CISCO IOS-XE Wireless EFT User Manual
- June 10, 2024
- Cisco
Table of Contents
- IOS-XE Wireless EFT
- Product Information: IOS-XE 17.11.1 Wireless EFT Guide
- Compatibility Matrix
- Providing Feedback and Requesting Support
- Product Usage Instructions: IOS-XE 17.11.1 Wireless EFT Guide
- Pre-Requisites
- Upgrade Paths
- Efficient AP Image Download through TCP Feature Overview
- Introduction
- Network Topology
- Pre-requisites
- Compatibility Matrix
- Features to Test
- Configuration:
- Pre-Requisite:
- Show Commands
- Configuration & Verification:
- Troubleshooting:
- References
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
IOS-XE Wireless EFT
Product Information: IOS-XE 17.11.1 Wireless EFT Guide
The Cisco Enterprise Wireless solutions are designed to provide resilient and secure wireless networking with adaptive and insightful intelligence. The solutions are built on Cisco Digital Network Architecture, making them ready for the growing user expectations, IoT devices, and cloud-driven applications. The Cisco Catalyst 9800 Series Wireless Controllers based on IOS-XE were introduced in 2018 and have since undergone constant innovation, new platform introductions, feature enhancements, and feature parity additions, making them the best in enterprise-class in the market.
Compatibility Matrix
The compatibility matrix for IOS-XE 17.11.1 Wireless EFT Guide is available in the user manual.
Features to Test
The features to test include:
- Efficient AP image download through TCP
Providing Feedback and Requesting Support
If you encounter any issues or have additional comments or feedback during the EFT program, you can provide your feedback to the TME team. If you find issues or have additional comments or feedback after the EFT program concludes, you can still provide your feedback to the TME team.
Product Usage Instructions: IOS-XE 17.11.1 Wireless EFT Guide
Network Topology
The network topology depends on your specific setup and requirements. Refer to the user manual for more information.
Pre-Requisites
Test Setup
Before conducting the tests, ensure that you have:
- Cisco Catalyst 9800 Series Wireless Controllers
- Cisco Catalyst 9100 Access Points
- Test devices
Upgrade Paths
The upgrade paths are available in the user manual.
Efficient AP Image Download through TCP Feature Overview
Feature Description
The efficient AP image download through TCP feature allows for faster and more reliable AP image downloads through the use of TCP.
Feature Usage
To use the efficient AP image download through TCP feature, follow the instructions in the user manual.
Introduction
Cisco Enterprise Wireless solutions are resilient, have integrated security, and employ adaptive and insightful intelligence providing useful insight into your network. With intent-based networking built on Cisco Digital Network Architecture, Cisco Enterprise Wireless solutions go beyond the latest Wi-Fi 6 and WiFi 6E (802.11ax) standards and are ready for the growing user expectations, IoT devices, and next-gen cloud-driven applications.
IOS-XE 17.11.1 Wireless EFT Guide
Cisco Catalyst 9800 Series Wireless Controllers: The Catalyst controllers streamline the best of RF excellence with open, programmable Cisco IOS® XE benefits, meaning you no longer have two operating systems to manage. These modular, reliable, and highly secure controllers are flexible enough to deploy anywhere– including your choice of cloud.
Cisco Catalyst® 9100 Access Points: Going beyond the Wi-Fi 6 and 6E standard, the Cisco Catalyst 9100 access points provide integrated security, resiliency, and operational flexibility, as well as increased network intelligence. These access points extend Cisco’s intent-based network and scale to the growing demands of the Internet of Things (IoT) while fully supporting the latest innovations and newest technologies, making them perfect for organizations of all sizes.
To get a complete overview and learn more about Cisco Enterprise Wireless Products and Solutions, please visit the following page: https://www.cisco.com/c/en/us/products/wireless/index.html – ~resources
Cisco Catalyst 9800 Series Wireless Controllers based on IOS-XE was introduced to the market in the end of 2018 with IOS-XE Release 16.10.1. There have been constant innovations, new platform introductions, feature enhancements, and feature parity additions over the last couple of years to make Cisco Catalyst 9800 Series Wireless Controllers and Cisco Catalyst 9100 Access Points, the best in enterprise-class in the market.
This document provides a feature overview, configuration, and test scenarios for a few selected wireless features based on customer interest, for an early field trial of IOS-XE Release 17.11.1. We are pleased to welcome you to the EFT for the IOS-XE Wireless Software Release 17.11.1. Cisco recognizes and appreciates the time and effort that will be evaluating the features in this software release and hopes that you will find it meets your expectations. This software and accompanying documentation are being provided to you under the non-disclosure agreement between you, your organization, and Cisco. Please do not discuss this project and its features outside of the discussions on Cisco Beta-related mailing lists. This software is pre-release software and as such should never be used in a commercial operating environment or with mission- critical data. We recommend that you install this software on a test network/system initially and then move to production testing as you are more comfortable with it. Please use the software as you would normally in your day-to-day tasks and report any problems that you find.
Providing Feedback and requesting support
Details on providing feedback are given below. Also, note that throughout the
project we may ask for feedback on specific areas of the software. Your
feedback is vital to Cisco Systems in providing you with the features and
utility that you require to realize your individual mission. This EFT
represents an opportunity to see if this addresses your needs and to provide
input regarding its suitability. The EFT program start dates and timelines
have been communicated to you under a separate communication by the EFT
administrator. During the EFT period, at least one EFT software refresh will
be available during the EFT phase. In order to include as many fixes as
possible in this refresh release; you and your staff are encouraged to test
this software and provide feedback as early in the program as is possible.
There will be a cut-off at which point we will freeze development in order to
test and release the update image. The update will contain important fixes and
all participants are recommended to upgrade once the EFT refresh software is
available. If you find issues or have additional comments or feedback after
the EFT program concludes we still, as always welcome your feedback!
For us to track found issues, provide comments, or ask questions you can submit your query to: polariswireless-beta@cisco.com
Catalyst 9800 IOS XE 17.11.1 Software EFT Images: The below location
can be used to pull the latest EFT Images:
Catalyst 9800 platforms:
- Catalyst 9800-CL Wireless Controller for Cloud – https://software.cisco.com/download/beta/1572566934
- Catalyst 9800-80 Wireless Controller – https://software.cisco.com/download/beta/1536549615
- Catalyst 9800-L Wireless Controller – https://software.cisco.com/download/beta/1597144509
- Catalyst 9800-40 Wireless Controller – https://software.cisco.com/download/beta/1388071271
EWC (Embedded Wireless Controller on AP):
- Catalyst 9130AXI Access Point – https://software.cisco.com/download/beta/773616253
- Catalyst 9120AXI Access Point – https://software.cisco.com/download/beta/792652702
- Catalyst 9117AXI Access Point – https://software.cisco.com/download/beta/811480614
- Catalyst 9115AXI Access Point – https://software.cisco.com/download/beta/811599778
Again, thank you for your time an effort in helping Cisco to meet your needs.
We value this relationship and look forward to your comments and continued
support. Please do not hesitate to contact us if you have any questions now,
or at any point during the EFT.
Wireless Features Targeted for EFT (Early Field Trial) in IOS-XE Release
17.11.1:
Simplicity:
- C9800 Jumbo Frame Support for Radius/AAA packets
- Enhancement in client steering during Rolling AP Upgrade
- Efficient AP image download through TCP
- Intelligently disable 2.4 GHz radios
- Usability: AAA CLI request
- RPC for Syslog Configuration
Security:
- Improvements to Built-in Captive Portal
- Multi Authentication Combination of 802.1x w/AAA Override (Dynamic Vlan Assignment) and LWA (consent) on C9800
- A location-Capable attribute in the Access-Request messages as part of RFC5580
- C9800 optimization of client exclusion time with WPA3 SAE
Connectivity:
- Mesh: Background Scanning
- Zero Wait DFS: Support on C9136
Sustainability:
- Unable to query OIDs from CISCO-LWAPP-AP-MIB on 9800- Migration halted
- SNMP OIDs – Phase 2
Network Topology
Pre-requisites
Test Setup
Upgrade Paths
For the purpose of this EFT program, Cisco recommends following the below
upgrade path
- 17.3.6 -> 17.11.1 EFT Image (Cisco qualified)
- 17.6.4 -> 17.11.1 EFT Image (Cisco qualified)
- 17.10.1 -> 17.11.1 EFT Image (Cisco qualified)
Note: If the customers have C9130 running 17.3.x, to successfully upgrade
to 17.11, please upgrade to 17.6.x first.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-3/release-
notes/rn-17-39800.html#Cisco_Concept.dita_9d1727be-e4ff-48e0-bbfd-
cdb60f7b4054
Compatibility Matrix
Features to Test
C9800 Jumbo Frame Support for Radius/AAA packets
Feature Overview:
In all the Polaris releases (till date), by default the radius packet Fragmentation is done at 1396 bytes in the intermediate layer. Which means “interface IP MTU configuration” is not honored. This leads to the below issues like Fragmentation size is fixed and Jumbo Frames are not supported. By adding this feature, the interface IP MTU configuration will be honored. Which would cover all the possible customer use cases with consistent behavior on outgoing RADIUS packets. With the new design, the RADIUS packet gets fragmented at the interface IP MTU configured value. The user has to configure the required IP MTU value under the interface config and in order to use the configured IP MTU value for the RADIUS transaction user has to configure the interface name under the corresponding RADIUS group.
Pre-Requisite:
- This feature will be supported on all platforms from the 17.11.1 version. · Jumbo packet support is available on ISE 3.1 version onwards
Configuration:
Interface configuration: interface
Radius Configuration on controller: aaa group server radius RADIUS_GROUP
server name radius_server1 ip radius source-interface
ISE Configuration interface
Note: If IP MTU is changed on ISE, please expect a network service restart for ISE.
Verification
Packet capture on Radius Packets:
Enhancement in client steering during Rolling AP Upgrade
Feature Overview:
During software upgrades, the Rolling AP Upgrade allows there to be minimal
network connectivity downtime. This is because when an AP goes to reload with
the new image, the surrounding APs will be up to serve clients. When an AP is
selected to reload, the clients currently connected to it need to roam to a
different AP. To do this, the AP will no longer respond to client join
requests, and it will send 802.11v BSS transition management frames to all the
clients supporting 802.11v. This will notify them the AP is going to reload
and to roam to a new AP. For clients that do not support 802.11v or do not
roam, the controller will de-authenticate all the clients connected to the AP.
For more information on Rolling AP Upgrade, please check this link:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-6/configguide/b_wl_17_6_cg/m_hitless_upgrade.html
Pre-Requisite:
- Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1
Configuration & Verification:
- To enable client steering: C9800# conf t C9800(config)# ap upgrade staggered client-steering
- To disable client steering: C9800# conf t C9800(config)# no ap upgrade staggered client-steering
- To configure de-authenticating clients during upgrade before the AP reloads: C9800# conf t C9800(config)# ap upgrade staggered client-deauth
- To configure not de-authenticating clients during upgrade before the AP reloads: C9800# conf t C9800(config)# no ap upgrade staggered client-deauth
Efficient AP image download through TCP
Feature Overview:
Prior to IOS XE 17.11.1, the AP image download during software upgrades
utilized the CAPWAP control tunnel. However, the CAPWAP control tunnel is
often occupied as it is used for many other purposes. Also, the image download
time is limited by the CAPWAP window size. There is also a heavy load on the
C9800 as the AP image downloads cause the WNCD processes to heavily utilize
the CPU. With IOS XE 17.11.1, AP image downloads move out of the CAPWAP
control tunnel and into the out-of-band data plane, allowing the image
downloads to happen over HTTPS. By moving the download process to HTTPS, the
load on the WNCd processes is reduced and frees the CAPWAP control path.
Furthermore, by utilizing HTTPS and TCP, the image downloads are faster and
more flexible as the link type and speed can be specified. If the HTTPS
download fails, there is seamless fallback to the CAPWAP control tunnel. By
default, the image upgrade will leverage port 8443 in order to avoid impact on
the WebUI and telemetry streams on the C9800. This can be changed to fit the
deployment. The mechanism for AP image download is as follows:
Pre-Requisite:
Configuration & Verification:
T o enable AP upgrade to use HTTPS: C9800# conf t C9800(config)# ap upgrade method https
To configure the AP file transfer port: C9800# conf t C9800(config)# ap
file-transfer https port
Note: If left unconfigured, the C9800 will use port 8443.
To verify that the AP image download is using HTTPS: C9800# show ap upgrade method HTTPS: Enabled>
To verify that the AP image download is using HTTPS: C9800# show ap file- transfer https summary
To verify that the AP supports image download over HTTPS: C9800# show ap name SITE4-9120-1 config general | sec Upgrade
To verify that the AP image download over HTTPS: C9800# show ap name SITE4-9120-1 config general | sec Upgrade AP Upgrade Out-Of-Band Capability
Intelligently disable 2.4 GHz radios
Feature Overview:
- FRA Flexible Radio Assignment
- XOR Dual-Band Radios
- RRM Radio Resource Management
To provide a configurable option to move redundant dual band XOR radios in the network to monitor role only. Current IOS-XE implementation, FRA moves redundant dual-band (XOR 2.4GHz/5GHz) radios to either 5GHz client serving or Monitor function. There is no choice but to select a particular option based on the deployment. This feature will allow customers to configure and choose as per their requirements. FRA evaluates 2.4GHz coverage only and determines if overlapping coverage is creating interference. If detected, the feature will move dual-band (XOR 2.4/5GHz) radio to either a 5GHz Client serving or Monitor role. As per the current implementation, there is no option to choose. This feature implements a configuration option in the 2.4GHz RF profile to select the radio to move to monitor-only mode. As part of this feature, the customer will have a configurable option to select the redundant dualband (XOR 2.4/5GHz) radios in the network to operate in a monitor role. Currently, there is no option to choose an FRA that will move radios to either 5GHz client serving or monitor. With this option, customers can choose based on their deployment.
Pre-Requisite:
- Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1
- APs: C9115, C9120, C9130, C9136, CW9164, CW9166, CW9162
Configuration & Verification:
Default-RF-Profile [Global Config]:
wlc(config)#ap dot11 24ghz fra action ? monitor Configures FRA action as
monitor
GHz RF-Profile
mdc-prod-wc2(config)#ap dot11 24ghz rf-profile madhu-rf-profile-24 mdc-prod-
wc2(config-rf-profile)#fra action ? monitor Configures FRA action as monitor
WebUI Configuration [1/2 ] Navigate: Configuration > Radio Configuration
RRM > FRA > 2.4/ 5GHz Flexible Radio > FRA Action
WebUI Configuration [2/2 ] Navigate: Configuration > Tags & Profiles >
RF/Radio > Advanced > FRA Action
Select: Update and Apply to Device
Show Commands
mdc-prod-wc2#sh ap fra
- FRA State: Enabled
- FRA Freeze: Disabled
- FRA Operation State : Up
- FRA Sensitivity: higher (85%)
- FRA Interval: 1 Hour(s)
- Service Priority: Coverage
- Client Aware FRA: Enabled
- Client Select: 25%
- Client Reset: 5%
- FRA Action: 2.4GHz/Monitor
- Last Run: 3069 seconds ago
Show CLI [2/2]
mdc-prod-wc2#sh ap rf-profile
- Client Aware FRA: Disabled
- FRA Action: 2.4GHz/Monitor
mdc-prod-wc2#sh ap name AP7872.5DED.CB74 config slot 0 | sec Attribute Attributes for Slot 0
- Radio Type: 802.11n – 2.4/5 GHz
- Radio Mode: Monitor
- Radio Role: Monitor
- Assignment Method: Auto
- Monitor Mode Reason: Automatically Switched by FRA
Usability: AAA CLI request
Feature Overview:
To increase the user readability on the show command for the AAA server, a
new CLI “show aaa server brief” is introduced which will show all the
necessary details in tabular format. And the column includes the following
information:
- Access Requests
- Access-Accept
- Access-Reject
- Access Timeouts
- Outstanding Access Transactions
- Uptime
- Accounting Requests
- Accounting response
- Accounting Timeouts
- Outstanding Accounting Transactions
- Total Requests (Auth+Acct)
- Total Responses(Auth+Acct)
Pre-Requisite:
Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1
Configuration & Verification:
Configuration:
No configuration needed.
Verification:
show aaa server brief
RPC for Syslog Configuration
Feature Overview:
This feature enhancement provides yang RPC support for CLI `send log’ such
that they can send the syslog message to device. Basically, IOS-XE exec CLI
send log, sends the specified logs to the syslog server. It helps to validate
both syslog server and device to send and receive syslogs, now this can be
achieved through the yang programable interface.
Pre-Requisite:
Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 Yang RPC
support of this CLI `send log ‘will provide a mechanism to push the syslog
message to device. In turn, the device will send this message to a configured
Syslog server. The Netconf-yang and restconf should be configured on the C9800
C9800#show running-config | in rest restconf C9800#show running-config | in
net conf net conf-yang
Generally, the `send log’ is configured from CLI but in 17.11 we can send it through the programable interface as shown below
There should not be any empty message
On WLC we see the message is printed in the log message.
The following are the restrictions on the inputs:
- The string in the log message should be in plain text format.
- An empty log message is not allowed.
- Special characters are allowed in log messages, mnemonics, and facilities.
- No space is allowed in the Facility name and Mnemonics, unlike the log message.
- There are 3 ways for inputs:
- Only log message (In this case log message will be sent with default severity, facility, and mnemonics).
- Severity along with log message (In this case log-message will be sent with default facility and mnemonics)
- All 4 options log message, severity, facility, and mnemonics.
- Below is the list of default values:
- Severity 7
- Facility “SYS”
- Mnemonics “USERLOG_DEBUG”
Improvements to Built-in Captive Portal
Feature Overview:
International customers across varying legal entities must comply with all
local laws. A legal requirement that is becoming more apparent is the
inclusion of local languages in all operations. Within current implementations
of IOS-XE, the login portal banner text section is limited of around 200
chars. Additionally, the software does not allow for the input of special
chars such as “ö” or “à”. Within 17.11.1, the banner text CLI input limit will
be enhanced to accommodate up to 400 chars. Furthermore, both banner text and
banner title strings displayed in the HTML login page will now be able to
support special characters such as “ö” or “à” etc. Since the multi-line banner
is supported via CLI, it is possible to configure via YANG as well. If the
input string provided exceeds the maximum limit, an error message will be
thrown indicating the same, and the config will be rejected. The Webauth login
portal banner comprises of two parts.
- Banner title This can be customized using banner title <> CLI under web auth parameter map. The default title string is “Welcome to the Cisco Web-Authentication network.”
- Banner text This can be customized using banner text <> CLI under web auth parameter map. The default text string is “Cisco is pleased to provide web-authentication infrastructure for your network. Please login.”
Limitations:
- No WebUI support for this feature.
- Parser has a limitation of 254 characters per line (including the CLI keywords). Hence, user will need to keep this in account while providing the input
Pre-Requisite:
- Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1
- Users must have knowledge of Local Web-Auth, Banner text and banner title.
Troubleshooting:
Below IOS debug can be enabled to see if there was any problem in banner
config. debug ip admission all On binos side, we can enable wncd all module
verbose logs and collect the traces. RA internal logs can also be collected
for client-related debugging. Below command outputs should also be collected.
show parameter-map type webauth name <> test platform software database get
sm_exec_context/tbl_webauth_parammap;name=
Multi Authentication Combination of 802.1x w/AAA Override (Dynamic Vlan Assignment) and LWA (consent) on C9800
Feature Overview:
In a university setup, clients authenticate using 802.1X. As part of 802.1X
authentication, AAA server pushes the policies to be applied for the client.
VLAN is one attribute which is pushed from AAA server. Since dot1x is secure
and happens without any user intervention, the end users are not aware of
which network they are connected to. This could lead to problems if the
clients connect to university Wifi and the users post inappropriate posts or
visit inappropriate sites.
To circumvent this problem, the university has configured for WebAuth
authentication post 802.1X. Web-Consent is used as part of WebAuth to inform
the end users that they are connected to the University Wifi. However, as part
of Web-Consent, since, no AAA policy is applied, the previously applied AAA
policy gets removed. This results in VLAN change and leads to client
disconnection. This cycle continues and the client doesn’t get network access.
To fix this problem, CLI is introduced. If this CLI is configured, then the
policy applied via Consent would be merged with the policy applied for
802.1X/MAB.
Pre-Requisite:
- Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1
- Users must have knowledge on Multi Auth concepts, LWA(Consent), AAA override.
Enabling the Feature from CLI: Device# configure terminal Device(config
)#parameter-map type web auth LWA_consent Device(config-params-parameter-
map)#type consent Device(config-params-parameter-map)#consent activation-mode
merge
Disabling the Feature from CLI: Device# configure terminal Device(config
)#parameter-map type web auth LWA_consent Device(config-params-parameter-
map)#no consent activation-mode merge
Show command with the feature enabled from CLI: JD_9800-L_1#sh parameter- map type web auth name LWA_consent
- Parameter Map Name: LWA_consent
- Banner Title: Consent Title
- Banner Text: Please accept the consent
- Type: consent
- Auth-proxy Init State time: 300 sec
- Webauth max-http connection: 200
- Webauth logout-window: Enabled
- Webauth success-window: Enabled
- Consent Email: Disabled
- Activation Mode:
- Sleeping-Client: Merge
- Webauth login-auth-bypass: Disabled
policy applied via Consent would be merged with the policy applied for 802.1X/MAB.
Show command with feature disabled from CLI:|
JD_9800-L_1#sh parameter-map type webauth name LWA_consent
- Parameter Map Name: LWA_consent
- Consent Email: Disabled
- Activation Mode: Replace
policy applied via Consent would not be merged with the policy applied for 802.1X/MAB.
Limitations:
- No WebUI support for this feature.
- No SNMP support. Only Yang support would be added for this feature.
- When “activation-mode merge” is not configured on the WebAuth parameter map, then the default activation mode is REPLACE-ALL. This means that user-profile for consent would replace all previously applied user-profile policies.
Location-Capable attribute in the Access-Request messages as part of
RFC5580 Feature Overview:
The RFC 5580 location attributes convey location-related information for
authentication and accounting exchanges. The location information is useful in
several scenarios. Wireless networks are deployed in public places, such as
shopping malls, airports, hotels, and coffee shops by a diverse set of
operators, such as wireless internet service providers (WISPs), cellular
network operators, and fixed broadband networks. In all these scenarios, the
network may need to know the user location to enable location-aware
authorization, billing, or services. Please refer to the IOS-XE 17.9 config
guide for configuring RFC 5508 location attributes
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-9/configguide/b_wl_17_9_cg/m_rfc-5580
-loc-att-on-the-controller.html#Cisco_Reference.dita_aed3a65e9f99-4d8b-bddb-
a6c4e9c3fe54
RFC 5580 mentions three location delivery methods for location information to AAA server, as mentioned below:
- Location delivery based on Out-of-Band agreement
- Location delivery based on Initial request
- Location delivery based on Mid-Session request
In IOS-XE 17.11 release we are enhancing this feature by adding the location- capable attribute in the access request to the out-of-band agreement.
Pre-Requisite:
- Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1
- Users must have knowledge of AAA and 802.1x
Configuration & Verification:
The location-Capable attribute is sent as part of access requests only in case
of method 2 (Location delivery based on Initial request) which is initial-
request-based, but we are providing the support for this attribute in out-of-
band which is (Location delivery based on Out-of-Band agreement) To enable
this attribute following command needs to be configured on C9800. Currently,
its only supported from CLI C9800(config)#radius-server attribute wireless
location delivery outof-band include-location-capable
C9800 optimization of client exclusion time with WPA3 SAE Feature
Overview:
The SAE client exclusion mechanism is designed to protect the system from
using computational resources on processing invalid authentication requests
from malicious users. If a client fails SAE authentication multiple times (up
to 5), the C9800 will exclude the client for an exclusion time frame (default
60 sec). During this exclusion time, all authentication requests from this
client are dropped. In local mode, SAE authentication is processed on WLC
which counts the number of authentication failures and adds client into the
exclusion list when the count reaches a predefined threshold. The client will
be allowed to connect again after the exclusion timeout. The timeout value is
configurable to allow flexibility in enforcing client exclusion. Prior to IOS
XE 17.11.1, SAE exclusion implementation starts the exclusion process at
client cleanup time after authentication failure. It takes a couple of more
message exchanges between C9800 and client to reach the cleanup state. As the
client may back off before sending the next message, SAE commit, after
authentication failure, the time lapse varies between the failure and the
start of exclusion. We can optimize the flow by starting the exclusion process
right at the authentication failure (SAE confirm message mismatch) time. This
avoids the delay and excludes client sooner.
Pre-Requisite:
- Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 · This feature is for Local Mode deployments only.
Configuration & Verification:
The optimization for WPA3 SAE client exclusion takes places in the background,
and no extra configuration needs to be done.
To verify the client exclusions:
- C9800# show wireless exclusionlist
- client mac-address f2f8.4a03.a0e8 detail
- Client State : Excluded
- Client MAC Address : f2f8.4a03.a0e8
- Client IPv4 Address: N/A
- Client IPv6 Address: N/A
- Client Username: N/A
- Exclusion Reason : SAE authentication failure
- Authentication Method : None
- Protocol: N/A
- AP MAC Address : 0c75.bdb1.3f20
- AP Name: AP0C75.BDB1.EDA8
- AP slot : 0
- Wireless LAN Id : 7
- Wireless LAN Name:
- VLAN Id : 0
Mesh: Background Scanning Feature Overview:
Cisco Mesh access points (MAP) are interconnected over wireless links in a
spanning tree like topology. A MAP connected to the network via ethernet
uplink is designated as the root MAP aka RAP. AWPP protocol is used to
maintain the tree and form the tree. When a MAP comes up, it tries to look for
another MAP (parent) to join to reach the gateway eventually via a RAP. The
same happens when a MAP loose connectivity with its existing parent. This
procedure is known as mesh tree convergence. This document aims to improve the
convergence procedure to make is faster and robust. A MAP in search its parent
uplink undergoes following procedures:
- Parent loss detection (if connected already)
- Scan (passive) for a new parent across all / subset of regulatory domain channels
- Seek (request/response) on newfound parent on scanned/operable channels
- Evaluate and choose the best neighbor
- Select the neighbor as potential parent and authenticate via selected parent to WLC
- Retain / Renew IP and
- Restart CAPWAP to join back the WLC
This procedure today could take from tens of seconds to a minute. We plan to implement the following to improve it: Mesh Background Scanning and auto parent selection are mechanisms used by a MAP to find and connect faster to a better potential parent across channels and always maintain its uplink with a best parent.
Pre-Requisite:
C9800 running in latest EFT IOS-XE image with Mesh network Up and running.
**Topology:
**
Configuration & Verification:
To enable Background Scanning: In Mesh Profile (wireless profile mesh default-
mesh-profile), enable the background scanning(background-scanning)
Verification: Check the background scanning in show wireless profile mesh
detailed <mesh profile
Configure: C9800-CL-AWS(config)#wireless profile mesh
Verify: C9800-CL-AWS#show wireless profile mesh detailed
- Mesh Profile Name:
- Description: custom mesh profile
- Bridge Group Name: custom_bgn_name
- Background Scan: ENABLED
- Enable background scanning and verify functionality works as expected on C9124 MAP.
- Enable background scanning and verify functionality works as expected on C9124 MAP.
- Verify mesh network is UP and running stable.
- Enable background scanning.
- On C9124 MAP verify that feature is enabled and functioning.
Use:
* show mesh stats
* show mesh history recent
* show mesh adjacency all
* show mesh convergence
* show mesh res
* show mesh bags can config backhaul
* show mesh bags can config slot 1
* show mesh bags can channels backhaul
* show mesh bags can channels slot 1
* show mesh bags can status backhaul
* show mesh bags can status slot 1
* show mesh bags can schedule backhaul
* show mesh bags can schedule slot 1
5. Verify that MAP UT is aware of the full channel list on which mesh peers from the same BNG operate, i.e. it is receiving complete information during RES provisioning.
6. Verify MAP UT is able to establish full adjacencies with radio neighbors that belong to the same BGN.
7. Verify MAP UT will not create adjacencies with radio neighbors that are not members of the same BGN
- Verify impact on client traffic when background scanning is enabled on C9124
- C9124 MAP is operating on a 5GHz backhaul channel.
- Wireless clients are connected to 2.4GHz client serving radio and generating constant traffic.
- Enable background scanning.
- Verify that background scanning has no impact on the client’s traffic.
Zero Wait DFS: Support on C9136 Feature Overview:
- The U-Nii-2 and U-Nii-2C(e) bands also known as the “DFS Channels” (Dynamic Frequency Assignment) require a 60 second (or more) Channel Availability Check (CAC) before being used by Wi-Fi to ensure no radar is in operation.
- Zero Wait DFS allows for using the AP’s resources to perform a preemptive CAC before a channel change is initiated, eliminating the 60-600 second delay experienced on a channel change to any DFS channel
Prior to 17.8 IOS-XE release, DFS CAC has been performed on demand as a precursor to assuming WiFi operations on a channel. This behavior is required to verify that there is no operating radar on the channel we will assume. Once accessed, scanning must continue during channel operation and be immediately abandoned if Radar is detected. When RRM assigns a channel, it assigns the “best” channel available in the current DCA run. There is also a second-best channel assigned at the time which is labeled as a future channel. In the event of a radar detection on the current DFS channel, the Future channel would be scanned and then used. This “Mini DCA” run ensured that the succession channel was already a good choice based on the channel adjacencies. If that future channel happened to be a DFS required channel, then the AP would scan 60 seconds (or 600 seconds if ETSI TDWR Channels 120, 124, 128) and then assume beaconing again on the new channel. The Zero Wait DFS feature was introduced originally in IOS-XE 17.9 for ETSI and FCC Catalyst C9130 AP. The IOS-XE 17.11 release adds support for the Catalyst C9136 AP’s. Zero Wait DFS is heavily dependent on local regulatory bodies rules, and as such there are differences in the methods used, but minimal difference to the outcomes experienced.
ETSI Regulatory:
The concept of Pre-CAC is supported. In ETSI, once a channel has been cleared
by CAC it can be considered cleared by the AP and used without additional CAC
indefinitely until the AP is restarted.
- This allows the AP to scan as few or as many channels as we wish to hold for future use
- If AP needs to use a future channel, it may do so without performing CAC
- If Radar is detected on the serving channel, AP can move to a Pre-CAC Channel and broadcast immediately.
This feature effectively removes the 10-minute (600 second) penalty for using a TDWR channel (120,124,128) in ETSI.
FCC Regulatory:
FCC approach differs in that there is not provision for Pre-CAC. In FCC a
channel is only valid as long as a receiver is listening to it and providing
CAC data. This rule means that we can still CAC a future channel choice, but
it must be continuously CAC’d if we are to assume it radar free and begin
immediate operations. DCA already calculates the “second best” channel in any
channel assignment as of the time of the DCA run. With the second-best channel
we have a valid, If slightly less optimal, channel already selected that won’t
conflict with the rest of the APs to be used in the event of a Radar
detection. This channel can be continuously CAC’d and in this way maintain
readiness for immediate operations by the AP at any time. The Catalyst C9130
and C9136 radio chipsets have 3 DFS scanning engines. Running in Tri-Radio
mode will demand that two of these engines be engaged if two DFS channels are
assigned. However, the 3rd goes unused and can be dedicated to scan the future
channel(s).
- This allows the AP to continuously scan a future channel (determined by DCA)
- If AP needs to use a future channel, it may do so without performing CAC
- If Radar is detected on the serving channel, AP can move to the future Channel and broadcast immediately.
NOTE: Future channel CAC is performed continuously without impact to serving radio operations for zero client impact.
Dual 5 GHz Considerations:
Pre-CAC covers all channels and scenarios for the ETSI region. Rolling CAC for
FCC presents a couple of possible scenarios. In FCC we can continuously CAC
only one future channel. If both 5 GHz interfaces are assigned DFS channels,
then only one can have a fully CAC’d and ready future channel. In the event
that we do have two interfaces with DFS channels assigned, the second best
channel for each must still maintain 100 MHz separation from the other
interfaces channel at all times. In many cases this will end up in a different
band all together. In cases where both Future channels are DFS as well, then
the interface with the highest number of clients will get the priority for
rolling CAC. If the other interface detects radar -its channel change will
have to perform a normal CAC (60 seconds) before assuming operations.
Pre-Requisite:
- C9136I or C9130 -B or -E AP’s
- C9800 Controller running the 17.11.1 EFT code
- Console access to the controller
Testing this feature is straight forward. All states can be shown presently in CLI show commands. Configuration can be achieved at the GUI or CLI levels.
Configuration & Verification:
Zero Wait DFS can be enabled at the global level for all AP’s on the WLC or
through an RF profile to manage a subset of APs. There is no configuration
options for this feature.
To enable Zero Wait DFS on the GUI: On the controller GUI – select Configuration=>RRM=>5 GHz Band=> DCA and choose Zero Wait DFS option, check the box to enable at the global level.
To enable Globally from the CLI: C9800-L_17_11(config)#AP dot11 5ghz rrm channel zero-wait-dfs
To disable, use the no command: C9800-L_17_11(config)#no AP dot11 5ghz rrm channel zero-waitdfs
In all cases to verify that the feature is globally enabled, use the
following show command to determine the current global state for Zero Wait
DFS:
C9800-L_17_11#sh ap dot11 5ghz channel | i Zero
- Zero Wait DFS: Enabled
NOTE: Enabling Zero Wait DFS will only affect APs that it is supported on, presently just the Catalyst C9130AX AP’s. Other APs that are not supported will not be affected by the configuration option.
Enable Zero Wait DFS selectively through an RF Profile:
Zero Wait DFS can also be selectively applied through an RF -Profile allowing
granular selection of a subset of APs for which this setting will apply.
There is no prerequisite for enabling at the global level:
From the GUI, navigate from the main menu to: Configuration=> Tags &
Profiles => RF/Radio Select the 5 GHz RF Profile to modify or create a new one
and select RRM/DCA and check Zero Wait DFS check box.
To enable Zero Wait DFS in an RF Profile from the CLI:
- C9800-L_17_11(config)#ap dot11 5ghz rf-profile
- C9800-L_17_11(config-rf-profile)#channel zero-wait-dfs
- C9800-L_17_11(config-rf-profile)#no channel zero-wait-dfs
To verify the state of Zero Wait DFS for an individual AP, use the following show commands:
C9800-L_17_11#sh ap name C9130i_9f.6e.a0 config slot 1 | s Zero
- Zero Wait DFS Parameters
- Zero Wait DFS Capable: Yes
- CAC Domain: FCC
- Zero Wait DFS Enabled: Enabled
- DFS Channel Inclusion list: 60,64,104
- DFS Channel Exclusion list: 52,56,100,108,112,116,120,124,128,132,136,140,144
- Pre-CAC Status: NA (this is FCC so there is no Pre-CAC capability)
- Reserved Channel CAC Status : In Progress (indicates that off channel scanning is being run)
- Reserved Channel: 108
- Reserved Channel Width: 40 M
The Example above is for an FCC AP below is the example for ETSI
AIRV_VWLC2#sh ap name AP1416.9D28.0CC4 config slot 1 | s Zero
- Zero Wait DFS Parameters
- Zero Wait DFS Capable: Yes
- CAC Domain: ETSI
- Zero Wait DFS Enabled: Enabled
- DFS Channel Inclusion list: 52,132
- DFS Channel Exclusion list: 56,60,64,100,104,108,112,116,136,140
- Pre-CAC Status: In progress (ETSI
- Pre-CAC, running)
- Reserved Channel CAC Status: In Progress (indicates that off-channel scanning is being run)
- Reserved Channel: 100
- Reserved Channel Width: 20 MHz
Testcases:
In order to test Zero Wait DFS, follow the steps below.
Note : It is important to match the suggested configuration as the test radar command on the AP only operates on a 20 MHz channel, using this against an AP with wider channels can get unpredictable results.
To test either FCC or ETSI
- 1. Configure the AP for a single slot 5 GHz. Either turn off tri-band mode (operate as 8×8) or disable the slot 2 radio.
- 2. Ensure that Zero Wait DFS is configured and that a reserve channel has been selected
- C9800-L_17_11#sh ap name
config slot 1 | s Zero Zero Wait DFS Parameters
* Zero Wait DFS Capable CAC Domain: Yes : FCC
* Zero Wait DFS Enabled: Enabled
* DFS Channel Inclusion list DFS Channel Exclusion list: 52,60 : 56,64,100,104,108,112,116,120,124,128,132,136,140,144
* Pre-CAC Status Reserved Channel CAC Status: NA : Complete
* Reserved Channel Reserved Channel Width: 60 : 20 MHz
- 3. On the AP CLI execute the Test Spectrum Radar command test spectrum radar signal dot11Radio 1 center-frequency
bandwidth 20 The Center Frequency of the 20 MHz channel assignment needs to be entered in MHz. for channel 52, this value is 5260 MHz, channel bandwidth should be set to 20 MHz. - 4. Once the radar signal is triggered the AP should resume operations on the “reserve” channel immediately, without the usual 60 second CAC delay.
- C9800-L_17_11#sh ap name C9130i_9f.6e.a0 config slot 1 | s Zero
- Zero Wait DFS Parameters Zero Wait DFS Capable CAC Domain: Yes : FCC
- Zero Wait DFS Enabled: Enabled
- DFS Channel Inclusion list: 60 New
- Operating channel the former reserve channel
- DFS Channel Exclusion list: 52,56,64,100,104,108,112,116,120,124,128,132,136,140,144
- Pre-CAC Status: NA
- Reserved Channel CAC Status: In
- Progress CAC is in progress for the new Reserve Channel
- Reserved Channel: 56
- Channel 56 will be the new reserve channel
- Reserved Channel Width: 20 MHz
Unable to query OIDs from CISCO-LWAPP-AP-MIB on 9800Migration halted
Feature Overview:
This is a AireOS parity Feature. Few AP MIB OIDs are missing in C9800 WLCs.
This feature is to add support of those missing OIDs.
Pre-Requisite:
No specific pre-requisite needed. SNMP should be enabled in the C9800.
Configuration & Verification:
- Bring up a C9800 with the latest validated EFT image provided through EFT program.
- Connect an access point to this C9800
- Create a WLAN and connect a client to this WLAN
- Configure the SNMP communities(read/write)
- Make sure the C9800 is responding to the SNMP queries
- Validate the following latest introduced OIDs (walk/get/get next/set)
- cLApSlotWlanStats
- cLApRadioWlanInfoEntry
- cLApActiveClientCount
- cLApAssociatedClientCount
- cLApMemoryCurrentUsage
- cLApMemoryAverageUsage
- cLApCpuCurrentUsage
- cLApCpuAverageUsage
- cLApGlobalAPConnectCount
- clsSysApConnectCount
- cLApWlanStatsAssocClientNum
- cLApWlanStatsOnlineUserNum
SNMP OIDs – Phase 2 Feature Overview:
This feature is to cater customer request to support few SNMP variables which
are useful for 9800 deployments.
Following are the new OID additions:
- bsnDot11EssNumberOfMobileStations
- bsnDot11EssNumApsUp
- bsnDot11EssNumApsDown
- bsnAPOperationStatus
- cLApUpTime
- bsnGlobalDot11SystemMobileStations
- cLApGlobalAPConnectCount
Pre-Requisite:
- Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1
- SNMP manager should be enabled
- Private or Public SNMP community should be configured
Configuration & Verification:
Start with verifying if SNMP manager is enabled and communities are added on
the Cisco Catalyst 9800 controller.
- sri-dao#sh run | i
- snmp snmp-server group v3_ro_users v3 priv read preview
- snmp-server group v3_rw_users v3 priv write preview
- snmp-server view preview is included
- snmp-server community public RO
- snmp-server community private RW
- snmp-server community test RW
- snmp-server trap-source Vlan8
- snmp-server packet size 5000
- snmp-server enable traps
- snmp authentication link down linkup coldstart warm start
- snmp-server enables traps wireless wireless_mobility
- snmp-server enable traps config
- snmp-server enables traps rf
- snmp-server host 10.104.174.58 public
- SNMP-server host 9.2.14.175 public
- SNMP-server host 9.5.11.19 public
- SNMP-server manager
- field phy_ ht_cfg.cfg_data. snmp_freq_string
- field radio_oper_data.phy_ht_cfg.cfg_data. snmp_freq_string
- field radio_oper_data.phy_ht_cfg.cf8data. snmp freq_string
OID Verification on Cisco Catalyst 9800 Controller:
Use these commands on 9800 CLI
SNMP Response: reqid 25, errstat 17, erridx 1 cLApGlobalAPConnectCount.0 = 4
References
- Software Download - Cisco Systems
- Software Download - Cisco Systems
- Software Download - Cisco Systems
- Software Download - Cisco Systems
- Software Download - Cisco Systems
- Software Download - Cisco Systems
- Software Download - Cisco Systems
- Software Download - Cisco Systems
- Wireless Network, Wi-Fi Networking, and Mobility Solutions - Cisco
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>