|
Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -
Index
Numerics
7920 support mode 5-8
802.11 bands, enabling and disabling 4-6
802.1X dynamic key settings 5-4
802.3x flow control 4-10
A
access point LEDs F-1
administrator access 4-7
AP-Manager interface 7-3
auto anchoring 5-9
autonomous access points 1-38
auto RF 4-5
B
buildings 9-5
C
CAC 5-8
campus maps 9-4
client location 1-10
clients, locating 9-16
configurations, saving 6-4
configuration wizard 4-2
console port settings 4-10
controller, adding to WCS 9-2
controller discovery using DNS 1-38
country code, configuring 4-5
coverage holes, monitoring 9-13
customize Web Auth 3-19
D
declarations of conformity B-1
default settings, resetting to 4-3
default username 4-3
DFS 1-16
DHCP 3-15
DHCP server, assigning WLAN to 5-3
Diffie-Hellman 5-7
disable web-based management 2-4
DNS for controller discovery 1-38
DTPC 4-10
dynamic WEP 5-4
E
error messages F-1
F
FCC Declaration of Conformity B-2
firewall for WCS 3-11
floor plans 9-7
flow control 4-10
G
guest mode 5-9
GUI 2-1
H
heat maps 9-10
help 2-4
I
Identity Networking 3-24
IKE authentication 5-6
interfaces, configuring 7-1
IPSec, enabling 5-6
IPSec passthrough 5-7
K
known-external 9-15
known-internal 9-15
L
Layer 2 security, configuring 5-4
Layer 2 to Layer 3 mode, converting 3-5
Layer 3 security, configuring 5-6
LED patterns, access points F-1
Local Netuser 5-8
locating rogue access points 9-14
long preambles 3-11
M
MAC filtering, configuring on WLANs 5-3
map editor 9-8
maps 9-4
mobility groups, configuring 4-8
MODE button 1-42
N
NTP 4-5
O
operator-defined interfaces 1-24
outdoor areas 9-6
P
ports, configuring 7-1
preambles, long 3-11
predicted coverage 9-11
Q
QBSS, configuring 5-8
QoS, configuring 5-8
R
Radio Resource Management, configuring 4-9
RADIUS settings 4-7
RADIUS settings, configuring 4-9
regulatory information B-1
reset button 1-42
resetting a controller 6-5
RF calibration model, creating 9-3
RF exposure B-5
rogue access points, solutions for 3-3
RRM 4-5
S
safety warnings A-1
secure web mode 7-5
security solutions 3-2
serial port
baudrate setting 4-10
timeout 4-10
service port, configuring 4-9
SNMP settings 4-7
snmp traps 4-8
Spanning Tree Protocol 7-5
SpectraLink NetLink phones 3-11
SSL 2-2
startup wizard 4-2
STP 7-5
system logging 4-10
system logging, enabling 4-10
system messages F-1
T
time and date settings 4-5
timeout, disabled clients 5-4
tunnel attributes 3-27
U
user accounts, deleting 9-25
username, default 4-3
V
virtual interface 7-4
VLANs 7-3
VLANs, assigning WLANs to 5-4
W
warnings A-1
WCS firewall 3-11
WCS statistics 9-19
Web Authentication 3-16
Web authentication login screen 3-16
WEP keys 5-5
wizard, startup 4-2
WLANs, configuring 5-1
WMM 5-8
world mode 4-10
WPA 5-5
Posted: Thu Sep 15 09:03:26 PDT 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.