cc/td/doc/product/access/mar_3200
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

Numerics

2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8

802.11g 3-6, 3-9

802.1x authentication 4-13

A

AAA

server group 4-25

aaa authentication login command 4-24

aaa authorization command 4-27

aaa new-model command 4-22, 4-25

abbreviating commands A-4

access point

security settings, matching client devices 8-24

WDS 9-1

accounting

with RADIUS 4-28

with TACACS+ 4-32, 4-37

accounting command 5-2

administrator access 4-21

Advanced Encryption Standard (AES) 1-7

AES-CCMP 8-1

Aironet 802.11 extensions 4-40

Aironet Client Utility (ACU) 17-3

antenna gains B-4

antennas 3-13

ARPANET 4-1

attributes, RADIUS

vendor-proprietary 4-30

vendor-specific 4-29

authentication

EAP server 4-20, 8-3

local mode with AAA 4-38

MAC address 8-5

NTP associations 4-47

RADIUS

key 4-22

login 4-24

server configuration for fast secure roaming 9-5

TACACS+

defined 4-32

key 4-34

login 4-34, 4-35

authentication network-eap command 9-10

authentication types

CCKM key management 8-5

EAP-FAST 8-4

EAP-TLS 8-4

EAP-TTLS 8-5

MAC address 8-5

matching on root devices and non-root bridges 8-24

Network-EAP 8-3

open 8-1

shared key 8-2

using WPA key management 8-6

authorization

with RADIUS 4-27

with TACACS+ 4-32, 4-36

autoinstall 5-2

B

banner login command 4-5

banner motd command 4-4

banners

configuring

login 4-5

message-of-the-day login 4-4

default configuration 4-3

when displayed 4-3

basic data rate 3-1

basic settings

checking 17-2

beacon period command 3-18

blocking communication between clients 3-16

bootloader 17-7

BOOTP 4-2

BR350 interoperability 6-2

bridge-group command 3-17, 6-9

Bridge Group Virtual Interface (BVI) 2-3

bridge interoperability 6-2

bridge protocol data unit (BPDU) 6-1

BSSIDs 5-3

C

carrier busy test 3-21

CCKM 8-5

CDMA 1-1

CDP

disabling for routing device 13-4

enabling and disabling 13-4

monitoring 13-5

Centralized Key Management (CCKM) 8-1

certificates

configuring 8-6

channel

spacing 3-7, 3-9

channel command 3-7

channel data rates 3-8, 3-10

channel settings 3-6

cipher suites

enabling 8-5

with WPA 8-8

Cisco Centralized Key Management

See CCKM

Cisco Centralized Key Management (CCKM) 1-7

Cisco IOS image release 1-8

Cisco IOS image upload A-9

Cisco TAC 17-1

CiscoWorks 2000 14-4

CKIP 1-7

CKIP (Cisco Key Integrity Protocol) 8-2

CLI

abbreviating commands A-4

command modes A-2

editing features

enabling and disabling A-6

keystroke editing A-7

wrapped lines A-8

error messages A-4

filtering command output A-9

getting help A-3

history

changing the buffer size A-5

described A-5

disabling A-6

recalling commands A-5

no and default forms of commands A-4

client communication, blocking 3-16

clock

See system clock

clock set command 4-44

clock timezone command 4-45

CMIC 1-7, 8-2

CMIC (Cisco Message Integrity Check)

See CMIC

command-line interface

See CLI

command modes A-2

commands

aaa authentication login 4-24

aaa authorization 4-27

aaa new-model 4-22, 4-25

abbreviating A-4

accounting 5-2

authentication network-eap 9-10

banner login 4-5

banner motd 4-4

beacon period 3-18

bridge-group 3-17, 6-9, 10-4

cdp enable 13-4

cdp holdtime 13-3

cdp timer 13-3

channel 3-7

clear cdp counters 13-5

clear cdp table 13-5

client profile multiple 6-5

clock set 4-44

clock timezone 4-45

concatenation 3-14

del 17-4

distance 3-15

dot11 interface speed 9-11

encapsulation 10-3

encapsulation dot1q 10-4

encryption 6-5

encryption mode cipher 8-1

fragment-threshold 3-19

hostname 4-1

infrastructure-client 3-16

infrastructure SSID 5-2

interface dot11radio 6-1

interface dot11radio0 10-3

interface fastEthernet0.x 10-4

ip domain-lookup 4-3

ip domain-name 4-2

ip name-server 4-2

login authentication 4-25

no and default A-4

ntp authenticate 4-47

ntp peer 4-49

packet retries 3-19

parent 3-20

parent timeout 3-20

payload-encapsulation 3-14

power 3-5, 3-8

prompt 4-1

radius-server host 4-23

rts 3-18

rts retries 3-18

set 17-6

set BOOT 17-6

setting privilege levels 4-10

show cdp 13-5

show cdp entry 13-5

show cdp interface 13-5

show cdp neighbors 13-5

show cdp traffic 13-5

show controller dot11radio 3-4

show dot11 carrier busy 3-21

spacing 3-7, 3-9

speed 3-1, 3-3

ssid 6-1

tftp_init 17-5

vlan 5-2

community strings

configuring 14-5

overview 14-4

concatenation 3-18, 3-19

concatenation command 3-14

configuration files

creating using a text editor 15-9

deleting a stored configuration 15-18

downloading

preparing 15-10, 15-12, 15-15

reasons for 15-8

using FTP 15-12

using RCP 15-16

using TFTP 15-10

guidelines for creating and using 15-8

invalid combinations when copying 15-4

types and location 15-9

uploading

preparing 15-10, 15-12, 15-15

reasons for 15-8

using FTP 15-14

using RCP 15-17

using TFTP 15-11

connections, secure remote 4-39

console cable 2-1

console port

cable 2-2

cryptographic message integrity 8-2

crypto pki CLI 8-6

crypto software image 4-39

D

data rate

basic 3-1

setting 3-1

throughput 3-2

data rates 3-8, 3-10

date

See NTP and system clock

daylight saving time 4-46

default

commands A-4

configuration, resetting 17-3

default configuration

banners 4-3

DNS 4-2

NTP 4-47

password and privilege level 4-6

SNMP 14-5

system message logging 16-3

TACACS+ 4-33

del command 17-4

Delivery Traffic Indication Message (DTIM) 5-3

DHCP 2-3, 4-2

directories

changing 15-3

creating and removing 15-4

displaying the working 15-3

distance command 3-15

distance setting 3-15

DNS

default configuration 4-2

display configuration 4-3

overview 4-2

setting up 4-2

domain names

DNS 4-2

Domain Name System

See DNS

dot11 interface speed command 9-11

downloading

configuration files

preparing 15-10, 15-12, 15-15

reasons for 15-8

using FTP 15-12

using RCP 15-16

using TFTP 15-10

image files

deleting old image 15-21

preparing 15-19, 15-22, 15-27

reasons for 15-18

using FTP 15-23

using RCP 15-29

using TFTP 15-20

E

editing features

enabling and disabling A-6

keystrokes used A-7

wrapped lines A-8

EIRP B-4

enable password 4-7

enable secret password 4-7

encrypted software image 4-39

encryption for passwords 4-7

encryption mode cipher command 8-1

Enhanced Distributed Channel Access (EDCA) 1-7

error messages

during command entry A-4

setting the display destination device 16-5

severity levels 16-7

system message format 16-2

Ethernet encapsulation 3-14

Ethernet indicator 17-1

Ethertype protocols

protocols

Ethertype C-2

Express Security page 2-4

Extensible Authentication Protocol

See EAP

extensions, Aironet 4-40

F

Fast Ethernet Switch mobile interface card (FESMIC) 2-1

fast secure roaming

and WDS 9-4

authentication server 9-5

features 1-7

files

copying 15-4

deleting 15-5

displaying the contents of 15-7

tar

creating 15-5

displaying the contents of 15-6

extracting 15-7

image file format 15-19

file system

displaying available file systems 15-1

displaying file information 15-3

local file system names 15-1

network file system names 15-4

setting the default 15-3

filtering

show and more command output A-9

filters

configuring using CLI 12-2

protocol C-1

Flash device 15-1

forward-delay time 6-6

fragmentation threshold 3-19

fragment-threshold command 3-19

frequencies B-2

FTP

accessing MIB files D-2

configuration files

downloading 15-12

overview 15-11

preparing the server 15-12

uploading 15-14

image files

deleting old image 15-26

downloading 15-23

preparing the server 15-22

uploading 15-26

G

get-bulk-request operation 14-2

get-next-request operation 14-2, 14-4

get-request operation 14-2, 14-4

get-response operation 14-2

global configuration mode A-3

GPRS 1-4

group key updates 8-22

H

help, for the command line A-3

history

changing the buffer size A-5

described A-5

disabling A-6

recalling commands A-5

history table, level and number of syslog messages 16-8

host name, ARPANET rules 4-1

hostname command 4-1

I

image, operating system 17-5

indicators 17-1

infrastructure-client command 3-16

infrastructure SSID command 5-2

inter-client communication, blocking 3-16

interface configuration mode A-3

Interior Gateway Protocol (IGP) 1-4

IP address 2-3

release and renew 2-1

ip domain-lookup command 4-3

ip domain-name command 4-2

ip name-server command 4-2

IP port protocols C-4

IP protocols

protocols

IP C-3

ISO designators for protocols C-1

K

KCK GL-4

KEK GL-4

key features 1-7

key management types 8-8

L

LEAP

setting on client and access point 8-24

LED indicators

Ethernet 17-1

radio traffic 17-1

status 17-1

Load balancing 4-40

login authentication

with RADIUS 4-24

with TACACS+ 4-34, 4-35

login authentication command 4-25

login banners 4-3

log messages

See system message logging

M

MAC address

authentication 8-5

troubleshooting 17-3

management options

CLI A-1

memory

Flash 15-1

Message Authentication Code GL-5

Message Integrity Check

See MIC

Message Integrity Code (MIC), definition GL-5

message-of-the-day (MOTD) 4-3

messages

to users through banners 4-3

method list 4-21

MIBs

accessing files with FTP D-2

location of files D-2

overview 14-1

SNMP interaction with 14-4

MIC 4-40, 8-1, 17-3

MoIP tunnel 1-5

monitoring, CDP 13-5

multicast 3-15

multiple basic SSIDs (multiple BSSIDs)

description 5-3

requirements and guidelines 5-3

multiple client profiles

configuring WMIC 6-3, 6-5

description 6-1

N

name-to-address translation 4-3

Network-EAP 8-3

Network Time Protocol

See NTP

no commands A-4

non-root bridge

infrastructure SSID 5-2

NTP

associations

authenticating 4-47

enabling broadcast messages 4-50

peer 4-49

server 4-49

default configuration 4-47

displaying the configuration 4-54

overview 4-41

restricting access

creating an access group 4-52

disabling NTP services per interface 4-53

source IP address, configuring 4-54

stratum 4-41

synchronizing devices 4-49

time

synchronizing 4-41

ntp authenticate command 4-47

ntp peer command 4-49

O

OFDM 1-8

P

packet retries command 3-19

pairwise GL-5

Pairwise Master Key (PMK) GL-5

parent command 3-20

parent timeout command 3-20

password reset 17-3

passwords

default configuration 4-6

encrypting 4-7

setting

enable 4-6

enable secret 4-7

with usernames 4-9

payload-encapsulation command 3-14

per-VLAN Spanning Tree (PVST) 6-2

PKI

ports, protected 3-17

power level, maximum B-4

preamble 3-12

preferential treatment of traffic

See QoS

pre-shared key 8-22

primary intersection 1-3

privileged EXEC mode A-2

privilege levels

exiting 4-11

logging into 4-11

overview 4-5, 4-10

setting a command with 4-10

prompt command 4-1

protocol filters 12-2, C-1

protocols

IP port C-4

public key infrastructure

See PKI

Public Secure Packet Forwarding 3-16

Q

QoS

configuration guidelines 11-4

impact on wireless LAN 11-2

overview 11-1

precedence 11-2

quality of service

See QoS

R

radio

configuring channel settings 3-6

configuring transmit power 3-5

distance setting 3-15

indicator 17-1

radio frequency data rates 3-8, 3-10

radio management 9-1

RADIUS

administrator access 4-21

attributes

vendor-proprietary 4-30

vendor-specific 4-29

configuring

accounting 4-28

authentication 4-24

authorization 4-27

communication, global 4-22, 4-28

communication, per-server 4-21, 4-22

multiple UDP ports 4-22

default configuration 4-21

defining AAA server groups 4-25

displaying the configuration 4-31

identifying the server 4-21

limiting the services to the user 4-27

method list 4-21

operation of 4-20

overview 4-19

SSID 5-2

suggested network environments 4-19

tracking services accessed by user 4-28

radius-server host command 4-23

range 3-2

rate limit, logging 16-9

RCP

configuration files

downloading 15-16

overview 15-14

preparing the server 15-15

uploading 15-17

image files

deleting old image 15-30

downloading 15-29

preparing the server 15-27

uploading 15-31

regulatory domains B-2

release and renew the IP address 2-1

reloading access point image 17-5

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

request to send (RTS) 3-18

restricting access

NTP services 4-52

passwords and privilege levels 4-5

TACACS+ 4-32

RFC

1157, SNMPv1 14-2

1305, NTP 4-41

1901, SNMPv2C 14-2

1902 to 1907, SNMPv2 14-2

roaming, fast secure roaming using CCKM 9-2

root port 6-1

rts command 3-18

rts retries command 3-18

S

secondary intersection 1-3

secure remote connections 4-39

Secure Shell

See SSH

Secure Shell (SSH)

See SSH

security 2-4

protocol 4-21

root device and non-root bridge settings 8-24

synchronizing 8-24

troubleshooting 17-3

security settings, Express Security page 2-4

self-healing wireless LAN 9-4

sequence numbers in log messages 16-6

server group

AAA 4-25

set BOOT command 17-6

set command 17-6

set-request operation 14-4

severity levels, defining in system messages 16-7

shared-key authentication 8-2

show controller dot11radio command 3-4

show dot11 carrier busy command 3-21

show vlan 10-6

Simple Network Management Protocol

See SNMP

SNMP

accessing MIB variables with 14-4

agent

described 14-3

disabling 14-5

community strings

configuring 14-5

overview 14-4

configuration examples 14-9

default configuration 14-5

limiting system log messages to NMS 16-8

manager functions 14-2

MIBs, location of D-2

overview 14-1, 14-4

snmp-server view 14-9

status, displaying 14-10

system contact and location 14-9

trap manager, configuring 14-8

traps

described 14-2

enabling 14-7

overview 14-1, 14-4

types of 14-7

versions supported 14-2

software images

delete from Flash 17-5

location in Flash 15-18

tar file format, described 15-19

spacing command 3-7, 3-9

spanning-tree

root port 6-1

Spanning Tree Protocol (STP) 6-1

speed command 3-1, 3-3

SSH

crypto software image 4-39

described 4-39

description 2-2

displaying settings 4-40

SSH Communications Security, Ltd. 2-2

SSID

2.4-GHz radio 5-2

configuring 5-2

default (tsunami) 17-2

default configuration 5-2

disable 5-2

infrastructure SSID 5-2

RADIUS 5-2

troubleshooting 17-2

understanding 5-1

VLAN 2-4, 4-12, 5-3

without VLANs 4-11

static WEP 4-11

with open authentication, setting on client and access point 8-24

with shared key authentication, setting on client and access point 8-24

statistics

CDP 13-5

SNMP input and output 14-10

status indicators 17-1

STP

BPDU message exchange 6-2

designated port, defined 6-3

designated switch, defined 6-3

displaying status 6-14

inferior BPDU 6-3

interface states

blocking 6-6

disabled 6-7

forwarding 6-6, 6-7

learning 6-7

listening 6-7

overview 6-5

overview 6-1

root port, defined 6-3

timers, described 6-4

stratum, NTP 4-41

summer time 4-46

switchport protected command 3-17

syslog

See system message logging

system clock 4-41

configuring

daylight saving time 4-46

manually 4-44

summer time 4-46

time zones 4-45

displaying the time and date 4-44

overview 4-41

See also NTP

system message logging

default configuration 16-3

defining error message severity levels 16-7

disabling 16-4

displaying the configuration 16-11

enabling 16-4

facility keywords, described 16-11

level keywords, described 16-8

limiting messages 16-8

message format 16-2

overview 16-1

rate limit 16-9

sequence numbers, enabling and disabling 16-6

setting the display destination device 16-5

timestamps, enabling and disabling 16-6

UNIX syslog servers

configuring the daemon 16-10

configuring the logging facility 16-10

facilities supported 16-11

system name 4-1

manual configuration 4-1

T

TAC 17-1

TACACS+

accounting, defined 4-32

authentication, defined 4-32

authorization, defined 4-32

configuring

accounting 4-37

authentication key 4-34

authorization 4-36

login authentication 4-34, 4-35

default configuration 4-33

displaying the configuration 4-38

identifying the server 4-34

limiting the services to the user 4-36

operation of 4-33

overview 4-32

tracking services accessed by user 4-37

tar files

creating 15-5

displaying the contents of 15-6

extracting 15-7

image file format 15-19

Telnet 2-1, 2-2

Temporal Key Integrity Protocol (TKIP) 8-1

Terminal Access Controller Access Control System Plus

See TACACS+

TFTP 17-5

configuration files

downloading 15-10

preparing the server 15-10

uploading 15-11

image files

deleting 15-21

downloading 15-20

preparing the server 15-19

uploading 15-22

tftp_init command 17-5

TFTP server

Cisco IOS image upload A-9

throughput 3-2, 3-7

time

See NTP and system clock 4-41

timestamps in log messages 16-6

time zones 4-45

TKIP 4-40

transmit and receive antennas

configuring 3-13

transmit power 3-5

transmit speed 3-1

traps

configuring managers 14-7

defined 14-2

enabling 14-7

notification types 14-7

overview 14-1, 14-4

troubleshooting 17-1

with CiscoWorks 14-4

with system message logging 16-1

tunnel 1-5

U

universal workgroup bridge

and multiple client profiles 6-1

UNIX syslog servers

daemon configuration 16-10

facilities supported 16-11

message logging configuration 16-10

upgrading software images

See downloading

uploading

configuration files

preparing 15-10, 15-12, 15-15

reasons for 15-8

using FTP 15-14

using RCP 15-17

using TFTP 15-11

image files

preparing 15-19, 15-22, 15-27

reasons for 15-18

using FTP 15-26

using RCP 15-31

using TFTP 15-22

user EXEC mode A-2

username-based authentication 4-9

V

VLAN

and bridges 10-2

configuring 10-3

overview 10-1

SSID 2-4, 4-11, 4-12, 5-3

with wireless bridges 10-3

vlan command 5-2

W

WDS

access point 9-1

and fast secure roaming 9-4

and WMIC 9-1

CLI commands 9-9

guidelines and requirements 9-4

web site

Cisco Software Center 17-7

WEP

configuring key 8-2

described 8-2

key example 8-5

key restrictions 8-4

keys 17-3

troubleshooting 17-3

with EAP 8-3

Wi-Fi Multimedia

See WMM

Wi-Fi Protected Access

See WPA

Wi-Fi Protected Access (WPA) 4-13

Wired Equivalent Privacy

See WEP

wireless bridges 10-3

Wireless Domain Services

See WDS

WMIC

and WDS 9-1

Cisco IOS image upload procedure A-9

multiple client profiles 6-3, 6-5

WMM

workgroup bridge

infrastructure SSID 5-2

world mode

802.11d standard 3-11

Cisco legacy 3-11

enabling and disabling 3-11

WPA 4-11

cipher suite 8-1

description 8-6

key management 8-6

WPA2 1-7


hometocprevnextglossaryfeedbacksearchhelp

Posted: Wed Feb 13 23:24:25 PST 2008
All contents are Copyright © 1992--2008 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.