- Preface
- Chapter 1: Cisco NCS Overview
- Chapter 2: Getting Started
- Chapter 3: Configuring Security Solutions
- Chapter 4: Performing Maintenance Operations
- Chapter 5: Monitoring Devices
- Chapter 6: Monitoring Maps
- Chapter 7: Managing NCS User Accounts
- Chapter 8: Configuring Mobility Groups
- Chapter 9: Configuring Devices
- Chapter 10: Managing Clients
- Chapter 11: Using Templates
- Chapter 12: Configuring FlexConnect
- Chapter 13: Alarm and Event Dictionary
- Chapter 14: Reports
- Chapter 15: Performing Administrative Tasks
- Chapter 16: NCS Services
- Chapter 17: Tools
- Chapter 18: wIPS Policy Alarm Encyclopedia
- Appendix A: Troubleshooting and Best Practices
- Appendix B: NCS and End-User Licenses
- Appendix C: Cisco NCS Server Hardening
- Appendix D: Certificate Signing Request (CSR) Generation for a Third-Party Certificate on a Cisco Prime Network Control System (NCS)
- Index
Index
Numerics
802.11a/n
Parameters
monitor 5-25
RRM Grouping
monitor 5-27
RRM Groups
monitor 5-30
802.11a/n Parameters 9-124
DCA 9-127
EDCA 9-132
General 9-124
Roaming 9-133
RRM Intervals 9-126
RRM Radio Grouping 9-129
RRM Thresholds 9-134
802.11 association diagnostic test 10-30
802.11b/g/n
Parameters
monitor 5-29
802.11b/g/n DTIM period 11-37
802.11b/g/n Parameters 9-136
EDCA 9-143
General 9-136
Roaming 9-143
RRM Intervals 9-138
RRM Thresholds 9-138
802.11b/g/n Parameters Controller Templates 11-107
802.11b/g RRM interval template 11-104
802.11b/g RRM threshold templates 11-102
802.11 Counters
access points 5-55
802.11 counters report 14-150
802.11 General Parameters
configuring 9-117
802.11h template 11-99
configuring 11-99
802.11 MAC Counters
access points 5-79
802.11n summary reports 14-146
802.11 Parameters
configuring 9-117
802.11 security trap 11-125
802.1n scaling reports 14-6
802.1X authentication diagnostic test 10-30
802.1X supplicant credentials 11-12
802.3 Bridging
configuring 9-30
802.3x Flow Control 9-30
880 series ISRs 1-7
A
AAA
AAA mode 15-87
active sessions 15-95
AP/MSE Authorization 9-94
General 9-87
LDAP Servers 9-90
local password policy 15-88
MAC Filtering 9-93
RADIUS 15-98
TACACS+ 15-95
TACACS+ Servers 9-91
users 15-89
Web Auth Configuration 9-95
AAA Local Net Users 9-92
AAA Mode 15-87
AAA override 11-31
AAA RADIUS
Acct Servers 9-88
Fallback Parameters 9-89
AAA servers 11-30
AAA traps 11-125
absolute 6-114
Access Control List
Rules 9-102
Access Control Lists
configuring 9-102
access control list template 11-79
access control list templates 11-72
access mode 9-166
access point
configuring for FlexConnect 12-8
credentials 9-162
friendly 11-86
access point authorization template 11-62
access point icons 6-45
access point load
avoiding 11-94
Access Point Password
Global 9-60
access point positions
changing with import or export of file 6-56, 6-57
Access Points
Cisco APs
configuring 9-115
detecting 5-112
disabling
ineligible 11-154
Monitoring
overview 5-43
radio utilization 5-56
Tx power and channel 5-56
access points
configuring 9-174
configuring for LOMM 9-194
embedded 1-7
positioning 6-56
access points, adding to maps6-34to 6-39
access point threats 3-8
access point threats or attacks 3-8
Access Point Timer Settings 9-64
access point traps 11-124
Account
creating 7-17
ACL
configuring 9-102
Rules 9-102
ACL IP group details 11-72
ACL Protocol Groups
configuring 11-78
ACL template 11-79
configuring 11-79
ACS View Server credentials 9-247
ACS View Servers
configure 9-246
ACS view server tab 10-28
active interferer count per channel 9-212
active interferers 9-211
active interferers count chart 9-212
Active Sessions 15-95
active sessions
monitoring 7-4
adaptive scan threshold 11-99
adaptive wIPS alarm report 14-168, 14-170, 14-175, 14-184
adaptive wIPS top 10 APs report 14-173
add config groups 8-16
add group members 8-10
adding a spectrum expert 9-210
adding autonomous access points
by CSV file 9-170
by device information 9-169
adding autonomous access points to NCS 9-169
adding IOS access points 9-169
by device information 9-169
adding launch points
for Google Earth 6-118
adding NCS as TACACS+ server 15-103
Adding System Interfaces 9-40
adding templates from config group 8-19
Adhoc Rogue
alarm details 5-108
Alarms
overview 5-105
Events
details 5-116
monitoring alarms 5-106
adhoc rogues 3-6
adhoc rogues report 14-178
adjusted link metric 6-82
Administrative Tools
overview 2-27
advanced debug 17-7
advanced options 6-94
Advanced Parameters 16-33
Advanced tab
on WLAN template 11-33
age out dual band 9-121
age out suppression 9-121
aggregated historical data 15-60
Aggressive Load Balancing 9-31
aggressive load balancing 9-118
Airopeek
configuring 9-116
Alarm
details 5-91
alarm 5-132
alarm cleanup options 15-52
alarm counts
for access points 5-138
for controllers 5-138
for coverage hole 5-138
for malicious APs 5-138
for mesh links 5-138
for mobility 5-138
for security 5-138
for unclassified APs 5-138
alarm dashboard 5-137
alarm display options 15-52
Alarms
acknowledging 5-140
Adhoc Rogue
details 5-108
overview 5-105
assigning 5-139
cleaning 5-140
deleting 5-140
email notifications 5-145
monitoring 5-1
Rogue APs 5-95
unassigning 5-139
alarms 13-1
assigning 3-16
clearing 3-16
config audit 17-11
deleting 3-16
searching 2-36
unassigning 3-16
alarm severity
configuring 5-139
alarm summary 2-27
alarm trigger threshold 11-66
alarm warning 5-141
all groups window 15-106
allow AAA override 9-71
alternate parent report 14-130
altitude 6-114
altitude mode 6-114
anonymous provision 11-57
anonymous provisioning 11-57
AP/MSE Authorization
configuring 9-94
AP authentication
template 11-65
AP Authentication and MFP
configuring 9-114
AP authorization
template 11-62
AP Config
export 9-185
AP-detected interferers
searching 2-43
AP Failover Priority 9-29
AP failover priority
setting 9-162
AP load
avoiding 11-94
AP Location data 6-55
AP manager IP 11-152
applying CLI commands 11-130
applying config groups 8-19
AP policies 3-31
AP policies template 11-82
AP Profile Status
access points 5-56
AP profile status report 14-92
APs
802.11 Counters 5-55
AP Profile Status 5-56
autonomous
templates 11-146
configuration templates 11-136
copy and replace 9-195
Coverage (RSSI) 5-52
Coverage (SNR) 5-52
details 5-57
CDP Neighbors 5-69
interfaces 5-67
Dynamic Power Control 5-50
Edit View 5-46
Export AP config 9-185
Generate Report 5-47
Interference 5-51
lightweight
templates 11-137
lightweight access point template 11-137
monitor
overview 5-43
Noise 5-51
Radio
details 5-71
radio 9-185
remove unassociated 9-195
TSM 5-56
UpTime 5-52
Voice Statistics 5-53
Voice TSM Reports 5-55
Voice TSM Table 5-53
AP Status Report
Scheduled Task 9-221
AP Template
tasks 9-221
AP Template Task
delete 9-222
enable, disable 9-222
history 9-222
modify 9-221
AP Timer Settings 9-64
AP up time 5-81
AP Username Password Controller Templates 11-11
asset matching criteria 16-77
assigning location presence 6-18
assigning virtual domains 7-16, 15-92
association request failures 5-85
association request success 5-85
association request timeouts 5-85
attacks
access points 3-8
attacks detected 3-9
AUDIT_STATUS_DIFFERENCE 13-87
auditing config groups 8-20
auditing FlexConnect groups 12-13
Audit Mode
basic audit 15-54
template based audit 15-54
Audit Now 9-21
audit report
for alarms 16-89
audit trail
viewing 7-9
Authentication Priority
configuring 9-156
authentication priority
template 11-129
authentication process
FlexConnect 12-2
authentication request failures 5-85
authentication request success 5-85
authentication request timeout 5-85
auto key generation 11-42
automatic backups, scheduling 4-7
automatic client exclusion 11-35
automatic client troubleshooting 10-34, 15-55
autonomous access points
downloading images 9-174
Autonomous AP
Migration Templates
edit 11-150
Autonomous AP Client Authentication Failure 10-6
Autonomous APs
template 11-146
new 11-146
templates 11-146
autonomous to lightweight migration 9-168
autonomous to LWAPP migration support 9-168
auto provisioning filter
editing 9-234
avoid access point load 11-94
avoid Cisco AP load 11-94
avoid foreign AP interference 11-94
avoid non-802.11 noise 11-94
B
background scanning 9-56
on mesh configuration 11-122
on templates 11-122
background scanning in mesh networks
scenarios 9-55
Background Scan parameter 9-56
backhaul interface 5-83
band selection 9-120
battery level
condition type 16-76
bridge group name 5-83
Bridging link information 6-81, 6-88
bridging link information 6-81, 6-88
bridging mesh statistics 5-83
broadcast deauthentication frame signatures 3-34
bronze 11-32
bronze queue 5-85
buildings
adding to NCS database 6-19
busiest APs report 14-95
busiest client report 14-41
C
CA Certificate
configuring 9-105
CA certificates 4-4
calculating access point requirements 6-92
calibrating client 11-133
CAS 16-1
cascade reboot 8-21
CCX client statistics report 14-68
CDP Interface Neighbors
controller ports
monitor 5-14
certificate signing request 3-44
change order buttons 14-13
Chokepoint
adding to NCS database 9-215
adding to NCS map 9-215
removing from NCS 9-217
removing from NCS map 9-216
chokepoint
condition type 16-77
Chokepoints 5-120
new 9-215
chokepoints
positioning 6-56
CIDR notation 11-72
Cisco Access Points
configuring 9-115
Cisco Adaptive wIPS
alarms 5-146
Cisco Aironet 1510 Access Points
in Mesh network 9-54
Cisco AP load
avoiding 11-94
Cisco Discovery Protocol 9-180
Cisco Unified Network Solution
Cisco Unified Wireless LAN Solution
civic address 6-18
CKIP 9-70
clamped to ground 6-114
classification rule 11-83
Classifying Rogue APs 5-99
clear config 9-183
CLI
template 11-129
CLI commands
applying to template 11-130
Client
disable 10-40
remove 10-40
Sessions Report 10-41
client 10-41
calibrating 11-133
managing 10-2
client alarm summary 10-7
client association failure 10-6
client authentication failure 10-6
client authentication provision 11-57
client authentication type distribution 10-10
client count report 14-44
client detail page 10-16
Client Details
Association History 10-18
CCXv5 Information 10-20
Location Information 10-19
Statistics 10-19
client details
retrieving from access point page 10-34
client devices
connecting to WLANs 12-9
client distribution 10-4
client excluded 10-6
happening automatically 11-35
Client Exclusion Policies
configuring 9-109
client exclusion policies 11-64
template 11-64
client exclusion policies template 11-64
Client Location
current map 10-41
recent map 10-41
client related traps 11-124
client reports 14-40
clients
searching 2-40
client sessions report 14-47
Client Summary
filtering 10-11
client summary report 14-51
client tab 10-3
client traffic 10-7
client traffic stream metrics report 14-57
client troubleshooting
automatic 15-55
enabling 10-34
client WEP key decryption error 10-6
client WPA MIC error counter activated 10-6
CLI Sessions
monito 5-7
color coding
of obstacles 6-74
compliance report 14-70
concept 17-11
condition type
for event definitions 16-76
config audit 17-11
config audit alarms 17-11
config group
adding templates 8-19
configuring 8-18
downloading IDS signatures 8-23
downloading sw to controllers 8-22
removing controllers 8-18
removing templates 8-19
config group audits 8-20
config groups
applying 8-19
auditing 8-20
creating 8-16
downloading customized webauth 8-23
rebooting 8-21
reporting 8-22
Config Group Task
delete 9-224
enable,disable 9-224
history 9-224
Config Group Tasks 9-223
modify 9-223
Configuration
scheduled 9-221
configuration audit report 14-71
Configuration Backup 15-13
Configure Access Points
Radio 9-185
Configure APs
copy and replace 9-195
Configure Controllers
802.11
General Parameters 9-117
802.11a/n Parameters 9-124
Dynamic Channel Assignment 9-127
EDCA 9-132
General 9-124
Roaming 9-133
RRM Intervals 9-126
RRM Radio Grouping 9-129
RRM Thresholds 9-134
802.11b/g/n Parameters 9-136
EDCA 9-143
General 9-136
Roaming 9-143
RRM DCA List 9-139
RRM Radio Grouping 9-140
RRM Thresholds 9-138
802.11 Parameters 9-117
Access Control List
Rules 9-102
Access Points
Cisco APs 9-115
Download Customized Web Auth Bundle 9-38
Download IDS signatures 9-38
Downloading Configuration 9-36
Downloading Software 9-36
Download Web Admin Certificate 9-37
FlexConnect 9-82
FlexConnect AP Groups 9-82
Management 9-150
Authentication Priority 9-156
Local Management Users 9-156
multiple servers 9-154
Syslog 9-154
Telnet SSH 9-153
Trap Receivers 9-150
Web Admin 9-154
Mesh 9-146
Ports 9-149
Rebooting Controllers 9-9, 9-10
Removing Controllers 9-8
Security
AAA 9-86
AAA AP authorization 9-94
AAA Local Net Users 9-92
AAA RADIUS Acct Servers 9-88
AAA RADIUS Auth Servers 9-87
Access Control Lists 9-102
AP Authentication and MFP 9-114
CA Certificate 9-105
Client Exclusion Policies 9-109
CPU Access Control List 9-104
Custom Signatures 9-114
Disabled Clients 9-101
file encryption 9-86
ID Certificate 9-106
IDS Sensor List 9-105
Local EAP 9-97
Local EAP General 9-97
Local EAP general EAP-FAST parameters 9-100
Local EAP General Network Users Priority 9-100
Local EAP Profiles 9-98
Rogue Policies 9-108
Standard Signatures 9-110
User Login Policies 9-101
Web Auth Certificate 9-107
Wireless Protection 9-107
System
DHCP Scopes 9-57
Mobility Groups 9-51
Network Route 9-50
Network Time Protocol 9-54
QoS Profiles 9-57
Spanning Tree Protocol 9-51
System Commands 9-32
System Interfaces 9-39
Uploading Files from Controllers 9-35
Configuring
ACL Protocol Groups 11-78
Wired Guest Access 9-47
Configuring 802.3 Bridging 9-30
configuring access points 9-174
configuring a client exclusion policy template 11-84
configuring a CPU ACL template 11-79
configuring a high throughput template 11-100
configuring a local EAP general template 11-53
configuring a local EAP profile template 11-54
configuring a manually disabled client template 11-63
configuring a mesh template 11-121
configuring an 802.11h template 11-99
configuring an access point 11-62
configuring an access point for FlexConnect 12-8
configuring an EAP-FAST template 11-56
configuring an RRM interval template 11-104
configuring an RRM threshold template 11-99
configuring a policy name template 11-92
configuring a roaming parameters template 11-96
configuring a TACACS+ server template 11-49
configuring a trusted AP policies template 11-82
configuring a user authentication priority template 11-129
configuring a user login policies template 11-60
configuring config group 8-16
configuring controller WLANs 9-65
configuring EDCA parameters
through a template 11-96
Configuring Existing Controllers 9-23
configuring firewall for NCS 3-30
configuring FlexConnect 12-1
configuring FlexConnect access point groups 12-9
configuring FlexConnect AP groups 11-38
configuring FlexConnect groups 12-11
configuring global credentials 9-162
configuring global email parameters 15-63
Configuring IDS 3-33
Configuring IDS signatures 3-33
configuring intrusion detection systems 3-33
configuring multiple country codes 8-14
configuring search results 2-46
configuring spectrum experts 9-210
configuring template
ACL 11-63
for rogue AP rule groups 11-84
configuring templates
802.11b/g RRM interval 11-104
access point authentication and MFP 11-82
access point authorization 11-62
file encryption 11-45
guest users 11-59
known rogue access point 11-99
local management user 11-128
MAC filter 11-61
RADIUS accounting 11-48
RADIUS authentication 11-46
syslog 11-126
Telnet SSH 11-125
traffic stream metrics QoS 11-20
trap control 11-123
WLAN 11-22
configuring the controller for FlexConnect 12-6
configuring the switch
for FlexConnect 12-5
Configuring User Roles 9-59
connecting client devices
to WLANs 12-9
Connecting to the Guest WLAN 3-44
context aware configuring 16-95
context-aware software 16-1
Controller
General System Parameters 9-26
Multicast Mode 9-63
Template Launch Pad 11-1
Uploading configuration/logs 9-35
controller
configuring for FlexConnect 12-6
controller details 11-152
Controller DHCP 9-62
configuring 9-62
controller license information 15-133
controller operational status 15-15
Controllers
Adding an Interface 9-40
configuring existing 9-23
DHCP Stats
monitor 5-8
Edit View 5-3
monitor
Summary 5-4
monitoring 5-1
search 5-2
System Parameters
monitor 5-3
controllers
adding 9-4
adding to NCS database 4-1
searching 2-39
specified 1-1
Controller Security
monitor 5-15
Controller Templates
802.11b/g/n Parameters 11-107
Adding 11-2
applying 11-2
AP Username Password 11-11
delete 11-2
managing, creating 11-4
SNMP Community 11-9
Viewing 9-21
Voice
802.11b/g/n 9-122, 11-90, 11-95, 11-110
Controller Time and Date 9-35
controller upgrade settings 15-59, 15-61, 15-78
Controller User Roles 9-59
controller WLANs
configuring 9-65
Country Codes
setting multiple 9-118
country codes
multiple 8-14
Coverage (RSSI)
access points 5-52
Coverage (SNR)
access points 5-52
coverage hole 5-88
coverage hole reports 14-153
CPU access control
template 11-79
CPU Access Control Lists
configuring 9-104
CPU ACL
configuring 9-104
Cranite 9-68
Creating Account 7-17
Creating a Lobby Ambassador Account 7-17
Creating guest user accounts 7-10
creating placemarks 6-115
creating virtual domains 15-41
CSR 3-44
CSV files 6-116
Current building
delete 6-22
edit map 6-21
Custom and Standard Signatures
Global Settings 9-113
customized webauth
downloading 8-23
Customized Web Auth Bundle
download 9-38
Customized WebAuth Bundles
downloads 9-16
Customized Web authentication 3-42
customized web authentication
downloading 11-68
customize report 14-12
Custom signature 3-39
Custom Signatures
configuring 9-114
D
data collection
for RFID tag 11-133
802.11a/n 9-127
debug commands A-4
debug strategy A-4
default lobby ambassdor credentials
deleting a license B-4
deleting a WLAN 9-77
deleting guest user templates 7-12
deleting NCS user accounts 7-3
designing a network 6-99
destination type
for report 14-8
Detecting APs 5-112
details
clients 10-42
device certificates 4-3
device information 9-169
device report 14-90
DHCP
configuring 9-62
DHCP diagnostic test 10-30
DHCP Scopes
configuring 9-57
DHCP server
overriding 11-37
DHCP Stats
controllers
monitor 5-8
diagnostic channel A-1
diagnostic test
802.11 association 10-30
802.1X authentication 10-30
DHCP 10-30
DNS ping 10-30
DNS resolution 10-30
IP connectivity 10-30
profile redirect 10-30
Disable
client 10-40
Disabled Clients
manual 9-101
disabled clients
template 11-63
disabling IDS signatures 3-38
Discovering Templates from Controllers 9-19
Distance
condition type 16-76
DNS ping diagnostic test 10-30
DNS resoltion diagnostic test 10-30
Download
Web Admin Certificate 9-155
Web Auth Certificate 9-155
downloading a customized web authentication page 11-68
downloading autonomous AP images 9-184
Downloading Configurations to Controllers 9-36
downloading customized webauth 8-23
Downloading customized web authentication 3-42
Downloading IDS signatures 3-37
downloading IDS signatures
from your config group 8-23
downloading images
to autonomous access points 9-173
Downloading Signature Files 9-111
Downloading Software
controllers 9-36
downloading sw to controllers
after adding config group 8-22
downloading vendor CA certificates 4-4
downloading vendor device certificates 4-3
Downloads
Customized WebAuth Bundles 9-16
Vendor CA Certificates 9-18
Vendor Device Certificate 9-17
downstream delay 11-21
downstream packet loss rate 11-21
drawing polygon areas
using map editor 6-72
DTIM 11-93
Dynamic Channel Assignment
802.11a/n 9-127
dynamic interface 11-15
E
EAP-FAST
template 11-56
EAP-FAST template 11-56
EAPOL flood signature 3-35
EDCA
802.11b/g/n Parameters 9-143
EDCA parameter
template 11-97
EDCA parameters
configuring through a template 11-96
editing saved reports 14-19
Editing signature parameters 3-40
editing the default lobby ambassador credentials 7-9, 7-14
edit location presence information 6-18
Edit View
access points 5-46
controllers 5-3
general 2-47
egress interface 9-67
configuring parameters 15-62
Email Notifications
alarms 5-145
embedded access points 1-7
emergency
condition type 16-77
enable background audit 8-17
enable enforcement 8-17
enable log module 15-122
enabling 10-41
enabling audit trails
for guest user activities 7-10
enabling IDS signatures 3-38
Enabling Web login 3-41
end user license agreementB-7to B-12
Ethernet bridging 9-164
Ethernet Switch
credentials 9-203
remove 9-210
Ethernet VLAN tagging guidelines 9-165
evaluation license
for controller 15-134
for MSE 15-136
Events
Adhoc Rogue 5-153
details 5-116
monitoring 5-148
overview 5-148
Pre Coverage Holes 5-154
Rogue Alarms 5-113
Rogue AP
details 5-114
Rogue APs 5-152
working with 5-158
events
searching 2-42
exclude device list 15-79
excluded packets 5-84
exclude switch trunk ports 15-79
exclude vendor list 15-80
executive summary report 14-147
exporting a file 6-56
to change access point position 6-56, 6-57
export task list 15-106
extend to ground 6-114
extension license
for controller 15-134
for MSE 15-136
extracting task list 15-112
F
Factory Defaults
restoring 9-34
failover mechanism 15-126
Failover Priority 9-29
feature
of NCS license 15-132
File Encryption
controller 9-86
file encryption template 11-45
filter
editing current auto provisioning 9-234
filtering
using to modify maps 6-88
filtering saved reports 14-18
filtering scheduled run results 14-16
firewall, configuring for NCS 3-30
FlexConnect
bandwidth restriction 11-33, 12-3
configuring 12-1
FlexConnect access point groups 12-9
FlexConnect AP Groups
configuring 9-82
FlexConnect AP groups
configuring 11-40
configuring template 11-40
FlexConnect configuration tab 11-41
FlexConnect Group
auditing 9-85
FlexConnect groups 12-10
auditing 12-13
FlexConnect local switching 9-72, 11-33
FlexConnect Parameters 9-82
Floor Areas
delete 6-40
edit 6-40
foreign access point interference
avoiding 11-94
foreign AP interference
avoiding 11-94
Frame type 3-39
friendly access point template 11-86
friendly AP
template 11-86
friendly rogue 11-82
friendly rogue access points 3-8
FTP
turning on and off 15-71
G
general templates
configuring 11-5
generating migration analysis report 17-13
geographical coordinates 6-113
Global AP Password
configuring 9-60
global credentials
configuring 9-162
Global Settings
Standard and Custom Signatures 9-113
Global settings
for standard and custom signatures 3-40
Global SSID Group
add 9-243
delete 9-244
edit 9-244
gold 11-32
gold queue 5-84
Google Earth
adding launch points 6-118
Google Earth coordinates 6-114
Google KML or CSV
importing into NCS 6-117
GPS markers 6-18
grace period license
for controller 15-134
groups
for FlexConnect 12-11
for rogue access point rules 11-84
group setup window on ACS server 15-107
GUEST_USER_ADDED 13-67
GUEST_USER_AUTHENTICATED 13-67
guest account settings 15-61
guest accounts status report 14-121
guest association report 14-123
guest count report 14-124
guest reports 14-121
guest user
template 11-59
guest user account
scheduling 7-12
guest user accounts
managing 7-11
guest user details
emailing 7-13
print 7-13
Guest Users
monitoring 5-22
guest user sessions report 14-125
guest user templates 11-59
Guest WLAN
connecting 3-44
guidelines
for Ethernet VLAN tagging 9-165
guidelines for using the map editor 6-5
H
heater status 5-81
heat map
described 6-38
Help Menu 2-26
hierarchy
of mesh network 6-86
Hierarchy of Mesh parent to child 6-89
hierarchy of mesh parent to child 6-89
High Throughput
802.11b/g/n Parameters 9-144, 9-145
high throughput
template 11-100
high throughput template
configuring 11-100
historical report type 14-1
HTTP
turning on and off 15-71
hybrid REAP
bandwidth restriction 9-72
hysteresis 11-98
I
ID Certificate
configuring 9-106
Identity Services Engine 16-102
IDS 3-33
IDS Sensor List
configuring 9-105
IDS sensors 3-33
IDS Signatures
configuring 9-110
download 9-38
IDS signatures 3-33
downloading 3-37
downloading from config group 8-23
enabling 3-38
uploading 3-36
images
downloading to autonomous access points 9-174
importing a file 6-56
to change access point position 6-56, 6-57
importing coordinates
as CSV file 6-116
into Google Earth 6-114
importing Google KML or CSV into NCS 6-117
Import map 6-55
In/Out
condition type 16-76
information elements
Aironet 11-34
infrastructure MFP 3-31
ingress interface 9-67
Inspect Location Readiness 6-78
Inspect VoWLAN Readiness 6-79
installing a license B-4
insufficient memory 5-84
interface group 11-19
Interferers
summary 5-125
interferers
summary 9-211
inter-subnet roaming 8-4
Intrusion Detection Systems 3-33
invalid association request 5-86
invalid reassociation request 5-86
Invalid Reauthentication Request 5-86
inventory report 14-107
IOS access points
adding 9-169
adding by device information 9-169
IOSAP_DOWN 13-131
IOSAP_LINK_DOWN 13-68
IOSAP_LINK_UP 13-67
IOSAP_UP 13-68
IP connectivity diagnostic test 10-30
K
KEK
key encryption key 11-46
key wrap 11-46
KML file 6-114
L
LAG mode 11-7
Latest Network Audit Report 9-23
latitude 6-113
Layer 1 security solutions 3-2
Layer 2 11-24
Layer 2 security solutions 3-2
Layer 3 11-29
Layer 3 security solutions 3-2
Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-29
LBS authorization
template 11-62
LDAP Servers 9-90
LDAP servers 9-71
template 11-50
LEAP authentication
requirements 8-8
Learn Client IP Address 11-34
legacy syslog
template 11-127
legacy syslog template 11-126
license
backup and restore B-4
license installation B-4
licenses B-1
license types B-1
Lightweight AP Protocol Transport Mode 9-30
limitations for high reliability 15-126
Link Aggregation 9-32
link aggregation (LAG)
guidelines 12-4
link metric
adjusted 6-82
unadjusted 6-82
link SNR 6-82
link stats report 14-131
Load
access points 5-49
load 6-98
load balancing 9-118
Lobby Ambassador
account 7-17
creating account 7-17
Lobby ambassador 7-10
Lobby Ambassador Account
creating 7-17
editing 7-18
lobby ambassador defaults
setting 7-6
local authentication
for FlexConnect groups 12-11
Local EAP 9-97
General EAP-FAST Parameters 9-100
General Network Users Priority 9-100
General Parameters 9-97
Profiles 9-98
local EAP authorization 9-71
Local EAP check box 11-31
local EAP general
template 11-53
local EAP profile template 11-54
Local Management Users
configuring 9-156
local management users
template 11-128
local management user template 11-128, 11-129
Local Net Users
configuring 9-92
local net users
template 11-58
local net users template 11-58
Local Password Policy 15-88
local switching
FlexConnect 11-33
Location
calibration 1-10
notifications 16-69
notification settings 16-71
synchronize servers 16-11
location change
condition type 16-77
location configuration
template 11-132
Location History
clients 10-43
location optimized monitor mode 9-178
location presence
assigning 6-18
Location Readiness 6-78
Location Server
logs 16-35
maintenance 16-42
NCS alarms 16-40
NCS events 16-40
NMSP parameters 16-30
notification parameters 16-67
restore 16-44
server events 16-39
backup historical data 16-43
configuration clearing 16-34
reboot hardware 16-34
location upgrade B-2
log analysis 10-26
logging 15-5
logging into the NCS user interface2-11to 2-12
logging options 15-121
logging the lobby ambassador activities 7-9
login.html 3-42
login disclaimer 15-62
login policies
template 11-61
log message levels 15-122
log modules
enabling 15-122
LOMM 9-178
configuring access point radios 9-194
longitude 6-115
long preambles, enabling for SpectraLink NetLink phones 4-5
LWAPP
template
edit 11-145
templates 11-137
Transport Mode 9-30
LWAPP migration 9-168
LWAPP template
new 11-137
M
MAC Filtering
configuring 9-93
MAC filtering 11-28
template 11-61
MAC filter template 11-61
MAC frequency 3-39
MAC information 3-39
MACK
message authenticator code keys 11-46
transport type 16-78
mail server configuration 15-62
Maintenance
location server 16-42
malformed neighbor packets 5-84
malicious rogue 11-82
malicious rogue access points 3-5, 3-6
managed network
security index 3-5
management frame flood signatures 3-34
Management Frame Protection 3-31
management frame protection 9-75, 11-65
Management Frame Protection Summary
controllers
monitor 5-19
management interface 11-8
Management Parameters
configuring 9-150
management queue 5-85
managing clients 10-1
managing current reports 14-14
managing saved reports 14-17
managing virtual domains 15-47
managing WLAN schedules 9-77
mandatory data rates 11-94
manually disabled client
template for 11-63
Manually Disabled Clients
managing 9-101
map editor
guidelines 6-5
guidelines for using 6-5
using to draw polygon areas 6-72
map editor functions 6-4
map properties
editing 6-14
maps
searching 2-44
using to monitor link stats 6-80
using to monitor mesh AP neighbors 6-84
map size 6-110
map view
updating 6-89
media streams 5-127
Menu Bar 2-13
Mesh
monitoring health 5-81
statistics for AP 5-82
mesh access point neighbors
monitoring 6-84
mesh access points
monitoring 6-82
mesh configuration
template 11-121
mesh link statistics 6-80
monitoring 6-80
mesh neighbors 6-85
mesh network hierarchy 6-86
mesh networks
background scanning 9-54
monitoring 6-80
Mesh Parameters 9-146
mesh parent-child hierarchical view 6-51
mesh reports 14-129
mesh template
configuring 11-121
Mesh tree
viewing 6-86
mesh tree
viewing 6-86
message integrity check information element 11-65
metrics
in QoS 11-20
for clients 3-31
MFP attacks 3-9
MFP client protection 11-37
MFP signature generation 11-37
MFP Summary
controllers
monitor 5-19
MFP templates 11-65
MIC IE 11-65
migration analysis
running 17-13
migration analysis report
generating 17-13
migration analysis summary
viewing 11-151
migration template 11-148
Migration Templates
Autonomous APs
edit 11-150
minimum RSSI 11-98
Mirror Mode 10-41
mirror mode 9-179
missing
condition type 16-76
MLD Snooping 9-63
mobile announce messages 8-8
Mobility 16-1
Mobility Stats
monitor 5-23
service 16-1
mobility 8-1
Mobility Anchor Group Keep Alive Interval 9-32
Mobility Group
Prerequisites 9-52
Mobility Groups
configuring 9-51
Messaging 9-52
mobility groups 8-7
mobility groups, configuring 8-8
mobility scalability 8-11
Mobility Services 16-1
viewing 16-5
Mobility Stats
monitor 5-23
modifying a migration template 11-151
modifying map displays 6-88
using filters 6-88
Monitor
Alarms 5-1
Events 5-148
Ports
overview 5-9
Rogue AP Rules 5-20
Monitor Access Points
details 5-57
edit view 5-46
load 5-49
radio type
802.11 MAC counters 5-79
on demand statistics 5-72
operational parameters 5-76
view alarms 5-80
view events 5-81
radio utilization 5-56
search 5-43
search results 5-44
Tx power and channel 5-56
Monitor Alarms
details 5-91
Monitor APs
802.11 Counters 5-55
AP Profile Status 5-56
Coverage (RSSI) 5-52
Coverage (SNR) 5-52
details
CDP Neighbors 5-69
interfaces 5-67
Dynamic Power Control 5-50
Interference 5-51
Noise 5-51
Radio
details 5-71
TSM 5-56
UpTime 5-52
Voice Statistics 5-53
Voice TSM Reports 5-55
Voice TSM Table 5-53
Monitor Chokepoints 5-120
Monitor Client
detecting APs
details 10-42
disable 10-40
location history 10-43
present map 10-41
recent map 10-41
remove 10-40
roam reason 10-42
v5 statistics 10-36
voice metrics 10-43
Monitor Controllers 5-1
802.11a/n parameters 5-25
802.11a/n RRM Grouping 5-27
802.11a/n RRM Groups 5-30
802.11b/g/n parameters 5-29
CLI Sessions 5-7
ports
general 5-9
spanning tree protocol 5-6
System
summary 5-4
WLANs 5-9
Monitor Events
Details 5-151
search 5-151
Monitoring
Guest Users 5-22
monitoring active sessions 7-5
monitoring channel width 5-87
monitoring mesh access point neighbors 6-84
using maps 6-84
monitoring mesh health 6-86
monitoring mesh link statistics
using maps 6-80
monitoring mesh networks
using maps 6-80
monitoring neighboring channels 9-54
monitoring pre-coverage holes 5-89
monitoring spectrum experts 9-211
monitor mode
location optimized 9-178
Monitor Tags 5-118
most recent audit alarms 17-11
most recent rogue adhocs 3-6
MSE 16-6
MSE authorization
template 11-62
MSE license information 15-136
Multicast Direct 9-63
multicast mobility mode 8-11
Multicast Mode
controller 9-63
Multiple Country Codes
setting 9-118
multiple country codes
configuring 8-14
multiple syslog
template 11-127
multiple syslog template 11-127
N
N+1 redundancy 8-5
NAC Out-of-Band Integration 9-44
NAC state 9-75
NAT 8-10
NCS
overview 1-2
servers supported 1-2
NCS_EMAIL_FAILURE 13-152
NCS-ADV-SI-SE-10 B-2
NCS Alarm
status 16-40
NCS Alarms
location servers 16-40
NCS database
restoring 4-8
on Linux 4-9
restoring in high availability environment 4-9
scheduling automatic backups 4-7
NCS Events
location servers 16-40
status 16-40
NCS guest operations report 14-127
NCS home 2-11
NCS licenses B-1
NCS Location Calibration 1-10
NCS password
recovering 4-12
NCS user accounts
adding 7-2
changing passwords 7-4
deleting 7-3
NCS user interface
described 2-13
netmask 11-72
NetStumbler signature 3-35
network address translation 8-10
Network Audit Report
latest 9-23
network design 6-99
network designs 16-12
network protection 3-33
Network Routes
configuring 9-50
Network Summary page 2-12
network summary reports 14-146
Network Time Protocol
configuring 9-54
network users priority
template 11-57
network utilization reports 14-155
new rogue access points report 14-182
NMSP Parameters
location server 16-30
node hops 5-84
nodes report 14-133
noise
avoiding non-802.11 types 11-94
avoid non-802.11 11-94
non-802.11 noise
avoiding 11-94
non-aggregated historical data 15-61
non-Cisco ACS server
for use with RADIUS 15-112
normal mode
for Ethernet port 9-166
North Bound API 7-15
Notification Parameters
location server 16-67
Notifications
location 16-69
Notification Settings
location 16-71
NTP configuration 9-54
NTP server template 11-10, 11-14
null probe response signatures 3-34
O
On Demand Statistics
access points 5-72
onstacle color coding 6-74
Operational Parameters
access points 5-76
OUI search 15-79
outdoor location
creating with Google Earth 6-113
overview
Cisco Unified Network Solution1-1to 1-2
NCS 1-2
P
packet error rate link color 6-88
packet error statistics report 14-137
packet jitter 11-20
packet latency 11-20
packet loss 11-20
packet loss rate 11-21
packet queue statistics report 14-139
packet stats report 14-135
parent changes 5-84
Passive Client 9-75
passthrough 11-29
PCI report 14-74
PEAP 11-55
peer-to-peer blocking 11-34
performance reports 14-150
permanent license
for controller 15-134
for MSE 15-136
physical appliance 2-2
placemarks
creating 6-115
placement of access points 6-40
planning mode 6-93
to calculate access point requirements 6-92
planning mode, calculating access point requirements 6-92
platinum 11-32
platinum queue 5-84
PLR 11-21
policy manager solutions 3-2
poor neighbor SNR 5-84
Port Parameters
configuring 9-149
Ports
Monitor
overview 5-9
monitor controllers 5-9
positioning access points 6-56
positioning chokepoints 6-56
positioning Wi-Fi TDOA receivers 6-56
power injector settings 9-181
Preauthentication ACL 9-70
Preferred Call 9-121
Prerequisites 2-4
Present Map
clients 10-41
print guest user details 7-13
probe cycle count 9-121
Profile
List 9-238
Profile editor 9-239
profile redirect diagnostic test 10-30
protection type 11-66
Q
QoS 11-32
QoS Profiles
configuring 9-57
queues
silver, gold, platinum, bronze, management 5-84
quick search 2-33
Quiet time 3-39
R
Radio
access points
configuring 9-185
radio resource management 11-94
Radio Status
scheduling and viewing 9-195
radio status
scheduling 9-196
Radio Utilization
access points 5-56
RADIUS 15-98
RADIUS Accounting
controllers
monitor 5-17
RADIUS accounting servers
template 11-48
RADIUS accounting template 11-48
RADIUS and TACACS+ attributes
RADIUS Authentication
controllers
monitor 5-15
RADIUS authentication template 11-46
RADIUS Auth Servers
AAA RADIUS
Auth Servers 9-87
RADIUS fallback
template 11-49
RADIUS fallback mode 11-50
RADIUS servers 9-71
reachability status 9-210
Readiness
location 6-78
VoWLAN 6-79
reassociation request failures 5-85
reassociation request success 5-86
reassociation request timeouts 5-85
reauthentication request failures 5-86
reauthentication request success 5-86
reauthentication request timeout 5-86
Rebooting Controllers 9-9, 9-10
recent adhoc rogue alarms 3-9
Recent Map
clients 10-41
recent rogue AP alarms 3-9
recovering the NCS password 4-12
recurrence
for report 14-9
refresh browser 6-99
refresh component icon 2-22
Refresh Config 9-19
refresh from network 6-98, 6-110
relative to ground 6-114
Remove APs 9-195
Remove Controllers 9-8
removing controllers from config group 8-18
removing templates from config group 8-19
report
running new 14-6
report launch pad 14-2
Reports
Rogue AP Events 14-186
reports
scheduled runs 14-15
reset AP now 9-183
Restore
location server 16-44
Restoring Factory Defaults 9-34
restoring NCS database
in high availability environment 4-9
restoring NCS database on Linux 4-9
retain NCS value 8-21
RF calibration model, creating 4-5
RF Calibration Models
apply to maps 6-69
delete 6-69
RFID data collection 11-133
RF profile traps 11-125
RF update traps 11-125
Roaming
802.11b/g/n Parameters 9-143
roaming 8-1
roaming parameter
template 11-98
roaming parameters template
configuring 11-98
Roam Reason
clients 10-42
rogue access point events report 14-188
rogue access point rule groups 11-84
rogue access point rules
configuring a template 11-82
viewing or editing 9-199
rogue access points
friendly 3-8
malicious 3-6
solutions for 3-3
unclassified 3-7
rogue adhocs
most recent 3-6
Rogue Alarm Events 5-113
Rogue AP
alarm details 5-114
alarms 5-95
malicious 5-94
Rules
monitor 5-20
Rogue AP Events
report 14-186
rogue AP rule groups
template 11-84
Rogue AP Rules
configuring 9-109
details 5-21
rogue AP rules
template 11-83
Rogue APs
classifying 5-99
friendly 5-94
unclassified 5-95
Rogue Client
details 5-103
rogue clients
searching 2-44
rogue detector 9-178
Rogue Devices
detecting 5-91
rogue location discovery protocol 11-81
Rogue Policies
configuring 9-108
rogue policies
template 11-81
template for 11-80
role criteria 11-151
root access points (RAPs)
selecting 9-168
root mode
changing from station role 17-13
routing state 5-83
RRM 11-94
DCA
802.11b/g/n Parameters 9-139
Radio Grouping
802.11b/g/n Parameters 9-140
RRM DCA 9-128
RRM Intervals
802.11a/n 9-126
802.11b/g/n Parameters 9-138
RRM intervals 11-99
template 11-104
RRM interval template
configuring 11-104
RRM Radio Grouping
802.11a/n 9-129
RRM Thresholds
802.11b/g/n Parameters 9-138
RRM threshold template
configuring 11-102
RSSI legend 6-110
rules
for rogue access point 11-82
running a new report 14-6
running a saved report 14-19
running migration analysis 17-13
RX neighbor requests 5-84
RX neighbor responses 5-84
S
Save Config to Flash 9-19
saved report
running 14-19
saved reports
editing 14-19
filtering 14-18
managing 14-17
saved searches 2-46
scalability parameters 8-11
scan cycle period threshold 9-121
scan threshold 11-99
Scheduled Configuration 9-221
Schedule details 9-174
scheduled run details
editing 14-17
scheduled run results 14-15
filtering 14-16
Scheduled Task
AP status report 9-221
schedules
managing for WLANs 9-77
scheduling guest user account 7-12
scheduling radio status 9-196
Search
access points 5-43
controller resul 5-2
Events 5-151
overview 2-27
search alarm parameters 2-36, 2-40, 5-33
search feature 2-33
using for troubleshooting 10-25
searching access points 2-37
searching clients 2-40
searching controllers 2-39
searching events 2-42
searching maps 2-44
searching tags 2-45
searching Wi-Fi TDOA receivers 2-44
secondary NCS operation 15-126
Security
AAA
LDAP servers 9-90
TACACS+ Servers 9-91
Web Auth Configuration 9-95
AAA MAC Filtering 9-93
Local EAP 9-97
security color range 3-5
security configurations
monitoring 5-145
security index 3-5
security mesh statistics 5-85
Security Reports
Rogue AP Events 14-186
security summary 14-191
security tab
interpreting 3-4
security thermometer 3-5
sending mobile announce messages 8-8
sensors
viewing IDS types 3-33
Server Events
location servers 16-39
status 16-39
set sorting buttons 14-13
Set Time
controller 9-35
setting AP failover 9-162
Setting Controller Time and Date 9-35
shunned clients
searching 2-45
silver 11-32
silver queue 5-84
Sniffer 11-138
Sniffer Feature 9-116
sniffer mode 9-178
SNMP
transport type 16-78
SNMP authentication 11-124
SNMP Community
controller templates 11-9
SNMP mediation 15-122
SNR definition 6-88
SNR down 6-82
SNR UP 6-82
SNR up 6-82
SOAP 16-78
software
downloading config groups to controllers 8-22
software, updating 4-2
Spanning Tree Protocol
configuring 9-51
monitor controllers 5-6
SpectraLink NetLink phones, enabling long preambles 4-5
spectrum expert
adding 9-210
spectrum expert details 9-212
Spectrum Experts
details 5-126
Interferers 5-125
summary 5-124
spectrum experts
configuring 9-210
monitoring 9-211
summary 9-211
SSID Group
add 9-245
add from global list 9-245
add global 9-243
delete 9-246
delete global 9-244
edit 9-246
edit global 9-244
SSID Group List
wIPS 9-242
SSID group list
global 9-243
SSID groups
wIPS 9-244
Standalone Building
adding floor plan 6-32
Standard and Custom Signatures
Global Settings 9-113
Standard signature 3-39
Standard Signature Parameters
configuring 9-110
standard signatures 3-33
static WEP 9-68
Static WEP-802.1X 9-68
station role
changing to root mode 17-13
Status Report
scheduled task 9-223
status schedules
managing for WLANs 9-77
stranded APs report 14-141
supported data rates 11-94
Switch
credentials 9-203
remove 9-210
switch
configuring for FlexConnect 12-5
Switch Port Tracing
Details 15-81
Troubleshooting 15-81
symmetric mobility tunneling 11-8
symmetric tunneling 8-5
Synchronize servers
location 16-11
Syslog
configuring individual controller 9-154
Individual controller 9-154
multiple servers 9-154
syslog
transport type 16-78
syslog templates 11-126, 11-127
System
General Properties 9-26
System Commands
controller 9-32
System Interfaces
Controllers 9-39
System parameters
controllers
monitor 5-3
System requirements 2-5
T
TACACS+ 15-95
TACACS+ server
configuring a template for 11-51
template 11-51
tagged packets 9-168
Tags 5-118
tags
searching 2-45
Task
configuration backup 15-13
status 15-15
Telnet SSH
template 11-123
Telnet SSH Parameters
configuring 9-153
Telnet SSH templates 11-125
temperature 5-81
template
configuring for rogue AP rules 11-82
Template Launch Pad
overview 11-1
Templates
AP Configuration 11-136
delete 11-2
test analysis tab 10-29
TFTP
turning on and off 15-71
TFTP details 11-152
TFTP Server
adding 9-247
TFTP server 3-36
TFTP Servers
configure 9-247
delete 9-248
thermometer color range 3-5
threats
access points 3-8
throughput report 14-63
tilt 6-114
Timer Setting
AP 9-64
total interferer count 9-212
total mismatched controllers 17-11
trace 15-125
traffic indicator message 11-93
Traffic Stream Metrics
access points 5-56
traffic stream metrics QoS status 11-21
traffic stream metrics QoS template 11-20
traffic stream metrics report 14-157
transition time 11-99
Transport Mode
LWAPP 9-30
transport types 16-78
trap
802.11 security 11-125
Trap Control
configuring 9-151
trap control
template 11-123
trap control templates 11-123
trap receiver
template 11-122
Trap Receivers
configuring 9-150
trap receiver template 11-122
traps
AAA 11-125
access point 11-124
client related 11-124
RF profile 11-125
RF update 11-125
unsupported 13-165
traps added in 2.2 13-32
traps added in 3.0 13-35
traps added in 3.1 13-38
traps added in 3.2 13-43
traps added in 4.0 13-44
traps added in 4.0.96.0 13-51
traps added in 4.1 13-54, 13-66
traps added in release 6.0 13-71
traps added in release 7.0 13-74
trend report type 14-1
Troubleshooting
Switch Port Tracing 15-81
troubleshooting A-1
using logging options 15-125
troubleshooting voice RF coverage 6-98
trunk mode 9-166
TSM
access points 5-56
tunneling 8-5
TX neighbor requests 5-84
TX neighbor responses 5-84
Tx Power and Channel
access points 5-56
Tx power and channel report 14-160
type
of NCS license 15-133
U
UDI
retrieving on controllers and access points 5-87
unadjusted link metric 6-82
unclassified rogue 11-82
unclassified rogue access points 3-7
understanding virtual domains 15-50
unique clients report 14-65
unique device identifier 5-87
unknown association requests 5-86
unknown reassociation request 5-86
untagged packets 9-168
Update map view 6-89
update map view 6-89
updating system software 4-2
upgrade settings
for controller 15-58
upgrading autonomous access points 11-153
upgrading NCS
in high availability environment 4-11
upgrading the network 4-12
Uploading IDS signatures 3-36
uploading IDS signatures 3-36
Uploading Signature Files 9-112
upstream delay 11-21
upstream packet loss rate 11-21
UpTime
access points 5-52
uptime report 14-114
User accounts
for guest 7-10
user credential retrieval priority 11-57
user details
emailing 7-13
printing 7-13
User Interface
Menu Bar 2-13
User Login Policies
configuring 9-101
user login policies
configuring a template 11-60
template 11-61
user preferences 15-82
User Roles
configuring 9-59
Users 15-89
using logging
for troubleshooting 15-125
using maps
to monitor mesh AP neighbors 6-84
to monitor mesh link statistics 6-80
using maps to monitor mesh networks 6-80
using planning mode 6-72
using template
ACL 11-79
for friendly access point 11-86
using templates
802.11b/g RRM interval 11-104
802.11b/g RRM threshold 11-102
access point authentication & MFP 11-65
access point authorization 11-62
local management user 11-128, 11-129
local net users 11-58
MAC filter 11-61
password policy 11-70
QoS 11-17
RADIUS accounting 11-48
Telnet SSH 11-125
traffic stream metrics QoS 11-20
trap control 11-123
trap receiver 11-122
web authentication 11-67
WLAN 11-22
utilization report 14-115
V
V5 Statistics
client 10-36
Vendor CA Certificates
downloads 9-18
vendor CA certificates
downloading 4-4
Vendor Device Certificate
downloads 9-17
vendor device certificates
downloading 4-3
vendor search 15-79
View 2-23
View Alarms
access points 5-80
view in chart icon 2-23
Viewing
Mobility Services 16-5
viewing audit status
for access points 9-196
viewing autonomous access points 9-173
viewing Google Earth maps 6-118
Viewing Mesh tree 5-82
view in grid icon 2-23
Viewing shunned clients 3-33
Viewing Templates Applied to a Controller 9-21
viewing the audit trail 7-9
viewing the migration analysis 11-151
view list 10-25
virtual appliance 2-2
virtual domains
creating 15-41
hierarchy 15-42
managing 15-47
understanding 15-50
VLAN tagging 9-164
Voice
802.11b/g/n Controller Templates 9-122, 11-90, 11-95, 11-110
Voice Metrics
clients 10-43
Voice-over-Internet Protocol
snooping 9-74
Voice RF Coverage issues 6-80
Voice Statistics
access points 5-53
voice statistics report 14-165
Voice TSM Reports
access points 5-55
Voice TSM Table
access points 5-53
VoIP calls graph 14-162
VoIP calls table 14-163
VoIP snooping 9-74
VoWLAN Readiness 6-79
W
Web Admin
configuring 9-154
Web Admin Certficate
downloading 9-37
Web Auth Certificate
configuring 9-107
Web Auth Configuration 9-95
web authentication template 11-67
web authentication type 11-67
Web authentication types 3-41
web auth security A-3
web login
enabling 3-41
web policy 9-70
Wellenreiter signature 3-35
WiFi TDOA Receivers
adding 9-218
configure 9-217
edit 9-220
remove 9-220
tag location 9-218
Wi-Fi TDOA receivers
positiioning 6-56
searching 2-44
wIPS
planning and configuring 16-97
Profile
add 9-238
Profile Editor 9-239
Profile List 9-238
SSID Group List 9-242
wIPS Alarms
details 5-147
monitoring 5-146
wIPS Profile
apply 9-242
delete 9-241
wIPS Profiles
add 9-238
configure 9-237
Wired Client Authentication Failure 10-6
Wired Client Auth fail VLAN Assigned 10-6
Wired Client Authorization Failure 10-6
Wired Client Critical VLAN Assigned 10-6
Wired Client Guest VLAN Assigned 10-6
Wired Client Security Violation 10-6
Wired Guest Access
configuring 9-47
Wireless Management 9-32
Wireless Protection Policies
configuring 9-107
WLAN
adding 9-76
deleting 9-77
WLAN AP groups 11-38
WLAN details
viewing 9-66
WLANs
configuring 9-65
monitor 5-9
web auth security A-3
WLAN status schedules
managing 9-77
WLAN templates 11-22
WMM parameters 9-72
WMM policy 11-32
work group bridge mode 9-174
worst node hops report 14-143
WPA+WPA2 9-69
X
XML mediation 15-123
Z
zoom in or out 6-110