Index
IN-8
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-6415-04
bridge
3-2
workgroup bridge
3-6
root access point
3-2
router mobile command
7-1, 7-2
S
secondary intersection
1-3
secure remote connections
4-39
Secure Shell
See
SSH
Secure Shell (SSH)
See
SSH
security
2-4
protocol
4-21
root device and non-root bridge settings
3-25
synchronizing
3-25
troubleshooting
8-3
security settings, Express Security page
2-4
self-healing wireless LAN
14-4
sequence numbers in log messages
6-6
server group
AAA
4-25
service set identifier (SSID)
3-7, 10-1, 15-1
set BOOT command
8-6
set command
8-6
set next hop loopback command
7-4
set-request operation
10-3
severity levels, defining in system messages
6-7
shared-key authentication
3-2
show controller dot11radio command
8-8
show controllers dot11Radio command
5-2, 8-2
show crypto ipsec command
7-5
show ip mobile router command
7-5
show ip mobile tunnel command
7-2
show vlan
5-6
Simple Network Management Protocol
See
SNMP
SNMP
accessing MIB variables with
10-3
agent
described
10-3
disabling
10-4
community strings
configuring
10-4
overview
10-3
configuration examples
10-9
default configuration
10-4
limiting system log messages to NMS
6-8
manager functions
10-2
MIBs, location of
12-2
overview
10-1, 10-3
snmp-server view
10-9
status, displaying
10-10
system contact and location
10-9
trap manager, configuring
10-8
traps
described
10-2
enabling
10-6
overview
10-1, 10-3
types of
10-6
versions supported
10-2
software images
delete from Flash
8-5
Spanning Tree Protocol (wireless bridge)
See
STP
speed command
8-6
SSH
crypto software image
4-39
described
4-39
description
2-2
displaying settings
4-40
SSH Communications Security, Ltd.
2-2
SSID
2.4-GHz radio
10-2
configuring
10-2
default (tsunami)
8-3
disable
10-2