|
Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -
Index
Numerics
2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8
802.1x authentication 4-13
A
AAA
server group 4-25
aaa authentication login command 4-24
aaa authorization command 4-27
aaa new-model command 4-22, 4-25
abbreviating commands A-4
access point
security settings, matching client devices 8-24
WDS 9-1
accounting
with RADIUS 4-28
accounting command 5-2
administrator access 4-21
Advanced Encryption Standard (AES) 1-7
AES-CCMP 8-1
Aironet 802.11 extensions 4-40
Aironet Client Utility (ACU) 17-3
antenna gains B-4
antennas 3-13
ARPANET 4-1
attributes, RADIUS
vendor-proprietary 4-30
vendor-specific 4-29
authentication
local mode with AAA 4-38
MAC address 8-5
NTP associations 4-47
RADIUS
key 4-22
login 4-24
server configuration for fast secure roaming 9-5
TACACS+
defined 4-32
key 4-34
authentication network-eap command 9-10
authentication types
CCKM key management 8-5
EAP-FAST 8-4
EAP-TLS 8-4
EAP-TTLS 8-5
MAC address 8-5
matching on root devices and non-root bridges 8-24
Network-EAP 8-3
open 8-1
shared key 8-2
using WPA key management 8-6
authorization
with RADIUS 4-27
autoinstall 5-2
B
banner login command 4-5
banner motd command 4-4
banners
configuring
login 4-5
message-of-the-day login 4-4
default configuration 4-3
when displayed 4-3
basic data rate 3-1
basic settings
checking 17-2
beacon period command 3-18
blocking communication between clients 3-16
bootloader 17-7
BOOTP 4-2
BR350 interoperability 6-2
bridge-group command 3-17, 6-9
Bridge Group Virtual Interface (BVI) 2-3
bridge interoperability 6-2
bridge protocol data unit (BPDU) 6-1
BSSIDs 5-3
C
carrier busy test 3-21
CCKM 8-5
CDMA 1-1
CDP
disabling for routing device 13-4
enabling and disabling 13-4
monitoring 13-5
Centralized Key Management (CCKM) 8-1
certificates
configuring 8-6
channel
channel command 3-7
channel settings 3-6
cipher suites
enabling 8-5
with WPA 8-8
Cisco Centralized Key Management
See CCKM
Cisco Centralized Key Management (CCKM) 1-7
Cisco IOS image release 1-8
Cisco IOS image upload A-9
Cisco TAC 17-1
CiscoWorks 2000 14-4
CKIP 1-7
CKIP (Cisco Key Integrity Protocol) 8-2
CLI
abbreviating commands A-4
command modes A-2
editing features
enabling and disabling A-6
keystroke editing A-7
wrapped lines A-8
error messages A-4
filtering command output A-9
getting help A-3
history
changing the buffer size A-5
described A-5
disabling A-6
recalling commands A-5
no and default forms of commands A-4
client communication, blocking 3-16
clock
See system clock
clock set command 4-44
clock timezone command 4-45
CMIC (Cisco Message Integrity Check)
See CMIC
command-line interface
See CLI
command modes A-2
commands
aaa authentication login 4-24
aaa authorization 4-27
abbreviating A-4
accounting 5-2
authentication network-eap 9-10
banner login 4-5
banner motd 4-4
beacon period 3-18
cdp enable 13-4
cdp holdtime 13-3
cdp timer 13-3
channel 3-7
clear cdp counters 13-5
clear cdp table 13-5
client profile multiple 6-5
clock set 4-44
clock timezone 4-45
concatenation 3-14
del 17-4
distance 3-15
dot11 interface speed 9-11
encapsulation 10-3
encapsulation dot1q 10-4
encryption 6-5
encryption mode cipher 8-1
fragment-threshold 3-19
hostname 4-1
infrastructure-client 3-16
infrastructure SSID 5-2
interface dot11radio 6-1
interface dot11radio0 10-3
interface fastEthernet0.x 10-4
ip domain-lookup 4-3
ip domain-name 4-2
ip name-server 4-2
login authentication 4-25
no and default A-4
ntp authenticate 4-47
ntp peer 4-49
packet retries 3-19
parent 3-20
parent timeout 3-20
payload-encapsulation 3-14
prompt 4-1
radius-server host 4-23
rts 3-18
rts retries 3-18
set 17-6
set BOOT 17-6
setting privilege levels 4-10
show cdp 13-5
show cdp entry 13-5
show cdp interface 13-5
show cdp neighbors 13-5
show cdp traffic 13-5
show controller dot11radio 3-4
show dot11 carrier busy 3-21
ssid 6-1
tftp_init 17-5
vlan 5-2
community strings
configuring 14-5
overview 14-4
concatenation command 3-14
configuration files
creating using a text editor 15-9
deleting a stored configuration 15-18
downloading
reasons for 15-8
using FTP 15-12
using RCP 15-16
using TFTP 15-10
guidelines for creating and using 15-8
invalid combinations when copying 15-4
types and location 15-9
uploading
reasons for 15-8
using FTP 15-14
using RCP 15-17
using TFTP 15-11
connections, secure remote 4-39
console cable 2-1
console port
cable 2-2
cryptographic message integrity 8-2
crypto pki CLI 8-6
crypto software image 4-39
D
data rate
basic 3-1
setting 3-1
throughput 3-2
date
See NTP and system clock
daylight saving time 4-46
default
commands A-4
configuration, resetting 17-3
default configuration
banners 4-3
DNS 4-2
NTP 4-47
password and privilege level 4-6
SNMP 14-5
system message logging 16-3
TACACS+ 4-33
del command 17-4
Delivery Traffic Indication Message (DTIM) 5-3
directories
changing 15-3
creating and removing 15-4
displaying the working 15-3
distance command 3-15
distance setting 3-15
DNS
default configuration 4-2
display configuration 4-3
overview 4-2
setting up 4-2
domain names
DNS 4-2
Domain Name System
See DNS
dot11 interface speed command 9-11
downloading
configuration files
reasons for 15-8
using FTP 15-12
using RCP 15-16
using TFTP 15-10
image files
deleting old image 15-21
reasons for 15-18
using FTP 15-23
using RCP 15-29
using TFTP 15-20
E
editing features
enabling and disabling A-6
keystrokes used A-7
wrapped lines A-8
EIRP B-4
enable password 4-7
enable secret password 4-7
encrypted software image 4-39
encryption for passwords 4-7
encryption mode cipher command 8-1
Enhanced Distributed Channel Access (EDCA) 1-7
error messages
during command entry A-4
setting the display destination device 16-5
severity levels 16-7
system message format 16-2
Ethernet encapsulation 3-14
Ethernet indicator 17-1
Ethertype protocols
protocols
Ethertype C-2
Express Security page 2-4
Extensible Authentication Protocol
See EAP
extensions, Aironet 4-40
F
Fast Ethernet Switch mobile interface card (FESMIC) 2-1
fast secure roaming
and WDS 9-4
authentication server 9-5
features 1-7
files
copying 15-4
deleting 15-5
displaying the contents of 15-7
tar
creating 15-5
displaying the contents of 15-6
extracting 15-7
image file format 15-19
file system
displaying available file systems 15-1
displaying file information 15-3
local file system names 15-1
network file system names 15-4
setting the default 15-3
filtering
show and more command output A-9
filters
configuring using CLI 12-2
protocol C-1
Flash device 15-1
forward-delay time 6-6
fragmentation threshold 3-19
fragment-threshold command 3-19
frequencies B-2
FTP
accessing MIB files D-2
configuration files
downloading 15-12
overview 15-11
preparing the server 15-12
uploading 15-14
image files
deleting old image 15-26
downloading 15-23
preparing the server 15-22
uploading 15-26
G
get-bulk-request operation 14-2
get-next-request operation 14-2, 14-4
get-request operation 14-2, 14-4
get-response operation 14-2
global configuration mode A-3
GPRS 1-4
group key updates 8-22
H
help, for the command line A-3
history
changing the buffer size A-5
described A-5
disabling A-6
recalling commands A-5
history table, level and number of syslog messages 16-8
host name, ARPANET rules 4-1
hostname command 4-1
I
image, operating system 17-5
indicators 17-1
infrastructure-client command 3-16
infrastructure SSID command 5-2
inter-client communication, blocking 3-16
interface configuration mode A-3
Interior Gateway Protocol (IGP) 1-4
IP address 2-3
release and renew 2-1
ip domain-lookup command 4-3
ip domain-name command 4-2
ip name-server command 4-2
IP port protocols C-4
IP protocols
protocols
IP C-3
ISO designators for protocols C-1
K
KCK GL-4
KEK GL-4
key features 1-7
key management types 8-8
L
LEAP
setting on client and access point 8-24
LED indicators
Ethernet 17-1
radio traffic 17-1
status 17-1
Load balancing 4-40
login authentication
with RADIUS 4-24
login authentication command 4-25
login banners 4-3
log messages
See system message logging
M
MAC address
authentication 8-5
troubleshooting 17-3
management options
CLI A-1
memory
Flash 15-1
Message Authentication Code GL-5
Message Integrity Check
See MIC
Message Integrity Code (MIC), definition GL-5
message-of-the-day (MOTD) 4-3
messages
to users through banners 4-3
method list 4-21
MIBs
accessing files with FTP D-2
location of files D-2
overview 14-1
SNMP interaction with 14-4
MoIP tunnel 1-5
monitoring, CDP 13-5
multicast 3-15
multiple basic SSIDs (multiple BSSIDs)
description 5-3
requirements and guidelines 5-3
multiple client profiles
description 6-1
N
name-to-address translation 4-3
Network-EAP 8-3
Network Time Protocol
See NTP
no commands A-4
non-root bridge
infrastructure SSID 5-2
NTP
associations
authenticating 4-47
enabling broadcast messages 4-50
peer 4-49
server 4-49
default configuration 4-47
displaying the configuration 4-54
overview 4-41
restricting access
creating an access group 4-52
disabling NTP services per interface 4-53
source IP address, configuring 4-54
stratum 4-41
synchronizing devices 4-49
time
synchronizing 4-41
ntp authenticate command 4-47
ntp peer command 4-49
O
OFDM 1-8
P
packet retries command 3-19
pairwise GL-5
Pairwise Master Key (PMK) GL-5
parent command 3-20
parent timeout command 3-20
password reset 17-3
passwords
default configuration 4-6
encrypting 4-7
setting
enable 4-6
enable secret 4-7
with usernames 4-9
payload-encapsulation command 3-14
per-VLAN Spanning Tree (PVST) 6-2
ports, protected 3-17
power level, maximum B-4
preamble 3-12
preferential treatment of traffic
See QoS
pre-shared key 8-22
primary intersection 1-3
privileged EXEC mode A-2
privilege levels
exiting 4-11
logging into 4-11
setting a command with 4-10
prompt command 4-1
protocols
IP port C-4
public key infrastructure
See PKI
Public Secure Packet Forwarding 3-16
Q
QoS
configuration guidelines 11-4
impact on wireless LAN 11-2
overview 11-1
precedence 11-2
quality of service
See QoS
R
radio
configuring channel settings 3-6
configuring transmit power 3-5
distance setting 3-15
indicator 17-1
radio frequency data rates 3-8, 3-10
radio management 9-1
RADIUS
administrator access 4-21
attributes
vendor-proprietary 4-30
vendor-specific 4-29
configuring
accounting 4-28
authentication 4-24
authorization 4-27
communication, global 4-22, 4-28
communication, per-server 4-21, 4-22
multiple UDP ports 4-22
default configuration 4-21
defining AAA server groups 4-25
displaying the configuration 4-31
identifying the server 4-21
limiting the services to the user 4-27
method list 4-21
operation of 4-20
overview 4-19
SSID 5-2
suggested network environments 4-19
tracking services accessed by user 4-28
radius-server host command 4-23
range 3-2
rate limit, logging 16-9
RCP
configuration files
downloading 15-16
overview 15-14
preparing the server 15-15
uploading 15-17
image files
deleting old image 15-30
downloading 15-29
preparing the server 15-27
uploading 15-31
regulatory domains B-2
release and renew the IP address 2-1
reloading access point image 17-5
Remote Authentication Dial-In User Service
See RADIUS
Remote Copy Protocol
See RCP
request to send (RTS) 3-18
restricting access
NTP services 4-52
passwords and privilege levels 4-5
TACACS+ 4-32
RFC
1157, SNMPv1 14-2
1305, NTP 4-41
1901, SNMPv2C 14-2
1902 to 1907, SNMPv2 14-2
roaming, fast secure roaming using CCKM 9-2
root port 6-1
rts command 3-18
rts retries command 3-18
S
secondary intersection 1-3
secure remote connections 4-39
Secure Shell
See SSH
Secure Shell (SSH)
See SSH
security 2-4
protocol 4-21
root device and non-root bridge settings 8-24
synchronizing 8-24
troubleshooting 17-3
security settings, Express Security page 2-4
self-healing wireless LAN 9-4
sequence numbers in log messages 16-6
server group
AAA 4-25
set BOOT command 17-6
set command 17-6
set-request operation 14-4
severity levels, defining in system messages 16-7
shared-key authentication 8-2
show controller dot11radio command 3-4
show dot11 carrier busy command 3-21
show vlan 10-6
Simple Network Management Protocol
See SNMP
SNMP
accessing MIB variables with 14-4
agent
described 14-3
disabling 14-5
community strings
configuring 14-5
overview 14-4
configuration examples 14-9
default configuration 14-5
limiting system log messages to NMS 16-8
manager functions 14-2
MIBs, location of D-2
snmp-server view 14-9
status, displaying 14-10
system contact and location 14-9
trap manager, configuring 14-8
traps
described 14-2
enabling 14-7
types of 14-7
versions supported 14-2
software images
delete from Flash 17-5
location in Flash 15-18
tar file format, described 15-19
spanning-tree
root port 6-1
Spanning Tree Protocol (STP) 6-1
SSH
crypto software image 4-39
described 4-39
description 2-2
displaying settings 4-40
SSH Communications Security, Ltd. 2-2
SSID
2.4-GHz radio 5-2
configuring 5-2
default (tsunami) 17-2
default configuration 5-2
disable 5-2
infrastructure SSID 5-2
RADIUS 5-2
troubleshooting 17-2
understanding 5-1
without VLANs 4-11
static WEP 4-11
with open authentication, setting on client and access point 8-24
with shared key authentication, setting on client and access point 8-24
statistics
CDP 13-5
SNMP input and output 14-10
status indicators 17-1
STP
BPDU message exchange 6-2
designated port, defined 6-3
designated switch, defined 6-3
displaying status 6-14
inferior BPDU 6-3
interface states
blocking 6-6
disabled 6-7
learning 6-7
listening 6-7
overview 6-5
overview 6-1
root port, defined 6-3
timers, described 6-4
stratum, NTP 4-41
summer time 4-46
switchport protected command 3-17
syslog
See system message logging
system clock 4-41
configuring
daylight saving time 4-46
manually 4-44
summer time 4-46
time zones 4-45
displaying the time and date 4-44
overview 4-41
See also NTP
system message logging
default configuration 16-3
defining error message severity levels 16-7
disabling 16-4
displaying the configuration 16-11
enabling 16-4
facility keywords, described 16-11
level keywords, described 16-8
limiting messages 16-8
message format 16-2
overview 16-1
rate limit 16-9
sequence numbers, enabling and disabling 16-6
setting the display destination device 16-5
timestamps, enabling and disabling 16-6
UNIX syslog servers
configuring the daemon 16-10
configuring the logging facility 16-10
facilities supported 16-11
system name 4-1
manual configuration 4-1
T
TAC 17-1
TACACS+
accounting, defined 4-32
authentication, defined 4-32
authorization, defined 4-32
configuring
accounting 4-37
authentication key 4-34
authorization 4-36
login authentication 4-34, 4-35
default configuration 4-33
displaying the configuration 4-38
identifying the server 4-34
limiting the services to the user 4-36
operation of 4-33
overview 4-32
tracking services accessed by user 4-37
tar files
creating 15-5
displaying the contents of 15-6
extracting 15-7
image file format 15-19
Temporal Key Integrity Protocol (TKIP) 8-1
Terminal Access Controller Access Control System Plus
See TACACS+
TFTP 17-5
configuration files
downloading 15-10
preparing the server 15-10
uploading 15-11
image files
deleting 15-21
downloading 15-20
preparing the server 15-19
uploading 15-22
tftp_init command 17-5
TFTP server
Cisco IOS image upload A-9
time
See NTP and system clock 4-41
timestamps in log messages 16-6
time zones 4-45
TKIP 4-40
transmit and receive antennas
configuring 3-13
transmit power 3-5
transmit speed 3-1
traps
configuring managers 14-7
defined 14-2
enabling 14-7
notification types 14-7
troubleshooting 17-1
with CiscoWorks 14-4
with system message logging 16-1
tunnel 1-5
U
universal workgroup bridge
and multiple client profiles 6-1
UNIX syslog servers
daemon configuration 16-10
facilities supported 16-11
message logging configuration 16-10
upgrading software images
See downloading
uploading
configuration files
reasons for 15-8
using FTP 15-14
using RCP 15-17
using TFTP 15-11
image files
reasons for 15-18
using FTP 15-26
using RCP 15-31
using TFTP 15-22
user EXEC mode A-2
username-based authentication 4-9
V
VLAN
and bridges 10-2
configuring 10-3
overview 10-1
with wireless bridges 10-3
vlan command 5-2
W
WDS
access point 9-1
and fast secure roaming 9-4
and WMIC 9-1
CLI commands 9-9
guidelines and requirements 9-4
web site
Cisco Software Center 17-7
WEP
configuring key 8-2
described 8-2
key example 8-5
key restrictions 8-4
keys 17-3
troubleshooting 17-3
with EAP 8-3
Wi-Fi Multimedia
See WMM
Wi-Fi Protected Access
See WPA
Wi-Fi Protected Access (WPA) 4-13
Wired Equivalent Privacy
See WEP
wireless bridges 10-3
Wireless Domain Services
See WDS
WMIC
and WDS 9-1
Cisco IOS image upload procedure A-9
multiple client profiles 6-3, 6-5
workgroup bridge
infrastructure SSID 5-2
world mode
802.11d standard 3-11
Cisco legacy 3-11
enabling and disabling 3-11
WPA 4-11
cipher suite 8-1
description 8-6
key management 8-6
WPA2 1-7
Posted: Wed Feb 13 23:24:25 PST 2008
All contents are Copyright © 1992--2008 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.