CISCO Wireless Controller Configuration Guide User Guide

June 9, 2024
Cisco

Administration of Controller

Using the Controller Interface

You can use the controller interface in the following two methods:

Using the Controller GUI

A browser-based GUI is built into each controller.
It allows up to five users to simultaneously browse into the controller HTTP or HTTPS (HTTP + SSL) management pages to configure parameters and monitor the operational status for the controller and its associated access points.
For detailed descriptions of the controller GUI, see the Online Help. To access the online help, click Help on the controller GUI.

Note
We recommend that you enable the HTTPS interface and disable the HTTP interface to ensure more robust security.

The controller GUI is supported on the following web browsers:

  • Microsoft Internet Explorer 11 or a later version (Windows)
  • Mozilla Firefox, Version 32 or a later version (Windows, Mac)
  • Apple Safari, Version 7 or a later version (Mac)

Note
We recommend that you use the controller GUI on a browser loaded with webadmin certificate (third-party certificate). We also recommend that you do not use the controller GUI on a browser loaded with self-signed certificate. Some rendering issues have been observed on Google Chrome (73.0.3675.0 or a later version) with self-signed certificates. For more information, see CSCvp80151.

Guidelines and Restrictions on using Controller GUI
Follow these guidelines when using the controller GUI:

  • To view the Main Dashboard that is introduced in Release 8.1.102.0, you must enable JavaScript on the web browser.

Note
Ensure that the screen resolution is set to 1280×800 or more. Lesser resolutions are not supported.

  • You can use either the service port interface or the management interface to access the GUI.
  • You can use both HTTP and HTTPS when using the service port interface. HTTPS is enabled by default and HTTP can also be enabled.
  • Click Help at the top of any page in the GUI to access the online help. You might have to disable your browser’s pop-up blocker to view the online help.

Logging On to the GUI

Note
Do not configure TACACS+ authentication when the controller is set to use local authentication.

Procedure
Step 1
Enter the controller IP address in your browser’s address bar. For a secure connection, enter https://ip-address. For a less secure connection, enter https://ip-address.

Step 2
When prompted, enter a valid username and password, and click OK.
The Summary page is displayed.
Note The administrative username and password that you created in the configuration wizard are case sensitive.
Logging out of the GUI
Procedure

Step 1
Click Logout in the top right corner of the page.

Step 2
Click Close to complete the log out process and prevent unauthorized users from accessing the controller GUI.

Step 3
When prompted to confirm your decision, click Yes.

Using the Controller CLI
A Cisco Wireless solution command-line interface (CLI) is built into each controller. The CLI enables you to use a VT-100 terminal emulation program to locally or remotely configure, monitor, and control individual controllers and its associated lightweight access points. The CLI is a simple text-based, tree-structured interface that allows up to five users with Telnet-capable terminal emulation programs to access the controller.

Note
We recommend that you do not run two simultaneous CLI operations because this might result in incorrect behavior or incorrect output of the CLI.

Note
For more information about specific commands, see the Cisco Wireless Controller Command Reference for relevant releases at: https://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller- software/products-command-reference-list.html

Logging on to the Controller CLI
You can access the controller CLI using either of the following methods:

  • A direct serial connection to the controller console port
  • A remote session over the network using Telnet or SSH through the preconfigured service port or the distribution system ports

For more information about ports and console connection options on controllers, see the relevant controller model’s installation guide.

Using a Local Serial Connection
Before you begin
You need these items to connect to the serial port:

  • A computer that is running a terminal emulation program such as Putty, SecureCRT, or similar
  • A standard Cisco console serial cable with an RJ45 connector

To log on to the controller CLI through the serial port, follow these steps:
Procedure

Step 1
Connect console cable; connect one end of a standard Cisco console serial cable with an RJ45 connector to the controller’s console port and the other end to your PC’s serial port.

Step 2
Configure terminal emulator program with default settings:

  • 9600 baud
  • 8 data bits
  • 1 stop bit
  • No parity
  • No hardware flow control

Note
The controller serial port is set for a 9600 baud rate and a short timeout. If you would like to change either of these values, run the config serial baudrate value and config serial timeout value to make your changes. If you set the serial timeout value to 0, serial sessions never time out. If you change the console speed to a value other than 9600, the console speed used by controller will be 9600 during boot and will only change upon the completion of boot process. Therefore, we recommend that you do not change the console speed, except as a temporary measure on an as-needed basis.

Step 3
Log on to the CLI–When prompted, enter a valid username and password to log on to the controller. The administrative username and password that you created in the configuration wizard are case sensitive. Note The default username is admin, and the default password is admin. The CLI displays the root level system prompt:
(Cisco Controller) >

Note
The system prompt can be any alphanumeric string up to 31 characters. You can change it by entering the config prompt command.

Using a Remote Telnet or SSH Connection

Before you begin
You need these items to connect to a controller remotely:

  • A PC with network connectivity to either the management IP address, the service port address, or if management is enabled on a dynamic interface of the controller in question
  • The IP address of the controller
  • A VT-100 terminal emulation program or a DOS shell for the Telnet session

Note
By default, controllers block Telnet sessions. You must use a local connection to the serial port to enable Telnet sessions.

Note
The aes-cbc ciphers are not supported on controller. The SSH client which is used to log in to the controller should have minimum a non-aes-cbc cipher.

Procedure
Step 1
Verify that your VT-100 terminal emulation program or DOS shell interface is configured with these parameters:

  • Ethernet address
  • Port 23

Step 2
Use the controller IP address to Telnet to the CLI.

Step 3
When prompted, enter a valid username and password to log into the controller.

Note
The administrative username and password that you created in the configuration wizard are case sensitive. Note The default username is admin, and the default password is admin.
The CLI shows the root level system prompt.

Note
The system prompt can be any alphanumeric string up to 31 characters. You can change it by entering the config prompt command.

Logging Out of the CLI
When you finish using the CLI, navigate to the root level and enter the logout command. You are prompted to save any changes that you made to the volatile RAM.

Note
The CLI automatically logs you out without saving any changes after 5 minutes of inactivity. You can set the automatic logout from 0 (never log out) to 160 minutes using the config serial timeout command. To prevent SSH or Telnet sessions from timing out, run the config sessions timeout 0 command.

Navigating the CLI

  • When you log into the CLI, you are at the root level. From the root level, you can enter any full command without first navigating to the correct command level.
  • If you enter a top-level keyword such as config, debug, and so on without arguments, you are taken to the submode of that corresponding keyword.
  • Ctrl + Z or entering exit returns the CLI prompt to the default or root level.
  • When navigating to the CLI, enter ? to see additional options available for any given command at the current level.
  • You can also enter the space or tab key to complete the current keyword if unambiguous.
  • Enter help at the root level to see available command line editing options.

The following table lists commands you use to navigate the CLI and to perform common tasks.

Table 1: Commands for CLI Navigation and Common Tasks

Command Action
help At the root level, view system wide navigation commands
? View commands available at the current level
command ? View parameters for a specific command
exit Move down one level
Ctrl + Z Return from any level to the root level
save config At the root level, save configuration changes from active working

RAM to nonvolatile RAM (NVRAM) so they are retained after reboot
reset system| At the root level, reset the controller without logging out
logout| Logs you out of the CLI

Enabling Web and Secure Web Modes

This section provides instructions to enable the distribution system port as a web port (using HTTP) or as a secure web port (using HTTPS). You can protect communication with the GUI by enabling HTTPS. HTTPS protects HTTP browser sessions by using the Secure Sockets Layer (SSL) protocol. When you enable HTTPS, the controller generates its own local web administration SSL certificate and automatically applies it to the GUI. You also have the option of downloading an externally generated certificate.

You can configure web and secure web mode using the controller GUI or CLI.

Note
Due to a limitation in RFC-6797 for the HTTP Strict Transport Security (HSTS), when accessing the controller’s GUI using the management IP address, HSTS is not honored and fails to redirect from HTTP to HTTPS protocol in the browser. The redirect fails if the controller’s GUI was previously accessed using the HTTPS protocol. For more information, see RFC-6797 document.

This section contains the following subsections:

Enabling Web and Secure Web Modes (GUI)

Procedure

Step 1
Choose Management > HTTP-HTTPS.
The HTTP-HTTPS Configuration page is displayed.

Step 2
To enable web mode, which allows users to access the controller GUI using “http://ip-address,” choose Enabled from the HTTP Access drop-down list. Otherwise, choose Disabled. The default value is Disabled. Web mode is not a secure connection.

Step 3
To enable secure web mode, which allows users to access the controller GUI using “https://ip-address,” choose Enabled from the HTTPS Access drop-down list. Otherwise, choose Disabled. The default value is Enabled. Secure web mode is a secure connection.

Step 4
In the Web Session Timeout field, enter the amount of time, in minutes, before the web session times out due to inactivity. You can enter a value between 10 and 160 minutes (inclusive). The default value is 30 minutes.

Step 5
Click Apply.

Step 6
If you enabled secure web mode in Step 3, the controller generates a local web administration SSL certificate and automatically applies it to the GUI. The details of the current certificate appear in the middle of the HTTP-HTTPS Configuration page.

Note
If desired, you can delete the current certificate by clicking Delete Certificate and have the controller generate a new certificate by clicking Regenerate Certificate. You have the option to use server side SSL certificate that you can download to controller. If you are using HTTPS, you can use SSC or MIC certificates.

Step 7
Choose Controller > General to open the General page.
Choose one of the following options from the Web Color Theme drop-down list:

  • Default–Configures the default web color theme for the controller GUI.
  • Red–Configures the web color theme as red for the controller GUI.

Step 8
Click Apply.

Step 9
Click Save Configuration.

Enabling Web and Secure Web Modes (CLI)
Procedure

Step 1
Enable or disable web mode by entering this command: config network webmode {enable | disable}
This command allows users to access the controller GUI using “http://ip- address.” The default value is disabled. Web mode is not a secure connection.

Step 2
Configure the web color theme for the controller GUI by entering this command: config network webcolor {default | red}
The default color theme for the controller GUI is enabled. You can change the default color scheme as red using the red option. If you are changing the color theme from the controller CLI, you need to reload the controller GUI screen to apply your changes.

Step 3
Enable or disable secure web mode by entering this command: config network secureweb {enable | disable}
This command allows users to access the controller GUI using “https://ip- address.” The default value is enabled. Secure web mode is a secure connection.

Step 4
Enable or disable secure web mode with increased security by entering this command: config network secureweb cipher-option high {enable | disable}
This command allows users to access the controller GUI using “https://ip- address” but only from browsers that support 128-bit (or larger) ciphers. With Release 8.10, this command is, by default, in enabled state. When high ciphers is enabled, SHA1, SHA256, SHA384 keys continue to be listed and TLSv1.0 is disabled. This is applicable to webauth and webadmin but not for NMSP.

Step 5
Enable or disable SSLv3 for web administration by entering this command: config network secureweb sslv3 {enable | disable}

Step 6
Enable 256 bit ciphers for a SSH session by entering this command: config network ssh cipher-option high {enable | disable}

Step 7
[Optional] Disable telnet by entering this command: config network telnet{enable | disable}

Step 8
Enable or disable preference for RC4-SHA (Rivest Cipher 4-Secure Hash Algorithm) cipher suites (over CBC cipher suites) for web authentication and web administration by entering this command: config network secureweb cipher-option rc4-preference {enable | disable}

Step 9
Verify that the controller has generated a certificate by entering this command: show certificate summary
Information similar to the following appears:
Web Administration Certificate…………….. Locally Generated
Web Authentication Certificate…………….. Locally Generated
Certificate compatibility mode:……………. off

Step 10
(Optional) Generate a new certificate by entering this command: config certificate generate webadmin
After a few seconds, the controller verifies that the certificate has been generated.

Step 11
Save the SSL certificate, key, and secure web password to nonvolatile RAM (NVRAM) so that your changes are retained across reboots by entering this command: save config

Step 12
Reboot the controller by entering this command: reset system

Telnet and Secure Shell Sessions

Telnet is a network protocol used to provide access to the controller’s CLI. Secure Shell (SSH) is a more secure version of Telnet that uses data encryption and a secure channel for data transfer. You can use the controller GUI or CLI to configure Telnet and SSH sessions. In Release 8.10.130.0, Cisco Wave 2 APs support the following cipher suites:

This section contains the following subsections:

Guidelines and Restrictions on Telnet and Secure Shell Sessions

  • When the controller’s config paging is disabled and clients running OpenSSH_8.1p1 OpenSSL 1.1.1 library are connected to the controller, you may experience the output display freezing. You may press any key to unfreeze the display. We recommend that you use one of the following methods to avoid this situation: · Connect using different version of OpenSSH and Open SSL library
  • Use Putty
  • Use Telnet
  • When the tool Putty is used as an SSH client to connect to the controller running versions 8.6 and above, you may observe disconnects from Putty when a large output is requested with paging disabled. This is observed when the controller has many configurations and has a high count of APs and clients, or in either of the cases. We recommend that you use alternate SSH clients in such situations.
  • In Release 8.6, controllers are migrated from OpenSSH to libssh, and libssh does not support these key exchange (KEX) algorithms: ecdh-sha2-nistp384 and ecdh-sha2-nistp521. Only ecdh-sha2-nistp256 is supported.
  • In Release 8.10.130.0 and later releases, controllers no longer support legacy cipher suites, weak ciphers, MACs and KEXs.

Configuring Telnet and SSH Sessions (GUI)
Procedure

Step 1 Choose Management > Telnet-SSH to open the Telnet-SSH Configuration page.
Step 2 In the Idle Timeout(minutes) field, enter the number of minutes that a Telnet session is allowed to remain inactive before being terminated. The valid range is from 0 to 160 minutes. A value of 0 indicates no timeout.
Step 3 From the Maximum Number of Sessions drop-down list, choose the number of simultaneous Telnet or SSH sessions allowed. The valid range is from 0 to 5 sessions (inclusive), and the default value is 5 sessions. A value of zero indicates that Telnet or SSH sessions are disallowed.
Step 4 To forcefully close current login sessions, choose Management > User Sessions and from the CLI session drop-down list, choose Close.
Step 5 From the Allow New Telnet Sessions drop-down list, choose Yes or No to allow or disallow new Telnet sessions on the controller. The default value is No.
Step 6 From the Allow New SSH Sessions drop-down list, choose Yes or No to allow or disallow new SSH sessions on the controller. The default value is Yes.
Step 7 Save your configuration.

What to do next
To see a summary of the Telnet configuration settings, choose Management > Summary. The Summary page that is displayed shows additional Telnet and SSH sessions are permitted.

Configuring Telnet and SSH Sessions (CLI)
Procedure

Step 1
Allow or disallow new Telnet sessions on the controller by entering this command: config network telnet {enable | disable}
The default value is disabled.

Step 2
Allow or disallow new SSH sessions on the controller by entering this command: config network ssh {enable | disable}
The default value is enabled.

Note
Use the config network ssh cipher-option high {enable | disable} command to enable sha2 which
is supported in controller.

Step 3
(Optional) Specify the number of minutes that a Telnet session is allowed to remain inactive before being terminated by entering this command: config sessions timeout timeout
The valid range for timeout is from 0 to 160 minutes, and the default value is 5 minutes. A value of 0 indicates no timeout.

Step 4
(Optional) Specify the number of simultaneous Telnet or SSH sessions allowed by entering this command: config sessions maxsessions session_num
The valid range session_num is from 0 to 5, and the default value is 5 sessions. A value of zero indicates that Telnet or SSH sessions are disallowed.

Step 5
Save your changes by entering this command: save config

Step 6
You can close all the Telnet or SSH sessions by entering this command: config loginsession close {session-id | all}
The session-id can be taken from the show login-session command.

Managing and Monitoring Remote Telnet and SSH Sessions
Procedure

Step 1
See the Telnet and SSH configuration settings by entering this command: show network summary

Information similar to the following is displayed:
RF-Network Name……………………….. TestNetwork1
Web Mode……………………………… Enable Secure
Web Mode……………………….. Enable
Secure Web Mode Cipher-Option High………. Disable
Secure Web Mode Cipher-Option SSLv2……… Disable
Secure Shell (ssh)…………………….. Enable
Telnet…………………………….. Disable …

Step 2
See the Telnet session configuration settings by entering this command: show sessions
Information similar to the following is displayed:
CLI Login Timeout (minutes)………… 5
Maximum Number of CLI Sessions……. 5

Step 3
See all active Telnet sessions by entering this command: show login- session
Information similar to the following is displayed:

ID User Name Connection From Idle Time Session Time
— ————— ————— ———— ————
00 admin EIA-232 00:00:00 00:19:04

Step 4
Clear Telnet or SSH sessions by entering this command: clear session session-id
You can identify the session-id by using the show login-session command.

Configuring Telnet Privileges for Selected Management Users (GUI)
Using the controller, you can configure Telnet privileges to selected management users. To do this, you must have enabled Telnet privileges at the global level. By default, all management users have Telnet privileges enabled.

Note
SSH sessions are not affected by this feature.

Procedure

Step 1 Choose Management > Local Management Users.
Step 2 On the Local Management Users page , check or uncheck the Telnet Capable check box for a management user.
Step 3 Save the configuration.

Configuring Telnet Privileges for Selected Management Users (CLI)
Procedure

  • Configure Telnet privileges for a selected management user by entering this command: config mgmtuser telnet user-name {enable | disable}

Management over Wireless

The management over wireless feature allows you to monitor and configure local controllers using a wireless client. This feature is supported for all management tasks except uploads to and downloads from (transfers to and from) the controller. This feature blocks wireless management access to the same controller that the wireless client device is currently associated with. It does not prevent management access for a wireless client associated with another controller entirely. To completely block management access to wireless clients based on VLAN and so on, we recommend that you use access control lists (ACLs) or similar mechanism.

Restrictions on Management over Wireless

  • Management over Wireless can be disabled only if clients are on central switching.
  • Management over Wireless is not supported for FlexConnect local switching clients. However, Management over Wireless works for non-web authentication clients if you have a route to the controller from the FlexConnect site.

This section contains the following subsections:
Enabling Management over Wireless (GUI)
Procedure

Step 1 Choose Management > Mgmt Via Wireless to open the Management Via Wireless page.
Step 2 Check the Enable Controller Management to be accessible from Wireless Clients check box to enable management over wireless for the WLAN or unselect it to disable this feature. By default, it is in disabled state.
Step 3 Save the configuration.

Enabling Management over Wireless (CLI)
Procedure

Step 1
Verify whether the management over wireless interface is enabled or disabled by entering this command: show network summary

  • If disabled: Enable management over wireless by entering this command: config network mgmt-via-wireless enable
  • Otherwise, use a wireless client to associate with an access point connected to the controller that you want to manage.

Step 2
Log into the CLI to verify that you can manage the WLAN using a wireless client by entering this command: telnet wlc-ip-addr CLI-command

Administration of Controller 13

Configuring Management using Dynamic Interfaces (CLI)

Dynamic interface is disabled by default and can be enabled if needed to be also accessible for most or all of management functions. Once enabled, all dynamic interfaces are available for management access to controller. You can use access control lists (ACLs) to limit this access as required.

Procedure

  • Enable or disable management using dynamic interfaces by entering this command: config network mgmt-via-dynamic-interface {enable | disable}

Documents / Resources

| CISCO Wireless Controller Configuration Guide [pdf] User Guide
Wireless Controller Configuration Guide, Controller Configuration Guide, Wireless Configuration Guide, Configuration Guide, Configuration
---|---

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals