|
Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -
Numerics
802.11b/g RRM interval template 10-62, 10-64
802.11b/g RRM threshold template 10-61
802.11b/g voice template 10-57
802.11h template
802.3 bridging
A
access control list templates 10-51
access point authentication and MFP templates 10-46
access point authorization template 10-39
access point inventory report 14-9
access point load
access point positions
changing with import or export of file 5-30
access point security statistics
access point templates
access point/radio templates 10-76
access points
configuring for hybrid REAP 12-9
accessing the schedule panel 14-3
ACS server
active interferer count per channel 9-26
active interferers count chart 9-26
active sessions
adding a migration template 9-17
adding access point templates 10-75
adding autonomous access points
adding controllers from config group 8-17
adding guest user account 7-15
adding templates from config group 8-18
adding WCS as TACACS+ server 15-5
adding WCS to a non-Cisco ACS server 15-13
adding WCS to ACS server 15-4
adding WCS usergroups
Advanced Options 5-15
Advanced tab
alarm severity
alternate parent
analyzing element location accuracy 5-57
AP list by location report 14-4
applying calibration models 5-54
applying controller templates 10-74
association request failures 6-38
association request success 6-38
association request timeouts 6-38
audit status
viewing for access points 9-22
audit trail
enabling for guest user activities 7-11
authentication order
authentication process
authentication request failures 6-38
authentication request success 6-38
authentication request timeout 6-38
automatic backups, scheduling 11-4, 15-2
automatic client exclusion 10-20
autonomous access points
autonomous to LWAPP migration support 9-14
auto-synchronizing location appliances 11-10
avoid foreign AP interference 10-54
B
backing up location appliance data 11-12
backing up the WCS database
backup and restore license B-6
bandwidth
bridging link information 6-41
buildings
C
CAC
calculating access point requirements 5-13
calibration models, applying 5-54
campus map, adding to WCS database 5-2
certificate signing request 3-20
changing access point positions 5-30
by importing or exporting a file 5-30
channels
monitoring on a floor map 5-47
using to enhance tag location 5-31
Cisco AP load
Cisco Unified Wireless Network Solution 5-57
Cisco Wireless LAN Solution
client alarms
client association report 14-7
client authentication provision 10-33
client devices
client reports
client security component 2-19
client tab
clients
monitoring on a floor map 5-49
clients detected by location server 2-19
combined inventory report 14-9
config group
downloading IDS signatures 8-21
downloading sw to controllers 8-20
config groups
downloading customized webauth 8-22
configuring an 802.11h template 10-63
configuring 802.3 bridging 9-12
configuring access control lists 10-51
configuring an access point 9-12, 9-18, 10-39
configuring an access point for hybrid REAP 12-9
configuring an ACL template 10-40
configuring alarm severity 13-57
configuring a client exclusion policy template 10-44
configuring the controller for hybrid REAP 12-6
configuring a CPU ACL template 10-41
configuring an EAP-FAST template 10-32
configuring EDCA parameters
for individual controllers 9-13
configuring firewall for WCS 3-6
configuring general templates 10-4
configuring global email parameters 15-22
configuring high density templates 10-55
configuring a high throughput template 10-64
configuring H-REAP AP groups 10-21
configuring hybrid REAP access point groups 12-12
configuring IDS signatures 3-10
configuring intrusion detection systems 3-9
configuring a LDAP server template 10-27
configuring a local EAP general template 10-30
configuring a local EAP profile template 10-31
configuring a manually disabled client template 10-40
configuring a mesh template 10-64, 10-65
configuring multiple country codes 8-13
configuring a network access control template 10-29
configuring a policy name template 10-52
configuring radio templates 10-78
configuring RADIUS servers 15-17
configuring a roaming parameters template 10-59
configuring a rogue policies template 10-42
configuring an RRM interval template 10-62
configuring an RRM threshold template 10-61
configuring spectrum experts 9-24
configuring the switch
configuring TACACS+ servers 15-15
configuring a TACACS+ server template 10-28
configuring a TFTP server template 10-68
configuring a trusted AP policies template 10-43
configuring a user authentication priority template 10-74
configuring a user login policies template 10-37
configuring a video parameter template 10-58
configuring a voice parameter template 10-57
configuring wired guest access 9-26
configuring templates
access point authentication and MFP 10-43
access point authorization 10-39
known rogue access point 10-63
traffic stream metrics QoS 10-8
connecting client devices
connecting to the Guest WLAN 3-19
content
controllers
configuring for hybrid REAP 12-6
controller CPU utilization 2-19
controller inventory report 14-9
controller inventory status 2-19
controller memory utilization 2-19
controller templates
controller utilization report 14-12
converting WLSE autonomous to WCS controller C-1
counters report
country codes
monitoring on a floor map 5-48- 5-49
CPU access control list template 10-41
creating a lobby ambassador account 7-12
creating a network configuration audit 14-6
creating a network design 5-24
creating a new access point report 14-5
creating a new client report 14-8
creating a new inventory report 14-9
creating a new mesh report 14-6, 14-11
creating a new performance report 14-12
creating a new security report 14-14
creating calibration models 5-42
creating guest user accounts 7-11
customized Web authentication 3-16
customizing content on WCS Home page 2-18
customizing tabs on WCS Home page 2-17
D
data management tasks
default lobby ambassdor credentials
deleting guest user templates 7-17
deleting WCS user accounts 7-4
detecting a suspicious client 3-9
DHCP server
document
documentation
downloading a customized web authentication 3-16, 8-22, 10-48
downloading IDS signatures 3-11
downloading sw to controllers
after adding config group 8-20
downloading vendor CA certificates 4-5
downloading vendor device certificates 4-4
downstream packet loss rate 10-9
drawing polygon areas
E
EDCA parameters
configuring for individual controllers 9-13
configuring through a template 10-59
editing signature parameters 3-14
editing the default lobby ambassador credentials 7-9
email notification
enabling audit trails
for guest user activities 7-11
end user license agreement B-6
establishing logging options 15-18
exporting a file
to change access point position 5-30
exporting asset information 11-10
F
file encryption template 10-22
filtering
firewall, configuring for WCS 3-6
floor plans
adding to a campus building 5-6- 5-8
adding to a standalone building 5-8- 5-9
foreign access point interference
foreign AP interference
G
general tab
general templates
global settings
for standard and custom signatures 3-14
group setup window on ACS server 15-9
guest user account
guest user details
guest users
Guest WLAN
guidelines for using the map editor 5-9
H
heat map
hierarchy
high throughput template
Home page
H-REAP AP groups
H-REAP groups
Hybrid REAP
hybrid REAP access point groups 12-12
Hybrid REAP local switching 10-19
I
IDS signature attacks
IDS signature events
downloading from config group 8-21
importing a file
to change access point position 5-30
importing asset information 11-10
information elements
inspect location readiness 5-18
installer
installing WCS
interferers
Intrusion Detection Systems 3-9
invalid association request 6-39
invalid reassociation request 6-39
invalid reauthentication request 6-39
IOS access points
adding by device information 9-15
K
KEK
known rogue access point templates 10-67
L
Layer 1 security solutions 3-2
Layer 2 security solutions 3-2
Layer 3 security solutions 3-2
Layer 3 to Layer 2 mode
converting Cisco Wireless LAN Solution 3-5
LDAP server
configuring a template for 10-27
LEAP authentication
license
licensing
on WLSE network management C-3
link aggregation (LAG)
link metric
link stats
link test
lobby ambassador account
lobby ambassador defaults
local EAP general template 10-30
local EAP profile template 10-31
local management user template 10-73, 10-74
local net users template 10-34
local switching
location accuracy
location appliance
location appliance data
location appliance functionality 4-3
location appliance importing 11-8
location appliances
relationship with WCS Location 1-5
location inventory status 2-19
location readiness
location server inventory report 14-9
location server utilization 14-12
logging in
to the WCS user interface 7-13, 2-13- 2-14
logging the lobby ambassador activities 7-19
long preambles
enabling for SpectraLink NetLink phones 4-6
M
MACK
message authenticator code keys 10-24
Maintain Image Aspect Ratio 5-50
malformed neighbor packets 6-37
management frame protection 3-7, 10-46
managing guest user accounts 7-14
managing user authentication order 9-5
manually disabled client
manually disabled clients 2-16
map
map editor
using to draw polygon areas 5-10
map editor, enhancing floor plans 5-9
map view
maps
using to monitor link stats 6-26
using to monitor mesh AP neighbors 6-31
mesh access point neighbors
mesh access points
mesh alarms
mesh networks
mesh packet error statistics 14-10
mesh parent-child hierarchical view 5-42
mesh security statistics
mesh statistics
mesh tab
mesh template
mesh tree
message integrity check information element 10-46
metrics
MFP alarms
MFP events
MFP signature generation 10-21
mobility groups
modifying a migration template 9-17
modifying access point reports 14-4
modifying client reports 14-6, 14-7
modifying inventory reports 14-9
modifying performance reports 14-12
modifying security reports 14-14
monitoring active sessions 7-5
monitoring channels
monitoring clients
monitoring coverage holes
monitoring mesh access point neighbors 6-31
monitoring mesh health 6-28, 6-33
monitoring mesh link statistics
monitoring mesh networks
monitoring outdoor areas 5-42, 5-50
monitoring predicted coverage 5-40
monitoring spectrum experts 9-25
monitoring transmit power levels 5-42
most recent client alarms 2-15
most recent security alarms 2-16
multiple country codes
N
network access control
new rogue AP count report 14-13
node hop count
noise
non-Cisco ACS server
O
optimizing the controller for high density 9-9
organization of document xviii
organizationally unique identifier 6-19
outdoor areas
adding to a campus map 5-4- 5-5
overview
Cisco Wireless LAN Solution 1-2
P
packet error rate
packet error rate link color 6-42
packet error statistics
packet statistics
password rules
performing data management tasks 15-19
pinging network devices from a controller 6-26
placement of access points 5-21
to calculate access point requirements 5-13
policy name template
polygon areas
predicted coverage, monitoring 5-40
predictive tool
Q
silver, gold, platinum, bronze, management 6-38
R
radio measurements
radio receiver sensitivity 6-19
radio resource management 10-54
radio templates
radio utilization report 14-12
RADIUS accounting template 10-26
RADIUS authentication template 10-24
RADIUS servers
reassociation request failures 6-39
reassociation request success 6-39
reassociation request timeouts 6-39
reauthentication request failures 6-39
reauthentication request success 6-39
reauthentication request timeout 6-39
receiving radio measurements 6-24
recent coverage holes 2-15, 2-19
recovering the WCS password 11-20
removing controllers from config group 8-17
removing templates from config group 8-18
report
location server inventory 14-9
location server utilization 14-12
Tx power level and channel 14-12
reports 14-4
mesh packet error statistics 14-10
restoring WCS database on Linux 11-7
RF calibration model, creating 4-7
roaming parameters template
rogue access point templates 10-67
rogue access points
detecting and locating 6-3- 6-4
rogue adhoc detail summary 2-19
rogue adhocs
rogue adhocs event report 14-13
rogue policies
RRM interval template
RRM threshold template
S
schedule panel
scheduling guest user account 7-18
search filters for alarms 13-4
security alarms
security statistics
security tab
sensors
servers
synchronizing WCS and location servers 11-9
setting lobby ambassodor defaults 7-8
setting multiple country codes 9-3
signature attacks summary 2-16
skull-and-crossbones indicator 6-4
SNMPv3
SNR link
downloading config groups to controllers 8-20
SpectraLink NetLink phones, enabling long preambles 4-6
spectrum expert
starting WCS
status report
stopping WCS
supported Cisco WLSE management stations C-2
switch
configuring for hybrid REAP 12-4
symmetric mobility tunneling 10-5
T
TACACS+ server
configuring a template for 10-28
tasks
template for configuring network user credentials 10-34
templates
TFTP server template
total APs not assigned to maps 2-15
traffic indicator message 10-53
traffic stream metrics QoS status 10-8
traffic stream metrics QoS template 10-8
traffic stream metrics report 14-4, 14-7
transmit power level values 5-48
transmit power levels
monitoring on a floor map 5-47
traps
traps added in 4.1 13-47, 13-54
traps added in 4.2 13-54
troubleshooting voice RF coverage 5-19
trusted AP policies
trusted AP policies template 10-43
turning password rules on or off 15-15
U
UDI
retrieving on controllers and access points 6-46
uninstalling WCS
unknown association requests 6-39
unknown reassociation request 6-40
unknown reauthentication request 6-40
upgrading to Linux 4
upgrading WCS
upstream packet loss rate 10-9
user accounts
user authentication order
user authentication priority template
user credential retrieval priority 10-34
user details
user login policies
to enhance tag location reporting 5-30
using maps
to monitor mesh AP neighbors 6-31
to monitor mesh link statistics 6-26
using maps to monitor mesh networks 6-26
802.11b/g RRM interval 10-62, 10-64
access point authentication & MFP 10-46
access point authorization 10-39
known rogue access point 10-67
local management user 10-73, 10-74
traffic stream metrics QoS 10-8
using testpoints
to analyze element location accuracy 5-57
using the installer to upgrade 11-15
utilization report
V
V5 Client Statistics Report 14-7
vendor device certificates
video parameter template
video parameter templates
View Filters icon 5-41, 5-47, 5-48, 5-49
viewing access point reports 14-4
viewing autonomous access points 9-16
viewing clients
viewing IDS signature attacks 13-60
viewing IDS signature events 3-15
viewing inventory reports 14-9
viewing performance reports 14-12
viewing security reports 14-14
voice parameter template
voice RF coverage
VoWLAN readiness
W
WCS
checking status
starting
stopping
uninstalling
upgrading
WCS controller deployment
WCS database
adding location appliances 4-2
backing up
restoring
scheduling automatic backups 11-4, 15-2
WCS Home page
WCS Location
relationship with Cisco location appliances 1-5
WCS on WLSE
WCS password
WCS user accounts
web authentication template 10-47
web login
WGBs
wired guest access
Wireless Control System (WCS)
wireless LAN event correlation 13-61
WLANs
WLSE autonomous deployment conversion C-1
WLSE map data
worst node hops
worst SNR links 2-17
Posted: Fri Oct 26 01:23:48 PDT 2007
All contents are Copyright © 1992--2007 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.