 9-224

history 9-224

Config Group Tasks 9-223

modify 9-223

Configuration

scheduled 9-221

configuration audit report 14-71

Configuration Backup 15-13

Configure Access Points

Radio 9-185

Configure APs

copy and replace 9-195

Configure Controllers

802.11

General Parameters 9-117

802.11a/n Parameters 9-124

Dynamic Channel Assignment 9-127

EDCA 9-132

General 9-124

High Throughput 9-134, 9-135

Media 9-130, 9-140

Roaming 9-133

RRM Intervals 9-126

RRM Radio Grouping 9-129

RRM Thresholds 9-134

802.11b/g/n Parameters 9-136

EDCA 9-143

General 9-136

High Throughput 9-144, 9-145

Roaming 9-143

RRM DCA List 9-139

RRM Radio Grouping 9-140

RRM Thresholds 9-138

802.11 Parameters 9-117

Access Control List

Rules 9-102

Access Points

Cisco APs 9-115

Download Customized Web Auth Bundle 9-38

Download IDS signatures 9-38

Downloading Configuration 9-36

Downloading Software 9-36

Download Web Admin Certificate 9-37

FlexConnect 9-82

FlexConnect AP Groups 9-82

Management 9-150

Authentication Priority 9-156

Local Management Users 9-156

multiple servers 9-154

Syslog 9-154

Telnet SSH 9-153

Trap Receivers 9-150

Web Admin 9-154

Mesh 9-146

Ports 9-149

Rebooting Controllers 9-9, 9-10

Removing Controllers 9-8

Security

AAA 9-86

AAA AP authorization 9-94

AAA Local Net Users 9-92

AAA RADIUS Acct Servers 9-88

AAA RADIUS Auth Servers 9-87

Access Control Lists 9-102

AP Authentication and MFP 9-114

CA Certificate 9-105

Client Exclusion Policies 9-109

CPU Access Control List 9-104

Custom Signatures 9-114

Disabled Clients 9-101

file encryption 9-86

ID Certificate 9-106

IDS Sensor List 9-105

Local EAP 9-97

Local EAP General 9-97

Local EAP general EAP-FAST parameters 9-100

Local EAP General Network Users Priority 9-100

Local EAP Profiles 9-98

Rogue Policies 9-108

Standard Signatures 9-110

User Login Policies 9-101

Web Auth Certificate 9-107

Wireless Protection 9-107

System

DHCP Scopes 9-57

Mobility Groups 9-51

Network Route 9-50

Network Time Protocol 9-54

QoS Profiles 9-57

Spanning Tree Protocol 9-51

System Commands 9-32

System Interfaces 9-39

Uploading Files from Controllers 9-35

Configuring

ACL Protocol Groups 11-78

Wired Guest Access 9-47

Configuring 802.3 Bridging 9-30

configuring access points 9-174

configuring a client exclusion policy template 11-84

configuring a CPU ACL template 11-79

configuring a high throughput template 11-100

configuring a local EAP general template 11-53

configuring a local EAP profile template 11-54

configuring a manually disabled client template 11-63

configuring a mesh template 11-121

configuring an 802.11h template 11-99

configuring an access point 11-62

configuring an access point for FlexConnect 12-8

configuring an EAP-FAST template 11-56

configuring an RRM interval template 11-104

configuring an RRM threshold template 11-99

configuring a policy name template 11-92

configuring a roaming parameters template 11-96

configuring a TACACS+ server template 11-49

configuring a trusted AP policies template 11-82

configuring a user authentication priority template 11-129

configuring a user login policies template 11-60

configuring config group 8-16

configuring controller WLANs 9-65

configuring EDCA parameters

through a template 11-96

Configuring Existing Controllers 9-23

configuring firewall for NCS 3-30

configuring FlexConnect 12-1

configuring FlexConnect access point groups 12-9

configuring FlexConnect AP groups 11-38

configuring FlexConnect groups 12-11

configuring global credentials 9-162

configuring global email parameters 15-63

Configuring IDS 3-33

Configuring IDS signatures 3-33

configuring intrusion detection systems 3-33

configuring multiple country codes 8-14

configuring search results 2-46

configuring spectrum experts 9-210

configuring template

ACL 11-63

for rogue AP rule groups 11-84

configuring templates

802.11b/g RRM interval 11-104

access point authentication and MFP 11-82

access point authorization 11-62

file encryption 11-45

guest users 11-59

known rogue access point 11-99

local management user 11-128

MAC filter 11-61

RADIUS accounting 11-48

RADIUS authentication 11-46

syslog 11-126

Telnet SSH 11-125

traffic stream metrics QoS 11-20

trap control 11-123

WLAN 11-22

configuring the controller for FlexConnect 12-6

configuring the switch

for FlexConnect 12-5

Configuring User Roles 9-59

connecting client devices

to WLANs 12-9

Connecting to the Guest WLAN 3-44

context aware configuring 16-95

context-aware software 16-1

Controller

General System Parameters 9-26

Multicast Mode 9-63

Template Launch Pad 11-1

Uploading configuration/logs 9-35

controller

configuring for FlexConnect 12-6

controller details 11-152

Controller DHCP 9-62

configuring 9-62

controller license information 15-133

controller operational status 15-15

Controllers

Adding an Interface 9-40

configuring existing 9-23

DHCP Stats

monitor 5-8

Edit View 5-3

monitor

Summary 5-4

monitoring 5-1

search 5-2

System Parameters

monitor 5-3

controllers

adding 9-4

adding to NCS database 4-1

searching 2-39

specified 1-1

Controller Security

monitor 5-15

Controller Templates

802.11b/g/n Parameters 11-107

Adding 11-2

applying 11-2

AP Username Password 11-11

delete 11-2

managing, creating 11-4

SNMP Community 11-9

Viewing 9-21

Voice

802.11b/g/n 9-122, 11-90, 11-95, 11-110

Controller Time and Date 9-35

controller upgrade settings 15-59, 15-61, 15-78

Controller User Roles 9-59

controller WLANs

configuring 9-65

Country Codes

setting multiple 9-118

country codes

multiple 8-14

Coverage (RSSI)

access points 5-52

Coverage (SNR)

access points 5-52

coverage hole 5-88

coverage hole reports 14-153

CPU access control

template 11-79

CPU Access Control Lists

configuring 9-104

CPU ACL

configuring 9-104

Cranite 9-68

Creating Account 7-17

Creating a Lobby Ambassador Account 7-17

Creating guest user accounts 7-10

creating placemarks 6-115

creating virtual domains 15-41

CSR 3-44

CSV files 6-116

Current building

delete 6-22

edit map 6-21

Custom and Standard Signatures

Global Settings 9-113

customized webauth

downloading 8-23

Customized Web Auth Bundle

download 9-38

Customized WebAuth Bundles

downloads 9-16

Customized Web authentication 3-42

customized web authentication

downloading 11-68

customize report 14-12

Custom signature 3-39

Custom Signatures

configuring 9-114

D

data collection

for RFID tag 11-133

DCA 11-105, 11-118

802.11a/n 9-127

debug commands A-4

debug strategy A-4

default lobby ambassdor credentials

editing 7-9, 7-14

deleting a license B-4

deleting a WLAN 9-77

deleting guest user templates 7-12

deleting NCS user accounts 7-3

designing a network 6-99

destination type

for report 14-8

Detecting APs 5-112

details

clients 10-42

device certificates 4-3

device information 9-169

device report 14-90

DHCP

configuring 9-62

DHCP diagnostic test 10-30

DHCP Scopes

configuring 9-57

DHCP server

overriding 11-37

DHCP Stats

controllers

monitor 5-8

diagnostic channel A-1

diagnostic test

802.11 association 10-30

802.1X authentication 10-30

DHCP 10-30

DNS ping 10-30

DNS resolution 10-30

IP connectivity 10-30

profile redirect 10-30

Disable

client 10-40

Disabled Clients

manual 9-101

disabled clients

template 11-63

disabling IDS signatures 3-38

Discovering Templates from Controllers 9-19

Distance

condition type 16-76

DNS ping diagnostic test 10-30

DNS resoltion diagnostic test 10-30

Download

Web Admin Certificate 9-155

Web Auth Certificate 9-155

downloading a customized web authentication page 11-68

downloading autonomous AP images 9-184

Downloading Configurations to Controllers 9-36

downloading customized webauth 8-23

Downloading customized web authentication 3-42

Downloading IDS signatures 3-37

downloading IDS signatures

from your config group 8-23

downloading images

to autonomous access points 9-173

Downloading Signature Files 9-111

Downloading Software

controllers 9-36

downloading sw to controllers

after adding config group 8-22

downloading vendor CA certificates 4-4

downloading vendor device certificates 4-3

Downloads

Customized WebAuth Bundles 9-16

Vendor CA Certificates 9-18

Vendor Device Certificate 9-17

downstream delay 11-21

downstream packet loss rate 11-21

drawing polygon areas

using map editor 6-72

DTIM 11-93

Dynamic Channel Assignment

802.11a/n 9-127

dynamic interface 11-15

E

EAP-FAST

template 11-56

EAP-FAST template 11-56

EAPOL flood signature 3-35

EDCA

802.11b/g/n Parameters 9-143

EDCA parameter

template 11-97

EDCA parameters

configuring through a template 11-96

editing saved reports 14-19

Editing signature parameters 3-40

editing the default lobby ambassador credentials 7-9, 7-14

edit location presence information 6-18

Edit View

access points 5-46

controllers 5-3

general 2-47

egress interface 9-67

email

configuring parameters 15-62

Email Notifications

alarms 5-145

embedded access points 1-7

emergency

condition type 16-77

enable background audit 8-17

enable enforcement 8-17

enable log module 15-122

enabling 10-41

enabling audit trails

for guest user activities 7-10

enabling IDS signatures 3-38

Enabling Web login 3-41

end user license agreementB-7to B-12

Ethernet bridging 9-164

Ethernet Switch

credentials 9-203

remove 9-210

Ethernet VLAN tagging guidelines 9-165

evaluation license

for controller 15-134

for MSE 15-136

event history 10-27, 16-89

Events

Adhoc Rogue 5-153

details 5-116

monitoring 5-148

overview 5-148

Pre Coverage Holes 5-154

Rogue Alarms 5-113

Rogue AP

details 5-114

Rogue APs 5-152

working with 5-158

events

searching 2-42

exclude device list 15-79

excluded packets 5-84

exclude switch trunk ports 15-79

exclude vendor list 15-80

executive summary report 14-147

exporting a file 6-56

to change access point position 6-56, 6-57

export task list 15-106

extend to ground 6-114

extension license

for controller 15-134

for MSE 15-136

extracting task list 15-112

F

Factory Defaults

restoring 9-34

failover mechanism 15-126

Failover Priority 9-29

feature

of NCS license 15-132

File Encryption

controller 9-86

file encryption template 11-45

filter

editing current auto provisioning 9-234

filtering

using to modify maps 6-88

filtering saved reports 14-18

filtering scheduled run results 14-16

firewall, configuring for NCS 3-30

FlexConnect

bandwidth restriction 11-33, 12-3

configuring 12-1

FlexConnect access point groups 12-9

FlexConnect AP Groups

configuring 9-82

FlexConnect AP groups

configuring 11-40

configuring template 11-40

FlexConnect configuration tab 11-41

FlexConnect Group

auditing 9-85

FlexConnect groups 12-10

auditing 12-13

FlexConnect local switching 9-72, 11-33

FlexConnect Parameters 9-82

Floor Areas

delete 6-40

edit 6-40

foreign access point interference

avoiding 11-94

foreign AP interference

avoiding 11-94

Frame type 3-39

friendly access point template 11-86

friendly AP

template 11-86

friendly rogue 11-82

friendly rogue access points 3-8

FTP

turning on and off 15-71

G

general templates

configuring 11-5

generating migration analysis report 17-13

geographical coordinates 6-113

Global AP Password

configuring 9-60

global credentials

configuring 9-162

Global Settings

Standard and Custom Signatures 9-113

Global settings

for standard and custom signatures 3-40

Global SSID Group

add 9-243

delete 9-244

edit 9-244

gold 11-32

gold queue 5-84

Google Earth

adding launch points 6-118

Google Earth coordinates 6-114

Google KML or CSV

importing into NCS 6-117

GPS markers 6-18

grace period license

for controller 15-134

groups

for FlexConnect 12-11

for rogue access point rules 11-84

group setup window on ACS server 15-107

GUEST_USER_ADDED 13-67

GUEST_USER_AUTHENTICATED 13-67

guest account settings 15-61

guest accounts status report 14-121

guest association report 14-123

guest count report 14-124

guest reports 14-121

guest user

template 11-59

guest user account

scheduling 7-12

guest user accounts

managing 7-11

guest user details

emailing 7-13

print 7-13

Guest Users

monitoring 5-22

guest user sessions report 14-125

guest user templates 11-59

Guest WLAN

connecting 3-44

guidelines

for Ethernet VLAN tagging 9-165

guidelines for using the map editor 6-5

H

heater status 5-81

heat map

described 6-38

Help Menu 2-26

hierarchy

of mesh network 6-86

Hierarchy of Mesh parent to child 6-89

hierarchy of mesh parent to child 6-89

High Throughput

802.11a/n 9-134, 9-135

802.11b/g/n Parameters 9-144, 9-145

high throughput

template 11-100

high throughput template

configuring 11-100

historical report type 14-1

HTTP

turning on and off 15-71

hybrid REAP

bandwidth restriction 9-72

hysteresis 11-98

I

ID Certificate

configuring 9-106

identity client 10-17, 16-84

Identity Services Engine 16-102

IDS 3-33

IDS Sensor List

configuring 9-105

IDS sensors 3-33

IDS Signatures

configuring 9-110

download 9-38

IDS signatures 3-33

downloading 3-37

downloading from config group 8-23

enabling 3-38

uploading 3-36

images

downloading to autonomous access points 9-174

importing a file 6-56

to change access point position 6-56, 6-57

importing coordinates

as CSV file 6-116

into Google Earth 6-114

importing Google KML or CSV into NCS 6-117

Import map 6-55

In/Out

condition type 16-76

information elements

Aironet 11-34

infrastructure MFP 3-31

ingress interface 9-67

Inspect Location Readiness 6-78

Inspect VoWLAN Readiness 6-79

installing a license B-4

insufficient memory 5-84

interface group 11-19

Interferers

summary 5-125

interferers

summary 9-211

inter-subnet roaming 8-4

Intrusion Detection Systems 3-33

invalid association request 5-86

invalid reassociation request 5-86

Invalid Reauthentication Request 5-86

inventory report 14-107

IOS access points

adding 9-169

adding by device information 9-169

IOSAP_DOWN 13-131

IOSAP_LINK_DOWN 13-68

IOSAP_LINK_UP 13-67

IOSAP_UP 13-68

IP connectivity diagnostic test 10-30

K

KEK

key encryption key 11-46

key wrap 11-46

KML file 6-114

L

LAG mode 11-7

Latest Network Audit Report 9-23

latitude 6-113

Layer 1 security solutions 3-2

Layer 2 11-24

Layer 2 security solutions 3-2

Layer 3 11-29

Layer 3 security solutions 3-2

Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-29

LBS authorization

template 11-62

LDAP Servers 9-90

LDAP servers 9-71

template 11-50

LEAP authentication

requirements 8-8

Learn Client IP Address 11-34

legacy syslog

template 11-127

legacy syslog template 11-126

license

backup and restore B-4

license installation B-4

licenses B-1

license types B-1

Lightweight AP Protocol Transport Mode 9-30

limitations for high reliability 15-126

Link Aggregation 9-32

link aggregation (LAG)

guidelines 12-4

link metric

adjusted 6-82

unadjusted 6-82

link SNR 6-82

link stats report 14-131

Load

access points 5-49

load 6-98

load balancing 9-118

Lobby Ambassador

account 7-17

creating account 7-17

Lobby ambassador 7-10

Lobby Ambassador Account

creating 7-17

editing 7-18

lobby ambassador defaults

setting 7-6

local authentication

for FlexConnect groups 12-11

Local EAP 9-97

General EAP-FAST Parameters 9-100

General Network Users Priority 9-100

General Parameters 9-97

Profiles 9-98

local EAP authorization 9-71

Local EAP check box 11-31

local EAP general

template 11-53

local EAP profile template 11-54

Local Management Users

configuring 9-156

local management users

template 11-128

local management user template 11-128, 11-129

Local Net Users

configuring 9-92

local net users

template 11-58

local net users template 11-58

Local Password Policy 15-88

local switching

FlexConnect 11-33

Location

calibration 1-10

notifications 16-69

notification settings 16-71

synchronize servers 16-11

location change

condition type 16-77

location configuration

template 11-132

Location History

clients 10-43

location optimized monitor mode 9-178

location presence

assigning 6-18

Location Readiness 6-78

Location Server

logs 16-35

maintenance 16-42

NCS alarms 16-40

NCS events 16-40

NMSP parameters 16-30

notification parameters 16-67

restore 16-44

server events 16-39

location server 16-11, 16-31

backup historical data 16-43

configuration clearing 16-34

reboot hardware 16-34

location upgrade B-2

log analysis 10-26

logging 15-5

logging into the NCS user interface2-11to 2-12

logging options 15-121

logging the lobby ambassador activities 7-9

login.html 3-42

login disclaimer 15-62

login policies

template 11-61

log message levels 15-122

log modules

enabling 15-122

LOMM 9-178

configuring access point radios 9-194

longitude 6-115

long preambles, enabling for SpectraLink NetLink phones 4-5

LWAPP

template

edit 11-145

templates 11-137

Transport Mode 9-30

LWAPP migration 9-168

LWAPP template

new 11-137

M

MAC Filtering

configuring 9-93

MAC filtering 11-28

template 11-61

MAC filter template 11-61

MAC frequency 3-39

MAC information 3-39

MACK

message authenticator code keys 11-46

mail

transport type 16-78

mail server configuration 15-62

Maintenance

location server 16-42

malformed neighbor packets 5-84

malicious rogue 11-82

malicious rogue access points 3-5, 3-6

managed network

security index 3-5

management frame flood signatures 3-34

Management Frame Protection 3-31

management frame protection 9-75, 11-65

Management Frame Protection Summary

controllers

monitor 5-19

management interface 11-8

Management Parameters

configuring 9-150

management queue 5-85

managing clients 10-1

managing current reports 14-14

managing saved reports 14-17

managing virtual domains 15-47

managing WLAN schedules 9-77

mandatory data rates 11-94

manually disabled client

template for 11-63

Manually Disabled Clients

managing 9-101

map editor

guidelines 6-5

guidelines for using 6-5

using to draw polygon areas 6-72

map editor functions 6-4

map properties

editing 6-14

maps

searching 2-44

using to monitor link stats 6-80

using to monitor mesh AP neighbors 6-84

map size 6-110

map view

updating 6-89

media streams 5-127

Menu Bar 2-13

Mesh

monitoring health 5-81

statistics for AP 5-82

mesh access point neighbors

monitoring 6-84

mesh access points

monitoring 6-82

mesh configuration

template 11-121

mesh link statistics 6-80

monitoring 6-80

mesh neighbors 6-85

mesh network hierarchy 6-86

mesh networks

background scanning 9-54

monitoring 6-80

Mesh Parameters 9-146

mesh parent-child hierarchical view 6-51

mesh reports 14-129

mesh template

configuring 11-121

Mesh tree

viewing 6-86

mesh tree

viewing 6-86

message integrity check information element 11-65

metrics

in QoS 11-20

MFP 3-31, 9-75

for clients 3-31

MFP attacks 3-9

MFP client protection 11-37

MFP signature generation 11-37

MFP Summary

controllers

monitor 5-19

MFP templates 11-65

MIC IE 11-65

migration analysis

running 17-13

migration analysis report

generating 17-13

migration analysis summary

viewing 11-151

migration template 11-148

Migration Templates

Autonomous APs

edit 11-150

minimum RSSI 11-98

Mirror Mode 10-41

mirror mode 9-179

missing

condition type 16-76

MLD Snooping 9-63

mobile announce messages 8-8

Mobility 16-1

Mobility Stats

monitor 5-23

service 16-1

mobility 8-1

Mobility Anchor Group Keep Alive Interval 9-32

mobility anchors 8-12, 9-78

Mobility Group

Prerequisites 9-52

Mobility Groups

configuring 9-51

Messaging 9-52

mobility groups 8-7

prerequisites8-8to 8-9

mobility groups, configuring 8-8

mobility scalability 8-11

Mobility Services 16-1

viewing 16-5

Mobility Stats

monitor 5-23

modifying a migration template 11-151

modifying map displays 6-88

using filters 6-88

Monitor

Alarms 5-1

Events 5-148

Ports

overview 5-9

Rogue AP Rules 5-20

Monitor Access Points

details 5-57

edit view 5-46

load 5-49

radio type

802.11 MAC counters 5-79

on demand statistics 5-72

operational parameters 5-76

view alarms 5-80

view events 5-81

radio utilization 5-56

search 5-43

search results 5-44

Tx power and channel 5-56

Monitor Alarms

details 5-91

Monitor APs

802.11 Counters 5-55

AP Profile Status 5-56

Coverage (RSSI) 5-52

Coverage (SNR) 5-52

details

CDP Neighbors 5-69

general 5-58, 5-65

interfaces 5-67

Dynamic Power Control 5-50

Interference 5-51

Noise 5-51

Radio

details 5-71

TSM 5-56

UpTime 5-52

Voice Statistics 5-53

Voice TSM Reports 5-55

Voice TSM Table 5-53

Monitor Chokepoints 5-120

Monitor Client

detecting APs

details 10-42

disable 10-40

location history 10-43

present map 10-41

recent map 10-41

remove 10-40

roam reason 10-42

v5 statistics 10-36

voice metrics 10-43

Monitor Controllers 5-1

802.11a/n parameters 5-25

802.11a/n RRM Grouping 5-27

802.11a/n RRM Groups 5-30

802.11b/g/n parameters 5-29

CLI Sessions 5-7

ports

general 5-9

spanning tree protocol 5-6

System

summary 5-4

WLANs 5-9

Monitor Events

Details 5-151

search 5-151

Monitoring

Guest Users 5-22

monitoring active sessions 7-5

monitoring channel width 5-87

monitoring mesh access point neighbors 6-84

using maps 6-84

monitoring mesh health 6-86

monitoring mesh link statistics

using maps 6-80

monitoring mesh networks

using maps 6-80

monitoring neighboring channels 9-54

monitoring pre-coverage holes 5-89

monitoring spectrum experts 9-211

monitor mode

location optimized 9-178

Monitor Tags 5-118

most recent audit alarms 17-11

most recent rogue adhocs 3-6

MSE 16-6

MSE authorization

template 11-62

MSE license information 15-136

Multicast Direct 9-63

multicast mobility mode 8-11

Multicast Mode

controller 9-63

Multiple Country Codes

setting 9-118

multiple country codes

configuring 8-14

multiple syslog

template 11-127

multiple syslog template 11-127

N

N+1 redundancy 8-5

NAC Out-of-Band Integration 9-44

NAC state 9-75

NAT 8-10

NCS

overview 1-2

servers supported 1-2

NCS_EMAIL_FAILURE 13-152

NCS-ADV-SI-SE-10 B-2

NCS Alarm

status 16-40

NCS Alarms

location servers 16-40

NCS database

restoring 4-8

on Linux 4-9

restoring in high availability environment 4-9

scheduling automatic backups 4-7

NCS Events

location servers 16-40

status 16-40

NCS guest operations report 14-127

NCS home 2-11

NCS licenses B-1

NCS Location Calibration 1-10

NCS password

recovering 4-12

NCS user accounts

adding 7-2

changing passwords 7-4

deleting 7-3

NCS user interface

described 2-13

logging into2-11to 2-12

netmask 11-72

NetStumbler signature 3-35

network address translation 8-10

Network Audit Report

latest 9-23

network design 6-99

network designs 16-12

network protection 3-33

Network Routes

configuring 9-50

Network Summary page 2-12

network summary reports 14-146

Network Time Protocol

configuring 9-54

network users priority

template 11-57

network utilization reports 14-155

new rogue access points report 14-182

NMSP Parameters

location server 16-30

node hops 5-84

nodes report 14-133

noise

avoiding non-802.11 types 11-94

avoid non-802.11 11-94

non-802.11 noise

avoiding 11-94

non-aggregated historical data 15-61

non-Cisco ACS server

for use with RADIUS 15-112

normal mode

for Ethernet port 9-166

North Bound API 7-15

Notification Parameters

location server 16-67

Notifications

location 16-69

Notification Settings

location 16-71

NTP configuration 9-54

NTP server template 11-10, 11-14

null probe response signatures 3-34

O

On Demand Statistics

access points 5-72

onstacle color coding 6-74

Operational Parameters

access points 5-76

OUI search 15-79

outdoor location

creating with Google Earth 6-113

overview

Cisco Unified Network Solution1-1to 1-2

NCS 1-2

P

packet error rate link color 6-88

packet error statistics report 14-137

packet jitter 11-20

packet latency 11-20

packet loss 11-20

packet loss rate 11-21

packet queue statistics report 14-139

packet stats report 14-135

parent changes 5-84

Passive Client 9-75

passthrough 11-29

PCI report 14-74

PEAP 11-55

peer-to-peer blocking 11-34

performance reports 14-150

permanent license

for controller 15-134

for MSE 15-136

physical appliance 2-2

placemarks

creating 6-115

placement of access points 6-40

planning mode 6-93

to calculate access point requirements 6-92

planning mode, calculating access point requirements 6-92

platinum 11-32

platinum queue 5-84

PLR 11-21

policy manager solutions 3-2

poor neighbor SNR 5-84

Port Parameters

configuring 9-149

Ports

Monitor

overview 5-9

monitor controllers 5-9

positioning access points 6-56

positioning chokepoints 6-56

positioning Wi-Fi TDOA receivers 6-56

power injector settings 9-181

Preauthentication ACL 9-70

Preferred Call 9-121

Prerequisites 2-4

Present Map

clients 10-41

print guest user details 7-13

probe cycle count 9-121

Profile

List 9-238

Profile editor 9-239

profile redirect diagnostic test 10-30

protection type 11-66

Q

QoS 11-32

QoS Profiles

configuring 9-57

queues

silver, gold, platinum, bronze, management 5-84

quick search 2-33

Quiet time 3-39

R

Radio

access points

configuring 9-185

radio resource management 11-94

Radio Status

scheduling and viewing 9-195

radio status

scheduling 9-196

Radio Utilization

access points 5-56

RADIUS 15-98

RADIUS Accounting

controllers

monitor 5-17

RADIUS accounting servers

template 11-48

RADIUS accounting template 11-48

RADIUS and TACACS+ attributes

virtual domains 7-17, 15-49

RADIUS Authentication

controllers

monitor 5-15

RADIUS authentication template 11-46

RADIUS Auth Servers

AAA RADIUS

Auth Servers 9-87

RADIUS fallback

template 11-49

RADIUS fallback mode 11-50

RADIUS servers 9-71

reachability status 9-210

Readiness

location 6-78

VoWLAN 6-79

reassociation request failures 5-85

reassociation request success 5-86

reassociation request timeouts 5-85

reauthentication request failures 5-86

reauthentication request success 5-86

reauthentication request timeout 5-86

Rebooting Controllers 9-9, 9-10

recent adhoc rogue alarms 3-9

Recent Map

clients 10-41

recent rogue AP alarms 3-9

recovering the NCS password 4-12

recurrence

for report 14-9

refresh browser 6-99

refresh component icon 2-22

Refresh Config 9-19

refresh from network 6-98, 6-110

relative to ground 6-114

Remove APs 9-195

Remove Controllers 9-8

removing controllers from config group 8-18

removing templates from config group 8-19

report

running new 14-6

report launch pad 14-2

Reports

Rogue AP Events 14-186

reports

scheduled runs 14-15

reset AP now 9-183

Restore

location server 16-44

Restoring Factory Defaults 9-34

restoring NCS database

in high availability environment 4-9

restoring NCS database on Linux 4-9

retain NCS value 8-21

RF calibration model, creating 4-5

RF Calibration Models

apply to maps 6-69

delete 6-69

RFID data collection 11-133

RF Profiles 9-123, 11-91

RF profile traps 11-125

RF update traps 11-125

Roaming

802.11b/g/n Parameters 9-143

roaming 8-1

roaming parameter

template 11-98

roaming parameters template

configuring 11-98

roaming time 11-20, 11-21

Roam Reason

clients 10-42

rogue access point events report 14-188

rogue access point rule groups 11-84

rogue access point rules

configuring a template 11-82

viewing or editing 9-199

rogue access points

friendly 3-8

malicious 3-6

monitoring3-9to 3-10

solutions for 3-3

unclassified 3-7

rogue adhocs

most recent 3-6

Rogue Alarm Events 5-113

Rogue AP

alarm details 5-114

alarms 5-95

malicious 5-94

Rules

monitor 5-20

Rogue AP Events

report 14-186

rogue AP rule groups

template 11-84

Rogue AP Rules

configuring 9-109

details 5-21

rogue AP rules

template 11-83

Rogue APs

classifying 5-99

friendly 5-94

unclassified 5-95

Rogue Client

details 5-103

rogue clients

searching 2-44

rogue detector 9-178

Rogue Devices

detecting 5-91

rogue location discovery protocol 11-81

Rogue Policies

configuring 9-108

rogue policies

template 11-81

template for 11-80

role criteria 11-151

root access points (RAPs)

selecting 9-168

root mode

changing from station role 17-13

routing state 5-83

RRM 11-94

DCA

802.11b/g/n Parameters 9-139

Radio Grouping

802.11b/g/n Parameters 9-140

RRM DCA 9-128

RRM Intervals

802.11a/n 9-126

802.11b/g/n Parameters 9-138

RRM intervals 11-99

template 11-104

RRM interval template

configuring 11-104

RRM Radio Grouping

802.11a/n 9-129

RRM Thresholds

802.11b/g/n Parameters 9-138

RRM threshold template

configuring 11-102

RSSI legend 6-110

rules

for rogue access point 11-82

running a new report 14-6

running a saved report 14-19

running migration analysis 17-13

RX neighbor requests 5-84

RX neighbor responses 5-84

S

Save Config to Flash 9-19

saved report

running 14-19

saved reports

editing 14-19

filtering 14-18

managing 14-17

saved searches 2-46

scalability parameters 8-11

scan cycle period threshold 9-121

scan threshold 11-99

Scheduled Configuration 9-221

Schedule details 9-174

scheduled run details

editing 14-17

scheduled run results 14-15

filtering 14-16

Scheduled Task

AP status report 9-221

schedules

managing for WLANs 9-77

scheduling guest user account 7-12

scheduling radio status 9-196

Search

access points 5-43

controller resul 5-2

Events 5-151

overview 2-27

search alarm parameters 2-36, 2-40, 5-33

search feature 2-33

using for troubleshooting 10-25

searching access points 2-37

searching clients 2-40

searching controllers 2-39

searching events 2-42

searching maps 2-44

searching tags 2-45

searching Wi-Fi TDOA receivers 2-44

secondary NCS operation 15-126

Security

AAA

LDAP servers 9-90

TACACS+ Servers 9-91

Web Auth Configuration 9-95

AAA MAC Filtering 9-93

Local EAP 9-97

security color range 3-5

security configurations

monitoring 5-145

security index 3-5

security mesh statistics 5-85

Security Reports

Rogue AP Events 14-186

security solutions3-1to 3-29

security summary 14-191

security tab

interpreting 3-4

security thermometer 3-5

sending mobile announce messages 8-8

sensors

viewing IDS types 3-33

Server Events

location servers 16-39

status 16-39

set sorting buttons 14-13

Set Time

controller 9-35

setting AP failover 9-162

Setting Controller Time and Date 9-35

shunned clients

searching 2-45

silver 11-32

silver queue 5-84

Sniffer 11-138

Sniffer Feature 9-116

sniffer mode 9-178

SNMP

transport type 16-78

SNMP authentication 11-124

SNMP Community

controller templates 11-9

SNMP mediation 15-122

SNR definition 6-88

SNR down 6-82

SNR UP 6-82

SNR up 6-82

SOAP 16-78

software

downloading config groups to controllers 8-22

software, updating 4-2

Spanning Tree Protocol

configuring 9-51

monitor controllers 5-6

SpectraLink NetLink phones, enabling long preambles 4-5

spectrum expert

adding 9-210

spectrum expert details 9-212

Spectrum Experts

details 5-126

Interferers 5-125

summary 5-124

spectrum experts

configuring 9-210

monitoring 9-211

summary 9-211

SSID Group

add 9-245

add from global list 9-245

add global 9-243

delete 9-246

delete global 9-244

edit 9-246

edit global 9-244

SSID Group List

wIPS 9-242

SSID group list

global 9-243

SSID groups

wIPS 9-244

Standalone Building

adding floor plan 6-32

Standard and Custom Signatures

Global Settings 9-113

Standard signature 3-39

Standard Signature Parameters

configuring 9-110

standard signatures 3-33

static WEP 9-68

Static WEP-802.1X 9-68

station role

changing to root mode 17-13

Status Report

scheduled task 9-223

status schedules

managing for WLANs 9-77

stranded APs report 14-141

supported data rates 11-94

Switch

credentials 9-203

remove 9-210

switch

configuring for FlexConnect 12-5

Switch Port Tracing

Details 15-81

Troubleshooting 15-81

symmetric mobility tunneling 11-8

symmetric tunneling 8-5

Synchronize servers

location 16-11

Syslog

configuring individual controller 9-154

Individual controller 9-154

multiple servers 9-154

syslog

transport type 16-78

syslog templates 11-126, 11-127

System

General Properties 9-26

System Commands

controller 9-32

System Interfaces

Controllers 9-39

System parameters

controllers

monitor 5-3

System requirements 2-5

T

TACACS+ 15-95

TACACS+ server

configuring a template for 11-51

template 11-51

tagged packets 9-168

Tags 5-118

tags

searching 2-45

Task

configuration backup 15-13

status 15-15

Telnet SSH

template 11-123

Telnet SSH Parameters

configuring 9-153

Telnet SSH templates 11-125

temperature 5-81

template

configuring for rogue AP rules 11-82

Template Launch Pad

overview 11-1

Templates

AP Configuration 11-136

delete 11-2

test analysis tab 10-29

TFTP

turning on and off 15-71

TFTP details 11-152

TFTP Server

adding 9-247

TFTP server 3-36

TFTP Servers

configure 9-247

delete 9-248

thermometer color range 3-5

threats

access points 3-8

throughput report 14-63

tilt 6-114

Timer Setting

AP 9-64

total interferer count 9-212

total mismatched controllers 17-11

TPC 11-106, 11-120

trace 15-125

traffic indicator message 11-93

Traffic Stream Metrics

access points 5-56

traffic stream metrics QoS status 11-21

traffic stream metrics QoS template 11-20

traffic stream metrics report 14-157

transition time 11-99

Transport Mode

LWAPP 9-30

transport types 16-78

trap

802.11 security 11-125

Trap Control

configuring 9-151

trap control

template 11-123

trap control templates 11-123

trap receiver

template 11-122

Trap Receivers

configuring 9-150

trap receiver template 11-122

traps

AAA 11-125

access point 11-124

client related 11-124

RF profile 11-125

RF update 11-125

unsupported 13-165

traps added in 2.2 13-32

traps added in 3.0 13-35

traps added in 3.1 13-38

traps added in 3.2 13-43

traps added in 4.0 13-44

traps added in 4.0.96.0 13-51

traps added in 4.1 13-54, 13-66

traps added in release 6.0 13-71

traps added in release 7.0 13-74

trend report type 14-1

Troubleshooting

Switch Port Tracing 15-81

troubleshooting A-1

using logging options 15-125

troubleshooting voice RF coverage 6-98

trunk mode 9-166

TSM

access points 5-56

tunneling 8-5

TX neighbor requests 5-84

TX neighbor responses 5-84

Tx Power and Channel

access points 5-56

Tx power and channel report 14-160

type

of NCS license 15-133

U

UDI

retrieving on controllers and access points 5-87

unadjusted link metric 6-82

unclassified rogue 11-82

unclassified rogue access points 3-7

understanding virtual domains 15-50

unique clients report 14-65

unique device identifier 5-87

unknown association requests 5-86

unknown reassociation request 5-86

untagged packets 9-168

Update map view 6-89

update map view 6-89

updating system software 4-2

upgrade settings

for controller 15-58

upgrading autonomous access points 11-153

upgrading NCS

in high availability environment 4-11

upgrading the network 4-12

Uploading IDS signatures 3-36

uploading IDS signatures 3-36

Uploading Signature Files 9-112

upstream delay 11-21

upstream packet loss rate 11-21

UpTime

access points 5-52

uptime report 14-114

User accounts

for guest 7-10

user credential retrieval priority 11-57

user details

emailing 7-13

printing 7-13

User Interface

Menu Bar 2-13

User Login Policies

configuring 9-101

user login policies

configuring a template 11-60

template 11-61

User Preferences 7-1, 15-1

user preferences 15-82

User Roles

configuring 9-59

Users 15-89

using filtering 6-81, 6-88

using logging

for troubleshooting 15-125

using maps

to monitor mesh AP neighbors 6-84

to monitor mesh link statistics 6-80

using maps to monitor mesh networks 6-80

using planning mode 6-72

using template

ACL 11-79

for friendly access point 11-86

using templates

802.11b/g RRM interval 11-104

802.11b/g RRM threshold 11-102

access point authentication & MFP 11-65

access point authorization 11-62

local management user 11-128, 11-129

local net users 11-58

MAC filter 11-61

password policy 11-70

QoS 11-17

RADIUS accounting 11-48

syslog 11-126, 11-127

Telnet SSH 11-125

traffic stream metrics QoS 11-20

trap control 11-123

trap receiver 11-122

web authentication 11-67

WLAN 11-22

utilization report 14-115

V

V5 Statistics

client 10-36

Vendor CA Certificates

downloads 9-18

vendor CA certificates

downloading 4-4

Vendor Device Certificate

downloads 9-17

vendor device certificates

downloading 4-3

vendor search 15-79

View 2-23

View Alarms

access points 5-80

view in chart icon 2-23

Viewing

Mobility Services 16-5

viewing audit status

for access points 9-196

viewing autonomous access points 9-173

viewing Google Earth maps 6-118

Viewing Mesh tree 5-82

view in grid icon 2-23

Viewing shunned clients 3-33

Viewing Templates Applied to a Controller 9-21

viewing the audit trail 7-9

viewing the migration analysis 11-151

view list 10-25

virtual appliance 2-2

virtual domains

assigning 7-16, 15-92

attributes 7-17, 15-49

creating 15-41

hierarchy 15-42

managing 15-47

understanding 15-50

VLAN tagging 9-164

Voice

802.11b/g/n Controller Templates 9-122, 11-90, 11-95, 11-110

Voice Metrics

clients 10-43

Voice-over-Internet Protocol

snooping 9-74

Voice RF Coverage issues 6-80

Voice Statistics

access points 5-53

voice statistics report 14-165

Voice TSM Reports

access points 5-55

Voice TSM Table

access points 5-53

VoIP calls graph 14-162

VoIP calls table 14-163

VoIP snooping 9-74

VoWLAN Readiness 6-79

W

Web Admin

configuring 9-154

Web Admin Certficate

downloading 9-37

Web Auth Certificate

configuring 9-107

Web Auth Configuration 9-95

web authentication template 11-67

web authentication type 11-67

Web authentication types 3-41

web auth security A-3

web login

enabling 3-41

web policy 9-70

Wellenreiter signature 3-35

WiFi TDOA Receivers

adding 9-218

configure 9-217

edit 9-220

remove 9-220

tag location 9-218

Wi-Fi TDOA receivers

positiioning 6-56

searching 2-44

wIPS

planning and configuring 16-97

Profile

add 9-238

Profile Editor 9-239

Profile List 9-238

SSID Group List 9-242

wIPS Alarms

details 5-147

monitoring 5-146

wIPS Profile

apply 9-242

delete 9-241

wIPS Profiles

add 9-238

configure 9-237

Wired Client Authentication Failure 10-6

Wired Client Auth fail VLAN Assigned 10-6

Wired Client Authorization Failure 10-6

Wired Client Critical VLAN Assigned 10-6

Wired Client Guest VLAN Assigned 10-6

Wired Client Security Violation 10-6

Wired Guest Access

configuring 9-47

Wireless Management 9-32

Wireless Protection Policies

configuring 9-107

WLAN

adding 9-76

deleting 9-77

WLAN AP groups 11-38

WLAN details

viewing 9-66

WLANs

configuring 9-65

monitor 5-9

web auth security A-3

WLAN status schedules

managing 9-77

WLAN templates 11-22

WMM parameters 9-72

WMM policy 11-32

work group bridge mode 9-174

worst node hops report 14-143

WPA+WPA2 9-69

X

XML mediation 15-123

Z

zoom in or out 6-110