Specifications
Index-2
wired ports 19-2
WPA 10-6
authentication, authorization, and
accounting. See AAA (authentication,
authorization, and accounting) 3-1, 3-4
authenticator, pass-through, RAS as
16-3
authorization 17-7, 17-63
attributes, assigning 17-45
order of processing 17-62
port lists 17-64
server setting for timeouts 19-8
server timeout 19-8
authorization attributes
Encryption-Type 17-48
local database assignment 17-42
security ACL 17-48
user group assignment 17-48
authorization password
MAC 17-21
outbound 17-21
authorization server timeout 19-8
autonegotiation 4-8
autosensing 4-7
Avaya voice over IP 15-23
B
backbone fast convergence 13-8
configuring 13-9
beacon interval 9-44
before editbuffer-index
defined 15-9
locating an ACE 15-17
black list 22-8
blink mode 9-35
blocked ports, displaying 13-12
Bonded Auth 17-15
boot information 23-3
bridge priority
configuring 13-3
defined 13-2
broadcast
DTIM interval 9-45
preamble length 9-47
buffer
edit. See edit buffer
system, for logging A-4
C
CA. See certificate authority
Called-Station-Id attribute C-3
Calling-Station-Id attribute C-3
case in usernames and passwords 3-8
Catalyst switch, interoperating with
load-sharing port groups 4-13
CCMP 10-3
enabling 10-8, 10-13
certificate authority
certificate source 16-2
enrolling with 16-9
Certificate Signing Request (CSR) 16-6
defined 16-4
generating 16-9
certificates
configuration scenarios 16-11
creating 16-5
EAP self-signed 16-7
invalid, troubleshooting A-2
overview 16-1
PKCS #12 object file 16-6
self-signed 16-6
supported on the RAS 16-3
Web 16-7
Certification Request Syntax Standard
16-4
channel
locking down 11-8
channels
channel number, setting 9-20
configuring 9-49
CHAP-Password attribute C-2
CIDR format for subnet masks in
command entries 1-3
cipher suites, RSN
enabling 10-13
cipher suites, WPA 10-3
enabling 10-8
Class attribute C-3
class of service. See CoS (class of
service)
classless interdomain routing (CIDR)
format 1-3
clear SSID 9-17
CLI
idle timeout 5-16
CLI (command-line interface)
command description format 1-9
command prompts 1-2
command-line editing 1-7
conventions 1-1
help 1-8
history buffer command reuse 1-7
IP address and mask notation 1-3
keyboard shortcuts 1-7
list formats 1-6
MAC address globs 1-4
MAC address notation
1-3
overview 1-1
port list conventions 1-6
subnet mask notation 1-3
syntax notation 1-2
tabs for command completion 1-7
text entry conventions 1-2
user globs 1-4
VLAN identification 1-6
wildcard mask notation 1-3
client black list 22-8
clients
802.1X 19-9
DNS 5-16
HTTPS 5-15
no network access,
troubleshooting A-2
NTP 5-24
Telnet 5-12
wireless. See users
WPA 10-7
command description format 1-9
command prompts 1-2
command-line interface. See CLI
(command-line interface)
committed security ACLs
deleting 15-12
mapping 15-13
viewing 15-10
community strings 6-2
computer authentication 17-15
configuration
displaying 23-9
loading 23-11
missing, troubleshooting A-3
resetting 23-13
saving 3-10, 23-11
setting 23-11
configuration file 23-1
See also configuration
configuration template, APs 9-26
connection modes, CLI 1-1
connections
dual-homed F-1
port groups 4-11
verifying 5-27
console
access 3-5
authentication 3-7
disabling log output A-7
first-time configuration on 3-5
logging system messages to A-7
no authentication 3-7
passwords 3-8
sessions, clearing 21-2
sessions, displaying
21-2
target A-4
conventions, CLI 1-1
CoS (class of service)
default 15-5
filtering by, in security ACLs 15-4
priority assigned 15-5
countermeasures 22-1
enabling 22-11
SNMP notifications 22-12
countermeasures, TKIP 10-5
configuring 10-9, 10-13