Index
IN-29
Cisco Wireless LAN Controller Configuration Guide
OL-17037-01
wireless intrusion prevention system (wIPS)
configuring on an access point
5-119 to 5-120
described 5-119
viewing information 5-120 to 5-121
wireless sniffing
configuring
using the CLI
D-41
using the GUI D-39 to D-41
prerequisites D-39
supported software D-39
WLAN ID parameter 6-5
WLAN Profile parameter 5-31, 13-10
WLANs
assigning web login, login failure, and logout pages
using the CLI
10-22
using the GUI 10-21
checking security settings 6-21
configuring
conditional web redirect
6-50 to 6-53
static and dynamic WEP 6-22
connecting clients to 13-15
creating
using the CLI
6-5
using the GUI 6-3 to 6-5
deleting
using the CLI
6-6
using the GUI 6-4
described 1-12, 3-9 to 3-10, 6-3
enabling or disabling
using the CLI
6-6
using the GUI 6-5
number supported 6-2
searching 6-7
session timeout
configuring
6-27
described 6-27
splash page web redirect 6-50
wired security solution 1-5
WLANs > Edit (Advanced) page 6-54
applying an ACL to a WLAN 5-62
configuring AAA override 5-80
configuring infrastructure MFP for a WLAN 5-69
configuring IPv6 bridging 6-39
configuring NAC out-of-band integration 6-59
configuring the diagnostic channel D-20
WLANs > Edit (QoS) page 6-35
WLANs > Edit (Security > AAA Servers) page
assigning LDAP servers to a WLAN
5-36
choosing RADIUS or LDAP servers for external
authentication
10-21
disabling accounting servers on a WLAN 6-53
enabling local EAP on a WLAN 5-45
WLANs > Edit (Security > Layer 2) page 6-23, 6-26
WLANs > Edit (Security > Layer 3) page
applying a preauthentication ACL to a WLAN
5-62
configuring a WLAN for VPN Passthrough 6-29
configuring web redirect 6-52
configuring wired guest access 10-28
WLANs > Edit page 6-5, 10-27, 13-7
WLANs > New page 6-4, 8-25, 8-26, 8-46, 8-47, 10-27, 13-7
WLANs page 6-3, 12-22
WLAN SSID parameter
configuring for guest user
10-5
creating a centrally switched WLAN 13-7
creating WLANs 6-5
identifying the guest LAN 10-27
mapping an access point group to a WLAN 6-46, 6-60
WMM
configuring
4-19, 6-35, 6-36
described 6-32
with CAC 4-52
WMM parameter 4-67
WMM Policy parameter 6-35
workgroup bridges (WGBs)
debugging
7-40
described 7-34
guidelines 7-35
illustrated 7-34