Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
2 – Index
viewing statistics … 7-28
action ID … 7-29
details … 7-30
protocol ID … 7-30
times used … 7-30
ACS
See auto-channel select
active mode
for redundancy group … 1-77, 10-4
address resolution table … 6-17
adoption
automatic versus manual … 2-70
failure, reasons for … 1-77
Layer 2
auto-provisioning … 2-57
connecting RP to infrastructure switch … 2-58
connecting RP to wireless services-enabled
switch … 2-57
network requirements for … 2-57
Layer 3
compared to Layer 2 … 2-56
customizing RPs’ DNS request … 2-68
default DNS request … 2-64
DHCP option 189 … 2-64
DNS lookup … 2-66
network requirements for … 2-61
RP requirements for … 2-62
verifying … 2-69
messages RPs send … 1-67
overview … 2-56
preference ID
configuring for module … 10-28
configuring for specific radio … 3-33
configuring in radio adoption defaults … 3-19
defined … 2-75
radio pre-configured … 1-66, 3-30
redundancy group and … 10-5
unadopting a radio … 3-40
viewing adopted RPs … 13-37
viewing unadopted RPs … 13-38
advanced mode configuration
configuring a specific radio … 4-18
configuring radio adoption defaults … 4-15, 4-17
considerations … 4-11
enabling … 4-13
normal mode with … 4-23
overview … 4-11
primary WLAN … 4-18, 4-21
reasons for using … 4-12
reverting to normal mode … 4-23
AIFSN
defined … 4-93
radio … 4-106
station … 4-103
alarms
acknowledging … 13-73
deleting … 13-72
exporting … 13-73
managing log … 13-70
SNMP traps required for … 2-108, 13-70
viewing details … 13-72
Allow list
local MAC authentication … 13-75
Web-Auth
configuring … 4-41, 5-28
defined … 5-8
necessary addresses … 5-9
answer broadcast ESS option … 4-67
antenna
effect on coverage … 3-45
external, lowering transmit power … 3-14
internal … 1-52
mode … 3-18, 3-33
AP detection
allowing unapproved APs … 13-52
approved list … 13-53
dedicated detector, configuring … 3-29, 13-40
detector mode … 1-62
enabling … 13-40
lists of detected APs … 13-46
overview … 13-39
single-channel detector, configuring … 3-29, 13-40
single-channel versus dedicated detector … 13-41
triggering SNMP trap … 13-54
unapproved list … 13-50
unseen AP timeout … 13-43
arbitration interframe spacing number
See AIFSN
association flood attack … 13-57
attack checking … 1-37
authentication
802.1X … 1-24, 4-35
encryption options with … 4-49
local MAC … 4-35, 13-74
MAC standard ACL … 1-39
open-key … 4-50