Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -
Index
Numerics
802.11b/g/n Parameters Controller Templates 4-45
802.11b/g RRM interval template 4-43
802.11b/g RRM threshold templates 4-43
802.11h template
configuring 4-42
802.1n scaling reports 29-2
802.1X supplicant credentials 4-13
A
AAA override 31-12
access control list template 4-34
access control list templates 4-32
access point
friendly 4-28
access point configuration templates 4-61
access point status
viewing 4-66
Account
creating 28-3
ACL IP group details 4-32
ACL Protocol Groups
configuring 4-36
ACL template 4-34
configuring 4-34
adding
users 28-2
adding a spectrum expert 17-22
advanced debug 17-4
Aironet IE 31-15
alarms
config audit 17-8
severity 11-3
status 11-3
alarm severity
configuring 11-7
anonymous provisioning 31-28
applying CLI commands 4-54
applying config groups 4-69
AP policies template 4-26
APs
autonomous
templates 4-62
new 1
lightweight access point template 4-61
AP Username Password Controller Templates 4-13
auditing config groups 4-69
auto key generation 31-21
automatic backups, scheduling 27-12
automatic client exclusion 31-15
autonomous access point migration templates 4-63
Autonomous AP
Migration Templates
edit 4-64
Autonomous APs
template 4-62
new 4-62
templates 4-62
B
background scanning
on mesh configuration 4-51
on templates 4-51
bronze 31-13
C
cascade reboot 4-70
Chokepoint
adding to NCS database 17-16
adding to NCS map 17-17
removing from NCS 17-18
removing from NCS map 17-18
Chokepoints
new 17-16
CIDR notation 4-33
Cisco Prime NCS (WAN)
about 1-1
CLI commands
applying to template 4-54
client exclusion 31-15
happening automatically 31-15
concept 17-7
config audit 17-7
config audit alarms 17-8
config group
downloading sw to controllers 4-71
config group audits 4-69
config groups
applying 4-69
auditing 4-69
creating 4-67
downloading customized webauth 4-72
reporting 4-70
Configure NAT for IP Address Conservation 4-80
Configuring
ACL Protocol Groups 4-36
configuring a client exclusion policy template 4-28
configuring a CPU ACL template 4-34
configuring a high throughput template 4-42
configuring a local EAP general template 4-24
configuring a local EAP profile template 4-24
configuring a manually disabled client template 4-31
configuring a mesh template 4-50
configuring an 802.11h template 4-42
configuring an EAP-FAST template 4-25
configuring an RRM interval template 4-43
configuring an RRM threshold template 4-42
configuring a policy name template 4-39
configuring a roaming parameters template 4-41
configuring a TACACS+ server template 4-23
configuring a trusted AP policies template 4-26
configuring a user authentication priority template 4-54
configuring a user login policies template 4-31
configuring autonomous access point migration template 4-64
configuring EDCA parameters
through a template 4-41
configuring FlexConnect AP groups 4-18
configuring search results 30-9
configuring spectrum experts 17-22
configuring template
ACL 4-31
for rogue AP rule groups 4-28
configuring templates
802.11b/g RRM interval 4-43
access point authentication and MFP 4-26
file encryption 4-30
guest users 17-1
known rogue access point 4-42
local management user 4-53
MAC filter 4-31
RADIUS accounting 4-22
RADIUS authentication 4-22
syslog 4-52
Telnet SSH 4-52
traffic stream metrics QoS 4-15
trap control 4-52
WLAN 4-17
Controller Templates
802.11b/g/n Parameters 4-45
AP Username Password 4-13
SNMP Community 4-11
Voice
802.11b/g/n 4-38, 4-40, 4-46
Creating Account 28-3
Creating a Lobby Ambassador Account 28-3
creating AP configuration templates 4-61
creating autonomous access point migration templates 4-63
customize report 29-3
D
Deploying DMVPN Template 9-1
Deploying GETVPN Template 4-60
DHCP server
overriding 31-17
DMVPN 4-85
DMVPN Template 4-59
downloading sw to controllers
after adding config group 4-71
downstream delay 4-16
downstream packet loss rate 4-16
Dynamic Multipoint VPN 4-85
E
EAP-FAST template 4-25
EDCA parameters
configuring through a template 4-41
Edit View
general 30-9
enable background audit 4-67
enable enforcement 4-67
Ethernet Switch
credentials
remove 17-22
event
severity 11-3
F
failover mechanism 27-5
file encryption template 4-30
FlexConnect
bandwidth restriction 31-14
FlexConnect AP groups
configuring 4-20
FlexConnect configuration tab 31-21
FlexConnect local switching 31-14
friendly access point template 4-28
friendly rogue 4-27
G
generating migration analysis report 17-9
GET VPN Group Member Template 4-59
GET VPN Key Server Template 4-59
gold 31-13
groups
for rogue access point rules 4-28
Guest User
add 28-6
e-mail 28-6
print 28-6
schedule 28-6
guest user templates 17-1
H
high throughput template
configuring 4-42
historical report type 29-1
I
information elements
Aironet 31-15
interface components
dashlet 30-2
filters 30-2
global toolbar 30-1
quick view 30-5
sub-menus 30-2
tables 30-5
interface group 4-15
K
KEK
key encryption key 31-23
key wrap 31-23
L
LAG mode 31-3
Learn Client IP Address 31-14
legacy syslog template 4-52
limitations for high availability 27-5
Lobby Ambassador
account 28-3
creating account 28-3
Lobby Ambassador Account
creating 28-3
Local EAP check box 31-12
local EAP profile template 4-24
local management user template 4-53, 4-54
local switching
FlexConnect 31-14
Location Server
logs 27-3
Logout idle user 28-7
LWAPP template
new 4-61
M
MACK
message authenticator code keys 31-23
malicious rogue 4-27
management interface 31-4
managing
faults 11-1
licenses 27-15
managing current reports 29-3
Managing Interface 4-78
Managing Interfaces 4-84
managing saved reports 29-4
manually disabled client
template for 4-31
mesh template
configuring 4-50
metrics
in QoS 4-15
MFP client protection 31-17
migration analysis
running 17-9
migration analysis report
generating 17-9
migration analysis summary 4-64
viewing 4-64
migration template
copying 4-65
Migration Templates
Autonomous APs
edit 4-64
migration templates
deleting 4-66
Monitor Tags 17-13
most recent audit alarms 17-8
multiple syslog template 4-53
N
NAT44 Rule 4-81
NAT Inside and Outside Addresses 4-80
NAT IP Pools 4-80
NCS database
scheduling automatic backups 27-12
netmask 4-33
NTP server template 4-11, 4-14
O
Overview of NAT 4-79
P
packet jitter 4-15
packet latency 4-15
packet loss 4-15
packet loss rate 4-16
passthrough 31-11
PEAP 31-27
peer-to-peer blocking 31-15
platinum 31-13
PLR 4-16
Profile
List 4-73
Purpose of NAT 4-79
Q
quick search 30-8
R
RADIUS accounting template 4-22
RADIUS authentication template 4-22
RADIUS fallback mode 4-23
reachability status 17-22
recovering the NCS password 27-13
report
running new 29-2
report launch pad 29-2
reports
scheduled runs 29-4
restoring NCS database
in high availability environment 27-13
retain NCS value 4-70
RF Profiles 4-39
roaming parameters template
configuring 4-41
roaming time 4-15, 4-16
rogue access point rule groups 4-28
rogue access point rules
configuring a template 4-26
rogue location discovery protocol 31-28
rogue policies
template for 4-26
role criteria 4-65
root mode
changing from station role 17-9
RRM interval template
configuring 4-43
RRM threshold template
configuring 4-43
rules
for rogue access point 4-26
running a new report 29-2
running migration analysis 17-9
S
saved reports
managing 29-4
Save Guest Accounts to Device 28-7
ScanSafe Templates 4-60
scheduled run results 29-4
silver 31-13
Sniffer 31-59
SNMP authentication 31-47
SNMP Community
controller templates 4-11
software
downloading config groups to controllers 4-71
spectrum expert
adding 17-22
Spectrum Experts
details 17-23
spectrum experts
configuring 17-22
station role
changing to root mode 17-9
Switch
credentials
remove 17-22
symmetric mobility tunneling 31-4
syslog templates 4-52, 4-53
T
TACACS+ server
configuring a template for 4-23
Tags 17-13
Telnet SSH templates 4-52
template
configuring for rogue AP rules 4-26
total mismatched controllers 17-8
trace 27-3
traffic stream metrics QoS template 4-15
trap control templates 4-52
trap receiver template 4-51
trend report type 29-1
troubleshooting
using logging options 27-3
troubleshooting access points 21-1
Types of NAT 4-80
U
unclassified rogue 4-27
unjoined access points 21-1
upgrading autonomous access points 4-66
upstream delay 4-16
upstream packet loss rate 4-16
user credential retrieval priority 4-25
user login policies
configuring a template 4-31
User Preferences 28-7
users
adding 28-2
Uses of NAT 4-80
using logging
for troubleshooting 27-3
using template
ACL 4-34
for friendly access point 4-28
using templates
802.11b/g RRM interval 4-43
802.11b/g RRM threshold 4-43
local management user 4-53, 4-54
password policy 4-30
QoS 4-11
RADIUS accounting 4-22
syslog 4-52, 4-53
Telnet SSH 4-52
traffic stream metrics QoS 4-15
trap control 4-52
trap receiver 4-51
WLAN 4-17
V
viewing the migration analysis 4-64
Voice
802.11b/g/n Controller Templates 4-38, 4-40, 4-46
W
WiFi TDOA Receivers
adding 17-24
configure 17-23
tag location 17-23
wIPS
Profile
add 4-73
Profile List 4-73
wIPS Profile
apply 4-76
delete 4-76
wIPS Profiles
add 4-73
WLAN AP groups 4-18
WLAN templates 4-17