User's Manual

Beta Draft -- Cisco Confidential
Index
IN-9
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
manual configuration 2-2
system requirements xxii
T
TAC 16-1
TACACS+
accounting, defined
2-45
authentication, defined 2-45
authorization, defined 2-45
configuring
accounting
2-50
authentication key 2-47
authorization 2-49
login authentication 2-46, 2-48
default configuration 2-46
displaying the configuration 2-50
identifying the server 2-47
limiting the services to the user 2-49
operation of 2-45
overview 2-45
tracking services accessed by user 2-50
tar files
creating
14-6
displaying the contents of 14-7
extracting 14-7
image file format 14-19
Telnet 11
Temporal Key Integrity Protocol 6-1
Terminal Access Controller Access Control System Plus
See TACACS+
TFTP
16-8
configuration files
downloading
14-11
preparing the server 14-10
uploading 14-11
image files
deleting
14-22
downloading 14-21
preparing the server 14-20
uploading 14-22
tftp_init command 16-8
time
See NTP and system clock
timestamps in log messages
15-6
time zones 2-18
TKIP 2-53, 6-1
TKIP (Temporal Key Integrity Protocol) 6-2
traps
configuring managers
13-7
defined 13-3
enabling 13-7
notification types 13-7
overview 13-2, 13-4
troubleshooting 16-1
with CiscoWorks 13-4
with system message logging 15-2
U
UNIX syslog servers
daemon configuration
15-10
facilities supported 15-11
message logging configuration 15-10
upgrading software images
See downloading
uploading
configuration files
preparing
14-10, 14-13, 14-16
reasons for 14-8
using FTP 14-14
using RCP 14-17
using TFTP 14-11
image files
preparing
14-20, 14-23, 14-27
reasons for 14-19
using FTP 14-26
using RCP 14-31