Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater

Index – 1
Index
Numerics
802.11 1-31
a…5-5
no short preamble with … 5-21
bg … 5-5
management frames … 1-32
viewing radio type … 5-31
802.1X … 1-15
client on radio port … 1-44, 1-46, 2-38
configuring on a WLAN … 3-35
RADIUS server 3-37
RADIUS server settings … 3-38
re-authentication period … 3-38
user-based VLANs with … 3-70
A
ACL
allow list … 6-52
associating with a WLAN … 6-55
deny list … 6-52
manual configuration … 1-22, 6-52
user-based or dynamic … 1-20, 3-70
ACS
configuring for a specific radio … 5-33
configuring in radio adoption defaults … 5-14
running … 5-27, 5-34
active mode
for redundancy group … 1-28, 4-5
address resolution table … 2-19
adoption
failure, reasons for … 1-28
preference ID 4-6
configuring for a specific radio … 5-36
configuring in radio adoption defaults … 5-20
radio configured before … 1-43, 5-32
radio port … 2-35
messages … 1-44
network requirements for … 2-30
redundancy group … 4-6, 4-10
unadopting a radio … 5-27
viewing adopted RPs … 6-16
viewing unadopted RPs … 6-17
advanced mode configuration … 3-11
concerns … 3-11
configuring a specific radio … 3-19
configuring radio adoption defaults … 3-15, 3-17
enabling … 3-13
normal mode with … 3-23
primary WLAN … 3-18, 3-21
reasons for using … 3-12
reverting to normal mode … 3-24
AIFSN
station … 3-81
alarms
acknowledging … 6-51
deleting … 6-50
exporting … 6-51
managing log
viewing details … 6-49
Allow list
Web-Auth … 7-7, 7-12
anomaly detection … 6-37
antenna
mode … 5-19, 5-36
Radio Port 210, on … 1-31
Radio Port 220, on … 1-31
Radio Port 230, on … 1-31
type … 5-38
AP detection … 1-39, 6-18
adopting radios as detectors … 6-25
allowing APs … 6-26
allowing unapproved APs … 6-32
configuring radio as detector … 6-23
enabling … 6-19
monitoring the approved list … 6-33
monitoring unapproved list … 6-30
normal vs detector radios … 6-22
setting list sizes … 6-21
setting unseen AP timeout … 6-21
triggering an SNMP trap … 6-35
association requests, monitoring … 6-37
authentication … 1-13
802.1X … 1-15, 3-35
encryption options with … 3-41
MAC authentication … 1-19, 1-22, 6-52
open-key … 3-42
shared-key … 3-58
Web-Auth … 1-17, 3-38, 7-2