Specifications
Index-6
password
case-sensitive 3-8
enable, changing 3-6
enable, setting 3-6
invalid for last-resort users 3-8,
17-36
one-time 16-8, 16-13
RADIUS 18-3
user 3-8
user in local database 3-8
PDAs, MAC addresses of 17-19
PEAP-MS-CHAP-V2
configuration scenario 17-67
defined 17-11
See also PEAP-MS-CHAP-V2
offload authentication
PEAP-MS-CHAP-V2 offload
authentication
configuration scenario 17-67
configuring 17-14
with pass-through, scenario 17-68
peer, Network Domain
configuring 8-6
PEM 16-9
performance issues A-13
permanent entries
ARP 5-25
FDB 4-21
permitted SSID list 22-7
permitted vendor list 22-6
Personal Information Exchange Syntax
Standard 16-4
Per-VLAN Spanning Tree (PVST) 13-1
ping
AAA and management ports D-1
setting ICMP parameters for 15-6
using 5-27
PKCS #10 object files 16-4
PKCS #12 object files 16-4
certificates, choosing 16-6
PKCS #7 object files 16-4
port control 19-2
port cost 13-2
configuring 13-4
displaying 13-12
port fast convergence 13-7
configuring 13-8
port groups 4-11
displaying 4-13
EtherChannel interoperability 4-13
port lists
authorization 17-64
conventions for 1-6
port priority 13-3
configuring 13-5
port types
clearing 4-4
configuring 4-1
defaults 4-2
resetting 4-4
ports
administrative state 4-8
autonegotiation 4-8
blocked by STP, displaying 13-12
clearing ACL maps from 17-49
filtering TCP and UDP packets by
15-7
HTTP 5-15
HTTPS 5-15
interface preference 4-6
mapping security ACLs to 15-14
naming 4-5
port groups 4-11
resetting 4-8
speed 4-7
SSH 5-11
static multicast router 14-4
statistics 4-10
statistics monitor 4-10
STP port cost 13-2
STP port cost, configuring 13-4
STP port cost, displaying 13-12
STP port priority 13-3
STP port priority, configuring 13-5
Telnet 5-13
types. See port types
VLANs, configuration scenario
4-24
wired, authentication on 19-2
power
locking down 11-8
preamble length 9-47
Privacy-Enhanced Mail (PEM) 16-9
private keys 16-3
product documentation iii
proxy reporting 14-2
pseudo-querier 14-2
public key cryptography 16-3
Public-Key Cryptography Standards
(PKCS) 16-4
public-key infrastructure 16-3
public-private key pair
Certificate Signing Request 16-6
creating 16-7
self-signed certificate 16-6
PVST+ (Per-VLAN Spanning Tree)
13-1
Q
QoS 12-9
querier
displaying 14-6
pseudo-querier 14-2
query interval 14-2
configuring 14-3
query response interval 14-2
configuring 14-3
QuickStart 2-8
quiet period, 802.1X 19-7
R
radar, AP response to 22-4
radio profiles 9-18
assigning radios 9-51
configuring 9-43, 9-44
default profile 9-19
disabling radios 9-52
displaying 9-58
enabling 9-51
removing 9-48
resetting a parameter 9-48
radios
assigning to a radio profile 9-51
beacon interval 9-44
beaconing SSIDs 9-40
channels 9-20, 9-49
counters 9-60
denial of configuration information,
troubleshooting A-2
disabling 9-52
DTIM interval 9-45
enabling 9-51
encryption 10-1
fragmentation threshold 9-46
long retry threshold 9-43
maximum receive threshold 9-46
maximum transmit threshold 9-46
preamble length 9-47
resetting 9-53
RTS threshold 9-45
short retry threshold 9-43
SSIDs 9-17, 9-39
transmit power 9-20, 9-49
RADIUS
accounting ports D-1
assigning attributes to users 17-46
assigning encryption types to user
sessions 17-50
authentication D-1
authentication scenario 3-11
authorization server timeout 19-8
clearing security ACL maps from
users 17-49
displaying server configuration
17-60
global defaults 18-3
load-balancing servers 18-7
mapping security ACLs to user
sessions 15-13, 17-49
offload authentication 17-9,
17-14
parameters, setting individually
18-5
pass-through authentication,
configuration scenario
17-66
password 18-3, 18-5