Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
12 – Index
fast Layer 2
enabling … 4-59, 9-11
overview … 9-3
pre-authentication … 9-3
Layer 2 … 1-80, 1-81, 9-2
Layer 3 … 1-83, 9-5
See also Layer 3 mobility
seamless coverage … 3-44
Web-Auth and … 5-2, 9-4
route table
default route … 6-15
one active … 6-16
overview … 6-12
static routes in … 6-14
routing … 1-23
capabilities requiring … 6-12
enabling … 6-12
RP
See radio port
running-config
applying changes to … 2-13
S
secure management … 2-9, 2-29
secure Network Time Protocol
See secure NTP
secure NTP
ACLs controlling access to … 2-146
authentication … 2-141
broadcast mode … 2-139
client/server mode … 2-139
configuration steps
client … 2-142
server … 2-142
hierarchy … 2-139
overview … 2-138
peer mode … 2-139
Secure Shell access … 2-24
security
adopting RPs as detectors … 3-11
authentication … 4-34
encryption … 1-31, 4-48
for management access … 2-24
See also authentication
See also encryption
WLAN … 4-34
self healing … 13-88
interference avoidance … 13-100
See also interference avoidance
neighbor recovery … 13-88
See also neighbor recovery
offset
radio adoption defaults … 3-24
specific radio configuration … 3-33
serial session
accessing CLI through … 2-21
sFlow
agent, viewing … 14-7
collector … 14-2
converting 802.11 to Ethernet … 14-11
counter polling
defined … 14-3
interval … 14-16
manually activating … 14-14
flow sampling
defined … 14-2
manually activating … 14-11
rate … 14-13
sample size … 14-14
manual configuration steps … 14-8
MIB version … 14-8
overview … 1-49, 14-2
receiver
configuration options … 14-4
defined … 14-2
manually configuring … 14-8
timeout … 14-10
receiver, configured by … 14-5
shared-key authentication … 4-76
short preamble
enabling in radio adoption defaults … 3-21
enabling on specific radio … 3-33
show ip interface command … 2-7
SNMP
communities … 2-25, 2-108
default support … 2-108
receiver
defining … 2-117
editing … 2-122
viewing information about … 2-121
security … 2-24
encrypted communications … 2-25
users … 2-24