Specifications

Index-4
ACLs 15-7
guest users, last-resort access 17-36
H
hello interval
configuring 13-6
defined 13-6
help, command-line 1-8
history buffer, reusing commands in 1-7
hits, security ACLs
configuring 15-11
sampling 15-11
HTTPS, disabling 5-15
I
ICMP ACLs 15-6
IEEE 802.1X 17-11
IGMP snooping 14-1
displaying information 14-4
enabling 14-1
last member query interval 14-2
last member query interval,
configuring 14-3
other-querier-present interval 14-2
other-querier-present interval,
configuring 14-3
proxy reporting 14-2
pseudo-querier 14-2
querier, displaying 14-6
query interval 14-2
query interval, configuring 14-3
query response interval 14-2
query response interval,
configuring 14-3
robustness value 14-2
robustness value, configuring 14-3
router solicitation 14-3
statistics 14-6
timers 14-2
ignore list 22-10
image
AP, force download 9-34
image file 23-1
boot information 23-3
calculating checksum 23-7
upgrading 23-16
info logging level A-5
information element 10-6
informs, SNMP 6-5
input filters, reassigning 17-54
interfering device 22-2
Internet Control Message Protocol
(ICMP) ACLs 15-6
Internet Group Management Protocol.
See IGMP snooping
interval, WEP rekey 19-4
Intrusion Detection System (IDS) 22-12
ad-hoc networks 22-14
DoS attacks 22-13
flood attacks 22-13
log messages 22-15
Netstumbler 22-14
weak WEP keys 22-14
Wellenreiter 22-14
wireless bridges 22-14
invalid certificate, troubleshooting A-2
IP ACLs 15-4
IP addresses
aliases
5-18
configuring 5-2
conventions for entry and display
1-3
disabling 5-4
displaying 5-4
removing 5-4
system IP address 5-5
verifying 5-27
wildcard masks for, in security
ACLs 15-5
IP interfaces, configuration scenario
5-30
IP phones 15-23
IP routes 5-6
default 5-8
displaying 5-7
static 5-8
tracing 5-29
K
key pair, public-private 16-7
key transmission
enabling and disabling 19-3
time intervals 19-3
keyboard shortcuts for command entry
1-7
keys
802.1X WEP rekeying 19-4
public-private pair, creating 16-7
static WEP 10-16
transmission of 802.1X key
information 19-3
L
last member query interval 14-2
configuring 14-3
last-resort authentication
available encryption 17-12
last-resort username 17-36
passwords are invalid 3-8, 17-36
LEDs, AP blink mode 9-35
list formats for command entry 1-6
load balancing
APs 9-34
RADIUS server groups 18-7
load-sharing port groups 4-11
displaying 4-13
EtherChannel interoperability 4-13
local AAA method 17-9
local accounting records 17-57
local authentication
802.1X, configuring 17-14
configuration scenario 3-11
console users, scenario 3-11
defined 17-12
local override and backup
authentication, scenario
3-12
local database 3-8
assigning encryption types in
17-49
assigning security ACLs in 17-48
clearing users from 3-8
local facility, for log messages sent to a
server A-7
local override 3-2, 17-9
location policy
compared to a security ACL 17-52
configuration scenario 17-68
configuring 17-53
defined 17-52
disabling 17-55
displaying rules in 17-54
order of rules in 17-54
location policy rules
clearing 17-55
configuring 17-53
defined 17-52
displaying 17-54
positioning 17-54
reassigning security ACLs 17-54
log configuration A-9
log message components A-4
logging
console A-7
current session A-8
displaying current configuration
A-9
nonvolatile buffer A-6
session defaults A-8
syslog server A-7
trace, clearing A-12
trace, viewing A-12
logging destinations, configuring A-4
logging targets, configuring A-4
long retry threshold 9-43
lt (less than) operator in security ACLs
15-7
M
MAC address globs
configuring 17-20
conventions for 1-5
displaying network sessions by
21-6
matching order 1-5
single asterisks (*) in 1-5