Cisco Wireless Control System Configuration Guide, Release 5.1
Index of Cisco Wireless Control System Configuration Guide, Version 5.1

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

40 MHz channel bonding 10-15

802.11a policy name 11-57

802.11b/g RRM interval template 11-68, 11-70

802.11b/g RRM threshold templates 11-66

802.11b/g voice templates 11-62

802.11 counters report 15-17, 15-18

802.11h template

configuring 11-69

802.11 security trap 11-75

802.11 tags layer 5-47

802.1n scaling reports 15-5

802.1X association 6-39

802.1X authentication 6-39

802.3 bridging

configuring 10-14

880 series ISRs 1-6

A

AAA override 11-17

AAA servers 11-16

AAA traps 11-75

absolute 18-2

access control list template 11-42

access control list templates 11-56

accessing the schedule panel 15-4

access point

configuring 11-40

configuring for hybrid REAP 13-8

credentials 9-2

friendly 11-48

access point/radio templates 11-81

access point authentication and MFP templates 11-51

access point authorization template 11-40

access point inventory report 15-14

access point layer 5-44

access point load

avoiding 11-59

Access point placement 5-24

access point placement 5-24

access point positions

changing with import or export of file 5-33

access point reports 15-5

modifying 15-8

viewing 15-8

access points

adding 5-23

configuring 9-7

configuring for LOMM 9-14

converting to LWAPP C-2

detecting 14-12

embedded 1-6

searching 9-16

selecting 11-90

access points, adding to maps5-23to 5-24

access point security statistics

for mesh 6-51

access point templates

adding 11-80

access point threats 6-11

access point traps 11-75

accuracy tool 5-67

ACL template 11-42

configuring 11-42

ACS server

adding WCS to 16-5

ACS View Server credentials 6-34

active interferer count per channel 9-20

active interferers 9-19

active interferers count chart 9-20

active sessions

monitoring 7-4

adaptive scan threshold 11-66

add config groups 8-18

add group members 8-10

adding access points 5-22

adding access point templates 11-80

adding a license B-5

adding a migration template 9-6

adding a spectrum expert 9-18

adding autonomous access points

by CSV file 9-5

adding auto-provisioning filter 16-18

adding chokepoints 5-34

adding controllers 10-1

adding controllers from config group 8-20

adding guest user account 7-15

adding guest user accounts 7-15

adding IOS access points 9-4

by device information 9-4

adding templates from config group 8-20

adding WCS as TACACS+ server 16-6

adding WCS to ACS server

for use with RADIUS 16-10

adding WCS to an ACS server 16-5

adding WCS to a non-Cisco ACS server 16-14

adding WCS usergroups

into ACS for RADIUS 16-11

into ACS for TACACS+ 16-7

add known rogue 11-71

adjusted link metric 6-42

administration menu 2-24

advanced debug 5-33, 5-63, 5-68

Advanced Options

definition 5-19

advanced options 5-18

Advanced tab

on WLAN template 11-18

Aironet IE 11-19

alarm 14-1

alarm dashboard 2-25, 14-1

alarm monitor 2-25, 6-17

alarms 14-1

config audit 8-25

monitoring 14-4

rogue access point 14-8

rogue adhoc 14-11

alarm trigger threshold 11-52

all groups window 16-8

alternate parent

for mesh 15-15

altitude 18-2

altitude mode 18-2

anonymous provisioning 11-34

antenna gain 6-33

antenna type 6-33

AP attack details 2-18

AP failover priority

setting 9-1, 10-8

AP list by location 15-7

AP list by location report 15-7

AP list by SSID 15-7

AP mesh layer info 5-45

applying calibration models 5-57

applying config groups 8-21

applying controller templates 11-79

AP policies 3-6

AP policies template 11-44

AP profile status report 15-7

APs not assigned to maps 2-17

AP status report

viewing for scheduled task 11-85

AP template task history

viewing 11-86

AP template tasks 11-85

AP up time 6-47

assigned virtual domain components 17-8

assigning location presence 5-3

assigning virtual domains 7-22

association request failures 6-54

association request success 6-54

association request timeouts 6-54

attacks

access points 6-11

AUDIT_STATUS_DIFFERENCE 14-65

auditing config groups 8-22

auditing H-REAP groups 13-15

audit report 16-34

audit reports 15-9

configuring 9-16, 10-5

audit status 6-50

viewing 10-5

viewing for access points 9-16

viewing for controllers 10-5

audit trail

viewing 7-9

audit trails

enabling for guest user activities 7-11

authentication order

managing 10-5

authentication priority 10-5

authentication process

Hybrid REAP 13-2

authentication request failures 6-54

authentication request success 6-54

authentication request timeout 6-54

auto key generation 11-23

automated upgrade 12-15

automatic backups, scheduling 12-3, 16-1

automatic client exclusion 11-20

automatic client troubleshooting 16-32

autonomous access points

adding by CSV file 9-5

viewing 9-5

autonomous to LWAPP migration support 9-3

auto provisioning 16-17

setting 16-22

auto provisioning device information

detailed 16-21

auto provisioning filter

deleting 16-21

editing 16-21

auto refresh 16-34

auto-synchronizing location appliances 12-10

avoid access point load 11-59

avoid Cisco AP load 11-59

avoid foreign AP interference 11-59

avoid non-802.11 noise 11-59

B

background tasks 12-13

running 16-1

backhaul interface 6-52

backing up location appliance data 12-12

backing up the WCS database

on Linux 12-5

on Windows 12-4

backup and restore license B-5

bandwidth

making expedited 11-63

basic auditing 8-23

best practices A-1

bridge group name 6-52

Bridging link information 6-57

bridging link information 6-57

bridging mesh statistics 6-52

broadcast deauthentication frame signatures 3-9

bronze 11-18

bronze queue 6-54

buildings

adding to a campus map 5-2

adding to WCS database 5-4

busiest APs report 15-7, 15-8

busiest clients report 15-10

C

CAC

enabling 10-9

CA certificates 4-5

CAD files 5-2

calculating access point requirements 5-15

calibration models 5-57

calibration models, applying 5-57

calibration status bar 5-61

call admission control 11-62

campus map, adding to WCS database 5-1

cascade reboot 8-26

CCA sensitivity 11-61

certificate signing request 3-21

changing access point positions 5-33

by importing or exporting a file 5-33

channel bonding

configuring 10-15

channel change notifications 6-72

channels

monitoring on a floor map 5-50

monitoring on floor map 5-50

channels on a floor map 5-50

channel width

monitoring 6-59

checking the status of WCS

on Linux 12-2

on Windows 12-1

chokepoints 5-34

adding 5-34

monitoring 5-42

removing 5-41

using to enhance tag location 5-34

Cisco AP load

avoiding 11-59

Cisco Discovery Protocol 9-11

Cisco UDI 5-19

Cisco Unified Wireless Network Solution 5-63

Cisco WCS base B-1

Cisco WCS location B-1

Cisco Wireless LAN Solution

overview1-1to ??

security solutions3-1to 3-4

civic address 5-3

clamped to ground 18-2

classification rule 11-45

clear config 9-12

client alarms

most recent 2-18

client association report 15-11

client authentication provision 11-34

client count 2-17, 2-22

client count graph report 15-5

client count report 15-11

client devices

connecting to WLANs 13-11

client exclusion 11-20

happening automatically 11-20

client exclusion policies template 11-49

client MFP 3-6

client properties 6-26

client related traps 11-74

client report

creating new 15-12

client reports

modifying 15-9, 15-11

viewing 15-9, 15-11

clients

finding6-35to??, 6-35, ??to 6-38

manually disabled 2-18

map 6-38

monitoring on a floor map 5-52

monitoring on a floormap 5-52

parameters 5-52

clients, monitoring on floor map 5-52

clients detected by location server 2-21

client security component 2-21

clients layer 5-46

client statistics 6-38

client tab

home page 2-17

client traffic 2-18, 2-22

client troubleshooting

automatic 16-32

combined inventory report 15-14

command buttons 2-25

components

of virtual domain 17-8

conducting accuracy testing 5-67

config audit 8-24

config audit alarms 8-25

config group

adding controllers 8-20

adding templates 8-20

configuring 8-19

downloading IDS signatures 8-28

downloading sw to controllers 8-27

removing controllers 8-20

removing templates 8-20

config group audits 8-22

config groups

applying 8-21

auditing 8-22

creating 8-17

downloading customized webauth 8-29

rebooting 8-26

reporting 8-26

config group task

deleting 11-88

config group task history

viewing 11-88

config group tasks 11-87

configuration audit summary 8-24

configuration mismatch 6-75

configuration sync 16-4

configure menu 2-23

configuring 40 MHz channel bonding 10-15

configuring 802.3 bridging 10-14

configuring access control lists 11-56

configuring access points 9-7, 10-14

configuring a client exclusion policy template 11-46

configuring a CPU ACL template 11-42

configuring a high throughput template 11-70

configuring alarm severity 14-71

configuring a local EAP general template 11-30

configuring a local EAP profile template 11-31

configuring a manually disabled client template 11-41

configuring a mesh template 11-70, 11-71

configuring an 802.11h template 11-69

configuring an access point 11-40

configuring an access point for hybrid REAP 13-8

configuring an EAP-FAST template 11-33

configuring an RRM interval template 11-68

configuring an RRM threshold template 11-66

configuring a policy name template 11-57

configuring a roaming parameters template 11-64

configuring a rogue policies template 11-43

configuring a TACACS+ server template 11-28

configuring a TFTP server template 11-72

configuring a trusted AP policies template 11-44

configuring audit reports 10-5

configuring a user authentication priority template 11-79

configuring a user login policies template 11-38

configuring a video parameter template 11-63

configuring a voice parameter template 11-62

configuring config group 8-18

configuring EDCA parameters

for individual controllers 10-16

through a template 11-64

configuring firewall for WCS 3-5

configuring general templates 11-4

configuring global credentials 9-2

configuring global email parameters 16-30

configuring high density templates 11-60

configuring H-REAP AP groups 11-21

configuring Hybrid REAP 13-1

configuring hybrid REAP access point groups 13-11

configuring Hybrid-REAP groups 13-13

Configuring IDS 3-8

Configuring IDS signatures 3-8

configuring IDS signatures 3-8

configuring intrusion detection systems 3-8

configuring multiple country codes 8-15

configuring NAC out-of-band 10-18

configuring radio templates 11-88

configuring RADIUS servers 16-24

configuring scheduled configuration tasks 11-85

configuring SNMPv3 10-17

configuring spectrum experts 9-18

configuring TACACS+ servers 16-17

configuring template

ACL 11-41

for rogue AP rule groups 11-46

configuring templates

802.11a policy name 11-56

802.11b/g RRM interval 11-68

802.11b/g RRM threshold 11-63

802.11b/g voice 11-62

access point/radio 11-81

access point authentication and MFP 11-44

access point authorization 11-40

file encryption 11-23

guest users 11-37

known rogue access point 11-69

local management user 11-78

MAC filter 11-39

QoS 11-6

RADIUS accounting 11-27

RADIUS authentication 11-24

syslog 11-76

Telnet SSH 11-75

traffic stream metrics QoS 11-8

trap control 11-73

trap receiver 11-72

web authentication 11-52

WLAN 11-9

configuring the controller for hybrid REAP 13-5

configuring the switch

for hybrid REAP 13-4

configuring wired guest access 10-23

connecting client devices

to WLANs 13-11

Connecting to the Guest WLAN 3-20

Containment 6-16

containment

of rogue access points 6-16

content

customizing 2-20

controller

configuring for hybrid REAP 13-5

controller audit report 16-34

controller CPU utilization 2-21

controller inventory report 15-14

controller inventory status 2-22

controller memory utilization 2-21

controllers

adding 10-1

adding to WCS database 4-1

pinging network devices 10-8

searching 10-4

specified 1-1

controller status report

viewing 11-87

controller templates

applying 11-80

controller upgrade settings 16-34

controller utilization report 15-18

controller values

refreshing 10-6

converting WLSE autonomous to WCS controller C-1

counters report

for 802.11 15-17

country codes

multiple 8-15, 10-3

setting 10-3

coverage areas 2-22

coverage hole 6-68, 6-75

coverage holes 2-17

finding 5-9

monitoring on a floor map5-51to 5-52

monitoring on floormap 5-51

coverage holes, monitoring 5-51

coverage hole summary report 15-18

Creating 15-8

creating a lobby ambassador account 7-12

creating a network configuration audit 15-10

Creating a network design 5-27

creating a network design 5-27

creating a new access point report 15-8

creating a new client report 15-12

creating a new inventory report 15-15

creating a new mesh report 15-10, 15-17

creating a new performance report 15-19

creating a new security report 15-20

creating a virtual domain 17-1

creating calibration models 5-45

Creating guest user accounts 7-11

creating guest user accounts 7-11

creating placemarks 18-3

creating virtual domains 17-1

CSR 3-21

CSV file 9-5, 16-19

CSV files 18-4

current AP template task

deleting 11-86

disabling 11-86

enabling 11-86

modifying 11-85

current config group task

disabling 11-88

enabling 11-88

modifying 11-87

current templates

viewing 10-17

customized web auth 10-27

customized webauth

downloading 8-29

Customized Web authentication 3-17

customized web authentication

downloading 11-54

customizing content on WCS Home page 2-20

customizing tabs on WCS Home page 2-19

Custom signature 3-14

D

dashboard

RRM 6-71

data/coverage 5-19

data management tasks

performing 16-27

data point collection 5-58

debug commands A-3

debug strategy A-4

default lobby ambassdor credentials

editing 7-9

deleting a current AP template task 11-86

deleting a current config group task 11-88

Deleting a guest user 3-20

deleting a license B-5

deleting a report 15-3

deleting guest user templates 7-17

deleting WCS user accounts 7-4

designing a network 5-27

detailed auto provisioning device information 16-21

detecting access points 14-12

detecting rogue access points 6-17

device certificates 4-5

device information 9-4

DHCP 6-39

DHCP server

overriding 11-20

DHCP statistics 6-70

diagnostic channel A-1

disable report schedule 15-2

disabling a current config group task 11-88

disabling current AP template task 11-86

disabling IDS signatures 3-13

DNS ping 6-39

DNS resolution 6-39

downloading a customized web authentication page 11-54

downloading customized webauth 8-29

Downloading customized web authentication 3-17

Downloading IDS signatures 3-12

downloading IDS signatures 3-12

from your config group 8-28

downloading sw to controllers

after adding config group 8-27

downloading vendor CA certificates 4-5

downloading vendor device certificates 4-5

download logs 5-70

downstream delay 11-9

downstream packet loss rate 11-9

drawing polygon areas

using map editor 5-13

DTIM 11-58

E

EAP-FAST template 11-33

EAPOL flood signature 3-10

EDCA parameters

configuring for individual controllers 10-16

configuring through a template 11-64

editing guest users 7-16

Editing signature parameters 3-15

editing the default lobby ambassador credentials 7-9

edit link 5-8

edit links

home page 2-19

edit location presence information 5-3

edit view 14-5

email

configuring parameters 16-29

email notifications

monitoring 14-14

embedded access points 1-6

enable background audit 8-18

enable enforcement 8-18

enable report schedule 15-2

enabling a current config group task 11-88

enabling audit trails

for guest user activities 7-11

enabling current AP template task 11-86

enabling high density 10-11

enabling IDS signatures 3-13

enabling load-based CAC 10-7

enabling location presence 5-6

Enabling Web login 3-16

enabling Web login 3-16

end user license agreementB-8to ??

entry chokepoint 5-42

establishing logging options 16-26

event history 6-22

event notification 1-4

Events 14-1

events 14-1

monitoring 14-13

excluded packets 6-53

exit chokepoint 5-42

expedited 11-63

expedited bandwidth 11-63

exporting a file

to change access point position 5-33

exporting asset information 12-10

exporting WLSE map data 5-54

export task list 16-8

extend to ground 18-2

external web auth 10-27

extracting task list 16-15

F

failed objects

monitoring 14-7

feature license B-2

file encryption template 11-23

filter

deleting auto provisiioning 16-21

editing current auto provisioning 16-21

filtering

using to modify maps 6-57

filter member management 16-19

filter mode 16-18

filter properties 16-19

finding clients 6-34

finding coverage holes 5-9

firewall, configuring for WCS 3-5

floor plans

adding to a campus building5-9to 5-11

adding to a standalone building5-11to 5-12

enhancing with map editor 5-12

foreign access point interference

avoiding 11-59

foreign AP interference

avoiding 11-59

Frame type 3-14

friendly access point template 11-48

friendly rogue 11-45

friendly rogue access points 6-10

G

general tab

client properties 6-26

home page 2-17

RF properties 6-28

security 6-29

general templates

configuring 11-4

generate password 11-37

GEO check box 5-8

geographical coordinates 18-1

global credentials

configuring 9-2

Global settings

for standard and custom signatures 3-15

global username and password

overriding 9-11

gold 11-18

gold queue 6-53

Google Earth coordinates 18-2

Google Earth maps 18-1

viewing 6-60

Google KML or CSV

importing into WCS 18-5

GPS markers 5-3

grid of plus marks 5-59

groups

for hybrid-REAP 13-12

for rogue access point rules 11-46

group setup window on ACS server 16-10

GUEST_USER_ADDED 14-62

GUEST_USER_AUTHENTICATED 14-63

Guest user

deleting 3-20

guest user account

scheduling 7-18

Guest user accounts

creating 7-11

guest user accounts

adding 7-15

creating 7-11

managing 7-14

guest user activities 7-11

guest user credentials 7-16

guest user details

emailing 7-19

print 7-19

guest users

viewing and editing 7-16

guest user templates 11-37

deleting 7-17

Guest WLAN

connecting 3-20

guidelines

for NAC out-of-band integration 10-19

guidelines for using the map editor 5-12

H

heater status 6-47

heat map

described 5-24

graphic 5-24

help menu 2-24

hierarchy

of mesh network 6-56

Hierarchy of Mesh parent to child 6-58

hierarchy of mesh parent to child 6-58

high density

enabling 10-11

high density requirements 10-11

high density templates 11-60

high throughput template

configuring 11-70

historical report type 15-1

Home page

customizing content 2-20

customizing tabs 2-19

H-REAP AP groups

configuring 11-21

H-REAP configuration tab 11-22

H-REAP groups

auditing 13-15

Hybrid REAP

configuring 9-1, 10-1, 13-1

hybrid REAP access point groups 13-11

hybrid-REAP groups 13-12

Hybrid REAP local switching 11-19

hysteresis 11-66

I

identical audit status 6-50

IDS 3-8

configuring 3-8

IDS sensors 3-8

IDS signature events

viewing 3-16

IDS signatures 3-8

disabling 3-13

downloading 3-12

downloading from config group 8-28

enabling 3-13

uploading 3-11

importing a file

to change access point position 5-33

importing asset information 12-10

importing coordinates

as CSV file 18-4

into Google Earth 18-2

importing Google KML or CSV into WCS 18-5

importing WLSE map data 5-54

indicator of alarms 2-25

information elements

Aironet 11-19

infrastructure MFP 3-6

input type 16-19

inspect location readiness 5-21

inspect VoWLAN readiness 5-22

installer

using to upgrade 12-15

installing a license B-3

installing WCS

for WLSE conversion C-2

insufficient memory 6-53

integrating NAC out-of-band 10-18

interferers

summary 9-19

internal web auth 10-27

inter-subnet roaming 8-4

Intrusion Detection Systems 3-8

intrusion detection systems 3-8

invalid association request 6-54

invalid reassociation request 6-54

invalid reauthentication request 6-55

inventory detail status 2-17

inventory reports 15-12

creating 15-15

modifying 15-15

viewing 15-15

inventory status 2-22

IOS access points

adding 9-4

adding by device information 9-4

IOSAP_DOWN 14-64

IOSAP_LINK_DOWN 14-63

IOSAP_LINK_UP 14-63

IOSAP_UP 14-64

IP connectivity 6-39

IPSEC failures 6-12

K

KEK

key encryption key 11-25

key wrap 11-25

KML file 18-2

L

laptop icon 6-37

latest network audit report 10-7

latitude 18-1

Layer 1 security solutions 3-1

Layer 2 11-11

Layer 2 security solutions 3-2

Layer 3 11-15

Layer 3 security solutions 3-2

Layer 3 to Layer 2 mode, converting Cisco Wireless LAN Solution 3-4

LBS authorization 11-40

LEAP authentication

requirements 8-8

legacy syslog template 11-76

license

adding B-5

backup and restore B-5

deleting B-5

license agreementB-8to ??

license installation B-3

license management B-4

licenses B-1

license types B-1

licensing

on WLSE network management C-4

lifetime 7-17

linear point collection 5-58

link aggregation 11-5

link aggregation (LAG)

guidelines13-4to ??

link metric

adjusted 6-42

unadjusted 6-42

link SNR 6-42

link stats

for mesh 15-16

Link test

running 6-63

link test

running 6-63

Link test result 6-64

link test results 6-42

list all filters 16-21

list filters 16-21

load 5-42

load-based CAC 11-62

enabling 10-9

Lobby ambassador 7-11

lobby ambassador

logging activites 7-19

lobby ambassador account

creating 7-12

editing 7-13

lobby ambassador defaults

setting 7-7

local authentication

for hybrid-REAP groups 13-12

Local EAP check box 11-17

local EAP general template 11-30

local EAP profile template 11-31

local management user template 11-78, 11-79

local net users template 11-35

local password policy 16-23

local switching

Hybrid REAP 11-19

locating rogue access points 6-17

location

of rogue access points 6-16

location accuracy

analyzing 5-63

using testpoints 5-63

location appliance

importing 12-7

location appliance data

backing up 12-12

location appliance functionality 4-3

location appliance importing 12-7

location appliances

adding to WCS database 4-2

auto-synchronizing 12-11

relationship with WCS Location 1-4

location inventory status 2-22

location menu 2-24

location optimized monitor mode 9-9

location presence

assigning 5-3

on a location server 5-6

location readiness

inspecting 5-21

location server inventory report 15-15

location server utilization 15-18

location tab 6-31

location upgrade B-2

log analysis 6-21

logging 16-4

logging in

to the WCS user interface 7-13

logging into the WCS user interface2-14to 2-16

logging options 16-26

logging the lobby ambassador activities 7-19

login.html 3-17

LOMM 9-9

configuring access point radios 9-14

longitude 18-3

long preambles, enabling for SpectraLink NetLink phones 4-6

LWAPP migration 9-3

M

MAC filtering 11-14

MAC filter template 11-39

MAC frequency 3-14

MAC information 3-14

MACK

message authenticator code keys 11-25

Maintain Image Aspect Ratio 5-53

maintaining WCS12-1to 12-19

malformed neighbor packets 6-52

malicious rogue 11-45

malicious rogue access points 6-3

managed network

security index 6-3

management frame flood signatures 3-9

Management Frame Protection 3-6

management frame protection 11-51

management queue 6-54

managing a virtual domain 17-6

managing guest user accounts 7-14

managing licenses B-4

managing multiple WCSs 1-7

managing user authentication order 10-5

managing virtual domains 17-6

manually disabled client

template for 11-41

manually disabled clients 2-18

manufacturer information 6-33

map

adding chokepoints 5-34

removing chokepoints 5-41

Map Editor

general notes and guidelines 5-12

map editor

general notes 5-12

guidelines for using 5-12

using to draw polygon areas 5-13

map editor, enhancing floor plans 5-12

maps

creating5-1to 5-24

monitoring5-42, 5-42to 5-53

searching 5-8

using to monitor link stats 6-40

using to monitor mesh AP neighbors 6-45

map view

updating 6-58

menu bar 2-23

mesh access point neighbors

monitoring 6-45

mesh access points

monitoring 6-43

mesh alarms

most recent 2-19

mesh alternate parent 15-15

mesh health 6-47

monitoring 6-47

mesh link statistics 6-40

monitoring 6-40

mesh link stats 15-16

mesh neighbors 6-46

mesh network

monitoring using maps 6-40

mesh network hierarchy 6-56

mesh networks

monitoring 6-40

mesh node hops 15-16

mesh packet error statistics 15-16

mesh packet statistics 15-16

mesh parent-child hierarchical view 5-45

mesh report

creating 15-10, 15-17

mesh reports 15-15

modifying 15-16

viewing 15-16

mesh security statistics

for an AP 6-47

mesh statistics

for an access point 6-51

mesh stranded APs 15-16

mesh tab

home page 2-19

mesh template

configuring 11-71

Mesh tree

viewing 6-56

mesh tree

viewing 6-56

mesh worst node hops 15-16

mesh worst SNR links 15-16

message integrity check information element 11-51

metrics

in QoS 11-8

MFP 3-6

for clients 3-7

MFP client protection 11-20

MFP signature generation 11-20

MFP templates 11-51

MIC IE 11-51

minimum RSSI 11-66

mirror mode 9-10

mismatched audit status 6-50

mobile announce messages 8-8

mobility 8-1

mobility anchors 8-12

mobility groups 8-7

prerequisites13-4to ??

mobility groups, configuring 8-8

mobility scalability 8-11

modifying access point reports 15-8

modifying a current AP template task 11-85

modifying a current config group task 11-87

modifying a migration template 9-6

modifying audit reports 15-9

modifying client reports 15-9, 15-11

modifying inventory reports 15-15

modifying map displays 6-57

using filters 6-57

modifying mesh reports 15-16

modifying performance reports 15-18

modifying security reports 15-20

monitoring active sessions 7-5

monitoring alarms 14-4

monitoring channels

on a floor map 5-50

monitoring channel width 6-59

monitoring chokepoints 5-42

monitoring clients

on a floormap 5-52

monitoring email notifications 14-14

monitoring events 14-13

monitoring failed objects 14-7

monitoring maps 5-42

monitoring mesh access point neighbors 6-45

using maps 6-45

monitoring mesh health 6-42, 6-47, 6-59

monitoring mesh link statistics

using maps 6-40

monitoring mesh networks

using maps 6-40

Monitoring outdoor areas 5-45

monitoring outdoor areas 5-53

monitoring pre-coverage holes 6-68

monitoring predicted coverage 5-43

monitoring rogue access point alarms 14-8

monitoring rogue access point details 14-9

monitoring rogue access points 6-12

monitoring rogue adhoc alarms 14-10

monitoring rogue adhocs 6-14

monitoring rogue clients 6-14, 14-13

monitoring security configurations 14-14, 16-32

monitoring shunned clients 6-15

monitoring spectrum experts 9-18

monitoring transmit power levels 5-45

on a floormap 5-50

monitor menu 2-23

monitor mode

location optimized 9-9

most recent AP alarms 2-21

most recent audit alarms 8-25

most recent client alarms 2-18

most recent mesh alarms 2-19

most recent rogue adhocs 3-3

most recent security alarms 2-18

multicast mobility mode 8-12

multiple country codes

configuring 8-15

setting 10-3

multiple syslog template 11-77

N

N+1 redundancy 8-5

NAC out-of-band

configuring 10-18

NAT 8-11

Navigator 1-7

NetStumbler signature 3-10

network address translation 8-11

network audit report

viewing latest 10-7

network design 5-27

network protection 3-8

Network Summary page 2-15

new rogue AP count 15-19

new rogue AP count report 15-19

new rogue APs 15-19

new rogue APs report 15-19

new search 5-8

node hop count

worst 2-19

node hops 6-53

for mesh 15-16

noise

avoiding non-802.11 types 11-59

avoid non-802.11 11-59

non-802.11 noise

avoiding 11-59

non-Cisco ACS server

for use with RADIUS 16-14

notifications

of channel change 6-72

of RF grouping 6-73

of transmission power change 6-73

NTP server template 11-3

null probe response signatures 3-9

O

on-demand accuracy testing 5-67

optimizing the controller for high density 10-11

organizationally unique identifier 6-33

Outdoor areas

monitoring 5-53

outdoor areas

monitoring 5-53

outdoor areas, adding to a campus map5-5to 5-6

outdoor location

creating with Google Earth 18-1

override global username password 9-11

overview

Cisco Wireless LAN Solution1-1to ??

WCS 1-2

P

packet error rate

worse 2-19

packet error rate link color 6-58

packet error statistics

for mesh 15-16

packet jitter 11-8

packet latency 11-8

packet loss 11-8

packet loss rate 11-9

packets received 6-55

packet statistics

for mesh 15-16

packets transmitted 6-55

parent changes 6-53

parent TSF 6-39

passthrough 11-15

password rules

turning on or off 16-23

PEAP 11-33

peer-to-peer blocking 11-20

guidelines 10-19

performance reports 15-17

creating 15-19

modifying 15-18

viewing 15-18

performing data management tasks 16-27

pico cell mode 11-58

pinging network devices from a controller 10-8

placemarks

creating 18-3

placement of access points 5-25

planning mode 5-17

to calculate access point requirements 5-15

planning mode, calculating access point requirements 5-15

platinum 11-18

platinum queue 6-53

PLR 11-9

POE status 6-50

policy manager solutions 3-2

policy name template

configuring 11-57

polygon areas

drawing with map editor 5-13

poor neighbor SNR 6-52

position testpoints 5-68

power-over-ethernet status 6-50

pre-coverage holes

monitoring 6-68

predicted coverage, monitoring5-43to ??, 5-43

predictive tool

distance based 5-21

Prerequisites 2-1

presence parameters 5-7

Present map 6-37

print guest user details 7-19

protection type 11-52

Q

QoS 11-17

QoS templates 11-6

quarantine 10-21

Queue 15-16

queues

silver, gold, platinum, bronze, management 6-53

Quiet time 3-14

R

radio inventory status 2-22

radio measurements

receiving 6-39

radio receiver sensitivity 6-33

radio resource management 11-59

Radio Resource Management statistics 6-72

radio status

scheduling 9-15

radio templates

configuring 11-88

radio utilization report 15-18

RADIUS accounting template 11-27

RADIUS and TACACS+ attributes

for virtual domain 7-23, 17-7

virtual domains 7-23, 17-7

RADIUS authentication template 11-24

RADIUS servers

configuring 16-24

reachability status 9-18

reassociation request failures 6-55

reassociation request success 6-55

reassociation request timeouts 6-55

reauthentication request failures 6-55

reauthentication request success 6-55

reauthentication request timeout 6-55

rebooting config groups 8-23

receiving radio measurements 6-39

recent alarms 2-21

recent coverage holes 2-17, 2-22

Recent map 6-37

recent rogue adhoc alarm 2-18

recent rogue AP alarms 2-18

recovering the WCS password 12-20

refresh

automatically 16-34

refresh browser 5-42

refresh controller values 10-6

refresh from network 5-42

refresh heatmap 5-42

relative to ground 18-2

removing chokepoints 5-41

removing controllers from config group 8-20

removing switches 10-30

removing templates from config group 8-20

report

802.11 counters 15-17

access point inventory 15-14

busiest APs 15-8

busiest clients 15-10

client association 15-11

client count 15-11

combined inventory 15-14

controller inventory 15-14

controller utilization 15-18

coverage hole summary 15-18

deleting 15-3

location server inventory 15-15

location server utilization 15-18

mesh alternate parent 15-15

mesh worst node hops 15-16

radio utilization 15-18

security summary 15-20

traffics stream metrics 15-8

traffic stream metrics 15-11

Tx power level and channel 15-18

unique client 15-11

voice statistics 15-18

reporting tag location 5-34

Reports 15-7

reports

802.11n scaling 15-5

access point type 15-7

disable schedule 15-2

enable schedule 15-2

mesh link stats 15-16

mesh node hops 15-16

mesh packet error statistics 15-16

mesh packet statistics 15-16

mesh worst SNR links 15-16

running 15-1

reset AP now 9-12

restore WCS values 10-6

restoring WCS database on Linux 12-7

retain WCS value 8-23

retention expiration 5-8

retransmission rule enable 5-8

Retrieving UDI 6-64

RF calibration model, creating 4-7

RF calibration tool 1-7

RF grouping notifications 6-73

RF prediction heat map 5-24

RF profile traps 11-75

RF properties 6-28

RF update traps 11-75

RLDP 11-44

roaming 8-1

roaming parameters template

configuring 11-65

roaming time 11-8, 11-9

rogue access point alarms

monitoring 14-8

rogue access point details 14-9

rogue access point location 6-16

rogue access point rule groups 11-46

rogue access point rules

configuring a template 11-44

viewing or editing 9-17

rogue access points

alarm monitor 6-17

detecting 6-17

detecting and locating6-17to 6-18

friendly 6-10

locating 6-17

malicious 6-9

monitoring6-1to ??, 6-12

solutions for 3-2

unclassified 6-10

rogue adhoc alarm 2-18

rogue adhoc alarms

monitoring 14-10

rogue adhocs

monitoring 6-14

most recent 3-3

rogue adhocs event report 15-20

rogue AP alarms 2-18

rogue AP detail summary 2-21

rogue APs event report 15-19

rogue APs layer 5-48

rogue APs report 15-19

rogue clients

monitoring 6-14, 14-13

rogue clients layer 5-49

rogue detector 9-10

rogue location discovery protocol 11-44

rogue management 3-3

rogue policies

template for 11-43

rogues detected by APs 15-19

routing state 6-52

RRM 11-59

RRM dashboard 6-71

RRM DCA 10-15

RRM intervals 11-68, 11-69, 11-70

RRM interval template

configuring 11-68, 11-70

RRM thresholds 11-66

RRM threshold template

configuring 11-66

rules

for rogue access point 11-44

viewing or editing for rogue access points 9-17

Running 6-63

Running a link test 6-62

running a link test 6-63

running background tasks 16-1

running report 15-1

RX neighbor requests 6-53

RX neighbor responses 6-53

Rx sensitivity 11-61

S

saved searches 5-8

scalability parameters 8-11

scaling reports

802.11n 15-5

scan threshold 11-66

scheduled accuracy testing 5-67

scheduled configuration tasks

configuring 11-85

scheduled tasks

viewing 9-15

schedule panel

accessing 15-4

scheduling guest user account 7-18

scheduling radio status 9-15

search

using for alarms 14-6

search clients 6-36

searching controllers 10-4

searching maps 5-6

security alarms

most recent 2-18

security color range 6-3

security configurations

monitoring 14-14, 16-32

security index 6-3

security index detailed report 6-4

security mesh statistics 6-54

security reports 15-19

creating 15-20

modifying 15-20

viewing 15-20

security solutions3-1to 3-4

security statistics

for mesh 6-51

security summary report 15-20

security summary window 6-2

security tab

home page 2-18

selecting access points 11-90

sending mobile announce messages 8-8

sensors

viewing IDS types 3-8

sequence parameter 11-57

serial number 6-33

servers

synchronizing WCS and location servers 12-8

Service Options

definitions 5-19

service options 5-19

setting AP failover 9-1

setting AP failover priority 10-8

setting lobby ambassodor defaults 7-7

setting multiple country codes 10-3

shunned clients

monitoring 6-15

shutting switch port 10-30

sidebar area 2-24

signature attacks 6-11

signature attacks summary 2-18

silver 11-18

silver queue 6-53

single device 16-19

skull-and-crossbones indicator 6-18

sniffer 11-82

sniffer mode 9-10

SNMP authentication 11-74

SNMPv3

configuring 10-17

SNR definition 6-58

SNR down 6-42

SNR link

worst 2-19

SNR UP 6-42

SNR up 6-42

software

downloading config groups to controllers 8-27

software, updating 4-4

SpectraLink NetLink phones, enabling long preambles 4-6

spectrum expert

adding 9-18

spectrum expert details 9-20

spectrum experts

configuring 9-18

monitoring 9-18

summary 9-19

Standard signature 3-14

standard signatures 3-9

starting WCS

on Linux 2-14

on Windows 2-13

statistics

DHCP 6-70

statistics tab 6-30

status, checking 12-1

status report

AP profile 15-7

stopping WCS

on Linux 12-3

on Windows 12-2

supported Cisco WLSE management stations C-2

switch

configuring for hybrid REAP 13-4

switches

removing 10-30

switch port

shutting 10-30

switch port tracing

using 10-27

symmetric mobility tunneling 11-5

symmetric tunneling 8-5

synchornization

of configuration 16-4

synchronize servers 12-8

syslog templates 11-76, 11-77

System requirements 2-2

T

TACACS+ server

configuring a template for 11-29

TACACS+ servers

configuring 16-23

tagging

of rogue access points 6-16

tag location reporting 5-34

Target 6-39

target TSF 6-39

tasks

importing into ACS 16-5

Telnet SSH templates 11-75

temperature 6-47

template

configuring for rogue AP rules 11-44

template-based auditing 8-23

template for configuring network user credentials 11-35

templates

using 11-1

test analysis 6-39

testing

accuracy 5-67

Testpoints 5-63

TFTP server 3-11

TFTP server template

configuring 11-72

thermometer color range 6-3

threats

access points 6-11

throughput report 15-6

tilt 18-2

tool to conduct accuracy testing 5-67

top APs by client count 2-17

top security issues 6-3

total APs not assigned to maps 2-17

total interferer count 9-20

total mismatched controllers 8-25

trace switch port 10-28

traffic indicator message 11-58

traffic stream metrics 11-63

traffic stream metrics QoS status 11-8

traffic stream metrics QoS template 11-8

traffic stream metrics report 15-8, 15-11

graphical 15-8

transition time 11-66

transmission power change notifications 6-73

transmit power level 11-59

transmit power levels

monitoring on a floor map 5-50

monitoring on a floormap 5-50

trap

802.11 security 11-75

trap control templates 11-73

trap receiver template 11-73

traps

AAA 11-75

access point 11-75

client related 11-74

RF profile 11-75

RF update 11-75

unsupported 14-70

WPS 11-75

traps added in 2.1 14-35

traps added in 2.2 14-39

traps added in 3.0 14-42

traps added in 3.1 14-44

traps added in 3.2 14-47

traps added in 4.0 14-48

traps added in 4.0.96.0 14-53

traps added in 4.1 14-55, 14-62

trend report type 15-1

troubleshooting A-1

troubleshooting voice RF coverage 5-22

trusted AP policies

template for 11-44

trusted AP policies template 11-44

tunneling 8-5

turning password rules on or off 16-17

Tx channel report 15-18

TX neighbor requests 6-53

TX neighbor responses 6-53

Tx power level report 15-18

U

UDI

retrieving on controllers and access points 6-64

unadjusted link metric 6-42

unclassified rogue 11-45

understanding virtual domains 7-24, 17-8

uninstalling WCS

on Linux 12-14

on Windows 12-14

unique client report 15-11

unique device identifier 6-64

unknown association requests 6-55

unknown reassociation request 6-55

unknown reauthentication request 6-55

Update map view 6-58

update map view 6-58

updating system software 4-4

upgrading the network 12-20

upgrading to Linux 4

during WLSE conversion C-3

upgrading WCS

on Linux 12-19

on Windows 12-19

Uploading IDS signatures 3-11

uploading IDS signatures 3-11

upstream delay 11-8

upstream packet loss rate 11-9

User accounts

for guest 7-11

user accounts

for guest 7-11

user authentication order

managing 10-5

user authentication priority template

configuring 11-79

user credential retrieval priority 11-35

user details

emailing 7-19

printing 7-19

user groups 7-2

User Interface 2-22

user login policies

configuring a template 11-38

user preferences 16-35

using chokepoints 5-33

to enhance tag location reporting 5-33

using edit view 14-5

using filtering 6-57

using maps

to monitor mesh AP neighbors 6-45

to monitor mesh link statistics 6-40

using maps to monitor mesh networks 6-40

using planning mode 5-13

using search 14-6

using switch port tracing 10-27

using template

ACL 11-42

for friendly access point 11-48

using templates 11-1

802.11a policy name 11-57

802.11b/g RRM interval 11-68, 11-70

802.11b/g RRM threshold 11-66

802.11b/g voice 11-62

access point/radio 11-81

access point authentication & MFP 11-51

access point authorization 11-40

file encryption 11-23

for legacy syslog 11-76

for multiple syslog 11-77

guest users 11-37

local management user 11-78, 11-79

local net users 11-35

MAC filter 11-39

NTP server 11-3

QoS 11-6

RADIUS accounting 11-27

RADIUS authentication 11-24

syslog 11-76, 11-77

Telnet SSH 11-75

traffic stream metrics QoS 11-8

trap control 11-73

trap receiver 11-73

web authentication 11-52

WLAN 11-9

using testpoints

to analyze element location accuracy 5-63

using the installer to upgrade 12-15

utilization report

for controllers 15-18

V

V5 Client Statistics Report 15-11

V5 client statistics report 15-11

vendor CA certificates

downloading 4-5

vendor device certificates

downloading 4-5

video parameter template

configuring 11-63

video parameter templates

configuring 11-63

view audit reports 10-5

View Filters icon 5-44, 5-50, 5-51, 5-52

viewing access point reports 15-8

viewing all current templates 10-17

viewing an AP template task history 11-86

viewing AP status report

for scheduled task 11-85

viewing audit reports 15-9

viewing audit status 10-5

for access points 9-16

viewing autonomous access points 9-5

viewing client reports 15-11

viewing clients

identified as WGBs 6-62

viewing controller status report

for the scheduled task 11-87

viewing DHCP statistics 6-70

viewing Google Earth maps 6-59, 18-6

viewing guest users 7-16

Viewing IDS signature events 3-16

viewing IDS signature events 3-16

viewing inventory reports 15-15

viewing mesh reports 15-16

Viewing Mesh tree 6-48

viewing mesh tree 6-51

viewing MFP events 14-4

viewing performance reports 15-18

view in grid 2-21

viewing security reports 15-20

Viewing shunned clients 3-8

viewing shunned clients 3-8

viewing the audit trail 7-9

viewing the RRM dashboard 6-73

virtual domain

managing 17-6

virtual domain hierarchy 17-3

virtual domains 17-1

assigning 7-22

attributes 7-23, 17-7

creating 17-1

hierarchy 17-3

managing 17-6

understanding 7-24, 17-8

voice parameter template

configuring 11-62

voice RF coverage

troubleshooting 5-22

voice statistics report 15-18

voice traffic 5-19

VoWLAN readiness

inspecting 5-22

W

WCS

checking status

on Linux 12-2

on Windows 12-1

installing 2-4

maintaining12-1to 12-19

overview 1-2

servers supported 1-2

starting

on Linux 2-14

on Windows 2-13

stopping

on Linux 12-3

on Windows 12-2

uninstalling

on Linux 12-14

on Windows 12-14

upgrading

on Linux 12-19

on Windows 12-19

versions1-3to 1-5

WCS_EMAIL_FAILURE 14-64

WCS-ADV-SI-SE-10 B-2

WCS Base, described 1-3, 1-5

WCS controller deployment

from WLSE autonomous C-1

WCS database

adding chokepoints 5-34

adding controllers 4-1

adding location appliances 4-2

backing up

on Linux 12-5

on Windows 12-4

removing chokepoints 5-41

restoring

on Linux 12-7

on Windows 12-5

scheduling automatic backups 12-3, 16-1

WCS home 2-14

WCS Home page

customizing content 2-20

customizing tabs 2-19

WCS licenses B-1

WCS Location

described1-4to 1-5

relationship with Cisco location appliances 1-4

WCS Navigator 1-7

WCS on WLSE

licensing C-7

WCS password

recovering 12-20

WCS user accounts

adding 7-1

changing passwords 7-4

deleting 7-4

WCS user interface 7-14

described 1-2, 1-6

logging into2-14to 2-16

WCS values

restoring 10-6

web authentication template 11-52

Web authentication types 3-17

web auth security A-2

web auth types 10-27

web login

enabling 3-16

Wellenreiter signature 3-10

WGB 9-6

WGBs

viewing those clients 6-62

wired guest access

configuring 10-23

Wireless Control System (WCS)

See WCS

WLANs

web auth security A-2

WLAN templates 11-9

WLSE autonomous deployment conversion C-1

WLSE management stations C-2

WLSE map data

exporting 5-54

importing 5-54

WLSE upgrade B-2

WLSE upgrade license C-7

WMM policy 11-18

work group bridge mode 9-6

worst node hop count 2-19

worst node hops

for mesh 15-16

worst packet error rate 2-19

worst SNR link 2-19

worst SNR links

for mesh 15-16

WPS traps 11-75