- Preface
- Chapter 1: Overview
- Chapter 2: Getting Started
- Chapter 3: Configuring Security Solutions
- Chapter 4: Performing System Tasks
- Chapter 5: Adding and Using Maps
- Chapter 6: Monitoring Wireless Devices
- Chapter 7: Managing WCS User Accounts
- Chapter 8: Configuring Mobility Groups
- Chapter 9: Configuring Access Points
- Chapter 10: Configuring Controllers and Switches
- Chapter 11: Managing Clients
- Chapter 12: Using Templates
- Chapter 13: Mobility Services
- Chapter 14: Performing Maintenance Operations
- Chapter 15: Configuring Hybrid REAP
- Chapter 16: Alarms and Events
- Chapter 17: Running Reports
- Chapter 18: Administrative Tasks
- Chapter 19: Tools Menu
- Chapter 20: Virtual Domains
- Chapter 21: Google Earth Maps
- Appendix A: Troubleshooting and Best Practices
- Appendix B: WCS and End User Licenses
- Appendix C: Conversion of a WLSE Autonomous Deployment to a WCS Controller Deployment
- Index
Index
Numerics
40 MHz channel bonding 10-41
802.11a/n Parameters
High Throughput 10-40
802.11a policy name 12-83
802.11 association diagnostic test 11-18
802.11b/g/n DTIM period 12-31
802.11b/g RRM interval template 12-93, 12-95
802.11b/g RRM threshold templates 12-91
802.11b/g voice templates 12-86
802.11 counters report 17-87
802.11h template 12-94
configuring 12-94
802.11n summary reports 17-82
802.11 security trap 12-103
802.11 tags
filtering 5-61
802.1n scaling reports 17-3
802.1X authentication diagnostic test 11-18
802.1X supplicant credentials 12-9
802.3 bridging
configuring 10-37
880 series ISRs 1-6
A
AAA override 12-27
AAA servers 12-26
AAA traps 12-103
absolute 21-2
Access 9-25
access control list template 12-74
access control list templates 12-69
access mode 9-6
access point
configuring 12-59
configuring for hybrid REAP 15-9
credentials 9-2
friendly 12-81
access point/radio templates 12-114
access point authentication and MFP templates 12-63
access point authorization template 12-59
access point configuration
importing 9-25
access point floor settings
filtering 5-57
access point heatmap
filtering 5-33
access point icon 5-63
access point icons 5-64
access point load
avoiding 12-85
Access point placement 5-50
access point placement 5-50
access point positions
changing with import or export of file 5-54, 5-80
access points
adding 5-45
configuring 9-17
configuring for LOMM 9-33
converting to LWAPP C-2
detecting 16-21
embedded 1-6
positioning 5-54
selecting 12-134
access points, adding to maps5-45to 5-50
access point security statistics
for mesh 6-15
access point templates
adding 12-113
access point threats 3-8
access point threats or attacks 3-8
access point traps 12-103
acknowledged alarms
hiding 16-16
acknowledging alarms 16-16
ACL
template 12-69
ACL IP group details 12-70
ACL template 12-74
configuring 12-74
ACS server
adding WCS to 18-8
ACS View Server credentials 6-2
ACS view server tab 11-16
active interferer count per channel 9-39
active interferers 9-38
active interferers count chart 9-39
active sessions
monitoring 7-4
adaptive scan threshold 12-91
adaptive wIPS alarm report 17-103
adaptive wIPS top 10 APs report 17-105
add config groups 8-20
add group members 8-10
adding access point templates 12-113
adding a mobility services engine 13-2
adding a spectrum expert 9-37
adding autonomous access points
by CSV file 9-10
by device information 9-10
adding autonomous access points to WCS 9-10
adding a WLAN 10-23
adding controllers 10-2
adding event groups 13-10
adding guest user accounts 7-12
adding IOS access points 9-10
by device information 9-10
adding launch points
for Google Earth 21-7
adding SNMP entries 18-56
adding templates from config group 8-23
adding WCS as TACACS+ server 18-9
adding WCS to ACS server
for use with RADIUS 18-13
adding WCS to an ACS server 18-8
adding WCS to a non-Cisco ACS server 18-17
adding WCS usergroups
into ACS for RADIUS 18-14
into ACS for TACACS+ 18-10
adhoc rogue events report 17-107
adhoc rogues report 17-109
adjusted link metric 6-5
administration menu 2-30
advanced debug 19-6
advanced options 5-40
Advanced tab
on WLAN template 12-29
age out dual band 10-32
age out suppression 10-32
aggregated historical data 18-7
aggressive load balancing 10-29
alarm 16-1
alarm cleanup options 18-36
alarm counts
for access points 16-4
for controllers 16-4
for coverage hole 16-4
for malicious APs 16-4
for mesh links 16-4
for mobility 16-4
for security 16-4
for unclassified APs 16-4
for WCS failures 16-4
alarm dashboard 16-1
alarm details
viewing 16-9
alarm display options 18-36
alarm indicator 16-1
alarms 16-1
acknowledging 16-16
assigning 3-22
clearing 3-22
config audit 19-10
deleting 3-22
monitoring 16-5
rogue access point 16-11
rogue adhoc 16-19
searching 2-34
unassigning 3-22
alarm severity
configuring 16-14
alarm summary 2-31
alarm trigger threshold 12-64
alarm warning 16-16
all groups window 18-11
allow AAA override 10-20
alternate parent report 17-69
altitude 21-2
altitude mode 21-2
anonymous provision 12-51
anonymous provisioning 12-51
AP attack details 2-21
AP authentication
template 12-63
AP authorization
template 12-59
AP-detected interferers
searching 2-40
AP failover priority
AP join taken time 11-7
AP load
avoiding 12-85
AP manager IP 9-16
AP mesh info
filtering 5-36
AP mode 12-115
AP parameters tab 12-114
applying CLI commands 12-109
applying config groups 8-23
applying controller templates 12-112
AP policies 3-37
AP policies template 12-77
AP primary discovery timeout 10-38
AP profile status report 17-49
APs
autonomous
new templates 12-120
lightweight
templates 12-113
APs not assigned to maps 2-20
AP status report
viewing for scheduled task 12-123
AP template task history
viewing 12-124
AP template tasks 12-123
AP threats and attacks 11-7
AP timers
configuring 10-13
AP up time 6-11
AP uptime 2-26
asset matching criteria 13-12
assigned virtual domain components 20-10
assigning location presence 5-7
assigning virtual domains 7-18
association request failures 6-18
association request success 6-18
association request timeouts 6-18
asynchronous 18-33
attacks
access points 3-8
attacks detected 3-9
audit 18-37
AUDIT_STATUS_DIFFERENCE 16-77
auditing config groups 8-24
auditing H-REAP groups 15-16
audit report 18-37
for alarms 16-10
audit reports
audit status 6-14
viewing 10-34
viewing for access points 9-35
viewing for controllers 10-34
audit trail
viewing 7-9
authentication order
managing 10-33
authentication priority 10-34
template 12-108
authentication process
Hybrid REAP 15-2
authentication request failures 6-18
authentication request success 6-18
authentication request timeout 6-18
auto key generation 12-36
automated upgrade 14-9
automatic backups, scheduling 14-3, 18-1
automatic client exclusion 12-30
automatic client troubleshooting 11-9, 18-39, 18-40
automatic database synchronization 13-6
autonomous access points
adding 9-10
adding by CSV file 9-10
downloading images 9-12
upgrading 9-14
viewing 9-12
autonomous AP images
downloading 9-25
Autonomous APs
template
new 12-120
autonomous to lightweight migration 9-9
autonomous to LWAPP migration support 9-9
auto provisioning 18-19
auto provisioning filter
editing 18-24
auto refresh 5-73, 5-74, 18-41
avoid access point load 12-85
avoid Cisco AP load 12-85
avoid foreign AP interference 12-85
avoid non-802.11 noise 12-85
B
background scanning 10-65
on mesh configuration 12-99
on templates 12-99
background scanning in mesh networks
scenarios 10-64
Background Scan parameter 10-65
background tasks
running 18-1
backhaul interface 6-16
backing up the WCS database
on Linux 14-5
on Windows 14-4
backup and restore license B-4
band selection 10-31
bandwidth
making expedited 12-87
battery level
condition type 13-12
best practices A-1
bridge group 12-119
bridge group name 6-16
Bridging link information 6-5, 6-21
bridging link information 6-5, 6-21
bridging mesh statistics 6-16
broadcast deauthentication frame signatures 3-40
bronze 12-29
bronze queue 6-18
buildings
adding to a campus map 5-5
adding to WCS database 5-9
busiest APs report 17-51
busiest client report 17-22
C
CAC
enabling 10-38
CA certificates 4-4
CAD files 5-5
calculating access point requirements 5-37
calibrating client 12-111
call admission control 12-86
campus map, adding to WCS database 5-4
CAS 13-1
cascade reboot 8-25
category
for alarms 16-7
CDP 12-117
certificate signing request 3-50
change order buttons 17-8
changing access point positions 5-80
by importing or exporting a file 5-80
changing station role
root mode 9-15
channel bonding
configuring 10-41
channel change AP 6-40
channel change notifications 6-37
channel width
monitoring 6-23
checking the status of WCS
on Linux 14-2
on Windows 14-1
chokepoint
condition type 13-12
chokepoint icon 5-64
chokepoints
positioning 5-54
CIDR notation 12-70
Cisco Aironet 1510 Access Points
in Mesh network 10-63
Cisco AP load
avoiding 12-85
Cisco Discovery Protocol 9-22, 12-117
Cisco WCS base B-1
Cisco wired IPS events 2-26
Cisco Wireless LAN Solution
civic address 5-8
CKIP 10-18
clamped to ground 21-2
classification rule 12-77
clear config 9-25
CLI
template 12-108
CLI commands
applying to template 12-109
client
calibrating 12-111
managing 11-1
client alarm summary 11-5
client association failure 11-5
client authentication failure 11-5
client authentication provision 12-51
client authentication type distribution 11-6
client count report 17-24
client detail page 11-8
client details
retrieving from access point page 11-9
client devices
connecting to WLANs 15-12
client distribution 11-2
client elements 18-71
client excluded 11-5
happening automatically 12-30
client exclusion policies 12-61
template 12-61
client exclusion policies template 12-61
client floor
filtering 5-59
client icon 5-63
client MFP 3-37
client protocol distribution 11-3
client related traps 12-102
client reports 17-21
clients
searching 2-37
clients detected by location server 2-27
client security events 2-27
client sessions report 17-26
client summary report 17-29
client tab dashboard 11-10
client traffic 11-6
client troubleshooting
automatic 18-39
enabling 11-9
client WEP key decryption error 11-5
client WPA MIC error counter activated 11-5
color coding
of obstacles 5-32
command buttons 2-30
compliance reports 17-41
component options icon 2-29
components
of virtual domain 20-10
condition type
for event definitions 13-12
config audit 19-9
config audit alarms 19-10
config group
adding controllers 8-22
adding templates 8-23
configuring 8-21
downloading IDS signatures 8-27
downloading sw to controllers 8-26
removing controllers 8-22
removing templates 8-23
config group audits 8-24
config groups
applying 8-23
auditing 8-24
creating 8-19
downloading customized webauth 8-27
rebooting 8-25
reporting 8-26
config group task
deleting 12-126
config group task history
viewing 12-126
config group tasks 12-125
configuration audit report 17-41
configuration audit summary 19-9
configuration mismatch 6-39
Configure Controllers
802.11a/n Parameters
High Throughput 10-40
configure menu 2-29
configuring 40 MHz channel bonding 10-41
configuring 802.3 bridging 10-38
configuring access points 9-17
configuring a client exclusion policy template 12-79
configuring a CPU ACL template 12-74
configuring a high throughput template 12-95
configuring alarm severity 16-14, 16-86
configuring a local EAP general template 12-46
configuring a local EAP profile template 12-47
configuring a manually disabled client template 12-60
configuring a mesh template 12-95, 12-98
configuring an 802.11h template 12-94
configuring an access point 12-59
configuring an access point for hybrid REAP 15-9
configuring an EAP-FAST template 12-49
configuring an RRM interval template 12-93
configuring an RRM threshold template 12-91
configuring a policy name template 12-83
configuring AP timers 10-13
configuring a roaming parameters template 12-88
configuring a TACACS+ server template 12-41
configuring a trusted AP policies template 12-77
configuring audit reports 10-34
configuring a user authentication priority template 12-108
configuring a user login policies template 12-56
configuring a video parameter template 12-87
configuring a voice parameter template 12-86
configuring config group 8-20
configuring controller WLANs 10-13
configuring DHCP proxy 10-10
configuring EDCA parameters
for individual controllers 10-43
through a template 12-88
configuring firewall for WCS 3-36
configuring global credentials 9-2
configuring global email parameters 18-46
configuring high availability 18-64
configuring H-REAP AP groups 12-32
configuring Hybrid REAP 13-1, 15-1
configuring hybrid REAP access point groups 15-12
configuring Hybrid-REAP groups 15-14
Configuring IDS 3-39
Configuring IDS signatures 3-39
configuring IDS signatures 3-39
configuring IGMP snooping 10-12
configuring intrusion detection systems 3-39
configuring LDAP bind requests 10-12
configuring multiple country codes 8-16
configuring NAC out-of-band 10-45
configuring radio templates 12-132
configuring RADIUS servers 18-31
configuring scheduled configuration tasks 12-123
configuring search results 2-45
configuring SNMPv3 10-44
configuring spectrum experts 9-37
configuring template
ACL 12-60
for rogue AP rule groups 12-79
configuring templates
802.11b/g RRM interval 12-93
802.11b/g RRM threshold 12-87
802.11b/g voice 12-86
access point/radio 12-114
access point authentication and MFP 12-77
access point authorization 12-59
file encryption 12-36
guest users 12-54
known rogue access point 12-94
local management user 12-106
MAC filter 12-57
QoS 12-13
RADIUS accounting 12-40
RADIUS authentication 12-37
syslog 12-105
Telnet SSH 12-104
traffic stream metrics QoS 12-16
trap control 12-101
WLAN 12-18
configuring the controller for hybrid REAP 15-5
configuring the switch
for hybrid REAP 15-4
configuring wired guest access 10-50
connecting client devices
to WLANs 15-12
Connecting to the Guest WLAN 3-50
Containment 6-1
containment
of rogue access point 16-21
of rogue access points 6-1
content
customizing 2-24
context aware configuring 13-14
context aware planning 13-14
context-aware software 13-1
controller
configuring for hybrid REAP 15-5
controller CPU utilization 2-27
controller details 9-16
controller license information 18-69
controller licenses
managing 18-74
searching 2-44
controller license status 18-6
controller memory utilization 2-27
controllers
adding 10-2
adding to WCS database 4-1
pinging network devices 10-38
specified 1-1
controller status report
viewing 12-125
controller template launch pad 12-1
controller templates
applying 12-112
controller upgrade settings 18-41, 18-43, 18-60
controller values
refreshing 10-35
controller WLANs
configuring 10-13
converting WLSE autonomous to WCS controller C-1
country codes
setting 10-28
coverage hole reports 17-89
coverage holes 2-20
CPU access control
template 12-74
Cranite 10-16
Creating a network design 5-53
creating a network design 5-53
creating a virtual domain 20-1
Creating guest user accounts 7-10
creating guest user accounts 7-10
creating placemarks 21-3
creating virtual domains 20-1
CSR 3-50
CSV file 9-10
method for adding autonomous access points 9-10
sample 10-3
CSV files 21-4
current AP template task
deleting 12-124
disabling 12-124
enabling 12-124
modifying 12-123
current config group task
disabling 12-125
enabling 12-125
modifying 12-125
currently logged guest users 2-28
current templates
viewing 10-44
customized web auth 10-55
customized webauth
downloading 8-27
Customized Web authentication 3-48
customized web authentication
downloading 12-67
customize report 17-7
customizing content on WCS Home page 2-24
customizing tabs on WCS Home page 2-23
Custom signature 3-45
D
dashboard
RRM 6-36
database synchronization
automatic 13-6
data collection
for RFID tag 12-111
data management tasks
performing 18-34
data retention 18-40
debug commands A-4
debug strategy A-4
default lobby ambassdor credentials
deleting a current AP template task 12-124
deleting a current config group task 12-126
deleting a license B-4
deleting a mobility services engine 13-4
deleting a WLAN 10-24
deleting controller templates 12-113
deleting event groups 13-11
deleting guest user templates 7-14
deleting WCS user accounts 7-4
designing a network 5-75
destination type
for report 17-4
detecting access points 16-21
detecting rogue access points 6-2
device certificates 4-3
device information 9-10
method for adding autonomous access points 9-10
device reports 17-48
DHCP diagnostic test 11-18
DHCP proxy
configuring 10-10
DHCP server
overriding 12-31
DHCP statistics 6-34
diagnostic channel A-1
diagnostic test
802.11 association 11-18
802.1X authentication 11-18
DHCP 11-18
DNS ping 11-18
DNS resolution 11-18
IP connectivity 11-18
profile redirect 11-18
disabled clients
template 12-60
disabling a current config group task 12-125
disabling current AP template task 12-124
disabling IDS signatures 3-44
discovering templates
from controllers 10-9
Distance
condition type 13-12
DNS ping diagnostic test 11-18
DNS resoltion diagnostic test 11-18
downloading a customized web authentication page 12-67
downloading autonomous AP images 9-25
downloading customized webauth 8-27
Downloading customized web authentication 3-48
Downloading IDS signatures 3-43
downloading IDS signatures 3-43
from your config group 8-27
downloading images
to autonomous access points 9-12
downloading sw to controllers
after adding config group 8-26
downloading vendor CA certificates 4-4
downloading vendor device certificates 4-3
downstream delay 12-17
downstream packet loss rate 12-17
drawing polygon areas
using map editor 5-30
DTIM 12-84
dynamic interface 12-11
E
EAP-FAST
template 12-50
EAP-FAST template 12-49
EAPOL flood signature 3-41
EDCA parameter
template 12-88
EDCA parameters
configuring for individual controllers 10-43
configuring through a template 12-88
edit content 2-25
edit contents 2-25
editing map properties 5-13
editing saved reports 17-12
editing scheduled run details 17-10
Editing signature parameters 3-47
editing the default lobby ambassador credentials 7-9, 7-16
edit link 5-21
edit links
home page 2-23
edit location presence information 5-7
Edit View
general 2-45
edit view
for alarms 16-8
egress interface 10-16
configuring parameters 18-45
email notifications
monitoring 16-23
embedded access points 1-6
emergency
condition type 13-12
enable background audit 8-20
enable enforcement 8-20
enable log module 18-32
enabling a current config group task 12-125
enabling audit trails
for guest user activities 7-10
enabling current AP template task 12-124
enabling IDS signatures 3-44
enabling load-based CAC 10-36
Enabling Web login 3-47
enabling Web login 3-47
end user license agreementB-7to B-12
establishing logging options 18-32
Ethernet bridging 9-3
Ethernet VLAN tagging guidelines 9-5
evaluation license
for controller 18-70
for MSE 18-70
event groups 13-10
event notification 1-5
Events 16-1
events 16-1
monitoring 16-22
searching 2-39
exclude device list 18-61
excluded packets 6-17
exclude switch trunk ports 18-61
exclude vendor list 18-61
executive summary report 17-84
expedited 12-87
expedited bandwidth 12-87
exporting a file 5-54
to change access point position 5-54, 5-80
export task list 18-11
extend to ground 21-2
extension license
for controller 18-70
for MSE 18-71
external antennas 12-134
external web auth 10-55
extracting task list 18-17
F
Failover 18-62
failover mechanism 18-62
failover scenario 18-62
failure source
for alarms 16-7
fast heartbeat interval 10-13
feature
of WCS license 18-68
feature license B-2
file encryption template 12-36
filter
editing current auto provisioning 18-24
filtering
using to modify maps 6-21
filtering 802.11 floor settings 5-61
filtering client floor settings 5-59
filtering floor setting
for access points 5-57
filtering floor settings
for AP mesh info 5-36
filtering rogue adhoc settings 5-62
filtering rogue AP settings 5-61
filtering rogue client floors 5-62
filtering saved reports 17-11
filtering scheduled run results 17-10
firewall, configuring for WCS 3-36
floor area map 5-55
Floor Areas
edit 5-74
floor component details 5-63
floor plans
adding to a campus building5-22to 5-27
adding to a standalone building5-27to 5-29
floor settings 5-56
foreign access point interference
avoiding 12-85
foreign AP interference
avoiding 12-85
Frame type 3-45
friendly access point template 12-81
friendly AP
template 12-81
friendly rogue 12-77
friendly rogue access points 3-7
friendly rogue APs 2-27
FTP
turning on and off 18-54
G
general tab
home page 2-20
general templates
configuring 12-4
generating migration analysis report 9-15
geographical coordinates 21-1
global credentials
configuring 9-2
Global settings
for standard and custom signatures 3-47
gold 12-29
gold queue 6-17
Google Earth
adding launch points 21-7
Google Earth coordinates 21-2
Google Earth maps 21-1
viewing 6-26
Google KML or CSV
importing into WCS 21-5
GPS markers 5-8
grace period license
for controller 18-70
groups
for hybrid-REAP 15-14
for rogue access point rules 12-79
group setup window on ACS server 18-12
GUEST_USER_ADDED 16-74
GUEST_USER_AUTHENTICATED 16-75
guest account settings 18-43
guest accounts status report 17-62
guest association report 17-64
guest count report 17-65
guest reports 17-62
guest user
template 12-54
guest user account
scheduling 7-14
Guest user accounts
creating 7-10
guest user accounts
adding 7-12
creating 7-10
managing 7-12
guest user details
emailing 7-15
print 7-15
guest user monitoring 6-36
guest user reports 17-120
guest users
currently logged 2-28
guest user sessions report 17-66
guest user templates 12-54
Guest WLAN
connecting 3-50
guidelines
for Ethernet VLAN tagging 9-5
for NAC out-of-band integration 10-46
guidelines for using the map editor 5-29
H
heater status 6-11
heat map
described 5-49
help menu 2-30
hide acknowledged alarms 16-16
hierarchy
of mesh network 6-19
Hierarchy of Mesh parent to child 6-22
hierarchy of mesh parent to child 6-22
High Throughput
802.11a/n 10-40
high throughput
template 12-95
high throughput template
configuring 12-95
historical data 18-7
historical report type 17-1
Home page
customizing content 2-24
customizing tabs 2-23
H-REAP AP groups
configuring 12-34
configuring template 12-34
H-REAP configuration 12-118
H-REAP configuration tab 12-35
H-REAP groups
auditing 15-16
H-REAP local switching 10-20
HTTP
turning on and off 18-54
http
//www.wildpackets.com/support/legacy/airopeek/overview 9-20
Hybrid REAP
hybrid REAP access point groups 15-12
hybrid-REAP groups 15-13
Hybrid REAP local switching 12-30
hysteresis 12-91
I
identical audit status 6-14
IDS 3-39
configuring 3-39
IDS sensors 3-39
IDS signatures 3-39
disabling 3-44
downloading 3-43
downloading from config group 8-27
enabling 3-44
uploading 3-42
IGMP snooping
configuring 10-12
images
downloading to autonomous access points 9-12
importing access point configuration 9-25
importing a file 5-54
to change access point position 5-54, 5-80
importing coordinates
as CSV file 21-4
into Google Earth 21-2
importing Google KML or CSV into WCS 21-5
In/Out
condition type 13-12
information elements
Aironet 12-30
infrastructure MFP 3-37
ingress interface 10-16
inspect location readiness 5-44
installer
using to upgrade 14-10
installing a license B-4
installing WCS
for WLSE conversion C-2
insufficient memory 6-17
integrating NAC out-of-band 10-45
interferers
summary 9-38
internal antennas 12-134
internal web auth 10-55
inter-subnet roaming 8-4
Intrusion Detection Systems 3-39
intrusion detection systems 3-39
invalid association request 6-19
invalid reassociation request 6-19
inventory detail status 2-20
inventory reports 17-41, 17-55
inventory status 2-27
IOS access points
adding 9-10
adding by device information 9-10
IOSAP_DOWN 16-76
IOSAP_LINK_DOWN 16-75
IOSAP_LINK_UP 16-75
IOSAP_UP 16-76
IP connectivity diagnostic test 11-18
K
KEK
key encryption key 12-39
key wrap 12-39
KML file 21-2
L
LAG mode 12-6
latest network audit report 10-36
latitude 21-2
launch pad
for controller templates 12-1
Layer 1 security solutions 3-2
Layer 2 12-20
Layer 2 security solutions 3-2
Layer 3 12-24
Layer 3 security solutions 3-2
Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-35
LBS authorization 12-59
template 12-59
LDAP 10-28
LDAP bind requests
configuring 10-28
LDAP servers 10-20
template 12-43
LEAP authentication
requirements 8-8
legacy beam forming 12-134
legacy syslog
template 12-105
legacy syslog template 12-105
license
backup and restore B-4
license installation B-4
license management 18-75
licenses B-1
license status 18-6
license types B-1
licensing 18-67
on WLSE network management C-4
limitations for high reliability 18-63
link aggregation (LAG)
guidelines 15-4
link latency 12-118
link metric
adjusted 6-5
unadjusted 6-5
link SNR 6-5
link stats report 17-70
load 5-74
load balancing 10-29
load-based AC 12-87
load-based CAC 12-87
enabling 10-38
Lobby ambassador 7-10
lobby ambassador defaults
setting 7-7
local authentication
for hybrid-REAP groups 15-14
local EAP authorization 10-20
Local EAP check box 12-27
local EAP general
template 12-46
local EAP general template 12-46
local EAP profile template 12-47
local management users
template 12-107
local management user template 12-107, 12-108
local net users
template 12-53
local net users template 10-27, 12-52
local password policy 18-29
local switching
Hybrid REAP 12-30
location
of rogue access point 16-21
of rogue access points 6-1
location appliance
importing 13-4
location appliance functionality 4-2
location appliance importing 13-4
location appliances
auto-synchronizing 13-6
relationship with WCS Location 1-4
location change
condition type 13-12
location configuration
template 12-110
location menu 2-30
location optimized monitor mode 9-20
location presence
assigning 5-7
location readiness
inspecting 5-44
location upgrade B-2
log analysis 11-14
logging 18-4
logging into the WCS user interface2-18to 2-19
logging options 18-32
logging the lobby ambassador activities 7-9
login.html 3-48
login disclaimer 18-44
login policies
template 12-56
log message levels 18-32
log modules
enabling 18-32
LOMM 9-20
configuring access point radios 9-33
longitude 21-3
long preambles, enabling for SpectraLink NetLink phones 4-5
lookup client
for DNS server 18-40
LWAPP
templates 12-113
LWAPP migration 9-9
LWAPP uptime 2-27
M
MAC filtering 12-23
template 12-57
MAC filter template 12-57
MAC frequency 3-46
MAC information 3-46
MACK
message authenticator code keys 12-39
transport type 13-13
mail server configuration 18-45
malformed neighbor packets 6-17
malicious rogue 12-77
malicious rogue access points 3-5
managed network
security index 3-5
management frame flood signatures 3-41
Management Frame Protection 3-37
management frame protection 10-22, 12-63
management interface 12-7
management queue 6-18
managing a virtual domain 20-7
managing clients 11-1
managing controller licenses 18-74
managing current reports 17-8
managing guest user accounts 7-12
managing licenses 18-75
managing MSE licenses 18-76
managing multiple WCSs 1-9
managing saved reports 17-11
managing user authentication order 10-33
managing virtual domains 20-7
managing WLAN schedules 10-25
mandatory data rates 12-85
manually disabled client
template for 12-60
manually disabled clients 2-20
Map Editor
general notes and guidelines 5-29
map editor
general notes 5-29
guidelines 5-29
guidelines for using 5-29
using 5-29
using to draw polygon areas 5-30
map editor functions 5-29
map properties
editing 5-13
Maps
properties 5-13
maps
using to monitor link stats 6-3
using to monitor mesh AP neighbors 6-8
map size 5-72
map view
updating 6-22
menu bar 2-29
mesh access point neighbors
monitoring 6-8
mesh access points
monitoring 6-6
mesh alarms
most recent 2-22
mesh configuration
template 12-98
mesh health 6-11
monitoring 6-11
mesh link statistics 6-3
monitoring 6-3
mesh neighbors 6-9
mesh network
monitoring using maps 6-3
mesh network hierarchy 6-19
mesh networks
background scanning 10-63
monitoring 6-3
mesh parent changing AP 2-27
mesh parent-child hierarchical view 5-36
mesh reports 17-68
mesh security statistics
for an AP 6-11
mesh statistics
for an access point 6-15
mesh tab
home page 2-22
mesh template
configuring 12-98
Mesh tree
viewing 6-19
mesh tree
viewing 6-19
message integrity check information element 12-63
metric collection 12-87
metrics
in QoS 12-16
for clients 3-38
MFP attacks 3-8
MFP client protection 12-31
MFP signature generation 12-31
MFP templates 12-63
MIC IE 12-63
migration analysis
running 9-15
migration analysis report
generating 9-15
migration analysis summary
viewing 9-14
migration template 9-13
minimum RSSI 12-91
mirror mode 9-21
mismatched audit status 6-14
missing
condition type 13-12
mobile announce messages 8-8
mobility 8-1
mobility groups 8-7
mobility groups, configuring 8-8
mobility scalability 8-12
mobility services 13-1
mobility services engine
adding to WCS 13-2
deleting from WCS 13-4
keeping synchronized 13-4
modifying a current AP template task 12-123
modifying a current config group task 12-125
modifying a migration template 9-15
modifying map displays 6-21
using filters 6-21
Monitor Alarms
Rogue 3-19
monitoring active sessions 7-5
monitoring channel width 6-23
monitoring email notifications 16-23
monitoring events 16-22
monitoring guest users 6-36
monitoring mesh access point neighbors 6-8
using maps 6-8
monitoring mesh health 6-11, 6-23
monitoring mesh link statistics
using maps 6-3
monitoring mesh networks
using maps 6-3
monitoring neighboring channels 10-63
monitoring pre-coverage holes 6-32
monitoring rogue access point alarms 16-10
monitoring rogue access point details 16-14
monitoring rogue alarm events 16-22
monitoring security configurations 16-23, 18-54
monitoring spectrum experts 9-38
monitor menu 2-29
monitor mode
location optimized 9-20
monitor mode APs 18-71
most recent AP alarms 2-27
most recent audit alarms 19-10
most recent client alarms 11-6
most recent mesh alarms 2-22
most recent rogue adhocs 3-6
most recent security alarms 2-21, 2-28
MSE
synchronizing with WCS 13-4
MSE authorization
template 12-59
MSE license information 18-70
MSE licenses
managing 18-76
MSE synchronization status 13-9
multicast mobility mode 8-12
multiple country codes
configuring 8-16
setting 10-28
multiple syslog
template 12-106
multiple syslog template 12-106
N
N+1 redundancy 8-5
NAC out-of-band
configuring 10-45
NAC support 10-22
NAT 8-11
Navigator 1-9
netmask 12-70
NetStumbler signature 3-41
network address translation 8-11
network audit report
viewing latest 10-36
network design 5-75
network designs 13-4
network protection 3-39
Network Summary page 2-19
network summary reports 17-82
network users priority
template 12-51
network utilization reports 17-91
new rogue access points report 17-111
new rogue AP count report 17-113
new search 5-21
new switch failure 10-59
node hop count
worst 2-22
node hops 6-17
nodes report 17-72
noise
avoiding non-802.11 types 12-85
avoid non-802.11 12-85
non-802.11 noise
avoiding 12-85
non-aggregated historical data 18-8
non-Cisco ACS server
for use with RADIUS 18-17
normal mode
for Ethernet port 9-6
notification receiver 18-47
notifications
of channel change 6-37
of RF grouping 6-38
of transmission power change 6-38
NTP server template 12-8, 12-10
null probe response signatures 3-41
O
OfficeExtend 12-118
onstacle color coding 5-32
OUI search 18-61
outdoor areas, adding to a campus map5-19to 5-21
outdoor location
creating with Google Earth 21-1
out-of-sync 13-8
out of sync alerts 13-6
overview
Cisco Wireless LAN Solution1-1to 1-2
WCS 1-2
P
packet error rate
worse 2-22
packet error rate link color 6-21
packet error statistics report 17-75
packet jitter 12-16
packet latency 12-16
packet loss 12-16
packet loss rate 12-17
packet queue statistics report 17-77
packet stats report 17-73
parent changes 6-17
parent TSF 6-3
Passive Client 10-22
passthrough 12-25
password rules
turning on or off 18-29
PCI report 17-43
PEAP 12-49
peer-to-peer blocking 12-30
guidelines 10-46
percent time at maximum power 6-40
performance reports 17-86
performing data management tasks 18-34
permanent license
for controller 18-70
for MSE 18-70
pinging network devices from a controller 10-38
placemarks
creating 21-3
placement of access points 5-50
Planning Mode 5-35
planning mode 5-39
to calculate access point requirements 5-37
planning mode, calculating access point requirements 5-37
platinum 12-29
platinum queue 6-17
PLR 12-17
POE status 6-14
policy manager solutions 3-2
policy name template
configuring 12-83
polygon areas
drawing with map editor 5-30
poor neighbor SNR 6-17
positioning access points 5-54
positioning chokepoints 5-54
positioning Wi-Fi TDOA receivers 5-54
power injector setting 12-117
power injector settings 9-23
power-over-ethernet status 6-14
pre-coverage holes
monitoring 6-32
predictive tool
distance based 5-44
Prerequisites 2-1
prerequisites for high reliability 18-63
print guest user details 7-15
probe cycle count 10-32
profile redirect diagnostic test 11-18
protection type 12-64
Q
QoS 12-28
QoS profiles
configuring 10-65
QoS templates 12-13
quarantine 10-47
queues
silver, gold, platinum, bronze, management 6-17
quick search 2-32
Quiet time 3-46
R
radio measurements
receiving 6-2
radio resource management 12-85
Radio Resource Management statistics 6-37
radio status
scheduling 9-34
radio templates
configuring 12-132
RADIUS accounting servers
template 12-40
RADIUS accounting template 12-40
RADIUS and TACACS+ attributes
RADIUS authentication template 12-37, 12-38
RADIUS fallback
template 12-42
RADIUS fallback mode 12-42
RADIUS servers 10-20
configuring 18-31
reachability status 9-37
reassociation request failures 6-18
reassociation request success 6-19
reassociation request timeouts 6-18
reauthentication request failures 6-19
reauthentication request success 6-19
reauthentication request timeout 6-19
rebooting config groups 8-25
receiving radio measurements 6-2
recent adhoc rogue alarms 3-9
recent coverage holes 2-20
recent rogue adhoc alarm 2-21
recent rogue alarms 2-27
recent rogue AP alarms 2-21, 3-9
recovering the WCS password 14-16
recurrence
for report 17-4
refresh browser 5-75
refresh component icon 2-29
refresh controller values 10-35
refresh from network 5-73, 5-75
refresh options 5-74
relative to ground 21-2
removing controllers from config group 8-22
removing switches 10-60
removing templates from config group 8-23
report
running new 17-2
report launch pad 17-2
reports
running 17-1
scheduled runs 17-9
reset AP now 9-25
restore WCS values 10-35
restoring WCS database
in high availability environment 14-8
restoring WCS database on Linux 14-7
retain WCS value 8-25
Retrieving UDI 6-29
RF calibration model, creating 4-6
RF grouping notifications 6-38
RFID data collection 12-111
RF profile traps 12-103
RF update traps 12-103
roaming 8-1
roaming parameter
template 12-90
roaming parameters template
configuring 12-90
rogue access point alarms 16-10
monitoring 16-10
rogue access point containment 16-21
rogue access point details 16-14
rogue access point events report 17-115
rogue access point location 6-1, 16-21
rogue access point rule groups 12-79
rogue access point rules
configuring a template 12-77
viewing or editing 9-36
rogue access points
friendly 3-7
malicious 3-5
monitoring 3-9
solutions for 3-2
unclassified 3-7
rogue access points report 17-117
rogue access point tagging 16-21
rogue adhoc alarm 2-21
rogue adhoc alarms
monitoring 16-19
rogue adhoc floors
filtering 5-62
rogue adhoc icon 5-64
rogue adhocs
most recent 3-6
rogue alarm events
monitoring 16-22
rogue AP alarms 2-21
rogue AP detail summary 2-27
rogue AP floors
filtering 5-61
rogue AP icon 5-64
rogue AP rule groups
template 12-79
rogue AP rules
template 12-77
rogue client floors
filtering 5-62
rogue client icon 5-64
rogue clients
searching 2-42
rogue detector 9-20
rogue location discovery protocol 12-76
rogue policies
template 12-76
template for 12-75
role criteria 9-14
root access points (RAPs)
selecting 9-9
root mode
changing from station role 9-15
routing state 6-16
RRM 12-85
RRM dashboard 6-36
RRM DCA 10-41
RRM intervals 12-93, 12-94, 12-95
template 12-93
RRM interval template
RRM threshold
template 12-91
RRM thresholds 12-91
RRM threshold template
configuring 12-91
RSSI legend 5-73
rules
for rogue access point 12-77
viewing or editing for rogue access points 9-36
Running a link test 6-28
running a link test 11-9
running a new report 17-2
running a saved report 17-12
running background tasks 18-1
running migration analysis 9-15
running report 17-1
RX neighbor requests 6-17
RX neighbor responses 6-17
S
sample CSV file 10-3
saved report
running 17-12
saved reports
editing 17-12
filtering 17-11
managing 17-11
scalability parameters 8-12
scan cycle period threshold 10-32
scan threshold 12-91
scheduled configuration tasks
configuring 12-123
Schedule details 9-17
scheduled run details
editing 17-10
scheduled run results 17-9
filtering 17-10
scheduled tasks
viewing 9-34
schedules
managing for WLANs 10-25
scheduling guest user account 7-14
scheduling radio status 9-34
search alarm parameters 2-35
search feature 2-32
using for troubleshooting 11-11
searching access points 2-36
searching AP-detected interferers 2-41
searching clients 2-38
searching controller licenses 2-44
searching controllers 2-37, 10-32
searching events 2-40
searching maps 2-42
searching rogue clients 2-42
searching SE-detected interferers 2-40
searching shunned clients 2-43
searching tags 2-43
searching Wi-Fi TDOA receivers 2-41
search results
configuring 2-45
secondary WCS operation 18-62
security alarms
most recent 2-21
security color range 3-5
security configurations
security index 3-5
security mesh statistics 6-18
security reports 17-102
security statistics
for mesh 6-15
security summary 17-119
security tab
home page 2-20
interpreting 3-4
security thermometer 3-5
SE-detected interferers
searching 2-40
selecting access points 12-134
sending mobile announce messages 8-8
sensors
viewing IDS types 3-39
set sorting buttons 17-8
setting AP failover 9-1
setting AP failover priority 10-37
setting multiple country codes 10-28
shunned clients
searching 2-42
shutting switch port 10-61
sidebar area 2-30
signature attacks summary 2-21
silver 12-29
silver queue 6-17
sniffer 12-116
sniffer mode 9-20
SNMP
transport type 13-13
SNMP authentication 12-102
SNMP credentials 18-56
SNMP mediation 18-33
SNMPv3
configuring 10-44
SNR definition 6-21
SNR down 6-5
SNR link
worst 2-22
SNR UP 6-5
SNR up 6-5
SOAP 13-13
software
downloading config groups to controllers 8-26
software, updating 4-2
SpectraLink NetLink phones, enabling long preambles 4-5
spectrum expert
adding 9-37
spectrum expert details 9-39
spectrum experts
configuring 9-37
monitoring 9-38
summary 9-38
Standard signature 3-45
standard signatures 3-40
starting WCS
on Linux 2-17
on Windows 2-16
static WEP 10-16
Static WEP-802.1X 10-17
station role
changing to root mode 9-15
statistics
DHCP 6-34
status, checking 14-1
status schedules
managing for WLANs 10-25
stopping WCS
on Linux 14-3
on Windows 14-2
stranded APs report 17-79
strongest AP RSSI 16-11
supplicant credentials
for AP 802.1X 12-9
supported Cisco WLSE management stations C-2
supported data rates 12-85
switch
configuring for hybrid REAP 15-4
switches
removing 10-61
switch port
shutting 10-61
switch port trace 18-60
switch port tracing
using 10-56
symmetric mobility tunneling 12-7
symmetric tunneling 8-5
synchornization
synchronization 13-6
viewing information from 13-9
synchronization history 13-10
synchronizing mobility services engines 13-4
synchronizing WCS and MSE 13-4
syslog
transport type 13-14
syslog templates 12-105, 12-106
System requirements 2-2
T
TACACS+ server
configuring a template for 12-45
template 12-45
TACACS+ servers
configuring 18-29
tag elements 18-71
tagged packets 9-8
tagging
of rogue access point 16-21
of rogue access points 6-1
tag icon 5-63
tags
searching 2-43
Target 6-3
target TSF 6-3
tasks
importing into ACS 18-8
Telnet SSH
template 12-101
Telnet SSH templates 12-104
temperature 6-11
template
configuring for rogue AP rules 12-77
template for configuring network user credentials 12-51
template launch pad
for controllers 12-1
templates
applied to controllers 10-10
discovering from controllers 10-9
using 12-1
test analysis tab 11-18
TFTP
turning on and off 18-54
TFTP details 9-16
TFTP server 3-42
thermometer color range 3-5
threats
access points 3-8
throughput report 17-33
tilt 21-2
tools menu 2-30
top APs by client count 11-3
total APs not assigned to maps 2-20
total interferer count 9-39
total mismatched controllers 19-10
trace 18-34
trace switch port 10-56
traffic indicator message 12-84
traffic stream metrics 12-87
traffic stream metrics QoS status 12-17
traffic stream metrics QoS template 12-16
traffic stream metrics report 17-93
transition time 12-91
transmission power change notifications 6-38
transport types 13-13
trap
802.11 security 12-103
trap control
template 12-101
trap control templates 12-101
trap receiver
template 12-100
trap receiver template 12-100
traps
AAA 12-103
access point 12-103
client related 12-102
RF profile 12-103
RF update 12-103
unsupported 16-85
traps added in 2.1 16-47
traps added in 2.2 16-51
traps added in 3.0 16-54
traps added in 3.1 16-56
traps added in 3.2 16-59
traps added in 4.0 16-60
traps added in 4.0.96.0 16-65
traps added in 4.1 16-67, 16-74
traps added in release 6.0 16-82
traps added in release 7.0 16-86
trend report type 17-1
troubleshooting A-1
using logging options 18-34
troubleshooting voice RF coverage 5-45
trunk mode 9-6
trusted AP policies
template for 12-77
trusted AP policies template 12-77
tunneling 8-5
TX neighbor requests 6-17
TX neighbor responses 6-17
Tx power and channel report 17-96
type
of WCS license 18-69
U
UDI
retrieving on controllers and access points 6-29
unadjusted link metric 6-5
unclassified rogue 12-77
unclassified rogue access points 3-7
unclassified rogue APs 2-28
understanding virtual domains 7-20, 20-9
uninstalling WCS
on Linux 14-9
on Windows 14-8
unique clients report 17-37
unique device identifier 6-29
unknown association requests 6-19
unknown reassociation request 6-19
untagged packets 9-8
Update map view 6-22
update map view 6-22
updating system software 4-2
upgrade settings
for controller 18-41
upgrading autonomous access points 9-14
upgrading the network 14-15
upgrading to Linux 4
during WLSE conversion C-3
upgrading WCS
in high availability environment 14-15
on Linux 14-14
on Windows 14-14
Uploading IDS signatures 3-42
uploading IDS signatures 3-42
upstream delay 12-17
upstream packet loss rate 12-17
uptime reports 17-58
User accounts
for guest 7-10
user accounts
for guest 7-10
user authentication order
managing 10-33
user authentication priority template
configuring 12-108
user credential retrieval priority 12-51
user details
emailing 7-15
printing 7-15
User Interface 2-28
user login policies
configuring a template 12-56
template 12-56
user preferences 18-66
using chokepoints 5-80
using Edit View
for alarms 16-8
using logging
for troubleshooting 18-34
using maps
to monitor mesh AP neighbors 6-8
to monitor mesh link statistics 6-3
using maps to monitor mesh networks 6-3
using planning mode 5-30
using search 16-8
using template
ACL 12-74
for friendly access point 12-81
using templates 12-1
802.11a policy name 12-83
802.11b/g RRM interval 12-93, 12-95
802.11b/g RRM threshold 12-91
802.11b/g voice 12-86
access point/radio 12-114
access point authentication & MFP 12-63
access point authorization 12-59
file encryption 12-36
for legacy syslog 12-105
for multiple syslog 12-106
guest users 12-54
local management user 12-107, 12-108
MAC filter 12-57
QoS 12-13
RADIUS accounting 12-40
RADIUS authentication 12-37
Telnet SSH 12-104
traffic stream metrics QoS 12-16
trap control 12-101
trap receiver 12-100
web authentication 12-64
WLAN 12-18
using the installer to upgrade 14-10
utilization reports 17-60
V
V5 client statistics 17-40
vendor CA certificates
downloading 4-4
vendor device certificates
downloading 4-3
vendor search 18-61
video parameter
template 12-87
video parameter template
configuring 12-87
video parameter templates
configuring 12-87
View 2-29
view audit reports 10-34
view history 11-4
view in chart icon 2-29
viewing alarm details 16-9
viewing all current templates 10-44
viewing an AP template task history 12-124
viewing AP status report
for scheduled task 12-123
viewing audit status 10-34
for access points 9-35
viewing autonomous access points 9-12
viewing clients
identified as WGBs 6-28
viewing controller status report
for the scheduled task 12-125
viewing DHCP statistics 6-34
viewing Google Earth maps 6-23, 21-6
Viewing Mesh tree 6-12
viewing mesh tree 6-15
view in grid icon 2-29
Viewing shunned clients 3-39
viewing shunned clients 3-39
viewing synchronization history 13-10
viewing synchronization info 13-9
viewing the audit trail 7-9
viewing the migration analysis 9-14
viewing the RRM dashboard 6-38
view list 11-11
virtual domain
managing 20-7
virtual domain hierarchy 20-3
virtual domains 20-1
assigning 7-18
creating 20-1
hierarchy 20-3
managing 20-7
VLAN tagging 9-3
Voice-over-Internet Protocol
snooping 10-21
voice parameter template
configuring 12-86
voice RF coverage
troubleshooting 5-45
voice statistics 17-100
VoIP calls graph 17-97
VoIP calls table 17-99
VoIP snooping 10-21
W
WCS
checking status
on Linux 14-2
on Windows 14-1
installing 2-6
overview 1-2
servers supported 1-2
starting
on Linux 2-17
on Windows 2-16
stopping
on Linux 14-3
on Windows 14-2
uninstalling
on Linux 14-9
on Windows 14-8
upgrading
on Linux 14-14
on Windows 14-14
WCS_EMAIL_FAILURE 16-76
WCS-ADV-SI-SE-10 B-2
WCS controller deployment
from WLSE autonomous C-1
WCS database
backing up
on Linux 14-5
on Windows 14-4
restoring
on Linux 14-7
on Windows 14-5
restoring in high availability environment 14-8
scheduling automatic backups 14-3, 18-1
WCS guest operations report 17-67
WCS home 2-18
WCS Home page
customizing content 2-24
customizing tabs 2-23
WCS licenses B-1
WCS Location
relationship with Cisco location appliances 1-4
WCS Navigator 1-9
WCS on WLSE
licensing C-7
WCS password
recovering 14-16
WCS user accounts
adding 7-1
changing passwords 7-4
deleting 7-4
WCS user interface 7-11
WCS values
restoring 10-35
web authentication
template 12-64
web authentication template 12-64
web authentication type 12-66
Web authentication types 3-48
web auth security A-3
web auth types 10-55
web login
enabling 3-47
web policy 10-19
Wellenreiter signature 3-42
WGB 9-12
WGBs
viewing those clients 6-28
Wi-Fi TDOA receiver icon 5-64
Wi-Fi TDOA receivers
positiioning 5-54
searching 2-41
wIPS 13-1
planning and configuring 13-16
wired guest access
configuring 10-50
Wireless Control System (WCS)
WLAN
adding 10-23
deleting 10-24
WLAN AP groups 12-32
WLAN details
viewing 10-14
WLANs
configuring 10-13
web auth security A-3
WLAN status schedules
managing 10-25
WLAN templates 12-18
WLSE autonomous deployment conversion C-1
WLSE management stations C-2
WLSE upgrade B-2
WLSE upgrade license C-7
WMM parameters 10-20
WMM policy 12-29
work group bridge mode 9-12
worst node hop count 2-22
worst node hops report 17-80
worst packet error rate 2-22
worst SNR link 2-22
WPA+WPA2 10-18
X
XML mediation 18-33
Z
zoom in or out 5-72