OneStart

Cisco 2100 Series manuals

2100 Series first page preview

2100 Series

Brand: Cisco | Category: Network Hardware
Table of contents
2100 Series first page preview

2100 Series

Brand: Cisco | Category: Controller
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Preface
  14. Audience
  15. Conventions
  16. Related Publications
  17. Obtaining Documentation
  18. Chapter 1 Overview
  19. Cisco Unified Wireless Network Solution Overview
  20. Single-Controller Deployments
  21. Multiple-Controller Deployments
  22. Operating System Software
  23. Layer 2 and Layer 3 LWAPP Operation
  24. Primary, Secondary, and Tertiary Controllers
  25. Controller Platforms
  26. Cisco 4400 Series Controllers
  27. Cisco 28/37/38xx Series Integrated Services Router
  28. Cisco UWN Solution WLANs
  29. Enhanced Integration with Cisco Secure ACS
  30. File Transfers
  31. Startup Wizard
  32. Cisco Wireless LAN Controller Memory
  33. Network Connections to Cisco Wireless LAN Controllers
  34. Cisco 4400 Series Wireless LAN Controllers
  35. Rogue Access Points
  36. C H A P T E R 2 Using the Web-Browser and CLI Interfaces
  37. Enabling Web and Secure Web Modes
  38. Loading an Externally Generated HTTPS Certificate
  39. Disabling the GUI
  40. Logging into the CLI
  41. Logging Out of the CLI
  42. CLI Interfaces
  43. C H A P T E R 3 Configuring Ports and Interfaces
  44. Overview of Ports and Interfaces
  45. Distribution System Ports
  46. Service Port
  47. Management Interface
  48. Virtual Interface
  49. Service-Port Interface
  50. Configuring the Management, AP-Manager, Virtual, and Service-Port Interfaces
  51. Using the CLI to Configure the Management, AP-Manager, Virtual, and Service-Port Interfaces
  52. Using the CLI to Configure the AP-Manager Interface
  53. Using the CLI to Configure the Virtual Interface
  54. Using the CLI to Configure the Service-Port Interface
  55. Using the CLI to Configure Dynamic Interfaces
  56. Configuring Ports
  57. configuring ports
  58. Configuring Port Mirroring
  59. Configuring Spanning Tree Protocol
  60. Using the GUI to Configure Spanning Tree Protocol
  61. Using the CLI to Configure Spanning Tree Protocol
  62. Enabling Link Aggregation
  63. Link Aggregation Guidelines
  64. Using the GUI to Enable Link Aggregation
  65. Using the CLI to Enable Link Aggregation
  66. Configuring a 4400 Series Controller to Support More Than 48 Access Points
  67. Connecting Additional Ports
  68. C H A P T E R 4 Configuring Controller SettingsWireless Device Access
  69. Using the Configuration Wizard
  70. Running the Configuration Wizard on the CLI
  71. Managing the System Time and Date
  72. Configuring a Country Code
  73. Enabling and Disabling 802.11 Bands
  74. Configuring RADIUS Settings
  75. Changing the Default Values of SNMP Community Strings
  76. Using the CLI to Change the SNMP Community String Default Values
  77. Using the GUI to Change the SNMP v3 User Default Values
  78. Using the CLI to Change the SNMP v3 User Default Values
  79. Using the CLI to Enable System Logging
  80. Enabling Dynamic Transmit Power Control
  81. Enabling Multicast Mode
  82. Intra-Controller Roaming
  83. CCX Layer 2 Client Roaming
  84. Using the GUI to Configure CCX Client Roaming Parameters
  85. Using the CLI to Configure CCX Client Roaming Parameters
  86. Configuring Voice and Video Parameters
  87. U-APSD
  88. Using the GUI to Configure Video Parameters
  89. Using the GUI to View Voice and Video Settings
  90. Using the CLI to Configure Voice Parameters
  91. Using the CLI to Configure Video Parameters
  92. Using the CLI to View Voice and Video Settings
  93. Configuring the Supervisor 720 to Support the WiSM
  94. Configuring the Supervisor
  95. C H A P T E R 5 Configuring Security Solutions
  96. Cisco UWN Solution Security
  97. Integrated Security Solutions
  98. Using the CLI to Enable Long Preambles
  99. Using the CLI to Configure Enhanced Distributed Channel Access
  100. Using the CLI to Enable Management over Wireless
  101. Configuring Access Control Lists
  102. Using the GUI to Configure Access Control Lists
  103. Using the CLI to Configure Access Control Lists
  104. Configuring Management Frame Protection
  105. Using the GUI to Configure MFP
  106. Using the GUI to View MFP Settings
  107. Using the CLI to Configure MFP
  108. Using the CLI to View MFP Settings
  109. Configuring Identity Networking
  110. Identity Networking Overview
  111. RADIUS Attributes Used in Identity Networking
  112. Interface-Name
  113. Tunnel Attributes
  114. Configuring AAA Override
  115. Using the CLI to Configure AAA Override
  116. Using the CLI to Configure IDS Sensors
  117. Viewing Shunned Clients
  118. Configuring IDS Signatures
  119. Using the GUI to Configure IDS Signatures
  120. Using the CLI to View IDS Signature Events
  121. Configuring AES Key Wrap
  122. Using the CLI to Configure AES Key Wrap
  123. Configuring Maximum Local Database Entries
  124. C H A P T E R 6 Configuring WLANsWireless Device Access
  125. Configuring WLANs
  126. External DHCP Servers
  127. Using the GUI to Configure DHCP
  128. Configuring MAC Filtering for WLANs
  129. Configuring Layer 2 Security
  130. Configuring a WLAN for Both Static and Dynamic WEP
  131. CKIP
  132. Configuring Layer 3 Security
  133. VPN Passthrough
  134. Web-Based Authentication
  135. Configuring 802.3 Bridging
  136. Configuring QoS Enhanced BSS (QBSS)
  137. Configuring Quality of Service Profiles
  138. Configuring Cisco Client Extensions
  139. Using the GUI to View a Client's CCX Version
  140. Using the CLI to View a Client's CCX Version
  141. Configuring Access Point Groups
  142. Creating Access Point Groups
  143. Assigning Access Points to Access Point Groups
  144. Configuring Multiple WLANs with the Same SSID
  145. Addition to the Controller CLI
  146. Configuring Conditional Web Redirect with 802.1X Authentication
  147. Using the GUI to Configure Conditional Web Redirect
  148. Disabling Accounting Servers per WLAN
  149. C H A P T E R 7 Controlling Lightweight Access Points
  150. The Controller Discovery Process
  151. Cisco 1000 Series Lightweight Access Points
  152. Cisco 1030 Remote Edge Lightweight Access Points
  153. Cisco 1000 Series Lightweight Access Point Models
  154. Antenna Sectorization
  155. Cisco 1000 Series Lightweight Access Point Power Requirements
  156. Cisco 1000 Series Lightweight Access Point Physical Security
  157. Wireless Mesh
  158. Adding the MAC Address of the Access Point to the Controller Filter List
  159. Configuring Mesh Parameters
  160. Configuring the Mesh Security Timer
  161. Autonomous Access Points Converted to Lightweight Mode
  162. Guidelines for Using Access Points Converted to Lightweight Mode
  163. Using the MODE Button and a TFTP Server to Return to a Previous Release
  164. Using a Controller to Send Debug Commands to Access Points Converted to Lightweight Mode
  165. Converted Access Points Send Radio Core Dumps to Controller
  166. Disabling the Reset Button on Access Points Converted to Lightweight Mode
  167. Retrieving the Unique Device Identifier on Controllers and Access Points
  168. Using the GUI to Retrieve the Unique Device Identifier on Controllers and Access Points
  169. Using the CLI to Retrieve the Unique Device Identifier on Controllers and Access Points
  170. Using the GUI to Perform a Link Test
  171. Using the CLI to Perform a Link Test
  172. Configuring Cisco Discovery Protocol
  173. Configuring Power over Ethernet
  174. Using the CLI to Configure Power over Ethernet
  175. Configuring Flashing LEDs
  176. C H A P T E R 8 Managing Controller Software and Configurations
  177. Upgrading Controller Software
  178. Saving Configurations
  179. Clearing the Controller Configuration
  180. managing user accounts
  181. Chapter 9 Managing User Account
  182. Creating Guest User Accounts
  183. Creating a Lobby Ambassador Account
  184. Viewing Guest User Accounts
  185. Using the CLI to View Guest Accounts
  186. Choosing the Web Authentication Login Window
  187. Choosing the Default Web Authentication Login Window
  188. Using the CLI to Choose the Default Web Authentication Login Window
  189. Modified Default Web Authentication Login Window Example
  190. Using a Customized Web Authentication Login Window from an External Web Server
  191. Using the CLI to Choose a Customized Web Authentication Login Window from an External Web Server
  192. Using the GUI to Download a Customized Web Authentication Login Window
  193. Using the CLI to Download a Customized Web Authentication Login Window
  194. Customized Web Authentication Login Window Example
  195. C H A P T E R 10 Configuring Radio Resource ManagementWireless Device Access
  196. Overview of Radio Resource Management
  197. Dynamic Transmit Power Control
  198. RRM Benefits
  199. RF Group Name
  200. Using the GUI to Configure an RF Group
  201. Using the CLI to Configure RF Groups
  202. Using the CLI to View RF Group Status
  203. Enabling Rogue Access Point Detection
  204. Using the CLI to Enable Rogue Access Point Detection
  205. Configuring Dynamic RRM
  206. Overriding Dynamic RRM
  207. using the cli to configure dynamic rrm
  208. overriding dynamic rrm
  209. Using the GUI to Statically Assign Channel and Transmit Power Settings
  210. Using the CLI to Statically Assign Channel and Transmit Power Settings
  211. Disabling Dynamic Channel and Power Assignment Globally for a Controller
  212. Viewing Additional RRM Settings Using the CLI
  213. Configuring CCX Radio Management Features
  214. Using the GUI to Configure CCX Radio Management
  215. Using the CLI to Configure CCX Radio Management
  216. Using the CLI to Obtain CCX Radio Management Information
  217. C H A P T E R 11 Configuring Mobility GroupsWireless Device Access
  218. Overview of Mobility
  219. Overview of Mobility Groups
  220. Determining When to Include Controllers in a Mobility Group
  221. Using the GUI to Configure Mobility Groups
  222. Using the CLI to Configure Mobility Groups
  223. Guidelines for Using Auto-Anchor Mobility
  224. Using the GUI to Configure Auto-Anchor Mobility
  225. Using the CLI to Configure Auto-Anchor Mobility
  226. Running Mobility Ping Tests
  227. C H A P T E R 12 Configuring Hybrid REAPWireless Device Access
  228. Overview of Hybrid REAP
  229. Hybrid REAP Guidelines
  230. Configuring Hybrid REAP
  231. Configuring the Controller for Hybrid REAP
  232. Configuring an Access Point for Hybrid REAP
  233. Using the GUI to Configure an Access Point for Hybrid REAP
  234. Using the CLI to Configure an Access Point for Hybrid REAP
  235. Connecting Client Devices to the WLANs
  236. Translated Safety Warnings
  237. Safety Considerations
  238. Class 1 Laser Product Warning
  239. Ground Conductor Warning
  240. Chassis Warning for Rack-Mounting and Servicing
  241. battery handling warning for 4400 series controllers
  242. equipment installation warning
  243. Regulatory Information for 1000 Series Access Points
  244. Manufacturers Federal Communication Commission Declaration of Conformity Statement
  245. Department of Communications—Canada
  246. European Community, Switzerland, Norway, Iceland, and Liechtenstein
  247. Declaration of Conformity for RF Exposure
  248. Guidelines for Operating Cisco Aironet Access Points in Japan
  249. Administrative Rules for Cisco Aironet Access Points in Taiwan
  250. Declaration of Conformity Statements
  251. FCC Statement for Cisco 4400 Series Wireless LAN Controllers
  252. Appendix C End User License and Warranty
  253. End User License Agreement
  254. Limited Warranty
  255. Disclaimer of Warranty
  256. Additional Open Source Terms
  257. Appendix D System Message and LED Pattern
  258. System Messages
  259. Interpreting LEDs
  260. Appendix E Logical Connectivity Diagram
  261. Cisco WiSM
  262. Cisco 28/37/38xx Integrated Services Router
2100 Series first page preview

2100 Series

Brand: Cisco | Category: Controller
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Table Of Contents
  20. Table Of Contents
  21. Chapter 1 Overview
  22. Single-Controller Deployments
  23. Multiple-Controller Deployments
  24. Operating System Security
  25. Layer 2 and Layer 3 Operation
  26. Client Location
  27. Cisco 2100 Series Controllers
  28. Catalyst 6500 Series Wireless Services Module
  29. Cisco 7600 Series Router Wireless Services Module
  30. Cisco 28/37/38xx Series Integrated Services Router
  31. Cisco UWN Solution Wired Connections
  32. Identity Networking
  33. File Transfers
  34. Startup Wizard
  35. Cisco Wireless LAN Controller Failover Protection
  36. Network Connections to Cisco Wireless LAN Controllers
  37. Cisco 4400 Series Wireless LAN Controllers
  38. C H A P T E R 2 Using the Web-Browser and CLI Interfaces
  39. Using the GUI to Enable Web and Secure Web Modes
  40. Using the CLI to Enable Web and Secure Web Modes
  41. Loading an Externally Generated SSL Certificate
  42. Using the CLI
  43. Using a Local Serial Connection
  44. Logging Out of the CLI
  45. C H A P T E R 3 Configuring Ports and Interfaces
  46. Distribution System Ports
  47. Service Port
  48. Interfaces
  49. Virtual Interface
  50. Service-Port Interface
  51. WLANs
  52. Configuring the Management, AP-Manager, Virtual, and Service-Port Interfaces
  53. Using the GUI to Configure the Management, AP-Manager, Virtual, and Service-Port Interfaces
  54. Using the CLI to Configure the Management, AP-Manager, Virtual, and Service-Port Interfaces
  55. Using the CLI to Configure the AP-Manager Interface
  56. Using the CLI to Configure the Service-Port Interface
  57. Configuring Dynamic Interfaces
  58. Using the CLI to Configure Dynamic Interfaces
  59. Configuring Ports
  60. Configuring Port Mirroring
  61. Configuring Spanning Tree Protocol
  62. Using the GUI to Configure Spanning Tree Protocol
  63. Using the CLI to Configure Spanning Tree Protocol
  64. Enabling Link Aggregation
  65. Link Aggregation Guidelines
  66. Using the GUI to Enable Link Aggregation
  67. Using the CLI to Enable Link Aggregation
  68. Using Link Aggregation
  69. C H A P T E R 4 Configuring Controller SettingsWireless Device Access
  70. Resetting the Device to Default Settings
  71. Running the Configuration Wizard on the CLI
  72. Using the AutoInstall Feature for Controllers Without a Configuration
  73. Obtaining an IP Address Through DHCP and Downloading a Configuration File from a TFTP Server
  74. Selecting a Configuration File
  75. Example of AutoInstall Operation
  76. Managing the System Date and Time
  77. Using the CLI to Configure the Date and Time
  78. Configuring 802.11 Bands
  79. Using the CLI to Configure 802.11 Bands
  80. Configuring 802.11n Parameters
  81. Using the CLI to Configure 802.11n Parameters
  82. Configuring DHCP Proxy
  83. Using the CLI to Configure DHCP Proxy
  84. Restoring Passwords
  85. Changing the Default Values of SNMP Community Strings
  86. Using the CLI to Change the SNMP Community String Default Values
  87. Using the CLI to Change the SNMP v3 User Default Values
  88. Using the GUI to Configure Aggressive Load Balancing
  89. Configuring Fast SSID Changing
  90. Configuring 802.3 Bridging
  91. Using the CLI to Configure 802.3 Bridging
  92. Configuring Multicast Mode
  93. Guidelines for Using Multicast Mode
  94. Using the GUI to Enable Multicast Mode
  95. Using the GUI to View Multicast Groups
  96. Using the CLI to Enable Multicast Mode
  97. Using the CLI to View Multicast Groups
  98. Configuring Client Roaming
  99. CCX Layer 2 Client Roaming
  100. Using the GUI to Configure CCX Client Roaming Parameters
  101. Using the CLI to Configure CCX Client Roaming Parameters
  102. Using the CLI to Debug CCX Client Roaming Issues
  103. Configuring Quality of Service
  104. Using the CLI to Configure QoS Profiles
  105. Configuring Quality of Service Roles
  106. Using the CLI to Configure QoS Roles
  107. Configuring Voice and Video Parameters
  108. Expedited Bandwidth Requests
  109. U-APSD
  110. Using the GUI to Configure Video Parameters
  111. Using the GUI to View Voice and Video Settings
  112. Using the CLI to Configure Voice Parameters
  113. Using the CLI to Configure Video Parameters
  114. Using the CLI to View Voice and Video Settings
  115. Configuring EDCA Parameters
  116. Using the CLI to Configure EDCA Parameters
  117. Configuring Cisco Discovery Protocol
  118. Using the GUI to Configure Cisco Discovery Protocol
  119. Using the GUI to View Cisco Discovery Protocol Information
  120. Using the CLI to Configure Cisco Discovery Protocol
  121. Using the CLI to View Cisco Discovery Protocol Information
  122. Configuring RFID Tag Tracking
  123. Using the CLI to Configure RFID Tag Tracking
  124. Using the CLI to View RFID Tag Tracking Information
  125. Using the CLI to Debug RFID Tag Tracking Issues
  126. Configuring and Viewing Location Settings
  127. Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues
  128. Synchronizing the Controller and Location Appliance
  129. Configuring the Supervisor 720 to Support the WiSM
  130. General WiSM Guidelines
  131. Using the Wireless LAN Controller Network Module
  132. C H A P T E R 5 Configuring Security Solutions
  133. Layer 3 Solutions
  134. Configuring RADIUS on the ACS
  135. Using the GUI to Configure RADIUS
  136. Using the CLI to Configure RADIUS
  137. RADIUS Authentication Attributes Sent by the Access Point
  138. RADIUS Accounting Attributes
  139. Configuring TACACS+
  140. Configuring TACACS+ on the ACS
  141. Using the GUI to Configure TACACS+
  142. Using the CLI to Configure TACACS+
  143. Viewing the TACACS+ Administration Server Logs
  144. Configuring Local Network Users
  145. Using the GUI to Configure Local Network Users
  146. Using the CLI to Configure Local Network Users
  147. Configuring LDAP
  148. Using the CLI to Configure LDAP
  149. Configuring Local EAP
  150. Using the GUI to Configure Local EAP
  151. Using the CLI to Configure Local EAP
  152. Configuring the System for SpectraLink NetLink Telephones
  153. Using the CLI to Enable Long Preambles
  154. Using the CLI to Configure Enhanced Distributed Channel Access
  155. Configuring DHCP Option 82
  156. Configuring and Applying Access Control Lists
  157. Using the GUI to Configure Access Control Lists
  158. Using the GUI to Apply Access Control Lists
  159. Applying an Access Control List to the Controller CPU
  160. Applying an Access Control List to a WLAN
  161. Applying a Preauthentication Access Control List to a WLAN
  162. Using the CLI to Configure Access Control Lists
  163. Using the CLI to Apply Access Control Lists
  164. Configuring Management Frame Protection
  165. Guidelines for Using MFP
  166. Using the GUI to Configure MFP
  167. Using the GUI to View MFP Settings
  168. Using the CLI to Configure MFP
  169. Using the CLI to View MFP Settings
  170. Using the CLI to Debug MFP Issues
  171. Configuring Identity Networking
  172. RADIUS Attributes Used in Identity Networking
  173. Interface-Name
  174. Tunnel Attributes
  175. Configuring AAA Override
  176. Using the GUI to Configure AAA Override
  177. Using the CLI to Configure AAA Override
  178. Detecting Rogue Devices
  179. WCS Interaction
  180. Using the CLI to Configure RLDP
  181. Configuring Rogue Classification Rules
  182. Using the CLI to Configure Rogue Classification Rules
  183. Viewing and Classifying Rogue Devices
  184. Using the CLI to View and Classify Rogue Devices
  185. Configuring IDS
  186. Using the CLI to Configure IDS Sensors
  187. Viewing Shunned Clients
  188. Configuring IDS Signatures
  189. Using the GUI to Configure IDS Signatures
  190. Using the CLI to Configure IDS Signatures
  191. Using the CLI to View IDS Signature Events
  192. Configuring wIPS
  193. Viewing wIPS Information
  194. Detecting Active Exploits
  195. C H A P T E R 6 Configuring WLANsWireless Device Access
  196. Creating WLANs
  197. Using the CLI to Create WLANs
  198. Searching WLANs
  199. Configuring DHCP
  200. Security Considerations
  201. Using the CLI to Configure DHCP
  202. Using the CLI to Debug DHCP
  203. Configuring MAC Filtering for WLANs
  204. Enabling MAC Filtering
  205. Configuring the DTIM Period
  206. Using the CLI to Configure the DTIM Period
  207. Configuring Peer-to-Peer Blocking
  208. Guidelines for Using Peer-to-Peer Blocking
  209. Using the CLI to Configure Peer-to-Peer Blocking
  210. Static WEP Keys
  211. Configuring a WLAN for Both Static and Dynamic WEP
  212. CKIP
  213. Configuring a Session Timeout
  214. Using the CLI to Configure a Session Timeout
  215. VPN Passthrough
  216. Assigning a QoS Profile to a WLAN
  217. Using the GUI to Assign a QoS Profile to a WLAN
  218. Using the CLI to Assign a QoS Profile to a WLAN
  219. Guidelines for Configuring QBSS
  220. Using the GUI to Configure QBSS
  221. Using the CLI to Configure QBSS
  222. Guidelines for Using IPv6 Bridging
  223. Using the GUI to Configure IPv6 Bridging
  224. Using the CLI to Configure IPv6 Bridging
  225. Using the GUI to Configure CCX Aironet IEs
  226. Using the CLI to Configure CCX Aironet IEs
  227. Creating Access Point Groups
  228. Configuring Web Redirect with 802.1X Authentication
  229. Splash Page Web Redirect
  230. Using the GUI to Configure Web Redirect
  231. Using the CLI to Configure Web Redirect
  232. Disabling Accounting Servers per WLAN
  233. Disabling Coverage Hole Detection per WLAN
  234. Using the CLI to Disable Coverage Hole Detection on a WLAN
  235. Guidelines for Using NAC Out-of-Band Integration
  236. Using the GUI to Configure NAC Out-of-Band Integration
  237. Using the CLI to Configure NAC Out-of-Band Integration
  238. C H A P T E R 7 Controlling Lightweight Access Points
  239. Verifying that Access Points Join the Controller
  240. Viewing CAPWAP MTU Information
  241. Using the GUI to Configure Global Credentials for Access Points
  242. Using the CLI to Configure Global Credentials for Access Points
  243. Configuring Authentication for Access Points
  244. Using the GUI to Configure Authentication for Access Points
  245. Using the CLI to Configure Authentication for Access Points
  246. Configuring the Switch for Authentication
  247. Autonomous Access Points Converted to Lightweight Mode
  248. Reverting from Lightweight Mode to Autonomous Mode
  249. Authorizing Access Points
  250. Authorizing Access Points Using LSCs
  251. Using the GUI to Authorize Access Points
  252. Using the CLI to Authorize Access Points
  253. Using DHCP Option 43 and DHCP Option 60
  254. Configuring the Syslog Server for Access Points
  255. Using a Controller to Send Debug Commands to Access Points Converted to Lightweight Mode
  256. Using the CLI to Retrieve Radio Core Dumps
  257. Using the CLI to Upload Radio Core Dumps
  258. Uploading Memory Core Dumps from Converted Access Points
  259. Using the CLI to Upload Access Point Core Dumps
  260. Disabling the Reset Button on Access Points Converted to Lightweight Mode
  261. Cisco Workgroup Bridges
  262. Guidelines for Using WGBs
  263. Sample WGB Configuration
  264. Using the CLI to View the Status of Workgroup Bridges
  265. Configuring Backup Controllers
  266. Using the GUI to Configure Backup Controllers
  267. Using the CLI to Configure Backup Controllers
  268. Configuring Failover Priority for Access Points
  269. Using the CLI to Configure Failover Priority for Access Points
  270. Configuring Country Codes
  271. Using the GUI to Configure Country Codes
  272. Using the CLI to Configure Country Codes
  273. Migrating Access Points from the -J Regulatory Domain to the -U Regulatory Domain
  274. Guidelines for Migration
  275. Using the W56 Band in Japan
  276. Optimizing RFID Tracking on Access Points
  277. Using the CLI to Optimize RFID Tracking on Access Points
  278. Configuring Probe Request Forwarding
  279. Retrieving the Unique Device Identifier on Controllers and Access Points
  280. Using the CLI to Retrieve the Unique Device Identifier on Controllers and Access Points
  281. Using the GUI to Perform a Link Test
  282. Using the CLI to Perform a Link Test
  283. Using the GUI to Configure Link Latency
  284. Using the CLI to Configure Link Latency
  285. Configuring Power over Ethernet
  286. Using the GUI to Configure Power over Ethernet
  287. Using the CLI to Configure Power over Ethernet
  288. Configuring Flashing LEDs
  289. Using the CLI to View Clients
  290. Chapter 8 Controlling Mesh Acces Point
  291. Network Access
  292. Deployment Modes
  293. Point-to-Point Wireless Bridging
  294. Architecture Overview
  295. Mesh Neighbors, Parents, and Children
  296. Adding Mesh Access Points to the Mesh Network
  297. Configuring External Authentication and Authorization Using a RADIUS Server
  298. Defining the Mesh Access Point Role
  299. Configuring Local Mesh Parameters
  300. Client Roaming
  301. Configuring Ethernet Bridging and Ethernet VLAN Tagging
  302. Configuring Advanced Features
  303. Guidelines for Using Voice on the Mesh Network
  304. Voice Call Support in a Mesh Network
  305. Enabling Mesh Multicast Containment for Video
  306. Backhaul Client Access (Universal Access) for Indoor and Outdoor Mesh Access Points
  307. Using the CLI to View Mesh Statistics for an Access Point
  308. Viewing Neighbor Statistics for an Access Point
  309. Using the CLI to View Neighbor Statistics for an Access Point
  310. Converting Indoor Access Points to Mesh Access Points (1130AG, 1240AG)
  311. Changing MAP and RAP Roles for Indoor Mesh Access Points (1130AG, 1240AG)
  312. Converting Indoor Mesh Access Points to Non-Mesh Lightweight Access Points (1130AG, 1240AG)
  313. Configuring Mesh Access Points to Operate with Cisco 3200 Series Mobile Access Routers
  314. Using the GUI to Enable Mesh Access Points to Operate with Cisco 3200 Series Mobile Access Routers
  315. Using the CLI to Enable Mesh Access Points to Operate with Cisco 3200 Series Mobile Access Routers
  316. C H A P T E R 9 Managing Controller Software and Configurations
  317. Guidelines for Upgrading to Controller Software 5.2 in Mesh Networks
  318. Mandatory Boot Variable Update for Networks with 1522 Access Points
  319. Upgrade Compatibility Matrix
  320. Using the GUI to Upgrade Controller Software
  321. Using the CLI to Upgrade Controller Software
  322. Transferring Files to and from a Controller
  323. Using the GUI to Download Device Certificates
  324. Using the CLI to Download Device Certificates
  325. Downloading CA Certificates
  326. Using the CLI to Download CA Certificates
  327. Uploading PACs
  328. Using the CLI to Upload PACs
  329. Uploading and Downloading Configuration Files
  330. Downloading Configuration Files
  331. Saving Configurations
  332. Editing Configuration Files
  333. Clearing the Controller Configuration
  334. Chapter 10 Managing User Account
  335. Using the CLI to Create a Lobby Ambassador Account
  336. Creating Guest User Accounts as a Lobby Ambassador
  337. Viewing Guest User Accounts
  338. Using the CLI to View Guest Accounts
  339. Choosing the Web Authentication Login Page
  340. Choosing the Default Web Authentication Login Page
  341. Using the CLI to Choose the Default Web Authentication Login Page
  342. Modified Default Web Authentication Login Page Example
  343. Creating a Customized Web Authentication Login Page
  344. Using a Customized Web Authentication Login Page from an External Web Server
  345. Using the CLI to Choose a Customized Web Authentication Login Page from an External Web Server
  346. Using the GUI to Download a Customized Web Authentication Login Page
  347. Using the CLI to Download a Customized Web Authentication Login Page
  348. Customized Web Authentication Login Page Example
  349. Assigning Login, Login Failure, and Logout Pages per WLAN
  350. Using the CLI to Assign Login, Login Failure, and Logout Pages per WLAN
  351. Configuring Wired Guest Access
  352. Configuration Overview
  353. Using the CLI to Configure Wired Guest Access
  354. C H A P T E R 11 Configuring Radio Resource ManagementWireless Device Access
  355. Dynamic Channel Assignment
  356. Coverage Hole Detection and Correction
  357. RRM Benefits
  358. RF Group Leader
  359. Using the GUI to Configure an RF Group
  360. Viewing RF Group Status
  361. Using the CLI to View RF Group Status
  362. Using the GUI to Configure RF Group Mode
  363. Using the GUI to Configure Dynamic Channel Assignment
  364. Using the GUI to Configure Coverage Hole Detection
  365. Using the GUI to Configure RRM Profile Thresholds, Monitoring Channels, and Monitor Intervals
  366. Using the CLI to Configure RRM
  367. Using the CLI to View RRM Settings
  368. Using the CLI to Debug RRM Issues
  369. Statically Assigning Channel and Transmit Power Settings to Access Point Radios
  370. Using the CLI to Statically Assign Channel and Transmit Power Settings
  371. Disabling Dynamic Channel and Power Assignment Globally for a Controller
  372. Enabling Rogue Access Point Detection in RF Groups
  373. Using the CLI to Enable Rogue Access Point Detection in RF Groups
  374. Radio Measurement Requests
  375. Using the CLI to Configure CCX Radio Management
  376. Using the CLI to Debug CCX Radio Management Issues
  377. Guidelines for Using Pico Cell Mode
  378. Using the CLI to Configure Pico Cell Mode
  379. Using the CLI to Debug Pico Cell Mode Issues
  380. C H A P T E R 12 Configuring Mobility GroupsWireless Device Access
  381. Overview of Mobility Groups
  382. Determining When to Include Controllers in a Mobility Group
  383. Using Mobility Groups with NAT Devices
  384. Configuring Mobility Groups
  385. Using the GUI to Configure Mobility Groups
  386. Using the CLI to Configure Mobility Groups
  387. Viewing Mobility Group Statistics
  388. Using the CLI to View Mobility Group Statistics
  389. Configuring Auto-Anchor Mobility
  390. Guidelines for Using Auto-Anchor Mobility
  391. Using the CLI to Configure Auto-Anchor Mobility
  392. WLAN Mobility Security Values
  393. Using Symmetric Mobility Tunneling
  394. Running Mobility Ping Tests
  395. C H A P T E R 13 Configuring Hybrid REAPWireless Device Access
  396. Hybrid REAP Guidelines
  397. Configuring Hybrid REAP
  398. Configuring the Controller for Hybrid REAP
  399. Using the GUI to Configure the Controller for Hybrid REAP
  400. Using the CLI to Configure the Controller for Hybrid REAP
  401. Using the CLI to Configure an Access Point for Hybrid REAP
  402. Connecting Client Devices to the WLANs
  403. Hybrid-REAP Groups and Backup RADIUS Servers
  404. Hybrid-REAP Groups and Local Authentication
  405. Using the CLI to Configure Hybrid-REAP Groups
  406. Translated Safety Warnings
  407. Safety Considerations
  408. Class 1 Laser Product Warning
  409. Ground Conductor Warning
  410. Chassis Warning for Rack-Mounting and Servicing
  411. Battery Handling Warning for 4400 Series Controllers
  412. Equipment Installation Warning
  413. More Than One Power Supply Warning for 4400 Series Controllers
  414. A P P E N D I X B Declarations of Conformity and Regulatory Information
  415. Department of Communications—Canada
  416. European Community, Switzerland, Norway, Iceland, and Liechtenstein
  417. Declaration of Conformity for RF Exposure
  418. Guidelines for Operating Controllers in Japan
  419. Power Cable and AC Adapter Warning for Japan
  420. Administrative Rules for Cisco Aironet Access Points in Taiwan
  421. All Access Points
  422. Declaration of Conformity Statements
  423. Appendix C End User License and Warranty
  424. End User License Agreement
  425. Limited Warranty
  426. Disclaimer of Warranty
  427. Notices
  428. Interpreting LEDs
  429. Appendix D Troubleshooting
  430. Using the CLI to Troubleshoot Problems
  431. Configuring System and Message Logging
  432. Using the GUI to Configure System and Message Logging
  433. Using the GUI to View Message Logs
  434. Using the CLI to Configure System and Message Logging
  435. Using the CLI to View System and Message Logs
  436. Viewing Access Point Event Logs
  437. Uploading Logs and Crash Files
  438. Using the CLI to Upload Logs and Crash Files
  439. Uploading Core Dumps from the Controller
  440. Troubleshooting CCXv5 Client Devices
  441. Roaming and Real-Time Diagnostics
  442. Using the CLI to Configure the Diagnostic Channel
  443. Using the GUI to Configure Client Reporting
  444. Using the CLI to Configure Client Reporting
  445. Using the CLI to Configure Roaming and Real-Time Diagnostics
  446. Using the Debug Facility
  447. Configuring Wireless Sniffing
  448. Using the CLI to Configure Sniffing on an Access Point
  449. Troubleshooting Access Points Using Telnet or SSH
  450. Debugging the Access Point Monitor Service
  451. Appendix E Logical Connectivity Diagram
  452. Cisco WiSM
  453. Catalyst 3750G Integrated Wireless LAN Controller Switch
  454. Cisco 28/37/38xx Integrated Services Router
  455. License Issues
Related products
2500 Series2000 Series500 Series5500 Series4400 SeriesMDS 9500 SeriesFlex 7500 SeriesFirepower 4100 SeriesCatalyst 8500 SeriesCatalyst 7500 Series
Cisco categories
More Cisco categories