712
I
NDEX
other-querier-present interval, configuring
371
proxy reporting
370
pseudo-querier
370
querier, displaying
375
query interval
370
query interval, configuring
371
query response interval
370
query response interval, configuring
371
robustness value
371
robustness value, configuring
371
router solicitation
372
statistics
374
timers
370
ignore list
579
image file
599
boot information
601
calculating checksum
606
upgrading
616
info logging level
625
information element
288
informs, SNMP
144
input filters, reassigning
502
interfering device
568
Internet Control Message Protocol (ICMP) ACLs
383
Internet Group Management Protocol. See IGMP
snooping
internet support
668
interval, WEP rekey
535
Intrusion Detection System (IDS)
584
ad-hoc networks
586
DoS attacks
585
flood attacks
585
log messages
587
Netstumbler
586
weak WEP keys
587
Wellenreiter
586
wireless bridges
586
invalid certificate, troubleshooting
620
IP ACLs
380
IP addresses
aliases
123
configuring
104
conventions for entry and display
29
disabling
107
displaying
107
removing
107
subnet masks for, notation conventions
29
system IP address
108
verifying
132
wildcard masks for, in security ACLs
382
IP interface, adding
104
IP interfaces, configuration scenario
135
IP phones
401
IP routes
108
default
111
displaying
110
static
111
tracing
133
K
key pair, public-private
421
key transmission
enabling and disabling
533
time intervals
533
keyboard shortcuts for command entry
33
keys
802.1X WEP rekeying
534
public-private pair, creating
421
static WEP
301
transmission of 802.1X key information
533
Knowledgebase
667
L
last member query interval
371
configuring
371
last-resort username, passwords are invalid
59
LEDs, MAP blink mode
229
license keys
668
list formats for command entry
32
load balancing, RADIUS server groups
526
load-balancing, RF load
267
load-sharing port groups
85
displaying
87
EtherChannel interoperability
87
local AAA method
443
local accounting records
505
local authentication
802.1X, configuring
450
configuration scenario
62
console users, scenario
62
defined
447
local override and backup authentication,
scenario
64
local database
59
assigning encryption types in
496
assigning security ACLs in
494
clearing users from
59
local facility, for log messages sent to a server
628
local override
52, 443
local packet switching, map configuration
252
location policy
compared to a security ACL
500
configuration scenario
516
configuring
501
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...