CISCO Release 80 Wireless Controller Configuration User Guide

June 15, 2024
Cisco

Release 80 Wireless Controller Configuration

Cisco Wireless Controller Configuration Guide, Release 8.0

Specifications

The specifications and information regarding the products in
this manual are subject to change without notice. All statements,
information, and recommendations in this manual are believed to be
accurate but are presented without warranty of any kind, express or
implied. Users must take full responsibility for their application
of any products.

Product Information

The Cisco Wireless Controller is a core component of the Cisco
Wireless Solution. It provides centralized management and control
for wireless networks. The controller can be set up using either
wired or wireless methods. The configuration can be done through a
graphical user interface (GUI) or through a command-line interface
(CLI) configuration wizard.

Key Features

  • Cisco Mobility Express

  • AutoInstall Feature for Controllers Without a
    Configuration

  • Default Configurations

Components

The Cisco Wireless Controller consists of the following
components:

  • Controller Hardware
  • Controller Software
  • Configuration Wizard

Product Usage Instructions

Initial Setup

To set up the Cisco Wireless Controller, follow these steps:

  1. Cisco WLAN Express Setup: Connect the controller to the network
    and configure basic settings.

  2. Setting up Cisco Wireless Controller using Cisco WLAN Express
    (Wired Method): Connect the controller to the network using a wired
    connection and configure the controller.

  3. Setting up Cisco Wireless Controller using Cisco WLAN Express
    (Wireless Method): Connect the controller to the network using a
    wireless connection and configure the controller.

Default Configurations

The Cisco Wireless Controller comes with default configurations
that can be used as a starting point. These configurations include
basic settings such as network name, security settings, and access
point settings.

Configuring the Controller Using the Configuration Wizard

The Cisco Wireless Controller can be configured using the
Configuration Wizard. This wizard provides a step-by-step guide to
configure various settings such as wireless networks, security
policies, and user access.

Configuring the Controller (GUI)

The Cisco Wireless Controller can also be configured through a
graphical user interface (GUI). The GUI provides an intuitive
interface for managing and configuring the controller.

Configuring the Controller Using the CLI Configuration

Wizard

For advanced users, the Cisco Wireless Controller can be
configured through a command-line interface (CLI) configuration
wizard. This wizard allows for more granular control and
customization of the controller settings.

Using the AutoInstall Feature for Controllers Without a

Configuration

The AutoInstall feature allows for easy configuration of
controllers that do not have a pre-existing configuration. This
feature automatically applies a default configuration to the
controller upon startup.

Restrictions on AutoInstall

There are certain restrictions on the use of the AutoInstall
feature. These restrictions include compatibility limitations and
specific configuration requirements. Please refer to the
documentation for more information.

FAQ

Q: How can I access the Cisco Bug Search Tool?

A: You can access the Cisco Bug Search Tool by visiting the
following URL: https://www.cisco.com/c/en/us/support/bug-tools.html

Q: How can I provide feedback on the documentation?

A: You can provide feedback on the documentation by using the
Documentation Feedback feature on the Cisco website. Simply
navigate to the relevant documentation page and click on the
“Feedback” button.

Cisco Wireless Controller Configuration Guide, Release 8.0
First Published: 2014-08-18 Last Modified: 2019-05-31
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE- NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
© 2014­2019 Cisco Systems, Inc. All rights reserved.

CONTENTS

PREFACE
PART I CHAPTER 1 CHAPTER 2

Full Cisco Trademarks with Software License ?
Preface xlv Audience xlv Conventions xlv Related Documentation xlvi Communications, Services, and Additional Information xlvii Cisco Bug Search Tool xlvii Documentation Feedback xlvii
Overview 49
Cisco Wireless Solution Overview 1 Core Components 2 Overview of Cisco Mobility Express 3
Initial Setup 5 Cisco WLAN Express Setup 5 Setting up Cisco Wireless Controller using Cisco WLAN Express (Wired Method) 8 Setting up Cisco Wireless Controller using Cisco WLAN Express (Wireless Method) 10 Default Configurations 10 Configuring the Controller Using the Configuration Wizard 11 Configuring the Controller (GUI) 12 Configuring the Controller–Using the CLI Configuration Wizard 22 Using the AutoInstall Feature for Controllers Without a Configuration 25 Restrictions on AutoInstall 26

Cisco Wireless Controller Configuration Guide, Release 8.0 iii

Contents

PART II CHAPTER 3

Obtaining an IP Address Through DHCP and Downloading a Configuration File from a TFTP Server 26
Selecting a Configuration File 27 Example: AutoInstall Operation 28 Managing the Controller System Date and Time 29 Restrictions on Configuring the Controller Date and Time 29 Configuring the Date and Time (GUI) 29 Configuring the Date and Time (CLI) 30
Management of Controllers 33
Administration of Controller 35 Using the Controller Interface 35 Using the Controller GUI 35 Guidelines and Restrictions on using Controller GUI 36 Logging On to the GUI 36 Logging out of the GUI 37 Using the Controller CLI 37 Logging on to the Controller CLI 37 Using a Local Serial Connection 37 Using a Remote Telnet or SSH Connection 38 Logging Out of the CLI 39 Navigating the CLI 39 Enabling Web and Secure Web Modes 40 Enabling Web and Secure Web Modes (GUI) 41 Enabling Web and Secure Web Modes (CLI) 41 Telnet and Secure Shell Sessions 43 Configuring Telnet and SSH Sessions (GUI) 44 Configuring Telnet and SSH Sessions (CLI) 44 Configuring Telnet Privileges for Selected Management Users (GUI) 46 Configuring Telnet Privileges for Selected Management Users (CLI) 46 Management over Wireless 47 Enabling Management over Wireless (GUI) 47 Enabling Management over Wireless (CLI) 47

Cisco Wireless Controller Configuration Guide, Release 8.0 iv

Contents

CHAPTER 4 CHAPTER 5

Configuring Management using Dynamic Interfaces (CLI) 48
Managing Licenses 49 Cisco Wireless Controller Licensing 49 Installing a License 50 Installing a License (GUI) 50 Installing a License (CLI) 51 Viewing Licenses 51 Viewing Licenses (GUI) 51 Viewing Licenses (CLI) 52 Configuring the Maximum Number of Access Points Supported 55 Configuring Maximum Number of Access Points to be Supported (GUI) 55 Configuring Maximum Number of Access Points to be Supported (CLI) 56 Troubleshooting Licensing Issues 56 Activating an AP-Count Evaluation License 56 Information About Activating an AP-Count Evaluation License 56 Activating an AP-Count Evaluation License (GUI) 57 Activating an AP-Count Evaluation License (CLI) 58 Right to Use Licensing 59 Configuring Right to Use Licensing (GUI) 60 Configuring Right to Use Licensing (CLI) 60 Rehosting Licenses 61 Information About Rehosting Licenses 61 Rehosting a License 62 Rehosting a License (GUI) 62 Rehosting a License (CLI) 63 License Agent 64 Configuring the License Agent (GUI) 65 Configuring the License Agent (CLI) 66 Retrieving the Unique Device Identifier on Controllers and Access Points 67 Retrieving the Unique Device Identifier on Controllers and Access Points (GUI) 67 Retrieving the Unique Device Identifier on Controllers and Access Points (CLI) 67
Managing Software 69

Cisco Wireless Controller Configuration Guide, Release 8.0 v

Contents

CHAPTER 6 CHAPTER 7

Upgrading the Controller Software 69 Guidelines and Restrictions for Upgrading Controller Software 69 Upgrading Controller Software (GUI) 71 Upgrading Controller Software (CLI) 73 Predownloading an Image to an Access Point 75
Access Point Predownload Process 77 Guidelines and Restrictions for Predownloading an Image to an Access Point 78 Predownloading an Image to Access Points–Global Configuration (GUI) 79 Predownloading an Image to Access Points (CLI) 80 Bootloader and Recovery Image 82
Configuring Boot Order (GUI) 82 Recovering an Access Point Using TFTP 83
Managing Configuration 85 Resetting the Controller to Default Settings 85 Resetting the Controller to Default Settings (GUI) 85 Resetting the Controller to Default Settings (CLI) 86 Saving Configurations 86 Editing Configuration Files 86 Clearing the Controller Configuration 88 Restoring Passwords 88 Rebooting the Controller 89 Transferring Files to and from a Controller 89 Backing Up and Restoring Controller Configuration 89 Uploading Configuration Files 90 Downloading Configuration Files 92 Downloading a Login Banner File 94 Downloading a Login Banner File (GUI) 95 Downloading a Login Banner File (CLI) 96 Clearing the Login Banner (GUI) 97
Network Time Protocol Setup 99 Authentication for the Controller and NTP/SNTP Server 99 Guidelines and Restrictions on NTP 99

Cisco Wireless Controller Configuration Guide, Release 8.0 vi

Contents

CHAPTER 8 CHAPTER 9

Configuring the NTP/SNTP Server to Obtain the Date and Time (GUI) 99 Configuring the NTP/SNTP Server to Obtain the Date and Time (CLI) 100
High Availability 103 Information About High Availability 103 Restrictions for High Availability 108 Configuring High Availability (GUI) 111 Enabling High Availability (CLI) 113 Configuring High Availability Parameters (CLI) 114 Replacing the Primary Controller in an HA Setup 115
Managing Certificates 117 Information about Loading an Externally Generated SSL Certificate 117 Loading an SSL Certificate (GUI) 118 Loading an SSL Certificate (CLI) 118 Downloading Device Certificates 119 Downloading Device Certificates (GUI) 120 Downloading Device Certificates (CLI) 121 Uploading Device Certificates 122 Uploading Device Certificates (GUI) 122 Uploading Device Certificates (CLI) 123 Downloading CA Certificates 124 Download CA Certificates (GUI) 124 Downloading CA Certificates (CLI) 125 Uploading CA Certificates 126 Uploading CA Certificates (GUI) 126 Uploading CA Certificates (CLI) 127 Generating a Certificate Signing Request 127 Generating a Certificate Signing Request using OpenSSL 128 Generating a Certificate Signing Request using Cisco Wireless Controller (GUI) 130 Downloading Third-Party Certificate 131 Downloading Third-Party Certificate (GUI) 131 Downloading Third-Party Certificate (CLI) 132

Cisco Wireless Controller Configuration Guide, Release 8.0 vii

Contents

CHAPTER 10

AAA Administration 133 Setting up RADIUS for Management Users 133 Restrictions on Configuring RADIUS 135 Configuring RADIUS Authentication (GUI) 135 Configuring RADIUS Accounting Servers (GUI) 138 Configuring RADIUS (CLI) 141 RADIUS Authentication Attributes Sent by the Controller 146 Authentication Attributes Honored in Access-Accept Packets (Airespace) 148 RADIUS Accounting Attributes 156 RADIUS VSA 158 Sample RADIUS AVP List XML File 158 Downloading RADIUS AVP List (GUI) 159 Uploading RADIUS AVP List (GUI) 160 Uploading and Downloading RADIUS AVP List (CLI) 160 Per-WLAN RADIUS Source Support 161 Prerequisites for Per-WLAN RADIUS Source Support 161 Configuring Per-WLAN RADIUS Source Support (GUI) 161 Configuring Per-WLAN RADIUS Source Support (CLI) 162 Monitoring the Status of Per-WLAN RADIUS Source Support (CLI) 162 RADIUS Realm 163 Disabling Accounting Servers per WLAN (GUI) 166 User Login Policies 166 Configuring User Login Policies (GUI) 167 Configuring User Login Policies (CLI) 167 AAA Override (Identity Networking) 167 RADIUS Attributes Used in Identity Networking 168 Configuring Network Access Identifier (CLI) 171 Setting up TACACS+ 172 TACACS+ VSA 174 Configuring TACACS+ (GUI) 175 Configuring TACACS+ (CLI) 177 Maximum Local Database Entries 178 Configuring Maximum Local Database Entries (GUI) 179

Cisco Wireless Controller Configuration Guide, Release 8.0 viii

Contents

CHAPTER 11 CHAPTER 12

Configuring Maximum Local Database Entries (CLI) 179
Managing Users 181 Administrator Usernames and Passwords 181 Restrictions on Managing User Accounts 181 Configuring Usernames and Passwords (GUI) 181 Configuring Usernames and Passwords (CLI) 182 Lobby Ambassador Account 183 Creating a Lobby Ambassador Account (GUI) 183 Creating a Lobby Ambassador Account (CLI) 184 Creating Guest User Accounts as a Lobby Ambassador (GUI) 184 Guest Accounts 185 Viewing the Guest Accounts (GUI) 185 Viewing the Guest Accounts (CLI) 186 Password Policies 186 Configuring Password Policies (GUI) 186 Configuring Password Policies (CLI) 187
Ports and Interfaces 189 Ports 189 Distribution System Ports 190 Restrictions for Configuring Distribution System Ports 190 Service Port 190 Configuring Ports (GUI) 191 Configuring Ports (CLI) 192 Link Aggregation 193 Restrictions on Link Aggregation 194 Configuring Link Aggregation (GUI) 196 Configuring Link Aggregation (CLI) 196 Verifying Link Aggregation Settings (CLI) 197 Configuring Neighbor Devices to Support Link Aggregation 197 Choosing Between Link Aggregation and Multiple AP-Manager Interfaces 197 Interfaces 198 Restrictions for Configuring Interfaces 199

Cisco Wireless Controller Configuration Guide, Release 8.0 ix

Contents

Dynamic AP Management 199 WLANs 199 Management Interface 201
Configuring the Management Interface (GUI) 201 Configuring the Management Interface (CLI) 203 Virtual Interface 205 Configuring Virtual Interfaces (GUI) 205 Configuring Virtual Interfaces (CLI) 206 Service-Port Interfaces 206 Restrictions on Configuring Service-Port Interfaces 207 Configuring Service- Port Interfaces Using IPv4 (GUI) 207 Configuring Service-Port Interfaces Using IPv4 (CLI) 208 Configuring Service-Port Interface Using IPv6 (GUI) 209 Configuring Service-Port Interfaces Using IPv6 (CLI) 209 Dynamic Interface 210 Prerequisites for Configuring Dynamic Interfaces 210 Restrictions on Configuring Dynamic Interfaces 210 Configuring Dynamic Interfaces (GUI) 211 Configuring Dynamic Interfaces (CLI) 212 AP-Manager Interface 214 Restrictions for Configuring AP Manager Interface 214 Configuring the AP-Manager Interface (GUI) 215 Configuring the AP Manager Interface (CLI) 216 Configuration Example: Configuring AP-Manager on a Cisco 5500 Series Controller 216 Interface Groups 218 Restrictions on Configuring Interface Groups 218 Creating Interface Groups (GUI) 219 Creating Interface Groups (CLI) 219 Adding Interfaces to Interface Groups (GUI) 219 Adding Interfaces to Interface Groups (CLI) 220 Viewing VLANs in Interface Groups (CLI) 220 Adding an Interface Group to a WLAN (GUI) 220 Adding an Interface Group to a WLAN (CLI) 221

Cisco Wireless Controller Configuration Guide, Release 8.0 x

Contents

CHAPTER 13 CHAPTER 14

IPv6 Clients 223 IPv6 Client Mobility 223 Prerequisites for Configuring IPv6 Mobility 223 Restrictions on Configuring IPv6 Mobility 224 Global IPv6 224 Restrictions on Global IPv6 224 Configuring IPv6 Globally (GUI) 225 Configuring IPv6 Globally (CLI) 225 RA Guard 225 Configuring RA Guard (GUI) 226 Configuring RA Guard (CLI) 226 RA Throttling 226 Configuring RA Throttling (GUI) 226 Configuring the RA Throttle Policy (CLI) 227 IPv6 Neighbor Discovery 227 Configuring Neighbor Binding (GUI) 228 Configuring Neighbor Binding (CLI) 228
Access Control Lists 229 Information about Access Control Lists 229 Guidelines and Restrictions on Access Control Lists 230 Configuring Access Control Lists (GUI) 231 Applying an Access Control List to an Interface (GUI) 233 Applying an Access Control List to the Controller CPU (GUI) 233 Applying an Access Control List to a WLAN (GUI) 234 Applying a Preauthentication Access Control List to a WLAN (GUI) 235 Configuring Access Control Lists (CLI) 235 Applying Access Control Lists (CLI) 236 Layer 2 Access Control Lists 237 Restrictions on Layer 2 Access Control Lists 238 Configuring Layer 2 Access Control Lists (CLI) 238 Configuring Layer 2 Access Control Lists (GUI) 239 Applying a Layer2 Access Control List to a WLAN (GUI) 240

Cisco Wireless Controller Configuration Guide, Release 8.0 xi

Contents

CHAPTER 15 CHAPTER 16

Applying a Layer2 Access Control List to an AP on a WLAN (GUI) 241 DNS-based Access Control Lists 241
Guidelines and Restrictions on DNS-based Access Control Lists 242 Configuring DNS-based Access Control Lists (CLI) 242 Configuring DNS-based Access Control Lists (GUI) 243
Multicast/Broadcast Setup 245 Multicast/Broadcast Mode 245 Restrictions on Configuring Multicast Mode 247 Enabling Multicast Mode (GUI) 249 Enabling Multicast Mode (CLI) 250 Viewing Multicast Groups (GUI) 251 Viewing Multicast Groups (CLI) 251 Viewing an Access Point’s Multicast Client Table (CLI) 252 Media Stream 253 Prerequisites for Media Stream 253 Restrictions for Configuring Media Stream 253 Configuring Media Stream (GUI) 253 Configuring Media Stream (CLI) 257 Configuring Media Parameters (GUI) 258 Viewing and Debugging Media Stream 259 Multicast Domain Name System 260 Restrictions for Configuring Multicast DNS 262 Configuring Multicast DNS (GUI) 263 Configuring Multicast DNS (CLI) 265 Bonjour Gateway Based on Access Policy 268 Restrictions on Bonjour Gateway Based on Access Policy 268 Configuring mDNS Service Groups (GUI) 269 Configuring mDNS Service Groups (CLI) 269
Controller Security 271 FIPS, CC, and UCAPL 271 FIPS 271 FIPS Self-Tests 271

Cisco Wireless Controller Configuration Guide, Release 8.0 xii

CHAPTER 17
PART III CHAPTER 18 CHAPTER 19

Information About CC 272 Information About UCAPL 272 Configuring FIPS (CLI) 273 Configuring CC (CLI) 273 Configuring UCAPL (CLI) 274 Cisco TrustSec 274 Guidelines and Restrictions on Cisco TrustSec 276 Configuring Cisco TrustSec 276
Configuring Cisco TrustSec on Controller (GUI) 276 Configuring Cisco TrustSec on Cisco WLC (CLI) 277 SXP 277
SNMP 281 Guidelines and Limitations for SNMP 281 Configuring SNMP (CLI) 281 SNMP Community Strings 284 Changing the SNMP Community String Default Values (GUI) 284 Changing the SNMP Community String Default Values (CLI) 284 Configuring Real Time Statistics (CLI) 285 SNMP Trap Enhancements 286 Configuring SNMP Trap Receiver (GUI) 286
Mobility 289
Overview 291 Information About Mobility 291 Guidelines and Restrictions 294
Auto-Anchor Mobility 297 Information about Auto-Anchor Mobility 297 Restrictions for Auto-Anchor Mobility 298 Configuring Auto-Anchor Mobility (GUI) 299 Configuring Auto-Anchor Mobility (CLI) 300 Dynamic Anchoring for Clients with Static IP 301

Contents

Cisco Wireless Controller Configuration Guide, Release 8.0 xiii

Contents

CHAPTER 20
CHAPTER 21 CHAPTER 22 PART IV CHAPTER 23

How Dynamic Anchoring of Static IP Clients Works 302 Restrictions on Dynamic Anchoring for Clients With Static IP Addresses 302 Configuring Dynamic Anchoring of Static IP Clients (GUI) 303 Configuring Dynamic Anchoring of Static IP Clients (CLI) 303
Mobility Groups 305 Information About Mobility Groups 305 Prerequisites for Configuring Mobility Groups 308 Configuring Mobility Groups (GUI) 309 Configuring Mobility Groups (CLI) 311 Viewing Mobility Group Statistics (GUI) 313 Viewing Mobility Group Statistics (CLI) 314 Information about Encrypted Mobility Tunnel 315 Restrictions for Encrypted Mobility Tunnel 315 Configuring Global Encrypted Mobility Tunnel (GUI) 315 Configuring Global Encrypted Mobility Tunnel (CLI) 316
Configuring New Mobility 317 Information About New Mobility 317 Restrictions for New Mobility 317 Configuring New Mobility (GUI) 318 Configuring New Mobility (CLI) 319
Monitoring and Validating Mobility 321 Mobility Ping Tests 321 Restrictions for Mobility Ping Tests 321 Running Mobility Ping Tests (CLI) 321 WLAN Mobility Security Values 322
Wireless 325
Country Codes 327 Information About Configuring Country Codes 327 Restrictions for Configuring Country Codes 328

Cisco Wireless Controller Configuration Guide, Release 8.0 xiv

CHAPTER 24 CHAPTER 25

Configuring Country Codes (GUI) 328 Configuring Country Codes (CLI) 329
Radio Bands 333 802.11 Bands 333 Configuring the 802.11 Bands (GUI) 333 Configuring the 802.11 Bands (CLI) 334 802.11n Parameters 337 Configuring the 802.11n Parameters (GUI) 337 Configuring the 802.11n Parameters (CLI) 338 802.11ac Parameters 340 Restrictions for 802.11ac Support 341 Configuring the 802.11ac High-Throughput Parameters (GUI) 342 Configuring the 802.11ac High- Throughput Parameters (CLI) 342
Radio Resource Management 345 Information about Radio Resource Management 345 Radio Resource Monitoring 346 Benefits of RRM 346 Information About Configuring RRM 346 Restrictions for Configuring RRM 347 Configuring RRM (CLI) 347 Viewing RRM Settings (CLI) 352 RF Groups 352 Information About RF Groups 352 RF Group Leader 353 RF Group Name 355 Controllers and APs in RF Groups 355 Configuring RF Groups 356 Configuring an RF Group Name (GUI) 356 Configuring an RF Group Name (CLI) 356 Configuring the RF Group Mode (GUI) 357 Configuring the RF Group Mode (CLI) 357 Viewing RF Group Status 358

Contents

Cisco Wireless Controller Configuration Guide, Release 8.0 xv

Contents

Viewing the RF Group Status (GUI) 358 Viewing the RF Group Status (CLI) 359 Rogue Access Point Detection in RF Groups 359 Enabling Rogue Access Point Detection in RF Groups (GUI) 359 Configuring Rogue Access Point Detection in RF Groups (CLI) 360 Off-Channel Scanning Deferral 361 Configuring Off-Channel Scanning Deferral for WLANs 362 Configuring Off-Channel Scanning Deferral for a WLAN (GUI) 362 Configuring Off Channel Scanning Deferral for a WLAN (CLI) 362 RRM NDP and RF Grouping 363 Configuring RRM NDP (CLI) 363 Channels 364 Dynamic Channel Assignment 364 Configuring Dynamic Channel Assignment (GUI) 366 Configuring RRM Profile Thresholds, Monitoring Channels, and Monitor Intervals (GUI) 369 Overriding RRM 371 Statically Assigning Channel and Transmit Power Settings (GUI) 371 Statically Assigning Channel and Transmit Power Settings (CLI) 373 Disabling Dynamic Channel and Power Assignment (CLI) 376 802.11h Parameters 377 Configuring the 802.11h Parameters (GUI) 377 Configuring the 802.11h Parameters (CLI) 377 Transmit Power Control 378 Overriding the TPC Algorithm with Minimum and Maximum Transmit Power Settings 379 Configuring Transmit Power Control (GUI) 379 Coverage Hole Detection and Correction 380 Configuring Coverage Hole Detection (GUI) 381 RF Profiles 382 Prerequisites for Configuring RF Profiles 385 Restrictions on Configuring RF Profiles 385 Configuring an RF Profile (GUI) 386 Configuring an RF Profile (CLI) 387 Applying an RF Profile to AP Groups (GUI) 389 Applying RF Profiles to AP Groups (CLI) 390

Cisco Wireless Controller Configuration Guide, Release 8.0 xvi

Contents

CHAPTER 26

Debug RRM Issues (CLI) 390 CleanAir 391
Role of the Cisco Wireless LAN Controller in a Cisco CleanAir System 391 Interference Types that Cisco CleanAir Can Detect 392 Persistent Devices 393
Persistent Devices Detection 393 Persistent Devices Propagation 393 Detecting Interferers by an Access Point 393 Detecting Persistent Sources of Interference 394 Prerequisites for CleanAir 394 Restrictions for CleanAir 394 Configuring Cisco CleanAir on the Controller 395 Configuring Cisco CleanAir on Cisco WLC (GUI) 395 Configuring Cisco CleanAir on Cisco WLC (CLI) 397 Configuring Cisco CleanAir on an Access Point 401 Configuring Cisco CleanAir on an Access Point (GUI) 401 Configuring Cisco CleanAir on an Access Point (CLI) 402 Monitoring Interference Devices 402 Prerequisites for Monitoring the Interference Devices 402 Monitoring the Interference Device (GUI) 403 Monitoring the Interference Device (CLI) 404 Monitoring Persistent Devices (GUI) 406 Monitoring Persistent Devices (CLI) 407 Monitoring the Air Quality of Radio Bands 407
Wireless Quality of Service 413 Call Admission Control 413 Voice and Video Parameters 413 Configuring Voice Parameters 413 Configuring Voice Parameters (GUI) 413 Configuring Voice Parameters (CLI) 415 Configuring Video Parameters 416 Configuring Video Parameters (GUI) 416 Configuring Video Parameters (CLI) 417

Cisco Wireless Controller Configuration Guide, Release 8.0 xvii

Contents

CHAPTER 27

Viewing Voice and Video Settings 418 Viewing Voice and Video Settings (GUI) 418 Viewing Voice and Video Settings (CLI) 419
Configuring SIP-Based CAC 422 Restrictions for SIP-Based CAC 422 Configuring SIP-Based CAC (GUI) 423 Configuring SIP-Based CAC (CLI) 423
Voice Prioritization Using Preferred Call Numbers 423 Prerequisites for Configuring Voice Prioritization Using Preferred Call Numbers 424 Configuring a Preferred Call Number (GUI) 424 Configuring a Preferred Call Number (CLI) 424
Enhanced Distributed Channel Access Parameters 425 Configuring EDCA Parameters (GUI) 425 Configuring EDCA Parameters (CLI) 426
Key Telephone System-Based CAC 427 Restrictions for Key Telephone System-Based CAC 427 Configuring KTS-based CAC (GUI) 428 Configuring KTS-based CAC (CLI) 428
Application Visibility and Control 429 Restrictions for Application Visibility and Control 431 Configuring Application Visibility and Control (GUI) 431 Configuring Application Visibility and Control (CLI) 432
NetFlow 433 Configuring NetFlow (GUI) 434 Configuring NetFlow (CLI) 434
QoS Profiles 435 Configuring QoS Profiles (GUI) 436 Configuring QoS Profiles (CLI) 438 Assigning a QoS Profile to a WLAN (GUI) 439 Assigning a QoS Profile to a WLAN (CLI) 441
Location Services 443 Optimizing RFID Tracking on Access Points 443 Optimizing RFID Tracking on Access Points (GUI) 443

Cisco Wireless Controller Configuration Guide, Release 8.0 xviii

Contents

CHAPTER 28

Optimizing RFID Tracking on Access Points (CLI) 444 Location Settings 445
Configuring Location Settings (CLI) 445 Viewing Location Settings (CLI) 447 Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues (CLI) 448 Viewing NMSP Settings (CLI) 448 Debugging NMSP Issues 449 Probe Request Forwarding 450 Configuring Probe Request Forwarding (CLI) 450 CCX Radio Management 451 Radio Measurement Requests 451 Location Calibration 452 Configuring CCX Radio Management 452
Configuring CCX Radio Management (GUI) 452 Configuring CCX Radio Management (CLI) 453 Viewing CCX Radio Management Information (CLI) 453 Debugging CCX Radio Management Issues (CLI) 454 Mobile Concierge 455 Configuring Mobile Concierge (802.11u) (GUI) 455 Configuring Mobile Concierge (802.11u) (CLI) 456 802.11u MSAP 457 Configuring 802.11u MSAP (GUI) 458 Configuring MSAP (CLI) 458 Configuring 802.11u HotSpot 458 Information About 802.11u HotSpot 458 Configuring 802.11u HotSpot (GUI) 459 Configuring HotSpot 2.0 (CLI) 459 Configuring Access Points for HotSpot2 (GUI) 461 Configuring Access Points for HotSpot2 (CLI) 462 Downloading the Icon File (CLI) 465
Wireless Intrusion Detection System 467 Protected Management Frames (Management Frame Protection) 467 Configuring Infrastructure MFP (GUI) 468

Cisco Wireless Controller Configuration Guide, Release 8.0 xix

Contents

CHAPTER 29

Viewing the Management Frame Protection Settings (GUI) 469 Configuring Infrastructure MFP (CLI) 469 Viewing the Management Frame Protection Settings (CLI) 470 Debugging Management Frame Protection Issues (CLI) 470 Rogue Management 470 Configuring Rogue Detection (GUI) 471 Configuring Rogue Detection (CLI) 474 Rogue Access Point Classification 477 Guidelines and Restrictions for Classifying Rogue Access Points 479 Configuring Rogue Classification Rules (GUI) 480 Viewing and Classifying Rogue Devices (GUI) 484 Configuring Rogue Classification Rules (CLI) 487 Viewing and Classifying Rogue Devices (CLI) 489 Intrusion Detection System Signatures 492 Uploading or Downloading IDS Signatures 494 Configuring IDS Signatures (GUI) 495 Viewing IDS Signature Events (GUI) 497 Configuring IDS Signatures (CLI) 498 Viewing IDS Signature Events (CLI) 499 Cisco Intrusion Detection System 500 Shunned Clients 500 Configuring IDS Sensors (GUI) 500 Viewing Shunned Clients (GUI) 501 Configuring IDS Sensors (CLI) 502 Viewing Shunned Clients (CLI) 503 Wireless Intrusion Prevention System 504 Restrictions for wIPS 509 Configuring wIPS on an Access Point (GUI) 510 Configuring wIPS on an Access Point (CLI) 510 Viewing wIPS Information (CLI) 511 Cisco Adaptive wIPS Alarms 512
Advanced Wireless Tuning 513 Aggressive Load Balancing 513

Cisco Wireless Controller Configuration Guide, Release 8.0 xx

CHAPTER 30
PART V CHAPTER 31

Configuring Aggressive Load Balancing (GUI) 514 Configuring Aggressive Load Balancing (CLI) 514 Reanchoring of Roaming Voice Clients 515 Restrictions for Configuring Reanchoring of Roaming Voice Clients 515 Configuring Reanchoring of Roaming Voice Clients (GUI) 516 Configuring Reanchoring of Roaming Voice Clients (CLI) 516 SpectraLink NetLink Telephones 517 Enabling Long Preambles (GUI) 517 Enabling Long Preambles (CLI) 518 Receiver Start of Packet Detection Threshold 518 Guidelines and Restrictions for RxSOP 519 Configuring Rx SOP (GUI) 519 Configuring RxSOP (CLI) 520
Timers 521 Information about Wireless Timers 521 Configuring Wireless Timers (GUI) 521 Configuring Wireless Timers (CLI) 521
Access Points 523
AP Power and Uplink LAN Connections 525 Power over Ethernet 525 Configuring Power over Ethernet (GUI) 525 Configuring Power over Ethernet (CLI) 526 Cisco Discovery Protocol 528 Restrictions for Cisco Discovery Protocol 528 Configuring the Cisco Discovery Protocol 530 Configuring the Cisco Discovery Protocol (GUI) 530 Configuring the Cisco Discovery Protocol (CLI) 531 Viewing Cisco Discovery Protocol Information 532 Viewing Cisco Discovery Protocol Information (GUI) 532 Viewing Cisco Discovery Protocol Information (CLI) 534 Getting CDP Debug Information 535

Contents

Cisco Wireless Controller Configuration Guide, Release 8.0 xxi

Contents

CHAPTER 32

Cisco 700 Series Access Points 535 Configuring Cisco 700 Series Access Points 536 Enabling the LAN Ports (CLI) 536
AP Connectivity to Controller 537 CAPWAP 537 Restrictions for Access Point Communication Protocols 538 Viewing CAPWAP Maximum Transmission Unit Information 538 Debugging CAPWAP 539 Link Latency 539 Restrictions for Link Latency 540 Configuring Link Latency (GUI) 540 Configuring Link Latency (CLI) 541 Preferred Mode 542 Guidelines for Configuring Preferred Mode 542 Configuring CAPWAP Preferred Mode (GUI) 542 Configuring CAPWAP Preferred Mode (CLI) 543 IPv6 CAPWAP UDP Lite 544 Configuring UDP Lite Globally (GUI) 544 Configuring UDP Lite on AP (GUI) 545 Configuring the UDP Lite (CLI) 545 Data Encryption 546 Restrictions on Data Encryption 547 Upgrading or Downgrading DTLS Images for Cisco 5508 WLC 548 Guidelines When Upgrading to or from a DTLS Image 548 Configuring Data Encryption (GUI) 549 Configuring Data Encryption (CLI) 549 VLAN Tagging for CAPWAP Frames from Access Points 550 Configuring VLAN Tagging for CAPWAP Frames from Access Points (GUI) 550 Configuring VLAN Tagging for CAPWAP Frames from Access Points (CLI) 551 Discovering and Joining Controllers 551 Controller Discovery Process 551 Guidelines and Restrictions on Controller Discovery Process 553 Using DHCP Option 43 and DHCP Option 60 553

Cisco Wireless Controller Configuration Guide, Release 8.0 xxii

Contents
Backup Controllers 554 Restrictions for Configuring Backup Controllers 554 Configuring Backup Controllers (GUI) 554 Configuring Backup Controllers (CLI) 556
Failover Priority for Access Points 558 Configuring Failover Priority for Access Points (GUI) 559 Configuring Failover Priority for Access Points (CLI) 560 Viewing Failover Priority Settings (CLI) 560
AP Retransmission Interval and Retry Count 561 Restrictions for Access Point Retransmission Interval and Retry Count 561 Configuring the AP Retransmission Interval and Retry Count (GUI) 561 Configuring the Access Point Retransmission Interval and Retry Count (CLI) 562
Authorizing Access Points 562 Authorizing Access Points Using SSCs 563 Authorizing Access Points for Virtual Controllers Using SSC 563 Authorizing Access Points Using MICs 564 Authorizing Access Points Using LSCs 564 Configuring Locally Significant Certificates (GUI) 565 Configuring Locally Significant Certificates (CLI) 566 Authorizing Access Points (GUI) 568 Authorizing Access Points (CLI) 569
AP Wired 802.1X Supplicant 569 Prerequisites for Configuring Wired 802.1X Authentication for Access Points 570 Restrictions for Authenticating Access Points 571 Configuring Authentication for Access Points (GUI) 571 Configuring Authentication for Access Points (CLI) 572 Configuring the Switch for Authentication 573
Configuring a Static IP Address on a Lightweight Access Point 574 Configuring a Static IP Address (GUI) 574 Configuring a Static IP Address (CLI) 575
Troubleshooting the Access Point Join Process 576 Configuring the Syslog Server for Access Points (CLI) 578 Viewing Access Point Join Information 579 Viewing Access Point Join Information (GUI) 579
Cisco Wireless Controller Configuration Guide, Release 8.0 xxiii

Contents

CHAPTER 33 CHAPTER 34

Viewing Access Point Join Information (CLI) 580
Managing APs 583 Access Point Modes 583 Global Credentials for Access Points 584 Restrictions for Global Credentials for Access Points 585 Configuring Global Credentials for Access Points 585 Configuring Global Credentials for Access Points (GUI) 585 Configuring Global Credentials for Access Points (CLI) 586 Configuring Telnet and SSH for Access Points 587 Configuring Telnet and SSH for APs (GUI) 587 Configuring Telnet and SSH for APs (CLI) 588 Embedded Access Points 588 Spectrum Expert Connection 589 Guidelines and Limitations for Spectrum Expert Connection 590 Configuring Spectrum Expert (GUI) 590 Cisco Universal Small Cell 8×18 Dual-Mode Module 592 Configuring Cisco Universal Small Cell 8×18 Dual-Mode Module 593 Configuring USC8x18 Dual-Mode Module in Different Scenarios 593 LED States for Access Points 595 Configuring the LED State for Access Points in a Network Globally (GUI) 596 Configuring the LED State for Access Point in a Network Globally (CLI) 596 Configuring LED State on a Specific Access Point (GUI) 596 Configuring LED State on a Specific Access Point (CLI) 596 Configuring Flashing LEDs 597 Information About Configuring Flashing LEDs 597 Configuring Flashing LEDs (CLI) 597 Configuring LED Flash State on a Specific Access Point (GUI) 597 Access Points with Dual- Band Radios 598 Configuring Access Points with Dual-Band Radios (GUI) 598 Configuring Access Points with Dual-Band Radios (CLI) 598
AP Groups 599 Access Point Groups 599

Cisco Wireless Controller Configuration Guide, Release 8.0 xxiv

Contents

PART VI CHAPTER 35

Restrictions for Configuring Access Point Groups 600 Configuring Access Point Groups 600 Creating Access Point Groups (GUI) 601 Creating Access Point Groups (CLI) 603 Viewing Access Point Groups (CLI) 604 802.1Q-in-Q VLAN Tagging 604 Restrictions for 802.1Q-in-Q VLAN Tagging 605 Configuring 802.1Q-in-Q VLAN Tagging (GUI) 605 Configuring 802.1Q-in-Q VLAN Tagging (CLI) 606
Mesh Access Points 607
Connecting Mesh Access Points to the Network 609 Overview 609 Adding Mesh Access Points to the Mesh Network 610 Adding MAC Addresses of Mesh Access Points to MAC Filter 611 Adding the MAC Address of the Mesh Access Point to the Controller Filter List (CLI) 611 Defining Mesh Access Point Role 612 Configuring the AP Role (CLI) 612 Configuring Multiple Controllers Using DHCP 43 and DHCP 60 612 Configuring External Authentication and Authorization Using a RADIUS Server 613 Configuring RADIUS Servers 614 Enable External Authentication of Mesh Access Points (CLI) 614 View Security Statistics (CLI) 615 Mesh PSK Key Provisioning 615 CLI Commands for PSK Provisioning 616 Configuring Global Mesh Parameters 617 Configuring Global Mesh Parameters (CLI) 617 Viewing Global Mesh Parameter Settings (CLI) 618 Backhaul Client Access 619 Configuring Backhaul Client Access (GUI) 620 Configuring Backhaul Client Access (CLI) 620 Configuring Local Mesh Parameters 620 Configuring Wireless Backhaul Data Rate 621

Cisco Wireless Controller Configuration Guide, Release 8.0 xxv

Contents

Configuring Ethernet Bridging 623 Configuring Native VLAN (CLI) 624 Configuring Bridge Group Names 625 Configuring Bridge Group Names (CLI) 625 Configuring Antenna Gain 625 Configuring Antenna Gain (CLI) 626 Configuring Advanced Features 626 Configuring Ethernet VLAN Tagging 626
Ethernet Port Notes 627 VLAN Registration 628 Configuring Ethernet VLAN Tagging (CLI) 630 Viewing Ethernet VLAN Tagging Configuration Details (CLI) 631 Workgroup Bridge Interoperability with Mesh Infrastructure 631 Configuring Workgroup Bridges 633 Guidelines for Configuration 636 Configuration Example 636 WGB Association Check 638 Link Test Result 639 WGB Wired/Wireless Client 640 Client Roaming 641 WGB Roaming Guidelines 642 Configuration Example 642 Troubleshooting Tips 643 Configuring Voice Parameters in Indoor Mesh Networks 643 Call Admission Control 643 Quality of Service and Differentiated Services Code Point Marking 644 Guidelines For Using Voice on the Mesh Network 649 Voice Call Support in a Mesh Network 650 Enabling Mesh Multicast Containment for Video 651 Viewing the Voice Details for Mesh Networks (CLI) 651 Enabling Multicast on the Mesh Network (CLI) 655 IGMP Snooping 655 Locally Significant Certificates for Mesh APs 656 Guidelines for Configuration 657

Cisco Wireless Controller Configuration Guide, Release 8.0 xxvi

Contents

CHAPTER 36

Differences Between LSCs for Mesh APs and Normal APs 657 Certificate Verification Process in LSC AP 657 Getting Certificates for LSC Feature 658 Configuring a Locally Significant Certificate (CLI) 659 LSC only MAP Authentication using wild card MAC 660 LSC-Related Commands 661 Controller GUI Security Settings 663 Deployment Guidelines 664 Configuring Antenna Band Mode 664 Information About Configuring Antenna Band Modes 664 Configuring Antenna Band Mode (CLI) 664 Configuring Daisy Chaining on Cisco Aironet 1530 Series Access Points 665 Information About Daisy Chaining the Cisco Aironet 1530 Series Access Points 665 Configuring Daisy Chaining (CLI) 669 Configuring a Daisy-Chain 670 Configuring Mesh Convergence 672 Information About Mesh Convergence 672 Restrictions on Mesh Convergence 672 Configuring Mesh Convergence (CLI) 673 Switching Between LWAPP and Autonomous Images (AP CLI) 673
Checking the Health of the Network 675 Show Mesh Commands 675 Viewing General Mesh Network Details 675 Viewing Mesh Access Point Details 677 Viewing Global Mesh Parameter Settings 678 Viewing Bridge Group Settings 679 Viewing VLAN Tagging Settings 679 Viewing DFS Details 679 Viewing Security Settings and Statistics 680 Viewing GPS Status 680 Viewing Mesh Statistics for a Mesh Access Point 681 Viewing Mesh Statistics for a Mesh Access Point (GUI) 681 Viewing Mesh Statistics for a Mesh Access Point (CLI) 684

Cisco Wireless Controller Configuration Guide, Release 8.0

xxvii

Contents

CHAPTER 37
PART VII CHAPTER 38

Viewing Neighbor Statistics for a Mesh Access Point 685 Viewing Neighbor Statistics for a Mesh Access Point (GUI) 685 Viewing the Neighbor Statistics for a Mesh Access Point (CLI) 686
Troubleshooting Mesh Access Points 689 Installation and Connections 689 Debug Commands 690 Remote Debug Commands 690 AP Console Access 691 Cable Modem Serial Port Access from an AP 691 Configuration 692 Mesh Access Point CLI Commands 694 Mesh Access Point Debug Commands 697 Defining Mesh Access Point Roles 697 Backhaul Algorithm 697 Passive Beaconing (Anti-Stranding) 698 Dynamic Frequency Selection 699 DFS in RAP 700 DFS in MAP 700 Preparation in a DFS Environment 701 Monitoring DFS 703 Frequency Planning 703 Good Signal-to- Noise Ratios 704 Access Point Placement 704 Bridge Group Name Misconfiguration 704 Misconfiguration of the Mesh Access Point IP Address 705 Misconfiguration of DHCP 706 Identifying the Node Exclusion Algorithm 706 Throughput Analysis 708
Client Network 711
Client Traffic Forwarding Configurations 713 802.3 Bridging 713

xxviii

Cisco Wireless Controller Configuration Guide, Release 8.0

CHAPTER 39

Restrictions on 802.3 Bridging 713 Configuring 802.3 Bridging (GUI) 713 Configuring 802.3 Bridging (CLI) 714 Enabling 802.3X Flow Control 714 Bridging Link Local Traffic 714 Configuring Bridging of Link Local Traffic (GUI) 714 Configuring Bridging of Link Local Traffic (CLI) 715 IP-MAC Address Binding 715 Configuring IP-MAC Address Binding (CLI) 715 TCP Adjust MSS 716 Configuring TCP Adjust MSS (GUI) 717 Configuring TCP Adjust MSS (CLI) 717 Passive Clients 718 Restrictions for Passive Clients 718 Configuring Passive Clients (GUI) 719 Configuring Passive Clients (CLI) 719 Enabling the Multicast-Multicast Mode (GUI) 720 Enabling the Global Multicast Mode on Controllers (GUI) 721 Enabling the Passive Client Feature on the Controller (GUI) 721
Quality of Service 723 Quality of Service 723 QoS Profiles 724 Configuring QoS Profiles (GUI) 725 Configuring QoS Profiles (CLI) 727 Assigning a QoS Profile to a WLAN (GUI) 728 Assigning a QoS Profile to a WLAN (CLI) 729 Quality of Service Roles 730 Configuring QoS Roles (GUI) 731 Configuring QoS Roles (CLI) 732 SIP (Media Session) Snooping, CAC, and Reporting 733 Restrictions for SIP (Media Session) Snooping, CAC, and Reporting 733 Configuring Media Session Snooping (GUI) 734 Configuring Media Session Snooping (CLI) 734

Contents

Cisco Wireless Controller Configuration Guide, Release 8.0 xxix

Contents

CHAPTER 40

Voice and Video Parameters 738 Call Admission Control 738 Static CAC 738 Load- Based CAC 739 Expedited Bandwidth Requests 739 U-APSD 740 Traffic Stream Metrics 740 Configuring Voice Parameters 741 Configuring Voice Parameters (GUI) 741 Configuring Voice Parameters (CLI) 742 Configuring Video Parameters 744 Configuring Video Parameters (GUI) 744 Configuring Video Parameters (CLI) 744 Viewing Voice and Video Settings 746 Viewing Voice and Video Settings (GUI) 746 Viewing Voice and Video Settings (CLI) 746
SIP-based CAC 750 Restrictions for SIP-Based CAC 750 Configuring SIP-Based CAC (GUI) 750 Configuring SIP-Based CAC (CLI) 751
Enhanced Distributed Channel Access Parameters 751 Configuring EDCA Parameters (GUI) 751 Configuring EDCA Parameters (CLI) 752
WLANs 755 Information About WLANs 755 Prerequisites for WLANs 755 Restrictions for WLANs 756 Creating and Removing WLANs (GUI) 757 Enabling and Disabling WLANs (GUI) 758 Editing WLAN SSID or Profile Name for WLANs (GUI) 758 Creating and Deleting WLANs (CLI) 759 Enabling and Disabling WLANs (CLI) 759 Editing WLAN SSID or Profile Name for WLANs (CLI) 760

Cisco Wireless Controller Configuration Guide, Release 8.0 xxx

Contents

CHAPTER 41

Viewing WLANs (CLI) 760 Searching WLANs (GUI) 760 Assigning WLANs to Interfaces 761
Per-WLAN Wireless Settings 763 DTIM Period 763 Configuring the DTIM Period (GUI) 764 Configuring the DTIM Period (CLI) 764 Cisco Client Extensions 765 Prerequisites for Configuring Cisco Client Extensions 765 Guidelines and Restrictions for Configuring Cisco Client Extensions 765 Configuring CCX Aironet IEs (GUI) 765 Viewing a Client’s CCX Version (GUI) 766 Configuring CCX Aironet IEs (CLI) 766 Viewing a Client’s CCX Version (CLI) 766 Client Profiling 766 Prerequisites for Configuring Client Profiling 767 Restrictions for Configuring Client Profiling 768 Configuring Client Profiling (GUI) 768 Configuring Client Profiling (CLI) 769 Configuring Custom HTTP Port for Profiling (GUI) 769 Configuring Custom HTTP Port for Profiling (CLI) 769 Client Count per WLAN 770 Restrictions for Setting Client Count for WLANs 770 Configuring the Client Count per WLAN (GUI) 770 Configuring the Maximum Number of Clients per WLAN (CLI) 771 Configuring the Maximum Number of Clients for each AP Radio per WLAN (GUI) 771 Configuring the Maximum Number of Clients for each AP Radio per WLAN (CLI) 772 Limit Clients per WLAN per AP Radio 772 Limit Clients per WLAN per AP Radio (GUI) 772 Limit Clients per WLAN per AP Radio (CLI) 773 Disabling Coverage Hole Detection per WLAN 773 Disabling Coverage Hole Detection on a WLAN (GUI) 774 Disabling Coverage Hole Detection on a WLAN (CLI) 774

Cisco Wireless Controller Configuration Guide, Release 8.0 xxxi

Contents

CHAPTER 42 CHAPTER 43
CHAPTER 44

WLAN Interfaces 775 Multicast VLAN 775 Configuring a Multicast VLAN (GUI) 776 Configuring a Multicast VLAN (CLI) 776
WLAN Timeouts 777 Client Exclusion Timeout 777 Configuring Client Exclusion Timeout (CLI) 777 Session Timeouts 777 Configuring a Session Timeout (GUI) 778 Configuring a Session Timeout (CLI) 778 User Idle Timeout 779 Configuring User Idle Timeout (GUI) 779 Configuring User Idle Timeout (CLI) 779 User Idle Timeout per WLAN 780 Configuring Per-WLAN User Idle Timeout (GUI) 780 Configuring Per-WLAN User Idle Timeout (CLI) 780 Address Resolution Protocol Timeout 781 Configuring ARP Timeout (GUI) 781 Configuring ARP Timeout (CLI) 781
WLAN Security 783 Layer 2 Security 783 Prerequisites for Layer 2 Security 783 MAC Filtering of WLANs 784 Restrictions for MAC Filtering 784 Enabling MAC Filtering 784 Local MAC Filters 785 Prerequisites for Configuring Local MAC Filters 785 Configuring Local MAC Filters (CLI) 785 Protected Management Frames (802.11w) 786 Restrictions for Protected Management Frames (802.11w) 786 Configuring Protected Management Frames (802.11w) (GUI) 787

xxxii

Cisco Wireless Controller Configuration Guide, Release 8.0

Contents
Configuring Protected Management Frames (802.11w) 802.11w (CLI) 788 Fast Secure Roaming 788
802.11r Fast Transition 788 802.11i Sticky Key Caching 793 Cisco Centralized Key Management (CCKM) 795 Wi-Fi Protected Areas (WPA) 795 WPA1 and WPA2 795 Wireless Encryption Protocol (WEP) 799 WLAN for Static WEP 799 Configuring Dynamic WEP (CLI) 800 MAC Authentication Failover to 802.1X Authentication 801 Layer 3 Security 801 Information About Web Authentication 802 Prerequisites for Configuring Web Authentication on a WLAN 802 Restrictions for Configuring Web Authentication on a WLAN 803 Default Web Authentication Login Page 803 Using a Customized Web Authentication Login Page from an External Web Server 807 Downloading a Customized Web Authentication Login Page 811 Assigning Login, Login Failure, and Logout Pages per WLAN 814 Captive Network Assistant Bypass 817 Configuring Captive Bypassing (CLI) 817 Fallback Policy with MAC Filtering and Web Authentication 817 Configuring a Fallback Policy with MAC Filtering and Web Authentication (GUI) 818 Configuring a Fallback Policy with MAC Filtering and Web Authentication (CLI) 818 Central Web Authentication 819 Authentication of Sleeping Clients 820 Restrictions for Authenticating Sleeping Clients 821 Configuring Authentication for Sleeping Clients (GUI) 822 Configuring Authentication for Sleeping Clients (CLI) 822 Web Redirect with 802.1X Authentication 823 Conditional Web Redirect 823 Splash Page Web Redirect 823 Configuring the RADIUS Server (GUI) 824 Configuring Web Redirect 824

Cisco Wireless Controller Configuration Guide, Release 8.0

xxxiii

Contents

Web Authentication Proxy 825 Configuring the Web Authentication Proxy (GUI) 827 Configuring the Web Authentication Proxy (CLI) 827
Supporting IPv6 Client Guest Access 828 EAP and AAA Servers 828
802.1X and Extensible Authentication Protocol 828 LDAP 830
Configuring LDAP (GUI) 830 Configuring LDAP (CLI) 832 Local EAP 834 Restrictions for Local EAP 835 Configuring Local EAP (GUI) 835 Configuring Local EAP (CLI) 839 Local Network Users on Controller 844 Uploading PACs for EAP-FAST 846 Uploading PACs (GUI) 847 Uploading PACs (CLI) 847 Advanced WLAN Security 848 AAA Override 848 Restrictions for AAA Override 848 Updating the RADIUS Server Dictionary File for Proper QoS Values 849 Configuring AAA Override (GUI) 850 Configuring AAA Override (CLI) 851 ISE NAC Support 851 Device Registration 851 Central Web Authentication 851 Local Web Authentication 853 Guidelines and Restrictions on ISE NAC Support 853 Configuring ISE NAC Support (GUI) 854 Configuring ISE NAC Support (CLI) 855 Client Exclusion Policies 855 Configuring Client Exclusion Policies (GUI) 855 Configuring Client Exclusion Policies (CLI) 856 Configuring Client Exclusion Policies for a WLAN (GUI) 857

xxxiv

Cisco Wireless Controller Configuration Guide, Release 8.0

Contents

CHAPTER 45

Configuring Client Exclusion Policies for a WLAN (CLI) 858 Wi-Fi Direct Client Policy 858
Restrictions for the Wi-Fi Direct Client Policy 858 Configuring the Wi-Fi Direct Client Policy (GUI) 858 Configuring the Wi-Fi Direct Client Policy (CLI) 859 Monitoring and Troubleshooting the Wi-Fi Direct Client Policy (CLI) 859 Peer-to-Peer Blocking 860 Restrictions on Peer-to-Peer Blocking 860 Configuring Peer-to-Peer Blocking (GUI) 860 Configuring Peer-to-Peer Blocking (CLI) 861 Local Policies 861 Guidelines and Restrictions for Local Policy Classification 863 Local Policy–Best Practices 864 Configuring Local Policies (GUI) 864 Configuring Local Policies (CLI) 866 Updating Organizationally Unique Identifier List 867 Updating Device Profile List 868 Wired Guest Access 869 Prerequisites for Configuring Wired Guest Access 870 Restrictions for Configuring Wired Guest Access 870 Configuring Wired Guest Access (GUI) 870 Configuring Wired Guest Access (CLI) 872
Client Roaming 877 Fast SSID Changing 877 Configuring Fast SSID Changing (GUI) 877 Configuring Fast SSID Changing (CLI) 878 802.11k Neighbor List and Assisted Roaming 878 Restrictions for Assisted Roaming 878 Configuring Assisted Roaming (GUI) 879 Configuring Assisted Roaming (CLI) 879 802.11v 880 Prerequisites for Configuring 802.11v 882 Configuring 802.11v Network Assisted Power Savings (CLI) 882

Cisco Wireless Controller Configuration Guide, Release 8.0 xxxv

Contents

CHAPTER 46

Monitoring 802.11v Network Assisted Power Savings (CLI) 882 Configuration Examples for 802.11v Network Assisted Power Savings 882 Optimized Roaming 883 Restrictions for Optimized Roaming 883 Configuring Optimized Roaming (GUI) 884 Configuring Optimized Roaming (CLI) 885 Band Select 885
Band Select Algorithm 886 Restrictions for Band Selection 886 Configuring Band Selection (GUI) 887 Configuring Band Selection (CLI) 888
DHCP 891 Information About Dynamic Host Configuration Protocol 891 Internal DHCP Servers 891 External DHCP Servers 892 DHCP Assignments 892 DHCP Proxy Mode versus DHCP Bridging Mode 893 DHCP Proxy Mode 894 Restrictions on Using DHCP Proxy 894 Configuring DHCP Proxy (GUI) 895 Configuring DHCP Proxy (CLI) 896 Configuring a DHCP Timeout (GUI) 896 Configuring a DHCP Timeout (CLI) 897 DHCP Option 82 897 Restrictions on DHCP Option 82 898 Configuring DHCP Option 82 (GUI) 898 Configuring DHCP Option 82 (CLI) 898 Configuring DHCP Option 82 Insertion in Bridge Mode (CLI) 899 DHCP Option 82 Link Select and VPN Select Suboptions 900 DHCP Link Select 900 DHCP VPN Select 900 Mobility Considerations 900 Prerequisites for DHCP Option 82 Link Select and VPN Select 901

xxxvi

Cisco Wireless Controller Configuration Guide, Release 8.0

CHAPTER 47 CHAPTER 48
CHAPTER 49

Configuring DHCP Option 82 Link Select and VPN Select (GUI) 901 Configuring DHCP Option 82 Link Select and VPN Select (CLI) 902 Internal DHCP Server 903 Restrictions for Configuring Internal DHCP Server 904 Configuring DHCP Scopes (GUI) 904 Configuring DHCP Scopes (CLI) 905 Configuring DHCP Per WLAN (GUI) 906 Configuring DHCP Per WLAN (CLI) 907 Debugging DHCP (CLI) 908
Client Data Tunneling 909 Proxy Mobile IPv6 909 Restrictions on Proxy Mobile IPv6 911 Configuring Proxy Mobile IPv6 (GUI) 912 Configuring Proxy Mobile IPv6 (CLI) 914
AP Groups 917 Access Point Groups 917 Restrictions for Configuring Access Point Groups 918 Configuring Access Point Groups 918 Creating Access Point Groups (GUI) 919 Creating Access Point Groups (CLI) 921 Viewing Access Point Groups (CLI) 922 802.1Q-in-Q VLAN Tagging 922 Restrictions for 802.1Q-in-Q VLAN Tagging 923 Configuring 802.1Q-in-Q VLAN Tagging (GUI) 923 Configuring 802.1Q-in-Q VLAN Tagging (CLI) 924
Workgroup Bridges 925 Cisco Workgroup Bridges 925 Guidelines and Restrictions for Cisco Workgroup Bridges 926 Viewing the Status of Workgroup Bridges (GUI) 927 Viewing the Status of Workgroup Bridges (CLI) 928 Debugging WGB Issues (CLI) 928

Contents

Cisco Wireless Controller Configuration Guide, Release 8.0

xxxvii

Contents

PART VIII CHAPTER 50

Non-Cisco Workgroup Bridges 929 Restrictions for Non-Cisco Workgroup Bridges 930
FlexConnect 931
FlexConnect 933 FlexConnect Overview 933 FlexConnect Authentication Process 935 FlexConnect Switching Modes 938 FlexConnect Operation Modes 938 FlexConnect VLANs and ACLs 939 Central DHCP Server for FlexConnect 939 Guidelines and Restrictions on FlexConnect 939 Configuring FlexConnect 941 Configuring the Switch at a Remote Site 941 Configuring the Controller for FlexConnect 942 Configuring the Controller for FlexConnect for a Centrally Switched WLAN Used for Guest Access 943 Configuring the Controller for FlexConnect (GUI) 943 Configuring the Controller for FlexConnect (CLI) 946 Configuring an Access Point for FlexConnect 947 Configuring an Access Point for FlexConnect (GUI) 947 Configuring an Access Point for FlexConnect (CLI) 950 Configuring an Access Point for Local Authentication on a WLAN (GUI) 952 Configuring an Access Point for Local Authentication on a WLAN (CLI) 952 Configuring FlexConnect Ethernet Fallback 953 Information About FlexConnect Ethernet Fallback 953 Restrictions for FlexConnect Ethernet Fallback 953 Configuring FlexConnect Ethernet Fallback (GUI) 953 Configuring FlexConnect Ethernet Fallback (CLI) 954 VideoStream for FlexConnect 954 Information About VideoStream for FlexConnect 954 Configuring VideoStream for FlexConnect (GUI) 955 Configuring VideoStream for FlexConnect (CLI) 956

xxxviii

Cisco Wireless Controller Configuration Guide, Release 8.0

Contents

CHAPTER 51

FlexConnect+Bridge Mode 957 Information about Flex+Bridge Mode 957 Configuring Flex+Bridge Mode (GUI) 959 Configuring Flex+Bridge Mode (CLI) 960
FlexConnect Groups 961 Information About FlexConnect Groups 961 IP-MAC Context Distribution for FlexConnect Local Switching Clients 962 Guidelines and Restrictions for IP-MAC Context Distribution for FlexConnect Local Switching Clients 962 Configuring IP-MAC Context Distribution For FlexConnect Local Switching Clients (GUI) 963 Configuring IP-MAC Context Distribution For FlexConnect Local Switching Clients (CLI) 963 FlexConnect Groups and Backup RADIUS Servers 963 FlexConnect Groups and Fast Secure Roaming 963 FlexConnect Groups and Local Authentication Server 964 Configuring FlexConnect Groups (GUI) 965 Configuring FlexConnect Groups (CLI) 968 VLAN-ACL Mapping 971 Configuring VLAN-ACL Mapping on FlexConnect Groups (GUI) 971 Configuring VLAN- ACL Mapping on FlexConnect Groups (CLI) 971 Viewing VLAN-ACL Mappings (CLI) 972 WLAN-VLAN Mapping 972 Configuring WLAN-VLAN Mapping on FlexConnect Groups (GUI) 972 Configuring WLAN-VLAN Mapping on FlexConnect Groups (CLI) 973 OfficeExtend Access Points 973 OEAP 600 Series Access Points 974 Supported WLAN Settings for 600 Series OfficeExtend Access Point 975 WLAN Security Settings for the 600 Series OfficeExtend Access Point 975 Authentication Settings 979 Supported User Count on 600 Series OfficeExtend Access Point 979 Remote LAN Settings 979 Channel Management and Settings 980 Firewall Settings 981 Additional Caveats 982

Cisco Wireless Controller Configuration Guide, Release 8.0

xxxix

Contents

CHAPTER 52

Implementing Security 982 Configuring OfficeExtend Access Points 983
Configuring OfficeExtend Access Points (GUI) 983 Configuring OfficeExtend Access Points (CLI) 985 Configuring a Personal SSID on an OfficeExtend Access Point Other than 600 Series OEAP 988 Viewing OfficeExtend Access Point Statistics 989 Viewing Voice Metrics on OfficeExtend Access Points 989 Network Diagnostics 990 Running Network Diagnostics (GUI) 990 Running Network Diagnostics (CLI) 991 Remote LANs 991 Configuring a Remote LAN (GUI) 991 Configuring a Remote LAN (CLI) 992 FlexConnect AP Image Upgrades 993 Restrictions on FlexConnect AP Image Upgrades 993 Configuring FlexConnect AP Upgrades (GUI) 994 Configuring FlexConnect AP Upgrades (CLI) 994 WeChat Client Authentication 995 Restrictions on WeChat Client Authentication 995 Configuring WeChat Client Authentication on WLC (GUI) 995 Configuring WeChat Client Authentication on WLC (CLI) 996 Authenticating Client Using WeChat App for Mobile Internet Access (GUI) 997 Authenticating Client Using WeChat App for PC Internet Access (GUI) 998
FlexConnect Security 999 FlexConnect Access Control Lists 999 Restrictions for FlexConnect Access Control Lists 999 Configuring FlexConnect Access Control Lists (GUI) 1001 Configuring FlexConnect Access Control Lists (CLI) 1003 Viewing and Debugging FlexConnect Access Control Lists (CLI) 1004 Authentication, Authorization, Accounting Overrides 1004 Restrictions on AAA Overrides for FlexConnect 1006 Configuring AAA Overrides for FlexConnect on an Access Point (GUI) 1007 Configuring VLAN Overrides for FlexConnect on an Access Point (CLI) 1008

Cisco Wireless Controller Configuration Guide, Release 8.0 xl

Contents

CHAPTER 53
CHAPTER 54 PART IX

OfficeExtend Access Points 1009 OfficeExtend Access Points 1009 OEAP 600 Series Access Points 1010 Supported WLAN Settings for 600 Series OfficeExtend Access Point 1011 WLAN Security Settings for the 600 Series OfficeExtend Access Point 1011 Authentication Settings 1015 Supported User Count on 600 Series OfficeExtend Access Point 1015 Remote LAN Settings 1015 Channel Management and Settings 1016 Firewall Settings 1017 Additional Caveats 1018 Implementing Security 1019 Configuring OfficeExtend Access Points 1019 Configuring OfficeExtend Access Points (GUI) 1019 Configuring OfficeExtend Access Points (CLI) 1021 Configuring a Personal SSID on an OfficeExtend Access Point Other than 600 Series OEAP 1024 Viewing OfficeExtend Access Point Statistics 1025 Viewing Voice Metrics on OfficeExtend Access Points 1025 Network Diagnostics 1026 Running Network Diagnostics (GUI) 1027 Running Network Diagnostics (CLI) 1027 Remote LANs 1027 Configuring a Remote LAN (GUI) 1028 Configuring a Remote LAN (CLI) 1029
FlexConnect AP Image Upgrades 1031 FlexConnect AP Image Upgrades 1031 Restrictions on FlexConnect AP Image Upgrades 1031 Configuring FlexConnect AP Upgrades (GUI) 1032 Configuring FlexConnect AP Upgrades (CLI) 1033
Monitoring the Network 1035

Cisco Wireless Controller Configuration Guide, Release 8.0 xli

Contents

CHAPTER 55 CHAPTER 56
PART X CHAPTER 57
CHAPTER 58

Monitoring the Controller 1037 Viewing System Resources 1037 Viewing System Resources (GUI) 1037 Viewing System Resources (CLI) 1038
System and Message Logging 1041 System and Message Logging 1041 Configuring System and Message Logging (GUI) 1041 Viewing Message Logs (GUI) 1044 Configuring System and Message Logging (CLI) 1044 Viewing System and Message Logs (CLI) 1049 Viewing Access Point Event Logs 1049 Information About Access Point Event Logs 1049 Viewing Access Point Event Logs (CLI) 1049
Troubleshooting 1051
Debugging on Cisco Wireless Controllers 1053 Understanding Debug Client on Wireless Controllers 1053 Deauthenticating Clients 1053 Deauthenticating Clients (GUI) 1053 Deauthenticating Clients (CLI) 1054 Using the CLI to Troubleshoot Problems 1054 Potential Reasons for Controller Reset 1055
Controller Unresponsiveness 1059 Upload Logs and Crash Files 1059 Uploading Logs and Crash Files (GUI) 1059 Uploading Logs and Crash Files (CLI) 1060 Uploading Core Dumps from the Controller 1061 Configuring the Controller to Automatically Upload Core Dumps to an FTP Server (GUI) 1061 Configuring the Controller to Automatically Upload Core Dumps to an FTP Server (CLI) 1062 Uploading Core Dumps from Controller to a Server (CLI) 1063

Cisco Wireless Controller Configuration Guide, Release 8.0 xlii

Contents

CHAPTER 59

Uploading Crash Packet Capture Files 1064 Restrictions for Uploading Crash Packet Capture Files 1065 Uploading Crash Packet Capture Files (GUI) 1066 Uploading Crash Packet Capture Files (CLI) 1066
Monitoring Memory Leaks 1067 Monitoring Memory Leaks (CLI) 1067 Troubleshooting Memory Leaks 1068
Debugging on Cisco Access Points 1071 Troubleshooting Access Points Using Telnet or SSH 1071 Troubleshooting Access Points Using Telnet or SSH (GUI) 1072 Troubleshooting Access Points Using Telnet or SSH (CLI) 1072 Debugging the Access Point Monitor Service 1073 Debugging Access Point Monitor Service Issues (CLI) 1073 Sending Commands to Access Points 1073 Understanding How Access Points Send Crash Information to the Controller 1074 Understanding How Access Points Send Radio Core Dumps to the Controller 1074 Retrieving Radio Core Dumps (CLI) 1074 Uploading Radio Core Dumps (GUI) 1075 Uploading Radio Core Dumps (CLI) 1075 Viewing the AP Crash Log Information 1076 Viewing the AP Crash Log information (GUI) 1076 Viewing the AP Crash Log information (CLI) 1077 Viewing MAC Addresses of Access Points 1077 Disabling the Reset Button on Access Points to Lightweight Mode 1077 Viewing Access Point Event Logs 1078 Information About Access Point Event Logs 1078 Viewing Access Point Event Logs (CLI) 1078 Troubleshooting OfficeExtend Access Points 1079 Interpreting OfficeExtend LEDs 1079 Troubleshooting Common Problems with OfficeExtend Access Points 1079 Link Test 1080 Performing a Link Test (GUI) 1081 Performing a Link Test (CLI) 1082

Cisco Wireless Controller Configuration Guide, Release 8.0 xliii

Contents

CHAPTER 60

Packet Capture 1083 Using the Debug Packet Logging Facility 1083 Configuring the Debug Facility (CLI) 1084 Wireless Sniffing 1088 Prerequisites for Wireless Sniffing 1088 Restrictions on Wireless Sniffing 1088 Configuring Sniffing on an Access Point (GUI) 1089 Configuring Sniffing on an Access Point (CLI) 1090

Cisco Wireless Controller Configuration Guide, Release 8.0 xliv

Preface

This preface describes the audience, organization, and conventions of this document. It also provides information on how to obtain other documentation. This preface includes the following sections:
· Audience, on page xlv · Conventions, on page xlv · Related Documentation, on page xlvi · Communications, Services, and Additional Information, on page xlvii
Audience
This publication is for experienced network administrators who configure and maintain Cisco wireless controllers and Cisco lightweight access points.

Conventions

This document uses the following conventions:
Table 1: Conventions

Convention bold font italic font
[] {x | y | z }
[x|y|z] string

Indication
Commands and keywords and user-entered text appear in bold font.
Document titles, new or emphasized terms, and arguments for which you supply values are in italic font.
Elements in square brackets are optional.
Required alternative keywords are grouped in braces and separated by vertical bars.
Optional alternative keywords are grouped in brackets and separated by vertical bars.
A nonquoted set of characters. Do not use quotation marks around the string. Otherwise, the string will include the quotation marks.

Cisco Wireless Controller Configuration Guide, Release 8.0 xlv

Related Documentation

Preface

Convention courier font <> [] !, #

Indication
Terminal sessions and information the system displays appear in courier font. Nonprinting characters such as passwords are in angle brackets. Default responses to system prompts are in square brackets. An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.

Tip Means the following information will help you solve a problem.

Caution Means reader be careful. In this situation, you might perform an action that could result in equipment damage or loss of data.
Related Documentation
· Release Notes for Cisco Wireless Controllers and Lightweight Access Points for Cisco Wireless releases http://www.cisco.com/c/en/us/support/wireless /wireless-lan-controller-software/ products-release-notes-list.html
· Cisco Wireless Solutions Software Compatibility Matrix https://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix /compatibility-matrix.html
· Feature Matrix for Wave 2 and 802.11ax (Wi-Fi 6) Access Points https://www.cisco.com/c/en/us/td/docs/wireless/access_point/feature-matrix/ap- feature-matrix.html
· Wireless and Mobility home page https://www.cisco.com/c/en/us/products/wireless/index.html
· Cisco Wireless Controller Configuration Guides http://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller- software/ products-installation-and-configuration-guides-list.html
· Cisco Wireless Controller Command References http://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller- software/ products-command-reference-list.html
· Cisco Wireless Controller System Message Guides and Trap Logs

Cisco Wireless Controller Configuration Guide, Release 8.0 xlvi

Preface

Communications, Services, and Additional Information

http://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller- software/ products-system-message-guides-list.html · Cisco Wireless Release Technical References http://www.cisco.com/c/en/us/support/wireless/wireless- lan-controller-software/ products-technical-reference-list.html · Cisco Wireless Mesh Access Point Design and Deployment Guides http://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller- software/ products-technical-reference-list.html · Cisco Prime Infrastructure http://www.cisco.com/c/en/us/support/cloud-systems-management/prime- infrastructure/ tsd-products-support-series-home.html · Cisco Connected Mobile Experiences http://www.cisco.com/c/en_in/solutions/enterprise-networks /connected-mobile-experiences/index.html · Cisco Mobility Express for Aironet Access Points https://www.cisco.com/c/en/us/support/wireless/mobility- express/series.html
Communications, Services, and Additional Information
· To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager. · To get the business impact you’re looking for with the technologies that matter, visit Cisco Services. · To submit a service request, visit Cisco Support. · To discover and browse secure, validated enterprise-class apps, products, solutions, and services, visit
Cisco DevNet. · To obtain general networking, training, and certification titles, visit Cisco Press. · To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a gateway to the Cisco bug-tracking system, which maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. The BST provides you with detailed defect information about your products and software.
Documentation Feedback
To provide feedback about Cisco technical documentation, use the feedback form available in the right pane of every online document.

Cisco Wireless Controller Configuration Guide, Release 8.0 xlvii

Documentation Feedback

Preface

xlviii

Cisco Wireless Controller Configuration Guide, Release 8.0

I P A R T
Overview
· Cisco Wireless Solution Overview, on page 1 · Initial Setup, on page 5

1 C H A P T E R
Cisco Wireless Solution Overview
Cisco Wireless Solution is designed to provide 802.11 wireless networking solutions for enterprises and service providers. Cisco Wireless Solution simplifies deploying and managing large-scale wireless LANs and enables a unique best-in-class security infrastructure. The operating system manages all data client, communications, and system administration functions, performs radio resource management (RRM) functions, manages system-wide mobility policies using the operating system security solution, and coordinates all security functions using the operating system security framework. This figure shows a sample architecture of a Cisco Wireless Enterprise Network:
Figure 1: Sample Cisco Wireless Enterprise Network Architecture
The interconnected elements that work together to deliver a unified enterprise-class wireless solution include the following:
· Client devices · Access points (APs)
Cisco Wireless Controller Configuration Guide, Release 8.0 1

Core Components

Overview

· Network unification through Cisco Wireless Controllers (controllers)
· Network management
· Mobility services
Beginning with a base of client devices, each element adds capabilities as the network needs to evolve and grow, interconnecting with the elements above and below it to create a comprehensive, secure wireless LAN (WLAN) solution.
· Core Components, on page 2
Core Components
A Cisco Wireless network consists of the following core components: · Cisco Wireless Controllers: Cisco Wireless Controllers (controllers) are enterprise- class high-performance wireless switching platforms that support 802.11a/n/ac and 802.11b/g/n protocols. They operate under control of the AireOS operating system, which includes the radio resource management (RRM), creating a Cisco Wireless solution that can automatically adjust to real-time changes in the 802.11 radio frequency (802.11 RF) environment. Controllers are built around high-performance network and security hardware, resulting in highly reliable 802.11 enterprise networks with unparalleled security. The following controllers are supported: · Cisco 2504 Wireless Controller
· Cisco 5508 Wireless Controller
· Cisco Flex 7510 Wireless Controller
· Cisco 8510 Wireless Controller
· Cisco Virtual Wireless Controller
· Catalyst Wireless Services Module 2 (WiSM2)
Note The Cisco Wireless Controllers do not support 10 G-based CISCO-AMPHENOL SFP. However, you may use an alternate vendor SFP.
· Cisco Access Points: Cisco access points (APs) can be deployed in a distributed or centralized network for a branch office, campus, or large enterprise. For more information about APs, see https://www.cisco.com/c/en/us/products/wireless/access-points/index.html
· Cisco Prime Infrastructure (PI): Cisco Prime Infrastructure can be used to configure and monitor one or more controllers and associated APs. Cisco PI has tools to facilitate large-system monitoring and control. When you use Cisco PI in your Cisco wireless solution, controllers periodically determine the client, rogue access point, rogue access point client, radio frequency ID (RFID) tag location and store the locations in the Cisco PI database. For more information about Cisco PI, see https://www.cisco.com/c/ en/us/support/cloud- systems-management/prime-infrastructure/series.html.
· Cisco Connected Mobile Experiences (CMX): Cisco Connected Mobile Experiences (CMX) acts as a platform to deploy and run Cisco Connected Mobile Experiences (Cisco CMX). Cisco Connected Mobile

Cisco Wireless Controller Configuration Guide, Release 8.0 2

Overview

Overview of Cisco Mobility Express

Experiences (CMX) is delivered in two modes–the physical appliance (box) and the virtual appliance (deployed using VMware vSphere Client) . Using your Cisco wireless network and location intelligence from Cisco MSE, Cisco CMX helps you create personalized mobile experiences for end users and gain operational efficiency with location-based services. For more information about Cisco CMX, see https://www.cisco.com/c/en/us/support/wireless/connected- mobile-experiences/series.html.
· Cisco DNA Spaces: Cisco DNA Spaces is a multichannel engagement platform that enables you to connect, know, and engage with visitors at their physical business locations. It covers various verticals of business such as retail, manufacturing, hospitality, healthcare, education, financial services, enterprise work spaces, and so on. Cisco DNA Spaces also provides solutions for monitoring and managing the assets in your premises.
The Cisco DNA Spaces: Connector enables Cisco DNA Spaces to communicate with multiple Cisco Wireless Controller (controller) efficiently by allowing each controller to transmit high intensity client data without missing any client information.
For information about how to configure Cisco DNA Spaces and the Connector, see https://www.cisco.com/ c/en/us/support/wireless/dna-spaces/products- installation-and-configuration-guides-list.html.
For more information about design considerations for enterprise mobility, see the Enterprise Mobility Design Guide at:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/Enterprise- Mobility-8-5-Design-Guide/ Enterprise_Mobility_8-5_Deployment_Guide.html
Overview of Cisco Mobility Express
The Cisco Mobility Express wireless network solution comprises of at least one Cisco Wave 2 AP with an in-built software-based wireless controller managing other Cisco APs in the network.
The AP acting as the controller is referred to as the primary AP while the other APs in the Cisco Mobility Express network, which are managed by this primary AP, are referred to as subordinate APs.
In addition to acting as a controller, the primary AP also operates as an AP to serve clients along with the subordinate APs.
Cisco Mobility Express provides most features of a controller and can interface with the following:
· Cisco Prime Infrastructure: For simplified network management, including managing AP groups
· Cisco Identity Services Engine: For advanced policy enforcement
· Connected Mobile Experiences (CMX): For providing presence analytics and guest access using Connect & Engage
For more information about using Cisco Mobility Express, see the user guide for relevant releases at: https://www.cisco.com/c/en/us/support/wireless /mobility-express/ products-installation-and-configuration-guides-list.html

Cisco Wireless Controller Configuration Guide, Release 8.0 3

Overview of Cisco Mobility Express

Overview

Cisco Wireless Controller Configuration Guide, Release 8.0 4

2 C H A P T E R
Initial Setup
· Cisco WLAN Express Setup, on page 5 · Configuring the Controller Using the Configuration Wizard, on page 11 · Using the AutoInstall Feature for Controllers Without a Configuration, on page 25 · Managing the Controller System Date and Time, on page 29
Cisco WLAN Express Setup
Cisco WLAN Express Setup is a simplified, out-of-the-box installation and configuration interface for Cisco Wireless Controllers. This section provides instructions to set up a controller to operate in a small, medium, or large network wireless environment, where access points can join and together as a simple solution provide various services such as corporate employee or guest wireless access on the network. There are two methods:
· Wired method · Wireless method With this, there are three ways to set up a controller: · Cisco WLAN Express Setup · Traditional command line interface (CLI) through serial console · Updated method using network connection directly to the controller GUI setup wizard
Note Cisco WLAN Express Setup can be used only for the first time in out-of- the-box installations or when controller configuration is reset to factory defaults.
Feature History · Release 7.6.120.0: This feature was introduced and supported only on Cisco 2500 Series Wireless Controller. It includes an easy-to-use GUI Configuration Wizard, an intuitive monitoring dashboard and several Cisco Wireless LAN best practices enabled by default. · Release 8.0.110.0: The following enhancements were made:
Cisco Wireless Controller Configuration Guide, Release 8.0 5

Cisco WLAN Express Setup

Overview

· Connect to any port: You can connect a client device to any port on the Cisco 2500 Series Wireless Controller and access the GUI configuration wizard to run Cisco WLAN Express. Previously, you were required to connect the client device to only port 2.
· Wireless Support to run Cisco WLAN Express: You can connect an AP to any of the ports on the Cisco 2500 Series Wireless Controller, associate a client device with the AP, and run Cisco WLAN Express. When the AP is associated with the Cisco 2500 Series Wireless Controller, only 802.11b and 802.11g radios are enabled; the 802.11a radio is disabled. The AP broadcasts an SSID named CiscoAirProvision, which is of WPA2-PSK type with the key being password. After a client device associates with this SSID, the client device automatically gets an IP address in the 192.168.x.x range. On the web browser of the client device, go to http://192.168.1.1 to open the GUI configuration wizard.
Note This feature is not supported on mobile devices such as smartphones and tablet computers.
· Release 8.1: The following enhancements are made: · Added support for the Cisco WLAN Express using the wired method to Cisco 5500, Flex 7500, 8500 Series Wireless Controllers and Cisco Virtual Wireless Controller. · Introduced the Main Dashboard view and compliance assessment and best practices. For more details, see the controller Online Help.
Configuration Checklist The following checklist is for your reference to make the installation process easy. Ensure that you have these requirements ready before you proceed: 1. Network switch requirements:
a. Controller switch port number assigned b. Controller assigned switch port c. Is the switch port configured as trunk or access? d. Is there a management VLAN? If yes, Management VLAN ID e. Is there a guest VLAN? If yes, Guest VLAN ID
2. Controller Settings: a. New admin account name b. Admin account password c. System name for the controller d. Current time zone e. Is there an NTP server available? If yes, NTP server IP address

Cisco Wireless Controller Configuration Guide, Release 8.0 6

Overview

Cisco WLAN Express Setup

Note We recommend using a reachable NTP server IP address. APs do not support FQDN in a day0 scenario.
f. Controller Management Interface: 1. IP address 2. Subnet Mask 3. Default gateway
g. Management VLAN ID
3. Corporate wireless network 4. Corporate wireless name or SSID 5. Is a RADIUS server required? 6. Security authentication option to select:
a. WPA/WPA2 Personal b. Corporate passphrase (PSK) c. WPA/WPA2 (Enterprise) d. RADIUS server IP address and shared secret
7. Is a DHCP server known? If yes, DHCP server IP address 8. Guest Wireless Network (optional)
a. Guest wireless name/SSID b. Is a password required for guest? c. Guest passphrase (PSK) d. Guest VLAN ID e. Guest networking
1. IP address 2. Subnet Mask 3. Default gateway
9. Advanced option: Configure RF Parameters for Client Density as Low, Medium, or High.
Preparing for Setup Using Cisco WLAN Express · Do not auto-configure the controller or use the wizard for configuration. · Do not use console interface; the only connection to the controller should be client connected to service port.
Cisco Wireless Controller Configuration Guide, Release 8.0 7

Setting up Cisco Wireless Controller using Cisco WLAN Express (Wired Method)

Overview

· Configure DHCP or assign static IP 192.168.1.X to laptop interface connected to service port. For more information about Cisco WLAN Express, see WLAN Express Setup and Best Practices Deployment Guide. This section contains the following subsections:
Setting up Cisco Wireless Controller using Cisco WLAN Express (Wired Method)
Procedure

Step 1
Step 2 Step 3
Step 4 Step 5

Connect a laptop’s wired Ethernet port directly to the Service port of the controller. The port LEDs blink to indicate that both the machines are properly connected.

Note

It may take several minutes for the controller to fully power on to make the GUI available to the

PC. Do not auto-configure the controller.

The LEDs on the front panel provide the system status:

· If the LED is off, it means that the controller is not ready.

· If the LED is solid green, it means that the controller is ready.

Configure DHCP option on the laptop that you have connected to the Service port. This assigns an IP address to the laptop from the controller Service port 192.168.1.X, or you can assign a static IP address 192.168.1.X to the laptop to access the controller GUI; both options are supported. Open any one of the following supported web browsers and type http://192.168.1.1 in the address bar.
· Mozilla Firefox version 32 or later (Windows, Mac)
· Microsoft Internet Explorer version 10 or later (Windows)
· Apple Safari version 7 or later (Mac)

Note

This feature is not supported on mobile devices such as smartphones and tablet computers.

Create an administrator account by providing the name and password. Click Start to continue. In the Set Up Your Controller box, enter the following details: a. System Name for the controller

b. Current time zone

c. NTP Server (optional)

Note

We recommend using a reachable NTP server IP address. APs do not support FQDN in a

day0 scenario.

d. Management IP Address

e. Subnet Mask

f. Default Gateway

Cisco Wireless Controller Configuration Guide, Release 8.0 8

Overview

RF Profile Configurations

Step 6
Step 7
Step 8 Step 9 Step 10

g. Management VLAN ID–If left unchanged or set to 0, the network switch port must be configured with a native VLAN ‘X0’

Note

The setup attempts to import the clock information (date and time) from the computer via

JavaScript. We recommend that you confirm this before continuing. Access points rely on correct

clock settings to be able to join the controller.

In the Create Your Wireless Networks box, in the Employee Network area, use the checklist to enter the following data: a) Network name/SSID b) Security c) Pass Phrase, if Security is set to WPA/WPA2 Personal d) DHCP Server IP Address: If left empty, the DHCP processing is bridged to the management interface
(Optional) In the Create Your Wireless Networks box, in the Guest Network area, use the checklist to enter the following data: a) Network name/SSID b) Security c) VLAN IP Address, VLAN Subnet Mask, VLAN Default Gateway, VLAN ID d) DHCP Server IP Address: If left empty, the DHCP processing is bridged to the management interface
In the Advanced Setting box, in the RF Parameter Optimization area, do the following: a) Select the client density as Low, Typical, or High. b) Configure the RF parameters for RF Traffic Type, such as Data and Voice. c) Change the Service port IP address and subnet mask, if necessary.
Click Next. Review your settings and then click Apply to confirm.
The controller reboots automatically. You will be prompted that the controller is fully configured and will be restarted. Sometimes, you might not be prompted with this message. In this scenario, do the following:
a) Disconnect the laptop from the controller service port and connect it to the Switch port. b) Connect the controller port 1 to the switch configured trunk port. c) Connect access points to the switch if not already connected. d) Wait until the access points join the controller.

RF Profile Configurations Procedure

Step 1 Step 2

After a successful login as an administrator, choose Wireless > RF Profiles to verify whether the Cisco WLAN Express features are enabled by checking that the predefined RF profiles are created on this page. You can define AP Groups and apply appropriate profile to a set of APs.
Choose Wireless > Advanced > Network Profile, verify the client density and traffic type details.

Cisco Wireless Controller Configuration Guide, Release 8.0 9

Setting up Cisco Wireless Controller using Cisco WLAN Express (Wireless Method)

Overview

Note

We recommend that you use RF and Network profiles configuration even if Cisco WLAN

Express was not used initially or if the controller was upgraded from a release that is earlier than

Release 8.1.

Setting up Cisco Wireless Controller using Cisco WLAN Express (Wireless Method)
This wireless method applies only to Cisco 2500 Series Wireless Controller.
Procedure

Step 1
Step 2 Step 3 Step 4
Step 5

Plug in a Cisco AP to any one of the ports of Cisco 2500 Series WLC. If you do not have a separate power supply for the AP, you can use Port 3 or Port 4, which supports PoE.
After the AP boots up, the AP associates with the WLC and downloads the WLC software.
The AP starts provisioning a WPA2-PSK SSID “CiscoAirProvision” with the key “password.”
Associate a client device to the “CiscoAirProvision” SSID. The client device is assigned an IP address in the 192.168.x.x range.
On the web browser of the client device, go to http://192.168.1.1 to open the GUI configuration wizard.

Default Configurations

When you configure your Cisco Wireless Controller, the following parameters are enabled or disabled. These settings are different from the default settings obtained when you configure the controller using the CLI wizard.

Parameters in New Interface Aironet IE DHCP Address Assignment (Guest SSID) Client Band Select Local HTTP and DHCP Profiling Guest ACL

Default Setting

Disabled

Enabled

Enabled

Enabled

Applied.

Note

Guest ACL denies traffic to the

management subnet.

CleanAir EDRRM EDRRM Sensitivity Threshold

Enabled Enabled
· Low sensitivity for 2.4 GHz. · Medium sensitivity for 5 GHz.

Cisco Wireless Controller Configuration Guide, Release 8.0 10

Overview

Configuring the Controller Using the Configuration Wizard

Parameters in New Interface Channel Bonding (5 GHz) DCA Channel Width mDNS Global Snooping Default mDNS profile
AVC (only AV)
Management
Virtual IP Address Multicast Address Mobility Domain Name RF Group Name

Default Setting Enabled 40 MHz Enabled Two new services added:
· Better printer support · HTTP

Enabled only with following prerequisites: · Bootloader version–1.0.18 Or
· Field Upgradable Software version–1.8.0.0 and above

Note

If you upgrade the bootloader after you

have setup the Cisco 2500 Series

Controller using the GUI Wizard, you

have to manually enable AVC on the

previously created WLAN.

· Via Wireless Clients–Enabled · HTTP/HTTPS Access–Enabled

· WebAuth Secure Web–Enabled

192.0.2.1 Not configured Name of employee SSID Default

Configuring the Controller Using the Configuration Wizard
The configuration wizard enables you to configure basic settings on the controller. You can run the wizard after you receive the controller from the factory or after the controller has been reset to factory defaults. The configuration wizard is available in both GUI and CLI formats.

Cisco Wireless Controller Configuration Guide, Release 8.0 11

Configuring the Controller (GUI)

Overview

Configuring the Controller (GUI)
Procedure

Step 1 Step 2

Connect your PC to the service port and configure it to use the same subnet as the controller.

Note

With Cisco 2504 Wireless Controller, connect your PC to the port 2 on the controller and configure

to use the same subnet.

Browse to http://192.168.1.1. The configuration wizard is displayed.

Note

You can use both HTTP and HTTPS when using the service port interface. HTTPS is enabled

by default and HTTP can also be enabled.

Note

For the initial GUI Configuration Wizard, you cannot access the controller using IPv6 address.

Figure 2: Configuration Wizard — System Information Page

Step 3 Step 4 Step 5

In the System Name field, enter the name that you want to assign to this controller. You can enter up to 31 ASCII characters. In the User Name field, enter the administrative username to be assigned to this controller. You can enter up to 24 ASCII characters. The default username is admin. In the Password and Confirm Password boxes, enter the administrative password to be assigned to this controller. You can enter up to 24 ASCII characters. The default password is admin.
· The password must contain characters from at least three of the following classes:
· Lowercase letters
· Uppercase letters
· Digits
· Special characters

Cisco Wireless Controller Configuration Guide, Release 8.0 12

Overview

Configuring the Controller (GUI)

Step 6

· No character in the password must be repeated more than three times consecutively. · The new password must not be the same as the associated username and not be the username reversed. · The password must not be cisco, ocsic, or any variant obtained by changing the capitalization of letters
of the word Cisco. In addition, you cannot substitute 1, I, or ! for i, 0 for o, or $ for s.
Click Next. The SNMP Summary page is displayed.
Figure 3: Configuration Wizard–SNMP Summary Page

Step 7
Step 8 Step 9 Step 10 Step 11

If you want to enable Simple Network Management Protocol (SNMP) v1 mode for this controller, choose Enable from the SNMP v1 Mode drop-down list. Otherwise, leave this parameter set to Disable.

Note

SNMP manages nodes (servers, workstations, routers, switches, and so on) on an IP network.

Currently, there are three versions of SNMP: SNMPv1, SNMPv2c, and SNMPv3.

If you want to enable SNMPv2c mode for this controller, leave this parameter set to Enable. Otherwise, choose Disable from the SNVP v2c Mode drop-down list.
If you want to enable SNMPv3 mode for this controller, leave this parameter set to Enable. Otherwise, choose Disable from the SNVP v3 Mode drop-down list.
Click Next.
When the following message is displayed, click OK:

Default values are present for v1/v2c community strings. Please make sure to create new v1/v2c community strings once the system comes up. Please make sure to create new v3 users once the system comes up.
The Service Interface Configuration page is displayed.

Cisco Wireless Controller Configuration Guide, Release 8.0 13

Configuring the Controller (GUI) Figure 4: Configuration Wizard-Service Interface Configuration Page

Overview

Step 12 Step 13 Step 14

If you want the controller’s service-port interface to obtain an IP address from a DHCP server, check the DHCP Protocol Enabled check box. If you do not want to use the service port or if you want to assign a static IP address to the service port, leave the check box unchecked.

Note

The service-port interface controls communications through the service port. Its IP address must

be on a different subnet from the management interface. This configuration enables you to manage

the controller directly or through a dedicated management network to ensure service access during

network downtime.

Perform one of the following:
· If you enabled DHCP, clear out any entries in the IP Address and Netmask text boxes, leaving them blank.

· If you disabled DHCP, enter the static IP address and netmask for the service port in the IP Address and Netmask text boxes.

Click Next. The LAG Configuration page is displayed.

Cisco Wireless Controller Configuration Guide, Release 8.0 14

Overview Figure 5: Configuration Wizard–LAG Configuration Page

Configuring the Controller (GUI)

Step 15 Step 16

To enable link aggregation (LAG), choose Enabled from the Link Aggregation (LAG) Mode drop-down list. To disable LAG, leave this field set to Disabled. Click Next.
The Management Interface Configuration page is displayed.

Step 17

Note

The management interface is the default interface for in-band management of the controller and

connectivity to enterprise services such as AAA servers.

In the VLAN Identifier field, enter the VLAN identifier of the management interface (either a valid VLAN identifier or 0 for an untagged VLAN). The VLAN identifier should be set to match the switch interface configuration.

Cisco Wireless Controller Configuration Guide, Release 8.0 15

Configuring the Controller (GUI)

Overview

Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 Step 24 Step 25
Step 26 Step 27

In the IP Address field, enter the IP address of the management interface.
In the Netmask field, enter the IP address of the management interface netmask.
In the Gateway field, enter the IP address of the default gateway.
In the Port Number field, enter the number of the port assigned to the management interface. Each interface is mapped to at least one primary port.
In the Backup Port field, enter the number of the backup port assigned to the management interface. If the primary port for the management interface fails, the interface automatically moves to the backup port.
In the Primary DHCP Server field, enter the IP address of the default DHCP server that will supply IP addresses to clients, the controller’s management interface, and optionally, the service port interface.
In the Secondary DHCP Server field, enter the IP address of an optional secondary DHCP server that will supply IP addresses to clients, the controller’s management interface, and optionally, the service port interface.
Click Next. The AP-Manager Interface Configuration page is displayed.

Note

This screen does not appear for Cisco 5508 controllers because you are not required to configure

an AP-manager interface. The management interface acts like an AP-manager interface by default.

In the IP Address field, enter the IP address of the AP-manager interface. Click Next. The Miscellaneous Configuration page is displayed.
Figure 6: Configuration Wizard–Miscellaneous Configuration Page

Step 28 Step 29

In the RF Mobility Domain Name field, enter the name of the mobility group/RF group to which you want the controller to belong.

Note

Although the name that you enter here is assigned to both the mobility group and the RF group,

these groups are not identical. Both groups define clusters of controllers, but they have different

purposes. All of the controllers in an RF group are usually also in the same mobility group and

vice versa. However, a mobility group facilitates scalable, system-wide mobility and controller

redundancy while an RF group facilitates scalable, system-wide dynamic RF management.

The Configured Country Code(s) field shows the code for the country in which the controller will be used. If you want to change the country of operation, check the check box for the desired country.

Cisco Wireless Controller Configuration Guide, Release 8.0 16

Overview

Configuring the Controller (GUI)

Step 30 Step 31

Note

You can choose more than one country code if you want to manage access points in multiple

countries from a single controller. After the configuration wizard runs, you must assign each

access point joined to the controller to a specific country.

Click Next. When the following message is displayed, click OK:

Warning! To maintain regulatory compliance functionality, the country code setting may only be modified by a network administrator or qualified IT professional. Ensure that proper country codes are selected before proceeding.?

The Virtual Interface Configuration page is displayed.
Figure 7: Configuration Wizard — Virtual Interface Configuration Page

Step 32 Step 33 Step 34

In the IP Address field, enter the IP address of the controller’s virtual interface. You should enter a fictitious, unassigned IP address.

Note

The virtual interface is used to support mobility management, DHCP relay, and embedded Layer

3 security such as guest web authentication and VPN termination. All controllers within a mobility

group must be configured with the same virtual interface IP address.

In the DNS Host Name field, enter the name of the Domain Name System (DNS) gateway used to verify the source of certificates when Layer 3 web authorization is enabled.

Note

To ensure connectivity and web authentication, the DNS server should always point to the virtual

interface. If a DNS hostname is configured for the virtual interface, then the same DNS hostname

must be configured on the DNS servers used by the client.

Click Next. The WLAN Configuration page is displayed.

Cisco Wireless Controller Configuration Guide, Release 8.0 17

Configuring the Controller (GUI) Figure 8: Configuration Wizard — WLAN Configuration Page

Overview

Step 35 Step 36
Step 37 Step 38

In the Profile Name field, enter up to 32 alphanumeric characters for the profile name to be assigned to this WLAN.
In the WLAN SSID field, enter up to 32 alphanumeric characters for the network name, or service set identifier (SSID). The SSID enables basic functionality of the controller and allows access points that have joined the controller to enable their radios.
Click Next.
When the following message is displayed, click OK:

Default Security applied to WLAN is: [WPA2(AES)][Auth(802.1x)]. You can change this after the wizard is complete and the system is rebooted.?
The RADIUS Server Configuration page is displayed.

Cisco Wireless Controller Configuration Guide, Release 8.0 18

Overview Figure 9: Configuration Wizard-RADIUS Server Configuration Page

Configuring the Controller (GUI)

Step 39 Step 40
Step 41 Step 42 Step 43 Step 44

In the Server IP Address field, enter the IP address of the RADIUS server.
From the Shared Secret Format drop-down list, choose ASCII or Hex to specify the format of the shared secret.

Note

Due to security reasons, the RADIUS shared secret key reverts to ASCII mode even if you have

selected HEX as the shared secret format from the Shared Secret Format drop- down list.

In the Shared Secret and Confirm Shared Secret boxes, enter the secret key used by the RADIUS server. In the Port Number field, enter the communication port of the RADIUS server. The default value is 1812. To enable the RADIUS server, choose Enabled from the Server Status drop-down list. To disable the RADIUS server, leave this field set to Disabled. Click Apply. The 802.11 Configuration page is displayed.

Cisco Wireless Controller Configuration Guide, Release 8.0 19

Configuring the Controller (GUI) Figure 10: Configuration Wizard–802.11 Configuration Page

Overview

Step 45 Step 46
Step 47

To enable the 802.11a, 802.11b, and 802.11g lightweight access point networks, leave the 802.11a Network Status, 802.11b Network Status, and 802.11g Network Status check boxes checked. To disable support for any of these networks, uncheck the check boxes.
To enable the controller’s radio resource management (RRM) auto-RF feature, leave the Auto RF check box selected. To disable support for the auto-RF feature, uncheck this check box.

Note

The auto-RF feature enables the controller to automatically form an RF group with other

controllers. The group dynamically elects a leader to optimize RRM parameter settings, such as

channel and transmit power assignment, for the group.

Click Next. The Set Time page is displayed.

Cisco Wireless Controller Configuration Guide, Release 8.0 20

Overview Figure 11: Configuration Wizard — Set Time Screen

Configuring the Controller (GUI)

Step 48 Step 49
Step 50

To manually configure the system time on your controller, enter the current date in Month/DD/YYYY format and the current time in HH:MM:SS format.
To manually set the time zone so that Daylight Saving Time (DST) is not set automatically, enter the local hour difference from Greenwich Mean Time (GMT) in the Delta Hours field and the local minute difference from GMT in the Delta Mins field.

Note

When manually setting the time zone, enter the time difference of the local current time zone

with respect to GMT (+/­). For example, Pacific time in the United States is 8 hours behind GMT.

Therefore, it is entered as ­8.

Click Next. The Configuration Wizard Completed page is displayed.

Cisco Wireless Controller Configuration Guide, Release 8.0 21

Configuring the Controller–Using the CLI Configuration Wizard Figure 12: Configuration Wizard–Configuration Wizard Completed Page

Overview

Step 51 Step 52

Click Save and Reboot to save your configuration and reboot the controller. When the following message is displayed, click OK:
Configuration will be saved and the controller will be rebooted. Click ok to confirm.?
The controller saves your configuration, reboots, and prompts you to log on.

Configuring the Controller–Using the CLI Configuration Wizard
Before you begin · The available options are displayed in brackets after each configuration parameter. The default value is displayed in all uppercase letters. · If you enter an incorrect response, an appropriate error message is displayed, such as Invalid Response, and returns you to the wizard prompt. · Press the hyphen key if you ever need to return to the previous command line.
Procedure

Step 1

When prompted to terminate the AutoInstall process, enter yes. If you do not enter yes, the AutoInstall process begins after 30 seconds.

Cisco Wireless Controller Configuration Guide, Release 8.0 22

Overview

Configuring the Controller–Using the CLI Configuration Wizard

Step 2 Step 3
Step 4
Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11
Step 12

Note

The AutoInstall feature downloads a configuration file from a TFTP server and then loads the

configuration onto the controller automatically.

Enter the system name, which is the name that you want to assign to the controller. You can enter up to 31 ASCII characters. Enter the administrative username and password to be assigned to this controller. You can enter up to 24 ASCII characters for each.
· The password must contain characters from at least three of the following classes:
· Lowercase letters

· Uppercase letters

· Digits

· Special characters

· No character in the password must be repeated more than three times consecutively.
· The new password must not be the same as the associated username and not be the username reversed.
· The password must not be cisco, ocsic, or any variant obtained by changing the capitalization of letters of the word Cisco. In addition, you cannot substitute 1, I, or ! for i, 0 for o, or $ for s.

If you want the controller’s service-port interface to obtain an IP address from a DHCP server, enter DHCP. If you do not want to use the service port or if you want to assign a static IP address to the service port, enter none.

Note

The service-port interface controls communications through the service port. Its IP address must

be on a different subnet from the management interface. This configuration enables you to manage

the controller directly or through a dedicated management network to ensure service access during

network downtime.

If you entered none in Step 4, enter the IP address and netmask for the service-port interface on the next two lines.
Enable or disable link aggregation (LAG) by choosing yes or NO.
Enter the IP address of the management interface.

Note

The management interface is the default interface for in-band management of the controller and

connectivity to enterprise services such as AAA servers.

Enter the IP address of the management interface netmask.
Enter the IP address of the default router.
Enter the VLAN identifier of the management interface (either a valid VLAN identifier or 0 for an untagged VLAN). The VLAN identifier should be set to match the switch interface configuration.
Enter the IP address of the default DHCP server that will supply IP addresses to clients, the management interface of the controller, and optionally, the service port interface. Enter the IP address of the AP-manager interface.

Note

This prompt does not appear for Cisco 5508 WLCs because you are not required to configure an

AP-manager interface. The management interface acts like an AP-manager interface by default.

Enter the IP address of the controller’s virtual interface. You should enter a fictitious unassigned IP address.

Cisco Wireless Controller Configuration Guide, Release 8.0 23

Configuring the Controller–Using the CLI Configuration Wizard

Overview

Step 13
Step 14 Step 15 Step 16 Step 17
Step 18 Step 19 Step 20
Step 21 Step 22 Step 23

Note

The virtual interface is used to support mobility management, DHCP relay, and embedded Layer

3 security such as guest web authentication and VPN termination. All controllers within a mobility

group must be configured with the same virtual interface IP address.

If desired, enter the name of the mobility group/RF group to which you want the controller to belong.

Note

Although the name that you enter here is assigned to both the mobility group and the RF group,

these groups are not identical. Both groups define clusters of controllers, but they have different

purposes. All of the controllers in an RF group are usually also in the same mobility group and

vice versa. However, a mobility group facilitates scalable, system-wide mobility and controller

redundancy while an RF group facilitates scalable, system-wide dynamic RF management.

Enter the network name or service set identifier (SSID). The SSID enables basic functionality of the controller and allows access points that have joined the controller to enable their radios.
Enter YES to allow clients to assign their own IP address or no to require clients to request an IP address from a DHCP server.
To configure a RADIUS server now, enter YES and then enter the IP address, communication port, and secret key of the RADIUS server. Otherwise, enter no. If you enter no, the following message is displayed: Warning! The default WLAN security policy requires a RADIUS server. Please see the documentation for more details.
Enter the code for the country in which the controller will be used.

Note

Enter help to view the list of available country codes.

Note

You can enter more than one country code if you want to manage access points in multiple

countries from a single controller. To do so, separate the country codes with a comma (for example,

US,CA,MX). After the configuration wizard runs, you need to assign each access point joined

to the controller to a specific country.

Enable or disable the 802.11b, 802.11a, and 802.11g lightweight access point networks by entering YES or no.
Enable or disable the controller’s radio resource management (RRM) auto-RF feature by entering YES or no.

Note

The auto-RF feature enables the controller to automatically form an RF group with other

controllers. The group dynamically elects a leader to optimize RRM parameter settings, such as

channel and transmit power assignment, for the group.

If you want the controller to receive its time setting from an external Network Time Protocol (NTP) server when it powers up, enter YES to configure an NTP server. Otherwise, enter no.

Note

The controller network module installed in a Cisco Integrated Services Router does not have a

battery and cannot save a time setting. Therefore, it must receive a time setting from an external

NTP server when it powers up.

If you entered no in Step 20 and want to manually configure the system time on your controller now, enter YES. If you do not want to configure the system time now, enter no. If you entered YES in Step 21, enter the current date in the MM/DD/YY format and the current time in the HH:MM:SS format. After you have completed step 22, the wizard prompts you to configure IPv6 parameters. Enter YES to proceed.
Enter the service port interface IPv6 address configuration. You can enter either static or SLAAC.
· If you entered, SLAAC, then IPv6 address is autoconfigured. · If you entered, static, you must enter the IPv6 address and its prefix length of the service interface.

Cisco Wireless Controller Configuration Guide, Release 8.0 24

Overview

Using the AutoInstall Feature for Controllers Without a Configuration

Step 24 Step 25 Step 26
Step 27 Step 28 Step 29
Step 30 Step 31

Enter the IPv6 address of the management interface. Enter the IPv6 address prefix length of the management interface. Enter the gateway IPv6 address of the management interface . After the management interface configuration is complete, the wizard prompts to configure IPv6 parameters for RADIUS server. Enter yes.
Enter the IPv6 address of the RADIUS server. Enter the communication port number of the RADIUS server. The default value is 1812. Enter the secret key for IPv6 address of the RADIUS server. Once the RADIUS server configuration is complete, the wizard prompts to configure IPv6 NTP server. Enter yes.
Enter the IPv6 address of the NTP server. When prompted to verify that the configuration is correct, enter yes or NO.
The controller saves your configuration when you enter yes, reboots, and prompts you to log on.

Using the AutoInstall Feature for Controllers Without a Configuration
When you boot up a controller that does not have a configuration, the AutoInstall feature can download a configuration file from a TFTP server and then load the configuration onto the controller automatically.
If you create a configuration file on a controller that is already on the network (or through a Prime Infrastructure filter), place that configuration file on a TFTP server, and configure a DHCP server so that a new controller can get an IP address and TFTP server information, the AutoInstall feature can obtain the configuration file for the new controller automatically.
When the controller boots, the AutoInstall process starts. The controller does not take any action until AutoInstall is notified that the configuration wizard has started. If the wizard has not started, the controller has a valid configuration.
If AutoInstall is notified that the configuration wizard has started (which means that the controller does not have a configuration), AutoInstall waits for an additional 30 seconds. This time period gives you an opportunity to respond to the first prompt from the configuration wizard:
Would you like to terminate autoinstall? [yes]:
When the 30-second terminate timeout expires, AutoInstall starts the DHCP client. You can terminate the AutoInstall task even after this 30-second timeout if you enter Yes at the prompt. However, AutoInstall cannot be terminated if the TFTP task has locked the flash and is in the process of downloading and installing a valid configuration file.

Cisco Wireless Controller Configuration Guide, Release 8.0 25

Restrictions on AutoInstall

Overview

Note The AutoInstall process and manual configuration using both the GUI and CLI of controller can occur in parallel. As part of the AutoInstall cleanup process, the service port IP address is set to 192.168.1.1 and the service port protocol configuration is modified. Because the AutoInstall process takes precedence over the manual configuration, whatever manual configuration is performed is overwritten by the AutoInstall process.
Restrictions on AutoInstall
· In Cisco 5508 WLCs, the following interfaces are used: · eth0–Service port (untagged)
· dtl0–Gigabit port 1 through the NPU (untagged)
· AutoInstall is not supported on Cisco 2504 WLC.
Obtaining an IP Address Through DHCP and Downloading a Configuration File from a TFTP Server
AutoInstall attempts to obtain an IP address from the DHCP server until the DHCP process is successful or until you terminate the AutoInstall process. The first interface to successfully obtain an IP address from the DHCP server registers with the AutoInstall task. The registration of this interface causes AutoInstall to begin the process of obtaining TFTP server information and downloading the configuration file. Following the acquisition of the DHCP IP address for an interface, AutoInstall begins a short sequence of events to determine the host name of the controller and the IP address of the TFTP server. Each phase of this sequence gives preference to explicitly configured information over default or implied information and to explicit host names over explicit IP addresses. The process is as follows:
· If at least one Domain Name System (DNS) server IP address is learned through DHCP, AutoInstall creates a /etc/resolv.conf file. This file includes the domain name and the list of DNS servers that have been received. The Domain Name Server option provides the list of DNS servers, and the Domain Name option provides the domain name.
· If the domain servers are not on the same subnet as the controller, static route entries are installed for each domain server. These static routes point to the gateway that is learned through the DHCP Router option.
· The host name of the controller is determined in this order by one of the following: · If the DHCP Host Name option was received, this information (truncated at the first period [.]) is used as the host name for the controller.
· A reverse DNS lookup is performed on the controller IP address. If DNS returns a hostname, this name (truncated at the first period [.]) is used as the hostname for the controller.
· The IP address of the TFTP server is determined in this order by one of the following:

Cisco Wireless Controller Configuration Guide, Release 8.0 26

Overview

Selecting a Configuration File

· If AutoInstall received the DHCP TFTP Server Name option, AutoInstall performs a DNS lookup on this server name. If the DNS lookup is successful, the returned IP address is used as the IP address of the TFTP server.
· If the DHCP Server Host Name (sname) text box is valid, AutoInstall performs a DNS lookup on this name. If the DNS lookup is successful, the IP address that is returned is used as the IP address of the TFTP server.
· If AutoInstall received the DHCP TFTP Server Address option, this address is used as the IP address of the TFTP server.
· AutoInstall performs a DNS lookup on the default TFTP server name (cisco- wlc-tftp). If the DNS lookup is successful, the IP address that is received is used as the IP address of the TFTP server.
· If the DHCP server IP address (siaddr) text box is nonzero, this address is used as the IP address of the TFTP server.
· The limited broadcast address (255.255.255.255) is used as the IP address of the TFTP server.
· If the TFTP server is not on the same subnet as the controller, a static route (/32) is installed for the IP address of the TFTP server. This static route points to the gateway that is learned through the DHCP Router option.
Selecting a Configuration File
After the hostname and TFTP server have been determined, AutoInstall attempts to download a configuration file. AutoInstall performs three full download iterations on each interface that obtains a DHCP IP address. If the interface cannot download a configuration file successfully after three attempts, the interface does not attempt further. The first configuration file that is downloaded and installed successfully triggers a reboot of the controller. After the reboot, the controller runs the newly downloaded configuration. AutoInstall searches for configuration files in the order in which the names are listed:
· The filename that is provided by the DHCP Boot File Name option
· The filename that is provided by the DHCP File text box
· host name-confg
· host name.cfg
· base MAC address-confg (for example, 0011.2233.4455-confg)
· serial number-confg
· ciscowlc-confg
· ciscowlc.cfg
AutoInstall runs through this list until it finds a configuration file. It stops running if it does not find a configuration file after it cycles through this list three times on each registered interface.

Cisco Wireless Controller Configuration Guide, Release 8.0 27

Example: AutoInstall Operation

Overview

Note

· The downloaded configuration file can be a complete configuration, or it can be a minimal configuration

that provides enough information for the controller to be managed by the Cisco Prime Infrastructure.

Full configuration can then be deployed directly from the Prime Infrastructure.

· AutoInstall does not expect the switch connected to the controller to be configured for either channels. AutoInstall works with a service port in LAG configuration.

· Cisco Prime Infrastructure provides AutoInstall capabilities for controllers. A Cisco Prime Infrastructure administrator can create a filter that includes the host name, the MAC address, or the serial number of the controller and associate a group of templates (a configuration group) to this filter rule. The Prime Infrastructure pushes the initial configuration to the controller when the controller boots up initially. After the controller is discovered, the Prime Infrastructure pushes the templates that are defined in the configuration group. For more information about the AutoInstall feature and Cisco Prime Infrastructure, see the Cisco Prime Infrastructure documentation.

Example: AutoInstall Operation
The following is an example of an AutoInstall process from start to finish:
Welcome to the Cisco Wizard Configuration Tool Use the ‘-‘ character to backup Would you like to terminate autoinstall? [yes]: AUTO-INSTALL: starting now… AUTO-INSTALL: interface ‘service-port’ – setting DHCP TFTP Filename ==> ‘abcd- confg’ AUTO-INSTALL: interface ‘service-port’ – setting DHCP TFTP Server IP ==> 1.100.108.2 AUTO-INSTALL: interface ‘service-port’ – setting DHCP siaddr ==> 1.100.108.2 AUTO-INSTALL: interface ‘service-port’ – setting DHCP Domain Server[0] ==> 1.100.108.2 AUTO-INSTALL: interface ‘service-port’ – setting DHCP Domain Name ==> ‘engtest.com’ AUTO-INSTALL: interface ‘service-port’ – setting DHCP yiaddr ==> 172.19.29.253 AUTO-INSTALL: interface ‘service-port’ – setting DHCP Netmask ==> 255.255.255.0 AUTO-INSTALL: interface ‘service-port’ – setting DHCP Gateway ==> 172.19.29.1 AUTO-INSTALL: interface ‘service-port’ registered AUTO-INSTALL: interation 1 — interface ‘service-port’ AUTO-INSTALL: DNS reverse lookup 172.19.29.253 ===> ‘wlc-1’ AUTO-INSTALL: hostname ‘wlc-1’ AUTO-INSTALL: TFTP server 1.100.108.2 (from DHCP Option 150) AUTO-INSTALL: attempting download of ‘abcd-confg’ AUTO-INSTALL: TFTP status – ‘TFTP Config transfer starting.’ (2) AUTO-INSTALL: interface ‘management’ – setting DHCP file ==> ‘bootfile1’ AUTO-INSTALL: interface ‘management’ – setting DHCP TFTP Filename ==> ‘bootfile2-confg’ AUTO-INSTALL: interface ‘management’ – setting DHCP siaddr ==> 1.100.108.2 AUTO-INSTALL: interface ‘management’ – setting DHCP Domain Server[0] ==> 1.100.108.2 AUTO-INSTALL: interface ‘management’ – setting DHCP Domain Server[1] ==> 1.100.108.3 AUTO-INSTALL: interface ‘management’ – setting DHCP Domain Server[2] ==> 1.100.108.4 AUTO-INSTALL: interface ‘management’ – setting DHCP Domain Name ==> ‘engtest.com’ AUTO- INSTALL: interface ‘management’ – setting DHCP yiaddr ==> 1.100.108.238 AUTO- INSTALL: interface ‘management’ – setting DHCP Netmask ==> 255.255.254.0 AUTO- INSTALL: interface ‘management’ – setting DHCP Gateway ==> 1.100.108.1 AUTO- INSTALL: interface ‘management’ registered AUTO-INSTALL: TFTP status – ‘Config file transfer failed – Error from server: File not found’ (3) AUTO-INSTALL: attempting download of ‘wlc-1-confg’ AUTO-INSTALL: TFTP status – ‘TFTP Config transfer starting.’ (2) AUTO-INSTALL: TFTP status – ‘TFTP receive complete… updating configuration.’ (2) AUTO-INSTALL: TFTP status – ‘TFTP receive complete… storing in flash.’ (2)

Cisco Wireless Controller Configuration Guide, Release 8.0 28

Overview

Managing the Controller System Date and Time

AUTO-INSTALL: TFTP status – ‘System being reset.’ (2) Resetting system

Managing the Controller System Date and Time
You can configure the controller system date and time at the time of configuring the controller using the configuration wizard. If you did not configure the system date and time through the configuration wizard or if you want to change your configuration, you can follow the instructions in this section to configure the controller to obtain the date and time from a Network Time Protocol (NTP) server or to configure the date and time manually. Greenwich Mean Time (GMT) is used as the standard for setting the time zone on the controller.
You can also configure an authentication mechanism between various NTP servers.
Restrictions on Configuring the Controller Date and Time
· If you are configuring wIPS, you must set the controller time zone to UTC.
· Cisco Aironet lightweight access points might not connect to the controller if the date and time are not set properly. Set the current date and time on the controller before allowing the access points to connect to it.
· You can configure an authentication channel between the controller and the NTP server.

Configuring the Date and Time (GUI)
Procedure

Step 1

Choose Commands > Set Time to open the Set Time page.
Figure 13: Set Time Page

Cisco Wireless Controller Configuration Guide, Release 8.0 29

Configuring the Date and Time (CLI)

Overview

Step 2
Step 3 Step 4 Step 5
Step 6 Step 7

The current date and time appear at the top of the page.

In the Timezone area, choose your local time zone from the Location drop-down list.

Note

When you choose a time zone that uses Daylight Saving Time (DST), the controller automatically

sets its system clock to reflect the time change when DST occurs. In the United States, DST starts

on the second Sunday in March and ends on the first Sunday in November.

Note

You cannot set the time zone delta on the controller GUI. However, if you do so on the controller

CLI, the change is reflected in the Delta Hours and Mins boxes on the controller GUI.

Click Set Timezone to apply your changes.
In the Date area, choose the current local month and day from the Month and Day drop-down lists, and enter the year in the Year box.
In the Time area, choose the current local hour from the Hour drop-down list, and enter the minutes and seconds in the Minutes and Seconds boxes.

Note

If you change the time zone location after setting the date and time, the values in the Time area

are updated to reflect the time in the new time zone location. For example, if the controller is

currently configured for noon Eastern time and you change the time zone to Pacific time, the

time automatically changes to 9:00 a.m.

Click Set Date and Time to apply your changes. Click Save Configuration.

Configuring the Date and Time (CLI)
Procedure

Step 1 Step 2

Configure the current local date and time in GMT on the controller by entering this command:

config time manual mm/dd/yy hh:mm:ss

Note

When setting the time, the current local time is entered in terms of GMT and as a value between

00:00 and 24:00. For example, if it is 8:00 a.m. Pacific time in the United States, you would enter

16:00 because the Pacific time zone is 8 hours behind GMT.

Perform one of the following to set the time zone for the controller: · Set the time zone location in order to have Daylight Saving Time (DST) set automatically when it occurs by entering this command: config time timezone location location_index where location_index is a number representing one of the following time zone locations: a. (GMT-12:00) International Date Line West

b. (GMT-11:00) Samoa

c. (GMT-10:00) Hawaii

d. (GMT-9:00) Alaska

Cisco Wireless Controller Configuration Guide, Release 8.0 30

Overview

Configuring the Date and Time (CLI)

e. (GMT-8:00) Pacific Time (US and Canada) f. (GMT-7:00) Mountain Time (US and Canada) g. (GMT-6:00) Central Time (US and Canada) h. (GMT-5:00) Eastern Time (US and Canada) i. (GMT-4:00) Atlantic Time (Canada) j. (GMT-3:00) Buenos Aires (Argentina) k. (GMT-2:00) Mid-Atlantic l. (GMT-1:00) Azores m. (GMT) London, Lisbon, Dublin, Edinburgh (default value) n. (GMT +1:00) Amsterdam, Berlin, Rome, Vienna o. (GMT +2:00) Jerusalem p. (GMT +3:00) Baghdad q. (GMT +4:00) Muscat, Abu Dhabi r. (GMT +4:30) Kabul s. (GMT +5:00) Karachi, Islamabad, Tashkent t. (GMT +5:30) Colombo, Kolkata, Mumbai, New Delhi u. (GMT +5:45) Katmandu v. (GMT +6:00) Almaty, Novosibirsk w. (GMT +6:30) Rangoon x. (GMT +7:00) Saigon, Hanoi, Bangkok, Jakarta y. (GMT +8:00) Hong Kong, Beijing, Chongqing z. (GMT +9:00) Tokyo, Osaka, Sapporo aa. (GMT +9:30) Darwin ab. (GMT+10:00) Sydney, Melbourne, Canberra ac. (GMT+11:00) Magadan, Solomon Is., New Caledonia ad. (GMT+12:00) Kamchatka, Marshall Is., Fiji ae. (GMT+12:00) Auckland (New Zealand)

Note

If you enter this command, the controller automatically sets its system clock to reflect DST

when it occurs. In the United States, DST starts on the second Sunday in March and ends

on the first Sunday in November.

· Manually set the time zone so that DST is not set automatically by entering this command:

config time timezone delta_hours delta_mins

Cisco Wireless Controller Configuration Guide, Release 8.0 31

Configuring the Date and Time (CLI)

Overview

Step 3 Step 4

where delta_hours is the local hour difference from GMT, and delta_mins is the local minute difference from GMT.

When manually setting the time zone, enter the time difference of the local current time zone with respect to GMT (+/­). For example, Pacific time in the United States is 8 hours behind GMT. Therefore, it is entered as ­8.

Note

You can manually set the time zone and prevent DST from being set only on the controller

CLI.

Save your changes by entering this command: save config
Verify that the controller shows the current local time with respect to the local time zone by entering this command: show time Information similar to the following is displayed:

Time……………… Thu Apr 7 13:56:37 2011 Timezone delt……… 0:0 Timezone location….. (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata

NTP Servers NTP Polling Interval……….3600

Index

NTP Key Index

NTP Server NTP Msg Auth Status

——- ——————————————————–

1

1

209.165.200.225

AUTH SUCCESS

Note

If you configured the time zone location, the Timezone Delta value is set to “0:0.” If you manually

configured the time zone using the time zone delta, the Timezone Location is blank.

Cisco Wireless Controller Configuration Guide, Release 8.0 32

I I P A R T
Management of Controllers
· Administration of Controller, on page 35 · Managing Licenses, on page 49 · Managing Software, on page 69 · Managing Configuration, on page 85 · Network Time Protocol Setup, on page 99 · High Availability, on page 103 · Managing Certificates, on page 117 · AAA Administration, on page 133 · Managing Users, on page 181 · Ports and Interfaces, on page 189 · IPv6 Clients, on page 223 · Access Control Lists, on page 229 · Multicast/Broadcast Setup, on page 245 · Controller Security, on page 271 · SNMP, on page 281

3 C H A P T E R
Administration of Controller
· Using the Controller Interface, on page 35 · Enabling Web and Secure Web Modes, on page 40 · Telnet and Secure Shell Sessions, on page 43 · Management over Wireless, on page 47 · Configuring Management using Dynamic Interfaces (CLI), on page 48
Using the Controller Interface
You can use the controller interface in the following two methods:
Using the Controller GUI
A browser-based GUI is built into each controller. It allows up to five users to simultaneously browse into the controller HTTP or HTTPS (HTTP + SSL) management pages to configure parameters and monitor the operational status for the controller and its associated access points. For detailed descriptions of the controller GUI, see the Online Help. To access the online help, click Help on the controller GUI.
Note We recommend that you enable the HTTPS interface and disable the HTTP interface to ensure more robust security.
The controller GUI is supported on the following web browsers: · Microsoft Internet Explorer 11 or a later version (Windows) · Mozilla Firefox, Version 32 or a later version (Windows, Mac) · Apple Safari, Version 7 or a later version (Mac)
Cisco Wireless Controller Configuration Guide, Release 8.0 35

Guidelines and Restrictions on using Controller GUI

Management of Controllers

Note We recommend that you use the controller GUI on a browser loaded with webadmin certificate (third-party certificate). We also recommend that you do not use the controller GUI on a browser loaded with self-signed certificate. Some rendering issues have been observed on Google Chrome (73.0.3675.0 or a later version) with self-signed certificates. For more information, see CSCvp80151.
Guidelines and Restrictions on using Controller GUI
Follow these guidelines when using the controller GUI: · To view the Main Dashboard that is introduced in Release 8.1.102.0, you must enable JavaScript on the web browser.
Note Ensure that the screen resolution is set to 1280×800 or more. Lesser resolutions are not supported.
· You can use either the service port interface or the management interface to access the GUI. · The controller may intermittently or fail to respond when there is a high volume of packets destined for
the controller’s management IP address. · You can use both HTTP and HTTPS when using the service port interface. HTTPS is enabled by default
and HTTP can also be enabled. · Click Help at the top of any page in the GUI to access the online help. You might have to disable your
browser’s pop-up blocker to view the online help.
Logging On to the GUI

Note Do not configure TACACS+ authentication when the controller is set to use local authentication. Procedure

Step 1 Step 2

Enter the controller IP address in your browser’s address bar. For a secure connection, enter https://ip-address. For a less secure connection, enter https://ip-address.
When prompted, enter a valid username and password, and click OK.

The Summary page is displayed.

Note

The administrative username and password that you created in the configuration wizard are case

sensitive.

Cisco Wireless Controller Configuration Guide, Release 8.0 36

Management of Controllers

Logging out of the GUI

Logging out of the GUI
Procedure

Step 1 Step 2
Step 3

Click Logout in the top right corner of the page.
Click Close to complete the log out process and prevent unauthorized users from accessing the controller GUI.
When prompted to confirm your decision, click Yes.

Using the Controller CLI
A Cisco Wireless solution command-line interface (CLI) is built into each controller. The CLI enables you to use a VT-100 terminal emulation program to locally or remotely configure, monitor, and control individual controllers and its associated lightweight access points. The CLI is a simple text-based, tree-structured interface that allows up to five users with Telnet-capable terminal emulation programs to access the controller.
Note We recommend that you do not run two simultaneous CLI operations because this might result in incorrect behavior or incorrect output of the CLI.

Note For more information about specific commands, see the Cisco Wireless Controller Command Reference for relevant releases at: https://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller- software/ products-command-reference-list.html
Logging on to the Controller CLI
You can access the controller CLI using either of the following methods: · A direct serial connection to the controller console port · A remote session over the network using Telnet or SSH through the preconfigured service port or the distribution system ports
For more information about ports and console connection options on controllers, see the relevant controller model’s installation guide.
Using a Local Serial Connection
Before you begin You need these items to connect to the serial port:
· A computer that is running a terminal emulation program such as Putty, SecureCRT, or similar · A standard Cisco console serial cable with an RJ45 connector

Cisco Wireless Controller Configuration Guide, Release 8.0 37

Using a Remote Telnet or SSH Connection

Management of Controllers

To log on to the controller CLI through the serial port, follow these steps: Procedure

Step 1 Step 2
Step 3

Connect console cable; connect one end of a standard Cisco console serial cable with an RJ45 connector to the controller’s console port and the other end to your PC’s serial port. Configure terminal emulator program with default settings:
· 9600 baud
· 8 data bits
· 1 stop bit
· No parity
· No hardware flow control

Note

The controller serial port is set for a 9600 baud rate and a short timeout. If you would like to

change either of these values, run the co

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals