Cisco Prime Infrastructure 1.2 User Guide
Field Reference

Table Of Contents

Field Reference

Configuration Templates Field Descriptions

Controller Templates Field Descriptions

Controller > System > General Template

Controller > System > Global CDP Configuration Template

Controller > System > Dynamic Interface Template

Controller > WLANs > WLAN Configuration Template

Controller > FlexConnect > FlexConnect AP Groups Template

Controller > Security > AAA > RADIUS Auth Servers Template

Controller > Security > AAA > LDAP Servers Template

Controller > Security > AAA > TACACS+ Servers Template

Controller > Security > Local EAP > General - Local EAP Template

Controller > Security > Local EAP > Local EAP Profiles Template

Controller > Security > Local EAP > EAP-FAST Parameters Template

Controller > Security > Wireless Protection Policies > Rogue Policies Template

Controller > Security > IP Groups Template

Controller > Security > Protocol Groups

Controller > Security > 802.11 > Band Select

Controller > Security > 802.11 > Media Stream

Controller > Security > 802.11 > RF Profiles

Controller > 80211a or n > Parameters

Controller > 80211a or n > CleanAir

Controller > 80211a or n > Media Parameters

Controller > 80211a or n > Roaming Parameters

Controller > 80211a or n > dot11a-RRM > Thresholds

Controller > 80211a or n > dot11a-RRM > DCA

Controller > 802.11b or g or n > Parameters

Controller > 802.11b or g or n > Media Parameters

Controller > 802.11b or g or n > Roaming Parameters

Controller > 802.11b or g or n > CleanAir

Controller > dot11b-RRM > Thresholds

Controller > dot11b-RRM > TPC

Controller > dot11b-RRM > DCA

Controller > Management > Trap Control

Controller > Management > Telnet SSH

Controller > Location > Location Configuration

Controller > PMIP > Global Config

Security Templates Field Descriptions

Security > DMVPN

Security > GETVPN-GroupMember

Security > GETVPN-KeyServer

Security > ScanSafe

Wireless Configuration Templates Field Descriptions

Lightweight AP Configuration Templates

Autonomous AP Migration Templates

Designing Mobility Services Engine Field Description

Mobility Services Engine Page Field Description

Mobility Services Engine > Select a command > Add Location Server

Mobility Services Engine > Select a command > Add Mobility Services Engine

Mobility Services Engine Database Synchronization

High Availability Field Description

Adding Trap Destinations for a mobility services engine

Adding User to a mobility services engine

Adding User Groups

Provisioning MSAP service advertisement

Wireless Operational Tools Field Descriptions

Guest User Controller Templates Field Descriptions

Guest User > Add Guest User > New Controller Template > General Tab

Guest User > Add Guest User > New Controller Template > Advanced Tab

Voice Audit Field Descriptions

Voice Audit > Controller Tab

Voice Audit > Rules Tab

Voice Audit > Report Tab

Voice Diagnostic Field Descriptions

Voice Diagnostic Test List Page

Voice Diagnostic Test Report Page

Switch Location Configuration Templates


Field Reference


This section provides reference information on Prime Infrastructure fields.

Configuration Templates Field Descriptions

Designing Mobility Services Engine Field Description

Wireless Operational Tools Field Descriptions

Configuration Templates Field Descriptions

The following sections contain field descriptions for configuration templates:

Controller Templates Field Descriptions

Security Templates Field Descriptions

Wireless Configuration Templates Field Descriptions

Switch Location Configuration Templates

Controller Templates Field Descriptions

The following sections contain field descriptions for pages found in Design > Configuration Templates > Features and Technologies > Controller.

Controller > System > General Template

Controller > System > Global CDP Configuration Template

Controller > System > Dynamic Interface Template

Controller > WLANs > WLAN Configuration Template

Controller > FlexConnect > FlexConnect AP Groups Template

Controller > Security > AAA > RADIUS Auth Servers Template

Controller > Security > AAA > LDAP Servers Template

Controller > Security > AAA > TACACS+ Servers Template

Controller > Security > Local EAP > General - Local EAP Template

Controller > Security > Local EAP > Local EAP Profiles Template

Controller > Security > Local EAP > EAP-FAST Parameters Template

Controller > Security > Wireless Protection Policies > Rogue Policies Template

Controller > Security > IP Groups Template

Controller > Security > Protocol Groups

Controller > Security > 802.11 > Band Select

Controller > Security > 802.11 > Media Stream

Controller > Security > 802.11 > RF Profiles

Controller > 80211a or n > Parameters

Controller > 80211a or n > CleanAir

Controller > 80211a or n > Media Parameters

Controller > 80211a or n > Roaming Parameters

Controller > 80211a or n > dot11a-RRM > Thresholds

Controller > 80211a or n > dot11a-RRM > DCA

Controller > 802.11b or g or n > Parameters

Controller > 802.11b or g or n > Media Parameters

Controller > 802.11b or g or n > Roaming Parameters

Controller > 802.11b or g or n > CleanAir

Controller > dot11b-RRM > Thresholds

Controller > dot11b-RRM > TPC

Controller > dot11b-RRM > DCA

Controller > Management > Trap Control

Controller > Management > Telnet SSH

Controller > Location > Location Configuration

Controller > PMIP > Global Config

Controller > System > General Template

Table 31-1 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > System > General page.

Table 31-1 Controller > System > General Template  

Field
Description

802.3x Flow Control Mode

Enable or disable flow control mode.

802.3 Bridging

Enable or disable 802.3 bridging. This 802.3 bridging option is not available for Cisco 5500 and Cisco 2106 series controllers.

Web Radius Authentication

choose the desired Web RADIUS authentication. You can choose to use PAP, CHAP, or MD5-CHAP for authentication between the controller and the client during the user credential exchange.

AP Primary Discovery Timeout

Specify the number of seconds for the AP Primary Discovery Timeout. The default is 120 seconds, and the valid range is 30 to 3600.

Back-up Primary Controller IP Address

Specify the Back-up primary and secondary controller details.

Back-up Primary Controller Name

Back-up Secondary Controller IP Address

Back-up Secondary Controller Name

CAPWAP Transport Mode

Specify Layer 2 or Layer 3 transport mode. When set to Layer 3, the lightweight access point uses IP addresses to communicate with the access points; these IP addresses are collected from a mandatory DHCP server. When set to Layer 2, the lightweight access point uses proprietary code to communicate with the access points.

Controllers through Version 5.2 use LWAPP and the new controller version uses CAPWAP.

Broadcast Forwarding

Choose to enable or disable broadcast forwarding. The default is disabled.

LAG Mode

Choose Enable or Disable from the LAG Mode drop-down list. Link aggregation allows you to reduce the number of IP addresses needed to configure the ports on your controller by grouping all the physical ports and creating a link aggregation group (LAG).

If LAG is enabled on a controller, any dynamic interfaces that you have created are deleted to prevent configuration inconsistencies in the interface database. When you make changes to the LAG configuration, the controller has to be rebooted for the changes to take effect.

Interfaces cannot be created with the Dynamic AP Manager flag set. Also, you cannot create more than one LAG on a controller.

Peer to Peer Blocking MOde

Choose to enable or disable peer-to-peer blocking mode. If you choose Disable, any same-subnet clients communicate through the controller. If you choose Enable, any same-subnet clients communicate through a higher-level router.

Over-the-Air Provisioning AP Mode

From the Over Air AP Provision Mode drop-down list, choose enable or disable.

AP Fallback

From the AP Fallback drop-down list, choose enable or disable. Enabling fallback causes an access point that lost a primary controller connection to automatically return to service when the primary controller returns.

When a controller fails, the backup controller configured for the access point suddenly receives a number of discovery and join requests. This might cause the controller to reach a saturation point and reject some of the access points. By assigning priority to an access point, you have some control over which access points are rejected. In a failover situation when the backup controller is saturated, the higher priority access points can join the backup controller if the lower priority access points are disjoined. Choose enable from the AP Failover Priority drop-down list if you want to allow this capability.

AP Failover Priority

Apple Talk Bridging

Choose to enable or disable AppleTalk bridging.

This AppleTalk bridging option is not available on Cisco 5500 series controllers.

Fast SSID Change

Choose to enable or disable the Fast SSID Change option. If the option is enabled, the client connects instantly to the controller between SSIDs without having much loss of connectivity. Normally, each client is connected to a particular WLAN identified by the SSID. If the client moves out of reach of the connected access point, the client has to reconnect to the controller using a different access point. This normal process consumes some time as the DHCP (Dynamic Host Configuration Protocol) server has to assign an IP address to the client.

Because the master controller is normally not used in a deployed network, the master controller setting is automatically disabled upon reboot or operating system code upgrade. You might want to enable the controller as the master controller from the Master Controller Mode drop-down list.

Master Controller Mode

Choose to enable or disable access to the controller management interface from wireless clients. Because of IPsec operation, management via wireless is only available to operators logging in across WPA or Static WEP.

Wireless Management

Wireless management is not available to clients attempting to log in via an IPsec WLAN.

Symmetric Tunneling Mode

Choose to enable or disable symmetric tunneling mode. With symmetric mobility tunneling, the controller provides inter-subnet mobility for clients roaming from one access point to another within a wireless LAN. The client traffic on the wired network is directly routed by the foreign controller. If a router has Reverse Path Forwarding (RPF) enabled (which provides additional checks on incoming packets), the communication is blocked. Symmetric mobility tunneling allows the client traffic to reach the controller designated as the anchor, even with RPF enabled.

All controllers in a mobility group must have the same symmetric tunneling mode.

For symmetric tunneling to take effect, you must reboot.

ACL Counters

Use the ACL Counters drop-down list to enable or disable ACL counters. The values per ACL rule can be viewed for each controller.

Default Mobility Domain Name

Enter the operator-defined RF mobility group name in the Default Mobility Domain Name text box.

Mobility Anchor Group Keep Alive Interval

At the Mobility Anchor Group Keep Alive Interval, determine the delay between tries for clients attempting to join another access point. With this guest tunneling N+1 redundancy feature, the time it takes for a client to join another access point following a controller failure is decreased because a failure is quickly identified, the clients are moved away from the problem controller, and the clients are anchored to another controller.

When you hover your mouse cursor over the field, the valid range of values appear.

Mobility ANchor Group Keep Alive Retries

At the Mobility Anchor Group Keep Alive Retries, specify the number of queries to anchor before the client declares it unreachable.

RF Network Name

Enter the RF network group name between 8 and 19 characters. Radio Resource Management (RRM) neighbor packets are distributed among access points within an RF network group. The Cisco access points only accept RRM neighbor packets sent with this RF network name. The RRM neighbor packets sent with different RF network names are dropped.

User Idle Timeout

Specify the time out for idle clients. The factory default is 300 seconds. When the timeout expires, the client loses authentication, briefly disassociates from the access point, reassociates, and re-authenticates.

Specify the timeout in seconds for the address resolution protocol. The factory default is 300 seconds.

ARP Timeout

Specify the timeout in seconds.

Global TCP Adjust MSS

Select the Global TCP Adjust MMS check box to start checking the TCP packets originating from the client, for the TCP SYN/ TCP ACK packets and MSS value and reset it to the configured value on the upstream and downstream side.

Disable local access

When this check box is selected, the AP will not broadcast local SSIDs or allow access to any of the Ethernet Ports.

Out of Box

Select this check box to create out-of-box RF profiles for both the radios along with out-of-box AP Group.

Web Auth Proxy Redirect Mode

Choose enable or disable Web Auth Proxy Redirect Mode if a manual proxy configuration is configured on the browser of the client; all web traffic going out from the client is destined for the PROXY IP and PORT configured on the browser.

Web Auth Proxy Redirect Port

Enter the Web Auth Proxy Redirect Port. The default ports are 8080 and 3128. The range is 0 to 65535.

AP Retransmit Count

Enter the AP Retransmit Count and Intervals. The AP Retransmit Count default value is 5 and the range is from 3 to 8. The AP Retransmit Interval default value is 3. The range is 2 to 5.

AP Retransmit Interval


Controller > System > Global CDP Configuration Template

Table 31-2 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > System > Global CDP Configuration page.

Table 31-2 Controller > System > Global CDP Configuration Template  

Field
Description

CDP on controller

Choose enable or disable CDP on the controller. This configuration cannot be applied on WiSM2 controllers.

Global CDP on APs

Choose to enable or disable CDP on the access points.

Refresh Interval

Enter the time in seconds at which CDP messages are generated. The default is 60.

Hold Time

Enter the time in seconds before the CDP neighbor entry expires. The default is 180.

CDP Advertisement Version

Enter which version of the CDP protocol to use. The default is v1.

Ethernet Interface Slot

Select the slots of Ethernet interfaces for which you want to enable CDP. CDP for Ethernet Interfaces fields are supported for Controller Version 7.0.110.2 and later.

Radio Interface Slot

Select the slots of Radio interfaces for which you want to enable CDP. CDP for Radio Interfaces fields are supported for Controller Version 7.0.110.2 and later.


Controller > System > Dynamic Interface Template

Table 31-3 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > System > Dynamic Interface page.

Table 31-3 Controller > System > Dynamic Interface  

Field
Description

Guest LAN

Select to mark the interface as wired.

Quarantine

Enable/disable to quarantine a VLAN. Select the check box to enable.

Netmask

Enter the net mask address of the interface.

LAG Mode

Select this check box to enable or disable LAG Mod. If LAG mode is selected with this interface, then the settings can be applied only to the LAG-enabled controllers.

Primary Port Number

Enter the port currently used by the interface.

Secondary Port Number

Enter a secondary port to be used by the interface when the primary port is down. When the primary port is reactivated, the Cisco 4400 Series Wireless LAN controller transfers the interfaces back to the primary port.

Primary and secondary port numbers are present only in the Cisco 4400 Series Wireless LAN controllers.

AP Management

Select this check box to enable access point management.

Primary DHCP Server

Enter the IP addresses of the primary DHCP servers.

Secondary DHCP Server

Enter the IP addresses of the secondary DHCP servers.

ACL Name

Choose a name from the list of defined names.

From the Add Format Type drop-down list in the Add Interface Format Type group box, choose either Device Info or File. If you choose device info, you must configure the device-specific fields for each controller. If you choose File, you must configure CSV device-specific fields (Interface Name, VLAN Identifier, Quarantine VLAN Identifier, IP Address, and Gateway) for all the managed controllers specified in the CSV file (see Table 31-4). If you choose Device Info, continue to Step 12.


The sample CSV files are as follows.

Table 31-4 Sample CSV Files 

ip_address
interface_name
vlan_id
quarantine_
vlan_id
interface_
ip_address
gateway

209.165.200.224

dyn-1

1

2

209.165.200.228

209.165.200.229

209.165.200.225

interface-1

4

2

209.165.200.230

209.165.200.231

209.165.200.226

interface-2

5

3

209.165.200.232

209.165.200.233

209.165.200.227

dyna-2

2

3

209.165.200.234

209.165.200.235


The first row of the CSV file is used to describe the columns included. The CSV files can contain the following fields:

ip_address

interface_name

vlan_id

quarantine_vlan_id

interface_ip_address

gateway

If you choose Apply to Controllers, you advance to the Apply To page where you can configure device-specific fields for each controller.

Use the Add and Remove options to configure device specific fields for each controllers. If you click Edit, a dialog box appears with the current parameter input.

Make the necessary changes in the dialog box, then click OK.


Note If you change the interface fields, the WLANs are temporarily disabled, therefore you might lose connectivity for some clients. Any changes to the interface fields are saved only after you successfully apply them to the controller(s).



Note If you remove an interface here, it is removed only from this template and not from the controllers.


Controller > WLANs > WLAN Configuration Template

The following tables describe the fields on the Design > Configuration Templates> Features and Technologies > Controller > WLANs > WLAN Configuration page:

Table 31-5—General tab

Table 31-6—Security tab

Table 31-7—QoS tab

Table 31-8—Advanced tab

Table 31-9—Hot Spot tab

Controller > WLANs > WLAN Configuration > General

Table 31-5 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > WLANs > WLAN Configuration > General tab.

Table 31-5 Controller > WLANs > WLAN Configuration > General  

Field
Description

Wired Lan

Check the box to indicate whether or not this WLAN is a wired LAN.

Note Specify if you want guest users to have wired guest access from an Ethernet connection designated and configured for guest access. Wired guest access ports might be available in a guest office or specific ports in a conference room and accounts are added to the network using the Lobby Ambassador portal. (The Egress or Ingress interface configurations are applicable for Wired LAN only.

Use the Type drop-down list to select the type of the wired LAN.

Guest LAN—Indicates that this wired LAN is a Guest LAN. If you select the Guest LAN option, you need to select an Ingress interface which has not already been assigned to any Guest LAN.

Remote LAN—Indicates that this wired LAN is a Remote LAN.

Profile Name

Enter a name in the Profile Name text box that identifies the WLAN or the guest LAN. Do not use any spaces in the name entered.

SSID

Enter the name of the WLAN SSID. An SSID is not required for a guest LAN.

WLANs with the same SSID must have unique Layer 2 security policies so that clients can make a WLAN selection based on information advertised in the beacons and probes.

Status

Select the Enable check box for the Status field.

Security Policies

Modifications you make in the Security tab appear after you save the template.

Radio Policy

Set the WLAN policy to apply to All (802.11a/b/g/n), 802.11a only, 802.11g only, 802.11b/g only, or 802.11a/g only.

Interface/Interface Group

Choose the available names of interfaces created by the Controller > Interfaces module.

Multicast VLAN

Select the Enable check box to enable the multicast VLAN feature.

From the Multicast VLAN Interface drop-down list, choose the appropriate interface name. This list is automatically populated when you enable the multicast VLAN feature

Broadcast SSID

Click to activate SSID broadcasts for this WLAN.


Related Topics

Table 31-6—Security tab

Table 31-7—QoS tab

Table 31-8—Advanced tab

Table 31-9—Hot Spot tab

Controller > WLANs > WLAN Configuration > Security

Table 31-6 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > WLANs > WLAN Configuration > Security tab.

Table 31-6 Controller > WLANs > WLAN Configuration > Security  

Field
Description
Layer 2

None

No Layer 2 security selected.

FT Enable—Select the check box to enable Fast Transition (FT) between access points.

Note Fast transition is not supported with FlexConnect mode.

Over the DS—Select the check box to enable or disable the fast transition over a distributed system.

Reassociation Timeout—Time in seconds after which fast transition reassociation times out. The default is 20 seconds, and the valid range is 1 to 100.

To enable Over the DS or Reassociation Timeout, you should enable fast transition.

802.1X

WEP 802.1X data encryption type:

40/64 bit key

104 bit key

152 bit key

Static WEP

Static WEP encryption fields:

Key sizes: Not set, 40/64, 104, and 152 bit key sizes.

Key Index: 1 to 4 (Note 2).

Encryption Key: Encryption key required.

Key Format: ASCII or HEX.

Allowed Shared Key Authentication—Select the check box to enable shared key authentication.

Regardless of the format you choose, for security reasons, only ASCII is visible on the WLC (and the Prime Infrastructure). For this reason, you cannot use a template to replicate the configuration on a second controller during auto provisioning. You should set the key format again in the template in case a discovered template is applied to another device.

Static WEP-802.1X

Use this setting to enable both Static WEP and 802.1X policies. If this option is selected, static WEP and 802.1X fields are displayed at the bottom of the page.

Static WEP encryption fields:

Key sizes: Not set, 40/64, 104, and 152 bit key sizes.

Key index: 1 to 4 (Note 2).

Encryption Key: Enter encryption key.

Key Format: ASCII or HEX.

Allowed Shared Key Authentication—Select the check box to enable.

802.1 Data Encryption: 40/64 bit key, 104 bit key, 152 bit key.

CKIP

Cisco Key Integrity Protocol (CKIP). A Cisco access point advertises support for CKIP in beacon and probe response packets. CKIP can be configured only when Aironet IE is enabled on the WLAN.

Note CKIP is not supported on 10xx APs.

When selected, these CKIP fields are displayed.

Key size: Not set, 40, or 104.

Key Index: 1 to 4

Encryption Key: Specify encryption key.

Key Format: ASCII or HEX.

Note Regardless of the format you choose, for security reasons, only ASCII is visible on the WLC (and Prime Infrastructure). For this reason, you cannot use a template to replicate the configuration on a second controller during auto provisioning. You should set the key format again in the template in case a discovered template is applied to another device.

MMH Mode—Select the check box to enable.

Key Permutation—Select the check box to enable

MAC Filtering

Check to filter clients by MAC address.

Note The ability to join a controller without specification within a MAC filter list is only supported on mesh access points.

Note For releases prior to 4.1.82.0, mesh access points do not join the controller unless they are defined in the MAC filter list.

You might want to disable the MAC filter list to allow newly added access points to join the controller. Before enabling the MAC filter list again, you should enter the MAC addresses of the new access points.

Authentication Key Management

Choose the desired type of authentication key management. The choices are 802.1X, CCKM, or PSK.

Note If you choose PSK, you must enter the shared key and type (ASCII or hexadecimal).

Note Regardless of the format you choose, for security reasons, only ASCII is visible on the WLC (and Prime Infrastructure). For this reason, you cannot use a template to replicate the configuration on a second controller during auto provisioning. You should set the key format again in the template in case a discovered template is applied to another device.

Layer 3

Layer 3 Security

Choose between None and VPN Pass Through.

Note The VPN passthrough option is not available for the 2106 or 5500 series controllers.

Web Policy

You can modify the default static WEP (web authentication) or assign specific web authentication (login, logout, login failure) pages and the server source.

1. To change the static WEP to passthrough, select the Web Policy check box and choose the Passthrough option from the drop-down list. This option allows users to access the network without entering a username or password.

An Email Input check box appears. Select this check box if you want users to be prompted for their e-mail address when attempting to connect to the network.

2. Choose the WebAuth on MAC Filter Failure option so that when clients fail on MAC filter, they are automatically switched to webAuth.

Note The WebAuth on Mac Filter Failure option works only when the Layer 2 Mac Filtering option is enabled.

3. To specify custom web authentication pages, unselect the Global WebAuth Configuration Enable check box.

When the Web Auth Type drop-down list appears, choose one of the following options to define the web login page for the wireless guest users:

Default Internal—Displays the default web login page for the controller. This is the default value.

Customized Web Auth—Displays custom web login, login failure, and logout pages. When the customized option is selected, three separate drop-down lists for login, login failure, and logout page selection appear. You do not need to define a customized page for all three of the options. Choose None from the appropriate drop-down list if you do not want to display a customized page for that option.

These optional login, login failure, and logout pages are downloaded to the controller as webauth.tar files.

External—Redirects users to an external server for authentication. If you choose this option, you must also enter the URL of the external server in the URL text box.

Note External web auth is not supported for 2106 and 5500 series controllers.

You can select specific RADIUS or LDAP servers to provide external authentication in the Security > AAA page. To do so, continue with Step 4.

Note The RADIUS and LDAP servers must be already configured to have selectable options in the Security > AAA page. You can configure these servers in the RADIUS Authentication Servers page and TACACS+ Authentication Servers page.

If you selected External as the Web Authentication Type in Step 2, choose Security > AAA, and choose up to three RADIUS and LDAP servers using the drop-down lists.

Repeat this process if a second (anchor) controller is being used in the network.

AAA Server

Radius Server Overwrite

Check to send the client authentication request through the dynamic interface which is set on the WLAN. When you enable the Radius Server Overwrite Interface option, the WLC sources all radius traffic for a WLAN using the dynamic interface configured on that WLAN.

Note You cannot enable Radius Server Overwrite Interface when Diagnostic Channel is enabled.

Note The Radius Server Overwrite Interface option is supported in controller Version 7.0.x and later.

Select the Enable check boxes, then use the drop-down lists in the RADIUS and LDAP servers section to choose authentication and accounting servers. This selects the default RADIUS server for the specified WLAN and overrides the RADIUS server that is configured for the network. If all three RADIUS servers are configured for a particular WLAN, server 1 has the highest priority, and so on.

If no LDAP servers are chosen here, Prime Infrastructure uses the default LDAP server order from the database.

Interim Update

Select t to enable interim update for RADIUS Server Accounting. If you have selected this check box, specify the Interim Interval value. The range is 180 to 3600 seconds, and the default value is 0.

Note The Interim Interval can be entered only when Interim Update is enabled.

Local EAP Authentication

Select the Local EAP Authentication check box if you have an EAP profile already configured that you want to enable. Local EAP is an authentication method that allows users and wireless clients to locally authenticate. It is designed for use in remote offices that want to maintain connectivity to wireless clients when the backend system becomes disrupted or the external authentication server goes down.

Allow AAA Override

When you enable AAA Override, and a client has conflicting AAA and controller WLAN authentication fields, client authentication is performed by the AAA server. As part of this authentication, the operating system moves clients from the default Cisco WLAN Solution to a VLAN returned by the AAA server and predefined in the controller interface configuration (only when configured for MAC filtering, 802.1X, and/or WPA operation). In all cases, the operating system also uses QoS and ACL provided by the AAA server, as long as they are predefined in the controller interface configuration. (This VLAN switching by AAA override is also referred to as identity networking.)

For instance, if the corporate WLAN primarily uses a management interface assigned to VLAN 2, and if AAA override returns a redirect to VLAN 100, the operating system redirects all client transmissions to VLAN 100, regardless of the physical port to which VLAN 100 is assigned.

When AAA override is disabled, all client authentication defaults to the controller authentication parameter settings, and authentication is only performed by the AAA server if the controller WLANs do not contain any client-specific authentication parameters.

The AAA override values might come from a RADIUS server, for example.


Related Topics

Table 31-5—General tab

Table 31-7—QoS tab

Table 31-8—Advanced tab

Table 31-9—Hot Spot tab

Controller > WLANs > WLAN Configuration > QoS

Table 31-7 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > WLANs > WLAN Configuration > QoS tab.

Table 31-7 Controller > WLANs > WLAN Configuration > QoS  

Field
Description

Quality of Service (QoS)

Choose Platinum (voice), Gold (video), Silver (best effort), or Bronze (background). Services such as VoIP should be set to gold while non-discriminating services such as text messaging can be set to bronze.

Override Per-User Rate Limits

Data rates on a per-user basis

Average Data Rate

Define the average data rate for TCP traffic per user or per SSID by entering the rate in Kbps in the Average Data Rate text boxes. A value of 0 imposes no

bandwidth restriction on the profile.

Burst Data Rate

Define the peak data rate for TCP traffic per user or per SSID by entering the rate in Kbps in the Burst Data Rate text boxes. A value of 0 imposes no bandwidth restriction on the profile. The Burst Data Rate should be greater than or equal to the Average Data Rate. Otherwise, the QoS policy may block traffic to and from the wireless client.

Average Real-Time Rate

Define the average real-time rate for UDP traffic per user or per SSID by entering the rate in Kbps in the Average Real-Time Rate text boxes. A value of 0 imposes no bandwidth restriction on the profile.

Burst Real-Time Rate

Define the peak real-time rate for UDP traffic per user or per SSID by entering the rate in Kbps in the Burst Real-Time Rate text boxes. A value of 0 imposes no bandwidth restriction on the profile. The Burst Real-Time Rate should be greater than or equal to the Average Real-Time Rate. Otherwise, the QoS policy may block traffic to and from the wireless client.

Override Per-SSID Rate Limits

Data rates on a per SSID basis

Average Data Rate

Define the average data rate TCP traffic per user or per SSID by entering the rate in Kbps in the Average Data Rate text boxes. A value of 0 imposes no bandwidth restriction on the profile.

Burst Data Rate

Define the peak data rate for TCP traffic per user or per SSID by entering the rate in Kbps in the Burst Data Rate text boxes. A value of 0 imposes no bandwidth restriction on the profile. The Burst Data Rate should be greater than or equal to the Average Data Rate. Otherwise, the QoS policy may block traffic in the WLANs.

Average Real-Time Rate

Define the average real-time rate for UDP traffic per user or per SSID by entering the rate in Kbps in the Average Real-Time Rate text boxes. A value of 0 imposes no bandwidth restriction on the profile.

Burst Real-Time Rate

Define the peak real-time rate for UDP traffic per user or per SSID by entering the rate in Kbps in the Burst Real-Time Rate text boxes. A value of 0 imposes no bandwidth restriction on the profile. The Burst Real-Time Rate should be greater than or equal to the Average Real-Time Rate. Otherwise, the QoS policy may block traffic in the WLANs.

WMM Policy

Choose Disabled, Allowed (so clients can communicate with the WLAN), or Required to make it mandatory for clients to have WMM enabled for communication.

7920 AP CAC

Select to enable support on Cisco 7920 phones.

If you want WLAN to support older versions of the software on 7920 phones, select the 7920 Client CAC check box to enable it. The CAC limit is set on the access point for newer versions of software.


Related Topics

Table 31-5—General tab

Table 31-6—Security tab

Table 31-8—Advanced tab

Table 31-9—Hot Spot tab

Controller > WLANs > WLAN Configuration > Advanced

Table 31-5 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > WLANs > WLAN Configuration > Advanced tab.

Table 31-8 Controller > WLANs > WLAN Configuration > Advanced  

Field
Description

FlexConnect Local Switching

Click to enable FlexConnect local switching. If you enable FlexConnect local switching, the FlexConnect access point handles client authentication and switches client data packets locally.

FlexConnect local switching is only applicable to the Cisco 1130/1240/1250 series access points. It is not supported with L2TP or PPTP authentications, and it is not applicable to WLAN IDs 9-16.

FlexConnect Local Auth

Select to enable FlexConnect local authentication.

Local authentication is useful where you cannot maintain the criteria a remote office setup of minimum bandwidth of 128 kbps with the roundtrip latency no greater than 100 ms and the maximum transmission unit (MTU) no smaller than 500 bytes. In local switching, the authentication capabilities are present in the access point itself. Thus local authentication reduces the latency requirements of the branch office.

Note Local authentication can only be enabled on the WLAN of a FlexConnect AP that is in local switching mode.

Local authentication is not supported in the following scenarios:

Guest Authentication cannot be performed on a FlexConnect local authentication enabled WLAN.

RRM information is not available at the controller for the FlexConnect local authentication enabled WLAN.

Local radius is not supported.

Once the client has been authenticated, roaming is supported after the WLC and the other FlexConnects in the group are updated with the client information.

Learn Client IP Address

When you enable hybrid-REAP local switching, the Learn Client IP Address check box is enabled by default. However, if the client is configured with Fortress Layer 2 encryption, the controller cannot learn the client IP address, and the controller periodically drops the client. Disable this option so that the controller maintains the client connection without waiting to learn the client IP address. The ability to disable this option is supported only with hybrid-REAP local switching; it is not supported with hybrid-REAP central switching.

Diagnostic Channel

Choose to enable the diagnostic channel feature or leave it disabled. The diagnostic channel feature allows you to troubleshoot problems regarding client communication with a WLAN. When initiated by a client having difficulties, the diagnostic channel provides the most robust communication methods with the fewest obstacles to communication.

Aironet IE

Select to enable support for Aironet information elements (IEs) for this WLAN. If Aironet IE support is enabled, the access point sends an Aironet IE 0x85 (which contains the access point name, load, number of associated clients, and so on) in the beacon and probe responses of this WLAN, and the controller sends Aironet IEs 0x85 and 0x95 (which contains the management IP address of the controller and the IP address of the access point) in the reassociation response if it receives Aironet IE 0x85 in the reassociation request.

IPv6

Select the IPv6 check box. You can configure IPv6 bridging and IPv4 web auth on the same WLAN.

Session Timeout

Check to set the maximum time a client session can continue before requiring reauthorization.

Coverage Hole Detection

Choose to enable or disable coverage hold detection (CHD) on this WLAN. By default, CHD is enabled on all WLANs on the controller. If you disable CHD on a WLAN, a coverage hole alert is still sent to the controller, but no other processing is done to mitigate the coverage hole. This feature is useful for guest WLANs where highly mobile guests are connected to your network for short periods of time.

Override Interface ACL

The Override Interface drop-down lists provides a list of defined access control lists (ACLs). Upon choosing an ACL from the list, the WLAN associates the ACL to the WLAN. Selecting an ACL is optional, and the default for this field is None

Peer to Peer Blocking

You can configure peer-to-peer blocking per WLAN rather than applying the status to all WLANs. From the Peer to Peer Blocking drop-down list, choose one of the following:

Disable—Peer-to-peer blocking is disabled, and traffic is bridged locally whenever possible.

Drop—The packet is discarded.

Forward Up Stream—The packet is forwarded on the upstream VLAN, and the decision is made about what to do with the packet.

Note For locally switched clients, the Forward Up Stream is same as Drop from 7.2.x version of controllers.

If FlexConnect local switching is enabled for the WLAN, which prevents traffic from passing through the controller, this drop-down list is dimmed.

Note Peer-to-peer blocking does not apply to multicast traffic.

Wi-Fi Direct Clients Policy

Choose one of the following options:

Disabled—Disables the Wi-Fi Direct Clients Policy for the WLAN and deauthenticates all Wi-Fi Direct capable clients. The default is Disabled.

Allow—Allows the Wi-Fi Direct clients to associate with an infrastructure WLAN.

Not-Allow—Disallows the Wi-Fi Direct clients from associating with an infrastructure WLAN.

Note Wi-Fi Direct Client Policy is applicable to WLANs that have APs in local mode only.

Note The Wi-Fi Direct Clients Policy is applicable for controller Version 7.2.x. and later.

Client Exclusion

Select the check box if you want to enable automatic client exclusion. If you enable client exclusion, you must also set the Timeout Value in seconds for disabled client machines. Client machines are excluded by MAC address, and their status can be observed. A timeout setting of 0 indicates that administrative control is required to reenable the client.

Note When session timeout is not set, it implies that an excluded client remains and does not timeout from the excluded state. It does not imply that the exclusion feature is disabled.

Passive Client

Enter the maximum number of clients to be associated in a WLAN in the Maximum Clients text box. The valid range is from 0 to 7000. The default value is 0.

Note A value of 0 allows unlimited number of clients to be associated with a WLAN.

Static IP Tunneling

Enable dynamic anchoring of static IP clients by selecting the Static IP Tunneling check box.

Media Session Snooping

This feature enables access points to detect the establishment, termination, and failure of voice calls and then report them to the controller and Prime Infrastructure. It can be enabled or disabled per WLAN.

When media session snooping is enabled, the access point radios that advertise this WLAN snoop for Session Initiation Protocol (SIP) voice packets. Any packets destined to or originating from port number 5060 are considered for further inspection. The access point tracks whether Wi-Fi Multimedia (WMM) and non-WMM clients are establishing a call, already on an active call, or in the process of ending a call and then notify the controller of any major call events.

KTS based CAC

Select the KTS based CAC check box to enable KTS based CAC support per WLAN.

WLC supports TSPEC based CAC and SIP based CAC. But there are certain phones that work with different protocols for CAC, which are based on the KTS (Key Telephone System). For supporting CAC with KTS-based SIP clients, WLC should understand and process the bandwidth request message from those clients to allocate the required bandwidth on the AP radio, in addition to handling and sending certain other messages, as part of this protocol.

Note The KTS CAC configuration is only supported by Cisco 5508, 7500, WISM2, and 2500 controllers that run controller software Release 7.2.x. This feature is not supported by Cisco 4400 series controllers.

NAC State

Choose SNMP NAC or Radius NAC. SIP errors that are discovered generate traps that appear on the client troubleshooting and alarms screens. The controller can integrate with the NAC appliance in out-of-band mode, where the NAC appliance remains in the data path only until clients have been analyzed and cleaned. Out-of-band mode reduces the traffic load on the NAC appliance and enables centralized NAC processing.

Scan Defer Priority

Off-Channel Scanning Defer is essential to the operation of RRM, which gathers information about alternate channel choices such as noise and interference. Additionally, Off-Channel Scanning Defer is responsible for rogue detection. Devices that need to defer Off-Channel Scanning Defer should use the same WLAN as often as possible. If there are many of these devices (and the possibility exists that Off-Channel Defer scanning could be completely disabled by the use of this feature), you should implement an alternative to local AP Off-Channel Scanning Defer, such as monitor access points, or other access points in the same location that do not have this WLAN assigned.

Assignment of a QoS policy (bronze, silver, gold, and platinum) to a WLAN affects how packets are marked on the downlink connection from the access point regardless of how they were received on the uplink from the client. UP=1,2 is the lowest priority, and UP=0,3 is the next higher priority. The marking results of each QoS policy are as follows:

Bronze marks all downlink traffic to UP= 1.

Silver marks all downlink traffic to UP= 0.

Gold marks all downlink traffic to UP=4.

Platinum marks all downlink traffic to UP=6.

Set the Scan Defer Priority by clicking the priority argument and Set the time in milliseconds in the Scan Defer Interval text box. Valid values are 0 through 60000. The default value is 100 milliseconds.

DTIM Period

In 802.11a/n and 802.11b/g/n networks, lightweight access points broadcast a beacon at regular intervals, which coincides with the Delivery Traffic Indication Map (DTIM). After the access point broadcasts the beacon, it transmits any buffered broadcast and multicast frames based on the value set for the DTIM period. This feature allows power-saving clients to wake up at the appropriate time if they are expecting broadcast or multicast data.

Normally, the DTIM value is set to 1 (transmit broadcast and multicast frames after every beacon) or 2 (transmit after every other beacon). For instance, if the beacon period of the 802.11a/n or 802.11b/g/n network is 100 ms and the DTIM value is set to 1, the access point transmits buffered broadcast and multicast frames 10 times per second. If the beacon period is 100 ms and the DTIM value is set to 2, the access point transmits buffered broadcast and multicast frames 5 times per second. Either of these settings might be suitable for applications, including VoIP, that expect frequent broadcast and multicast frames.

However, the DTIM value can be set as high as 255 (transmit broadcast and multicast frames after every 255th beacon) if all 802.11a/n or 802.11b/g/n clients have power save enabled. Because the clients have to listen only when the DTIM period is reached, they can be set to listen for broadcasts and multicasts less frequently, resulting in longer battery life. For instance, if the beacon period is 100 ms and the DTIM value is set to 100, the access point transmits buffered broadcast and multicast frames once every 10 seconds, allowing the power-saving clients to sleep longer before they have to wake up and listen for broadcasts and multicasts, resulting in longer battery life.

Many applications cannot tolerate a long time between broadcast and multicast messages, resulting in poor protocol and application performance. We recommend a low DTIM value for 802.11a/n and 802.11b/g/n networks that support such clients.

Under DTIM Period, enter a value between 1 and 255 (inclusive) in the 802.11a/n and 802.11b/g/n fields. The default value is 1 (transmit broadcast and multicast frames after every beacon).

DHCP Server

Select the check box to override DHCP server,. Another field appears where you can enter the IP address of your DHCP server. For some WLAN configurations, this is required. Three valid configurations are as follows:

DHCP Required and a valid DHCP server IP address - All WLAN clients obtain an IP address from the DHCP server.

DHCP is not required and a valid DHCP server IP address - All WLAN clients obtain an IP address from the DHCP server or use a static IP address.

DHCP not required and DHCP server IP address 0.0.0.0 - All WLAN clients are forced to use a static IP address. All DHCP requests are dropped.

You cannot choose to require a DHCP address assignment and then enter a DHCP server IP address.

MFP Signature Generation

Select to enable signature generation for the 802.11 management frames transmitted by an access point associated with this WLAN. Signature generation makes sure that changes to the transmitted management frames by an intruder are detected and reported.

MFP Client Protection

Choose Enabled, Disabled, or Required for configuration of individual WLANs of a controller. If infrastructure MFP is not enabled, this drop-down list is unavailable.

Note The Enabled parameter is the same as the Optional parameter that you choose from the MFP Client Protection drop-down list in the WLC graphical user interface.

Note Client-side MFP is only available for those WLANs configured to support Cisco Compatible Extensions (version 5 or later) clients, and WPA2 must first be configured.

DTIM Period

Enter a value between 1 and 255 beacon intervals in the 802.11a/n DTIM Period group box of the page. The controller sends a DTIM packet on the 802.11a/n radio for this WLAN based on what is entered as an interval.

Note The DTIM configuration is not appropriate for guest LANs.

Client Profiling

Select to enable or disable profiling of all the clients that are associated with the WLAN.

Note Client Profiling is not supported with FlexConnect local authentication.

Note Client Profiling is configurable only when you select the DHCP Address Assignment check box.

PMIP Mobility

Choose the mobility type from the following options:

None—Configures the WLAN with Simple IP.

Mixed—Configures the WLAN with Simple IP and PMIPv6.

PMIPv6—Configures the WLAN with only PMIPv6.


Related Topics

Table 31-5—General tab

Table 31-6—Security tab

Table 31-7—QoS tab

Table 31-9—Hot Spot tab

Controller > WLANs > WLAN Configuration > Hot Spot

Table 31-5 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > WLANs > WLAN Configuration > Hot Spot tab.

Table 31-9 Controller > WLANs > WLAN Configuration > Hot Spot  

Field
Description
General

802.11u Status

Select to enable 802.11u on the WLAN.

From the drop-down list, In the HESSID field, enter the Homogenous Extended Service Set Identifier value. The HESSID is a 6-octet MAC address that identifies the homogeneous ESS.

Internet Access

Select to enable this WLAN to provide Internet services.

Network Type

Choose one of the following network types that best describes the 802.11u you want to configure on this WLAN:

Private Network

Private Network with Guest Access

Chargeable Public Network

Free Public Network

Emergency Services Only Network

Personal Device Network

Test or Experimental

Wildcard

Network Auth Type

Choose the authentication type that you want to configure for the 802.11u parameters on this network:

Not configured

Acceptance of Terms and Conditions

Online Enrollment

HTTP/HTTPS Redirection

OUI List

Enter the following details:

OUI name

Is Beacon

OUI Index

Click Add to add the OUI (Organizationally Unique Identifier) entry to this WLAN.

In the group box,

Domain List

Enter the following details:

Domain Name—The domain name operating in the 802.11 access network.

Domain Index—Select the domain index from the drop-down list.

Click Add to add the domain entry to this WLAN.

OUI List

Enter the following details:

Realm Name—The realm name.

Realm Index—The realm index.

Click Add to add the domain entry to this WLAN.

MSAP

Click to enable service advertisements.

Server Index

If you enabled MSAP, you must provide a server index. Enter the server index for this WLAN. The server index field uniquely identifies an MSAP server instance serving a venue that is reachable through the BSSID.

Note MSAP (Mobility Services Advertisement Protocol) is designed to be used primarily by mobile devices that are configured with a set of policies for establishing network services. These services are available for devices that offer higher-layer services, or network services that are enabled through service providers. Service advertisements use MSAP to provide services to mobile devices prior to association to a Wi-Fi access network. This information is conveyed in a service advertisement. A single-mode or dual-mode mobile device queries the network for service advertisements before association. The device's network discovery and the selection function may use the service advertisements in its decision to join the network.

HotSpot2 Enable

Choose to enable HotSpot2.

WAN Link Status

Select the link status.

WAN SIM Link Status

The symmetric link status. For example, you can configure the uplink and downlink to have different speeds or same speeds.

Down Link Speed

The downlink speed. The maximum value is 4,194,304 kbps.

Up Link Speed

The uplink speed. The maximum value is 4,194,304 kbps.

Operator Name List

Specify the following:

Operator Name—Specify the name of the 802.11 operator.

Operator Index—Select an operator index. The range is from 1 to 32.

Language Code—An ISO-14962-1997 encoded string defining the language. This string is a three character language code.

Click Add to add the operator details.

Port Config List

Specify the following:

IP Protocol—The IP protocol that you want to enable. The following options are ESP, FTP, ICMP, and IKEV2.

Port No—The port number that is enabled on this WLAN.

Status—The status of the port.


Related Topics

Table 31-5—General tab

Table 31-6—Security tab

Table 31-7—QoS tab

Table 31-8—Advanced tab

Controller > FlexConnect > FlexConnect AP Groups Template

Table 31-1 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > FlexConnect > FlexConnect AP Groups page.

Table 31-10 Controller > FlexConnect > FlexConnect AP Groups

Field
Description

General

Primary RADIUS

Choose the primary RADIUS authentication servers for each group. If a RADIUS authentication server is not present on the controller, Prime Infrastructure configured RADIUS server does not apply. A value of 10 indicates that the primary RADIUS server is not configured for this group.

Secondary RADIUS

Note Choose the secondary RADIUS authentication servers for each group. If a RADIUS authentication server is not present on the controller, Prime Infrastructure configured RADIUS server does not apply. A value of 0 indicates that the primary RADIUS server is not configured for this group.

FlexConnect AP

An access point Ethernet MAC address cannot exist in more than one FlexConnect group on the same controller. If more than one group is applied to the same controller, select the Ethernet MAC check box to unselect an access point from one of the groups. You should save this change or apply it to controllers.

Click Add AP. The FlexConnect AP Group page appears.

FlexConnect Configuration

Click the FlexConnect Configuration tab to enable local authentication for a FlexConnect group.

Note Make sure that the Primary RADIUS Server and Secondary RADIUS Server fields are set to None on the General tab.

FlexConnect Local Authentication

Click to enable local authentication for this FlexConnect group. The default value is unselected.

Note When you attempt to use this feature, a warning message indicates that it is a licensed feature.

Note You can click the Users configured in the group link that appears at the bottom of the page to view the list of FlexConnect users. You can create FlexConnect users only after you save the FlexConnect AP Group.

EAP Type

To allow a FlexConnect access point to authenticate clients using LEAP, select the LEAP check box. Otherwise, to allow a FlexConnect access point to authenticate clients using EAP-FAST, select the EAP-FAST check box.

To use manual PAC provisioning, enter the key used to encrypt and decrypt PACs in the EAP-FAST Key and Confirm EAP-FAST Key text boxes.

Auto Key Generation

To allow PACs to be sent automatically to clients that do not have one during PAC provisioning, select the Auto Key Generation check box

EAP-FAST Key

Enter the authority identifier of the EAP-FAST server. The identifier must be 32 hexadecimal characters.

EAP-FAST Authority ID

Enter the authority identifier of the EAP-FAST server in text format. You can enter up to 32 hexadecimal characters.

EAP-FAST Authority Info

Enter the authority information of the EAP-FAST server.

EAP-FAST Pac Timeout

Specify a PAC timeout value by entering the number of seconds for the PAC to remain viable in the edit box. The valid range is 2 to 4095 seconds.

Image Upgrade

FlexConnect AP Upgrade

Check to upgrade the FlexConnect access points.

Slave Maximum Retry Count

Enter the maximum retries for the slave to undertake to start the download from the master in the FlexConnect group. This option is available only if you select the FlexConnect AP Upgrade check box.

Note You are allowed to add an access point as a master access point only if FlexConnect AP Upgrade check box is enabled on the General tab.

VLAN-ACL Mapping

Use the edit table on this tab to add VLAN-ACL mappings.

VLAN ID

Enter a VLAN ID. The valid VLAN ID range is 1—4094.

Ingress ACL

Choose an Ingress ACL.

Egress ACL

Choose an Engress ACL.

WLAN-ACL Mapping

Use the edit table on this tab to add WLAN-ACL mappings.

WLAN ID

WLAN ID.

WLAN Profile Name

Choose a WLAN profile.

Web-Auth ACL

Choose a WebAuth ACL.

Web Policies

Use the edit table on this tab to add or select Web Policy ACLs.

Web-Policy ACL

Choose a WebPolicy ACL. You can add up to a maximum of 16 Web-Policy ACLs.

Local Split

Use the edit table on this tab to add or select Local-Split ACLs

WLAN Profile Name

Choose a WLAN Profile Name from the list.

Local-Split ACL

Choose a Local-Split ACL.

Central DHCP

Use the edit table on this tab to add or select Central DHCP for each WLAN Profile.

WLAN Profile Name

Choose a WLAN Profile Name from the list.

Central DHCP

Choose Enable to enable central DHCP for this profile.

Override DNS

Choose Enable to enable DNS override for this profile.

NAT-PAT

Choose Enable to enable network address and port address translation for this profile.


Controller > Security > AAA > RADIUS Auth Servers Template

Table 31-11 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > Security > AAA > RADIUS Auth Servers page.

Table 31-11 Controller > Security > AAA > RADIUS Auth Servers  

Field
Description

Server Address

Enter the server address.

Port Number

Enter the port address.

Shared Secret Format

Choose either ASCII or hex.

Note Regardless of the format you choose, for security reasons, only ASCII is visible on the WLC (and Prime Infrastructure). For this reason, you cannot use a template to replicate the configuration on a second controller during auto provisioning. You should set the key format again in the template in case a discovered template is applied to another device.

Shared Secret

Enter the RADIUS shared secret used by your specified server.

Confirm Shared Secret

Reenter the RADIUS shared secret used by your specified server.

Key WRAP

Select the check box if you want to enable key wrap. If this check box is enabled, the authentication request is sent to RADIUS servers that have following key encryption key (KEK) and message authenticator code keys (MACK) configured. When enabled, the following fields appear:

Shared Secret Format: Enter ASCII or hexadecimal.

Note Regardless of the format you choose, for security reasons, only ASCII is visible on the WLC (and Prime Infrastructure). For this reason, you cannot use a template to replicate the configuration on a second controller during auto provisioning. You should set the key format again in the template in the event a discovered template is applied to another device.

KEK Shared Secret: Enter the KEK shared secret.

MACK Shared Secret: Enter the MACK shared secret.

Note Each time the controller is notified with the shared secret, the existing shared secret is overwritten with the new shared secret.

Admin Status

Click if you want to enable administration privileges.

Support for RFC 3576

Click if you want to enable support for RFC 3576. RFC 3576 is an extension to the Remote Authentication Dial In User Service (RADIUS) protocol. It allows dynamic changes to a user session and includes support for disconnecting users and changing authorizations applicable to a user session. With these authorizations, support is provided for Disconnect and Change-of-Authorization (CoA) messages. Disconnect messages immediately terminate a user session, whereas CoA messages modify session authorization attributes such as data filters.

Network User

Click if you want to enable network user authentication. If this option is enabled, this entry is considered as the RADIUS authenticating server for the network user.

Management User

Click if you want to enable management authentication. If this option is enabled, this entry is considered as the RADIUS authenticating server for the management user.

Retransmit Timeout

Specify the time in seconds after which the RADIUS authentication request times out and a retransmission is attempted by the controller. You can specify a value between 2 and 30 seconds.

IPSec

If you click to enable the IP security mechanism, additional IP security fields are added to the page, and Steps 13 to 19 are required. If you enable IPSec, complete the following fields.

IPsec Authentication

Choose which IP security authentication protocol to use. The options are HMAC-SHA1, HMAC-MD5, and None.

Message Authentication Codes (MAC) are used between two parties that share a secret key to validate information transmitted between them. HMAC (Hash MAC) is a mechanism based on cryptographic hash functions and can be used in combination with any iterated cryptographic hash function. HMAC-MD5 and HMAC-SHA1 are two constructs of the HMAC using the MD5 hash function and the SHA1 hash function. HMAC also uses a secret key for calculation and verification of the message authentication values

IPsec Encryption

Select the IP security encryption mechanism to use:

DES—Data Encryption Standard is a method of data encryption using a private (secret) key. DES applies a 56-bit key to each 64-bit block of data.

Triple DES—Data Encryption Standard that applies three keys in succession.

AES 128 CBC—Advanced Encryption Standard uses keys with a length of 128, 192, or 256 bits to encrypt blocks with a length of 128, 192, or 256 bits. AES 128 CBC uses a 128-bit data path in Cipher Clock Chaining (CBC) mode.

None—No IP security encryption mechanism.

IKE Authentication

The Internet Key Exchange (IKE) authentication is not an editable text box. Internet Key Exchange protocol (IKE) is used as a method of distributing the session keys (encryption and authentication), as well as providing a way for the VPN endpoints to agree on how data should be protected. IKE keeps track of connections by assigning a bundle of security associations (SAs) to each connection

IKE Phase 1

Choose either aggressive or main. This sets the IKE protocol. IKE phase 1 is used to negotiate how IKE is protected. Aggressive mode passes more information in fewer packets, with the benefit of a slightly faster connection, at the cost of transmitting the identities of the security gateways in the clear

Lifetime

Set the timeout interval (in seconds) when the session expires

IKE Diffie Hellman Group

Set the IKE Diffie Hellman group. The options are group 1 (768 bits), group 2 (1024 bits), or group 5 (1536 bits). Diffie-Hellman techniques are used by two devices to generate a symmetric key where you can publicly exchange values and generate the same symmetric key.

Although all three groups provide security from conventional attacks, Group 5 is considered more secure because of its larger key size. However, computations involving Group 1 and Group 2 based keys might occur slightly faster because of their smaller prime number size


Controller > Security > AAA > LDAP Servers Template

Table 31-12 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > Security > AAA > LDAP Servers page.

Table 31-12 Controller > Security > AAA > LDAP Servers  

Field
Description

Server Address

Enter the IP address of the server.

Port Number

Port number of the controller to which the access point is connected.

Bind Type

Choose Authenticated or Anonymous. If you choose Authenticated, you must enter a bind username and password as well. A bind is a socket opening that performs a lookup. Anonymous bind requests are rejected.

Server User Base DN

Enter the distinguished name of the subtree in the LDAP server that contains a list of all the users.

Server User Attribute

Enter the attribute that contains the username in the LDAP server.

Server User Type

Enter the ObjectType attribute that identifies the user.

Retransmit Timeout

Enter the number of seconds between retransmissions. The valid range is 2 to 30 seconds, and the default value is 2 seconds.

Admin Status

Check if you want the LDAP server to have administrative privileges.


Controller > Security > AAA > TACACS+ Servers Template

Table 31-13 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > Security > AAA > TACACS+ Servers page.

Table 31-13 Controller > Security > AAA > TACACS+ Servers  

Field
Description

Server Type

Select one or more server types by selecting their respective check boxes. The following server types are available:

authentication—Server for user authentication/authorization.

authorization—Server for user authorization only.

accounting—Server for RADIUS user accounting.

Server Address

Enter the IP address of the server.

Port Number

Enter the port number of the server. The default is 49.

Shared Secret Format

Choose either ASCII or hex.

Regardless of which format you choose, for security reasons, only ASCII is visible on the WLC (and Prime Infrastructure). For this reason, you cannot use a template to replicate the configuration on a second controller during auto provisioning. Set the key format again in the template in the event a discovered template is applied to another device.

Shared Secret

Enter the TACACS+ shared secret used by your specified server.

Confirmed Shared Secret

Reenter the TACACS+ shared secret used by your specified server.

Admin Status

Check if you want the LDAP server to have administrative privileges.

Retransmit Timeout

Enter the time, in seconds, after which the TACACS+ authentication request times out and a retransmission is attempted by the controller.


Controller > Security > Local EAP > General - Local EAP Template

Table 31-14 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > Security > Local EAP > General - Local EAP page.

Table 31-14 Controller > Security > Local EAP > General - Local EAP  

Field
Description

Local Auth Active Timeout

Enter the amount of time (in seconds) that the controller attempts to authenticate wireless clients using local EAP after any pair of configured RADIUS servers fail. The valid range is 1 to 3600 seconds, and the default setting is 1000 seconds

Note Enter the values specified below if you are using EAP-FAST, manual password entry, one-time password, or 7920/7921 phones. You must increase the 802.1x timeout values on the controller (default=2 seconds) for the client to obtain the PAC using automatic provisioning. The recommended and default timeout on the Cisco ACS server is 20 seconds. Roaming fails if these values are not set the same across multiple controllers.

Local EAP Identity Request Timeout

1

Local EAP Identity Request Maximum Retries

20

Local EAP Dynamic WEP Key Index

0

Local EAP Request Timeout

20

Local EAP Request Maximum Retries

2

EAPOL-Key Timeout

1000 (in milli-seconds)

EAPOL-Key Max Retries

2

Max Login Ignore Identity Response

Choose Enable to limit the number of devices that can be connected to the controller with the same username.


Controller > Security > Local EAP > Local EAP Profiles Template

Table 31-15 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > Security > Local EAP > Local EAP Profiles page.

Table 31-15 Controller > Security > Local EAP > Local EAP Profiles  

Field
Description

EAP Profile Name

User-defined identification.

Select Profile Methods

Choose the desired authentication type:

LEAP—This authentication type leverages Cisco Key Integrity Protocol (CKIP) and MMH message integrity check (MIC) for data protection. A username and password are used to perform mutual authentication with the RADIUS server through the access point.

EAP-FAST—This authentication type (Flexible Authentication via Secure Tunneling) uses a three-phased tunnel authentication process to provide advanced 802.1X EAP mutual authentication. A username, password, and PAC (protected access credential) are used to perform mutual authentication with the RADIUS server through the access point.

TLS—This authentication type uses a dynamic session-based WEP key derived from the client adapter and RADIUS server to encrypt data. It requires a client certificate for authentication.

PEAP—This authentication type is based on EAP-TLS authentication but uses a password instead of a client certificate for authentication. PEAP uses a dynamic session-based WEP key derived from the client adapter and RADIUS server to encrypt data.

Certificate Issuer

Determine whether Cisco or another vendor issued the certificate for authentication. Only EAP-FAST and TLS require a certificate.

Check Against CA Certificates

Check if you want the incoming certificate from the client to be validated against the certificate authority (CA) certificates on the controller.

Verify Certificate CN Identity

Check if you want the (CN) in the incoming certificate to be validated against the common name of the CA certificate.

Check Against Date Validity

Check if you want the controller to verify that the incoming device certificate is still valid and has not expired.

Local Certificate Required

Check if a local certificate is required.

Client Certificate Required

Check if a client certificate is required.


Controller > Security > Local EAP > EAP-FAST Parameters Template

Table 31-16 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > Security > Local EAP > EAP-FAST Parameters page.

Table 31-16 Controller > Security > Local EAP > EAP_FAST Parameters  

Field
Description

Time to Live for the PAC

Enter the number of days for the PAC to remain viable. The valid range is 1 to 1000 days, and the default setting is 10 days.

Authority ID

Enter the authority identifier of the local EAP-FAST server in hexadecimal characters. You can enter up to 32 hexadecimal characters, but you must enter an even number of characters.

Authority Info

Enter the authority identifier of the local EAP-FAST server in text format.

Server Key and Confirm Server Key

Enter the key (in hexadecimal characters) used to encrypt and decrypt PACs

Anonymous Provision

Check to enable anonymous provisioning. This feature allows PACs to be sent automatically to clients that do not have one during PAC provisioning. If you disable this feature, PACs must be manually provisioned


Controller > Security > Wireless Protection Policies > Rogue Policies Template

Table 31-17 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > Security > Wireless Protection Policies > Rogue Policies page.

Table 31-17 Controller > Security > Wireless Protection Policies > Rogue Policies  

Field
Description

Rogue Location Discovery Protocol

Determine whether or not the Rogue Location Discovery Protocol (RLDP) is connected to the enterprise wired network. Choose one of the following:

Disable—Disables RLDP on all access points.

All APs—Enables RLDP on all access points.

Monitor Mode APs—Enables RLDP only on access points in monitor mode.

Note With RLDP, the controller instructs a managed access point to associate with the rogue access point and sends a special packet to the controller. If the controller receives the packet, the rogue access point is connected to the enterprise network. This method works for rogue access points that do not have encryption enabled.

Expiration TImeout for Rogue AP and Rogue Client Entries

Enter the expiration timeout (in seconds) for rogue access point entries.

Rogue Detection Report Interval

Enter the time interval in seconds at which the APs should send the rogue detection report to the controller. A valid range is 10 seconds to 300 seconds, and the default value is 10 seconds. This feature is applicable to APs that are in monitor mode only.

Rogue Detection Minimum RSSI

Enter the minimum RSSI value that a rogue should have for the APs to detect and for the rogue entry to be created in the controller. A valid range is -70 dBm to -128 dBm, and the default value is -128 dBm. This feature is applicable to all the AP modes.

There can be many rogues with very weak RSSI values that do not provide any valuable information in the rogue analysis. Therefore, you can use this option to filter the rogues by specifying the minimum RSSI value at which the APs should detect rogues.

Rogue Detection Transient Interval (Enter 0 to Disable)

Enter the time interval at which a rogue has to be consistently scanned for by the AP after the first time the rogue is scanned. By entering the transient interval, you can control the time interval at which the AP should scan for rogues. The APs can filter the rogues based on their transient interval values. Valid range is between 120 seconds to 1800 seconds, and the default value is 0. This feature is applicable to APs that are in monitor mode only

Validate Rogue Clients against AAA

Check to enable the AAA validation of rogue clients.

Detect and Report Adhoc Networks

Check to enable detection and reporting of rogue clients participating in ad hoc networking.

Rogue on Wire

Automatically contains rogues that are detected on the wired network.

Using our SSID

Automatically contains rogues that are advertising your network's SSID. If you leave this parameter unselected, the controller only generates an alarm when such a rogue is detected.

Valid Client on Rogue AP

Automatically contains a rogue access point to which trusted clients are associated. If you leave this parameter unselected, the controller only generates an alarm when such a rogue is detected.


Controller > Security > IP Groups Template

Table 31-18 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Security > IP Groups

.

Table 31-18 Controller > Security > IP Groups  

Field
Description

Name

Name of the template.

Description

Description of the template.

Validation Criteria

Choose a device type from the drop-down list and enter the OS version.

IP Group Name

Lists all the IP address including IPv4 and IPv6 groups. One IP address group can have a maximum of 128 IP address and netmask combinations. For the IP address of any, an any group is predefined. For the IPv6 address of any, an any group is predefined with an IP address type of IPv6.

IP Address

For an IP Group, enter an IPv4 address format. For IPv6 groups, enter an IPv6 address format.

Netmask

Allows the user to set the subnet mask in dotted-decimal notation rather than the CIDR notation for the IP address property. A range of IP addresses defined so that only machines with IP addresses within the range are allowed to access an Internet service. This field does not apply for IPv6 groups.

CIDR

Classless InterDomain Routing. This field does not apply for IPv6 groups. A protocol which allows the assignment of Class C IP addresses in multiple contiguous blocks. CIDR notation allows the user to add a large number of clients that exist in a subnet range by configuring a single client object.

Prefix Length

Prefix for IPv6 addresses, ranging from 0 to 128.


Controller > Security > Protocol Groups

Table 31-19 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Security > Protocol Groups.

.

Table 31-19 Controller > Security > Protocol Groups  

Field
Description

Name

Name of the template.

Description

Description of the template.

Rule Name

The rule name is provided for the existing rules, or you can now enter a name for a new rule. ACLs are not required to have rules defined. When a packet matches all the fields of a rule, the action for this rule is exercised.

Protocol

Choose a protocol from the drop-down list:

Any—All protocols

TCP—Transmission Control Protocol

UDP—User Datagram Protocol

ICMP—Internet Control Message Protocol

ESP—IP Encapsulating Security Payload

AH—Authentication Header

GRE—Generic Routing Encapsulation

IP—Internet Protocol

Eth Over IP—Ethernet over Internet Protocol

Other Port OSPF—Open Shortest Path First

Other—Any other IANA protocol (http://www.iana.org/)

Source Port

Enter the source port. Can be Any, HTTP, HTTPS, Telnet, RADIUS, DHCP Server, DHCP Client, DNS, L2TP, PPTP control, FTP control, SMTP, SNMP, LDAP, Kerberos, NetBIOS NS, NetBIOS DS, NetBIOS SS, MS Dir Server, Other and Port Range.

Dest Port

Enter the destination port. If TCP or UDP is selected, can be Any, HTTP, HTTPS, Telnet, RADIUS, DHCP Server, DHCP Client, DNS, L2TP, PPTP control, FTP control, SMTP, SNMP, LDAP, Kerberos, NetBIOS NS, NetBIOS DS, NetBIOS SS, MS Dir Server, Other and Port Range.

DSCP (Differentiated Services Code Point)

Choose Any or Specific from the drop-down list. If Specific is selected, enter the DSCP (range of 0 through 255). DSCP is a packet header code that can be used to define the quality of service across the Internet.


Controller > Security > 802.11 > Band Select

Table 31-20 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Security > 802.11 > Band Select.

.

Table 31-20 Controller > Security > 802.11 > Band Select  

Field
Description

Probe Cycle Count

Enter a value between 1 and 10 for the probe cycle count. The cycle count sets the number of suppression cycles for a new client. The default cycle count is 2.

Scan Cycle Period Threshold

Enter a value between 1 and 1000 milliseconds for the scan cycle period threshold. This setting determines the time threshold during which new probe requests from a client come from a new scanning cycle. The default cycle threshold is 200 milliseconds.

Age Out Suppression

Enter a value between 10 and 200 seconds for the age out suppression field. Age-out suppression sets the expiration time for pruning previously known 802.11b/g clients. The default value is 20 seconds. After this time elapses, clients become new and are subject to probe response suppression.

Age Out Dual Band

Enter a value between 10 and 300 seconds for the age out dual band field. The age-out period sets the expiration time for pruning previously known dual-band clients. The default value is 60 seconds. After this time elapses, clients become new and are subject to probe response suppression.

Acceptable Client RSSI

Enter a value between -20 and -90 dBm for the acceptable client RSSI field. This field sets the minimum RSSI for a client to respond to a probe. The default value is -80 dBm.


Controller > Security > 802.11 > Media Stream

Table 31-21 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Security > 802.11 > Media Stream.

.

Table 31-21 Controller > Security > 802.11 > Media Stream  

Field
Description

Media Stream Name

The name of the media stream.

Multicast Destination Start IP

Start IP address of the media stream to be multicast.

Multicast Destination End IP

End IP address of the media stream to be multicast. Start IP and End IP can be IPv4 or IPv6 multicast address, starting from controller Version 7.2.x.

Maximum Expected Bandwidth

Maximum bandwidth that a media stream can use.

Average Packet Size

Average packet size that a media stream can use.

RRC Periodical Update

Resource Reservation Control calculations that are updated periodically; if disabled, RRC calculations are done only once when a client joins a media stream.

RRC Priority

Priority of RRC with the highest at 1 and the lowest at 8.

Traffic Profile Violation

Appears if the stream is dropped or put in the best effort queue if the stream violates the QoS video profile.

Policy

Appears if the media stream is admitted or denied.


Controller > Security > 802.11 > RF Profiles

Table 31-22 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Security > 802.11 > RF Profiles.

.

Table 31-22 Controller > Security > 802.11 > RF Profiles  

Field
Description

Template Name

User-defined name for the template.

Profile Name

User-defined name for the current profile.

Description

Description of the template.

Radio Type

The radio type of the access point. This is a drop-down list from which you can choose an RF profile for APs with 802.11a or 802.11b radios.

Minimum Power Level Assignment (-10 to 30 dBm)

Indicates the minimum power assigned. Range: -10 to 30 dBm Default: -10 dBm.

Maximum Power Level Assignment (-10 to 30 dBm)

Indicates the maximum power assigned. Range: -10 to 30 dBm Default: 30 dBm.

Power Threshold v1(-80 to -50 dBm)

Indicates the transmitted power threshold.

Power Threshold v2(-80 to -50 dBm)

Indicates the transmitted power threshold.

Data Rates

Use the Data Rates drop-down lists to specify the rates at which data can be transmitted between the access point and the client. These data rates are available:

802.11a—6, 9, 12, 18, 24, 36, 48, and 54 Mbps.

802.11b/g—1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps

For each data rate, you must also choose one of these options:

Mandatory—Clients must support this data rate to associate to an access point on the controller.

Supported—Any associated clients that support this data rate might communicate with the access point using that rate. However, the clients are not required to be able to use this rate to associate.

Disabled—The clients specify the data rates used for communication.


Controller > 80211a or n > Parameters

Table 31-23 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 80211a or n > Parameters.

.

Table 31-23 Controller > 80211a or n > Parameters  

Field
Description

802.11a Network Status

Select the check box to enable 802.11a/n network status.

Client Link

Use this drop-down list to enable Clientlink on all access point 802.11a/n radios that support ClientLink. Otherwise, choose Disable.

Beacon Period

Enter the amount of time between beacons in kilomicroseconds. The valid range is from 20 to 1000 milliseconds.

DTIM Period

Enter the number of beacon intervals that might elapse between transmission of beacon frames containing a traffic indicator message (TIM) element whose delivery count text box is 0. This value is transmitted in the DTIM period field of beacon frames. When client devices receive a beacon that contains a DTIM, they normally wake up to check for pending packets. Longer intervals between DTIMS let clients sleep longer and preserve power. Conversely, shorter DTIM periods reduce the delay in receiving packets but use more battery power because clients wake up more often.

Fragmentation Threshold

Determine the size at which packets are fragmented (sent as several pieces instead of as one block). Use a low setting in areas where communication is poor or where there is a great deal of radio interference.

802.11e Max Bandwidth

Enter the percentage for 802.11e maximum bandwidth.

Mode

Click the checkbox to enable Cisco Compatible Extension (CCX) Location Measurement. When enabled, this enhances the location accuracy of clients.

Interval

Enter the interval at which CCX Location Measurement signals are broadcast, in seconds. The CCX location measurement interval of the Cisco Compatible Extension can only be changed when measurement mode is enabled.

Data Rate Dropdowns

Select the negotiation type for each data rate. The client and controller negotiate data rates between them. If the data rate is set to Mandatory, the client must support it to use the network. If a data rate is set as Supported by the controller, any associated client that also supports that same rate might communicate with the access point using that rate. However, it is not required that a client uses all the rates marked supported to associate. For each rate, a drop-down list of Mandatory or Supported is available. Each data rate can also be set to Disable to match client settings.

Channel List

From this drop-down list in the Noise/Interference/Rogue Monitoring Channels section, choose between all channels, country channels, or DCA channels based on the level of monitoring you want. Dynamic Channel Allocation (DCA) automatically selects a reasonably good channel allocation amongst a set of managed devices connected to the controller.


Controller > 80211a or n > CleanAir

Table 31-24 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 80211a or n > CleanAir.

.

Table 31-24 Controller > 80211a or n > CleanAir  

Field
Description

Report Interferers

Select the report interferers check box to enable the CleanAir system to report and detect sources of interference, or unselect it to prevent the controller from reporting interferers. The default value is unselected.

Interferers Ignored/Selected for Reporting

Make sure that any sources of interference that need to be detected and reported by the CleanAir system appear in the Interferences to Detect box and any that do not need to be detected appear in the Interferers to Ignore box. Use the > and < buttons to move interference sources between these two boxes. By default, all interference sources are ignored.

Persistent Device Propagation

Select the Persistent Device Propagation check box to enable propagation of information about persistent devices that can be detected by CleanAir. Persistent device propagation enables designating information about interference types and propagating this information to the neighboring access points. Persistent interferers are present at the a location and interfere with the WLAN operations even if they are not detectable at all times.

Air Quality Alarm

Select the Air Quality Alarm check box to enable the triggering of air quality alarms, or unselect the box to disable this feature.

Air Quality Alarm Threshold

If you selected the Air Quality Alarm check box, enter a value between 1 and 100 (inclusive) in the Air Quality Alarm Threshold field to specify the threshold at which you want the air quality alarm to be triggered. When the air quality falls below the threshold level, the alarm is triggered. A value of 1 represents the worst air quality, and 100 represents the best. The default value is 1.

Air Quality Unclassified Category Alarm

Category AlarmSelect the Air Quality Unclassified category Alarm check box to enable the alarms to be generated for unclassified interference category. CleanAir can detect and monitor unclassified interferences. Unclassified interference are interference that are detected but do not correspond to any of the known interference types.

Air Quality Unclassified Category Severity Threshold

If you selected the Air Quality Unclassified category Alarm check box, enter a value between 1 and 99 (inclusive) in the Air Quality Unclassified Severity Threshold text box to specify the threshold at which you want the unclassified category alarm to be triggered. The default is 20.

Interferers For Security Alarm

Select the Interferers For Security Alarm check box to trigger interferer alarms when the controller detects specified device types, or unselect it to disable this feature. The default value is unselected.

Interferers Ignored/Selected for Security Alarms

Make sure that any sources of interference that need to trigger interferer alarms appear in the Interferers Selected for Security Alarms box and any that do not need to trigger interferer alarms appear in the Interferers Ignored for Security Alarms box. Use the > and < buttons to move interference sources between these two boxes. By default, all interferer sources for security alarms are ignored.


Controller > 80211a or n > Media Parameters

The following tables describe the fields on the Design > Configuration Templates > Features and Technologies > Controller > 802.11a or n > Media Parameters page:

Table 31-25—Voice tab

Table 31-26—Video tab

Table 31-27—General tab

Controller > 80211a or n > Media Parameters > Voice

Table 31-25 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > 80211a or n > Media Parameters > Voice tab.

.

Table 31-25 Controller > 80211a or n > Media Parameters > Voice 

Field
Description

Admission Control (ACM)

Select the check box to enable admission control. For end users to experience acceptable audio quality during a VoIP phone call, packets must be delivered from one endpoint to another with low latency and low packet loss. To maintain QoS under differing network loads, call admission control (CAC) is required. CAC on an access point allows it to maintain controlled QoS when the network is experiencing congestion and keep the maximum allowed number of calls to an acceptable quantity.

CAC Method

If Admission Control (ACM) is enabled, specify the CAC method as either load-based or static. Load-based CAC incorporates a measurement scheme that takes into account the bandwidth consumed by all traffic types from itself, from co-channel access points, and by co-located channel interference. Load-based CAC also covers the additional bandwidth consumption resulting from PHY and channel impairment.

Maximum Bandwidth Allowed

Specify the percentage of maximum bandwidth allowed. This option is only available when CAC is enabled.

Reserved Roaming Bandwidth

Specify the percentage of reserved roaming bandwidth. This option is only available when CAC is enabled.

Expedited Bandwidth

Select the check box to enable expedited bandwidth as an extension of CAC for emergency calls. You must have an expedited bandwidth IE that is CCXv5 compliant so that a TSPEC request is given higher priority.

SIP CAC

Select the check box to enable SIP CAC. SIP CAC should be used only for phones that support status code 17 and do not support TSPEC-based admission control.

SIP Codec

Specify the codec name you want to use on this radio. The available options are G.711, G.729, and User Defined.

SIP Call Bandwidth

Specify the bandwidth in kilobits per second that you want to assign per SIP call on the network. This field can be configured only when the SIP Codec selected is User Defined.

SIP Sample Interval

Specify the sample interval in milliseconds that the codec must operate in.

Metric Collection

Select the check box to enable metric collection. Traffic stream metrics are a series of statistics about VoIP over your wireless LAN which inform you of the QoS of the wireless LAN. For the access point to collect measurement values, traffic stream metrics must be enabled. When this is enabled, the controller begins collecting statistical data every 90 seconds for the 802.11b/g interfaces from all associated access points. If you are using VoIP or video, this feature should be enabled.


Related Topics

Table 31-26—Video tab

Table 31-27—General tab

Controller > 80211a or n > Media Parameters > Video

Table 31-26 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > 80211a or n > Media Parameters > Video tab.

Table 31-26 Controller > 80211a or n > Media Parameters > Video 

Field
Description

Admission Control (ACM)

Select the check box to enable admission control.

Maximum Bandwidth

Specify the percentage of maximum bandwidth allowed. This option is only available when CAC is enabled.

Reserved Roaming Bandwidth

Specify the percentage of reserved roaming bandwidth. This option is only available when CAC is enabled.

CAC Method

If Admission Control (ACM) is enabled, specify the CAC method as either load-based or static. Load-based CAC incorporates a measurement scheme that takes into account the bandwidth consumed by all traffic types from itself, from co-channel access points, and by co-located channel interference. Load-based CAC also covers the additional bandwidth consumption resulting from PHY and channel impairment.

Unicast Video Redirect

Select the Unicast Video Redirect check box to enable all non-media stream packets in video queue are redirected to the best effort queue. If disabled, all packets with video marking are kept in video queue.

Client Minimum Phy Rate

Specify the physical data rate required for the client to join a media stream from the Client Minimum Phy Rate drop-down list.

Multicast Direct Enable

Select the Multicast Direct Enable check box to set the Media Direct for any WLAN with Media Direct enabled on a WLAN on this radio.

Maximum Number of Streams per Radio

Specify the maximum number of streams per Radio to be allowed.

Maximum Number of Streams per Client

Specify the maximum number of streams per Client to be allowed.

Best Effort QOS Admission

Select the Best Effort QOS Admission check box to redirect new client requests to the best effort queue. This happens only if all the video bandwidth has been used. If this is disabled and maximum video bandwidth has been used, then any new client request is rejected.


Related Topics

Table 31-25—Voice tab

Table 31-27—General tab

Controller > 80211a or n > Media Parameters > General

Table 31-27 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > 80211a or n > Media Parameters > General tab.

Table 31-27 Controller > 80211a or n > Media Parameters > General 

Field
Description

Maximum Media Bandwidth (0 to 85%)

Specify the percentage of maximum of bandwidth allowed. This option is only available when CAC is enabled.


Related Topics

Table 31-25—Voice tab

Table 31-26—Video tab

Controller > 80211a or n > Roaming Parameters

Table 31-28 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 80211a or n > Roaming Parameters.

.

Table 31-28 Controller > 80211a or n > Roaming Parameters  

Field
Description

Mode

Use the Mode drop-down list to choose one of the configurable modes: default values or custom values. If you select Default, the roaming parameters are unavailable for editing, and have the default values displayed in the text boxes. Select Custom to edit the roaming parameters.

Minimum RSSI

Enter a value for the minimum Received Signal Strength Indicator (RSSI) required for the client to associate to an access point. If the average received signal power of the client dips below this threshold, reliable communication is usually impossible. Therefore, clients must already have found and roamed to another access point with a stronger signal before the minimum RSSI value is reached. Range: -80 to -90 dBm. Default: -85 dBm

Roaming Hysteresis

Enter a value to indicate how strong the signal strength of a neighboring access point must be for the client to roam to it. This field is intended to reduce the amount of ping ponging between access points if the client is physically located on or near the border between two access points. Range: 2 to 4 dB. Default: 2 dB.

Adaptive Scan Threshold

Enter the RSSI value from the associated access point of the client, below which the client must be able to roam to a neighboring access point within the specified transition time. This field also provides a power-save method to minimize the time that the client spends in active or passive scanning. For example, the client can scan slowly when the RSSI is above the threshold and scan more rapidly when below the threshold. Range: -70 to -77 dB. Default: -72 dB.

Transition Time

Enter the maximum time allowed for the client to detect a suitable neighboring access point to roam to and to complete the roam, whenever the RSSI from the associated access point of the client is below the scan threshold. Range: 1 to 10 seconds. Default: 5 seconds.


Controller > 80211a or n > dot11a-RRM > Thresholds

Table 31-29 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 80211a or n > dot11a-RRM > Thresholds.

.

Table 31-29 Controller > 80211a or n > dot11a-RRM > Thresholds  

Field
Description

Min Failed Clients

Enter the minimum number of failed clients currently associated with the controller.

Coverage Level

Enter the target range of coverage threshold.

Data RSSI

Enter the Data RSSI (-60 to -90 dBm). This number indicates the value for the minimum Received Signal Strength Indicator (RSSI) for data required for the client to associate to an access point.

Voice RSSI

Enter the Voice RSSI (-60 to -90 dBM). This number indicates the value for the minimum Received Signal Strength Indicator (RSSI) required for voice for the client to associate to an access point.

Max Clients

Enter the maximum number of failed clients that are currently associated with the controller.

RF Utilization

Enter the percentage of threshold for 802.11a/n.

Interference Threshold

Enter an interference threshold percentage.

Noise Threshold

Enter a noise threshold between -127 and 0 dBm. When the controller is outside of this threshold, it sends an alarm to Prime Infrastructure.

Coverage Exception Level Per AP

Enter the coverage exception level percentage. When the coverage drops by this percentage from the configured coverage for the minimum number of clients, a coverage hole is generated.


Controller > 80211a or n > dot11a-RRM > DCA

Table 31-30 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 80211a or n > dot11a-RRM > DCA.

.

Table 31-30 Controller > 80211a or n > dot11a-RRM > DCA  

Field
Description

Assignment Mode

From the, choose one of three modes:

Automatic—The transmit power is periodically updated for all access points that permit this operation.

On Demand—Transmit power is updated when you click Assign Now.

Disabled—No dynamic transmit power assignments occur, and values are set to their global default.

Avoid Foreign AP Interference

Select the check box to have RRM consider interference from foreign Cisco access points (those non-Cisco access points outside RF/mobility domain) when assigning channels. This foreign 802.11 interference. Unselect this check box to have RRM ignore this interference.In certain circumstances with significant interference energy (dB) and load (utilization) from foreign access points, RRM might adjust the channel assignment to avoid these channels (and sometimes adjacent channels) in access points close to the foreign access points. This increases capacity and reduces variability for the Cisco WLAN Solution.

Avoid Cisco AP Load

Select the check box to have controllers consider the traffic bandwidth used by each access point when assigning channels to access points. Unselect this check box to have RRM ignore this value. In certain circumstances and with denser deployments, there might not be enough channels to properly create perfect channel reuse. In these circumstances, RRM can assign better reuse patterns to those access points that carry more traffic load.

Avoid non 802.11 Noise

Select the check box to have access points avoid channels that have interference from non-access point sources, such as microwave ovens or Bluetooth devices. Unselect this check box to have RRM ignore this interference. In certain circumstances with significant interference energy (dB) from non-802.11 noise sources, RRM might adjust the channel assignment to avoid these channels (and sometimes adjacent channels) in access points close to the noise sources. This increases capacity and reduces variability for the Cisco WLAN Solution.

Signal Strength Contribution

Always enabled (not configurable). This constantly monitors the relative location of all access points within the RF/mobility domain to ensure near-optimal channel reuse. The net effect is an increase in Cisco WLAN Solution capacity and a reduction in co-channel and adjacent channel interference.

Event Driven RRM

Select the check box to disable spectrum event-driven RRM. By default, Event Driven RRM is enabled. Event Driven RRM is used when a CleanAir-enabled access point detects a significant level of interference

Sensitivity Threshold

If Event Driven RRM is enabled, this field displays the threshold level at which event-driven RRM is triggered. It can have a value of either Low, Medium, or High. When the interference for the access point rises above the threshold level, RRM initiates a local Dynamic Channel Assignment (DCA) run and changes the channel of the affected access point radio if possible to improve network performance. Low represents a decreased sensitivity to changes in the environment while High represents an increased sensitivity.


Controller > 802.11b or g or n > Parameters

Table 31-31 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 802.11b or g or n > Parameters.

.

Table 31-31 Controller > 802.11b or g or n > Parameters  

Field
Description

Policy Name

Security policy in force.

Beam Forming

Choose Enable or Disable from the drop-down list. Beam forming refers to a general signal processing technique used to control the directionality of the reception or transmission of a signal.

Transmitted Power Threshold

The valid range is from -50 to -80.

Beacon Period

The rate at which the SSID is broadcast by the access point (the amount of time between beacons). The valid range is from 100 to 600 milliseconds.

DTIM Period

The number of beacon intervals that might elapse between transmission of beacon frames containing a traffic indicator message (TIM) element whose delivery count field is 0. This value is transmitted in the DTIM period field of beacon frames. When client devices receive a beacon that contains a DTIM, they normally "wake up" to check for pending packets. Longer intervals between DTIMs let clients sleep longer and preserve power. Conversely, shorter DTIM periods reduce the delay in receiving packets but use more battery power because clients wake up more often.

DTIM period is not applicable in controller Version 5.0.0.0 and later.

Fragmentation Threshold

Determine the size at which packets are fragmented (sent as several pieces instead of as one block). Use a low setting in areas where communication is poor or where there is a great deal of radio interference. The default value is 2346.

802.11e Max Bandwidth

Percentage for 802.11e max bandwidth. The default value is 100.

Dynamic Assignment

From the Dynamic Assignment drop-down list, choose any one of the following dynamic transmit power assignment modes.:

Automatic—The transmit power is periodically updated for all access points that permit this operation.

On Demand—Transmit power is updated when you click Assign Now.

Disabled—No dynamic transmit power assignments occur and values are set to their global default.

The default is Automatic. The power levels and available channels are defined by the country code setting and are regulated on a country by country basis.

Dynamic Tx Power Control

Select this check box to enable DTPC support. If this option is enabled, the transmit power level of the radio is advertised in the beacons and the probe responses.

Assignment Mode

From the Assignment Mode drop-down list, choose any one of the following dynamic channel assignment modes:

Automatic—The channel assignment is periodically updated for all access points that permit this operation.

On Demand—Channel assignments are updated when desired.

Disabled—No dynamic channel assignments occur and values are set to their global default.

The default is Automatic.

Avoid Foreign AP Interference

Enable this Radio Resource Management (RRM) foreign 802.11 interference-monitoring parameter to have Radio Resource Management consider interference from foreign (non-Cisco access points outside the RF/mobility domain) access points when assigning channels to Cisco access points. Disable this field to have Radio Resource Management ignore this interference.

In certain circumstances with significant interference energy (dB) and load (utilization) from Foreign access points, Radio Resource Management might adjust the channel assignment to avoid these channels (and sometimes adjacent channels) in Cisco access points close to the Foreign access points to increase capacity and reduce variability for the Cisco WLAN Solution.

Avoid Cisco AP Load

Enable this Radio Resource Management (RRM) bandwidth-sensing parameter to have controllers consider the traffic bandwidth used by each access point when assigning channels to access points. Disable this field to have Radio Resource Management ignore this value.

In certain circumstances and with denser deployments, there might not be enough channels to properly create perfect channel re-use. In these circumstances, Radio Resource Management can assign better re-use patterns to those APs that carry more traffic load.

Avoid non 802.11 Noise

Enable this Radio Resource Management (RRM) noise-monitoring field to have access points avoid channels that have interference from non-Access Point sources, such as microwave ovens or Bluetooth devices. Disable this field to have Radio Resource Management ignore this interference.

In certain circumstances with significant interference energy (dB) from non-802.11 noise sources, Radio Resource Management might adjust the channel assignment to avoid these channels (and sometimes adjacent channels) in access points close to the noise sources to increase capacity and reduce variability for the Cisco WLAN Solution.

Signal Strength Contribution

This check box is always enabled (not configurable). Radio Resource Management (RRM) constantly monitors the relative location of all access points within the RF/mobility domain to ensure near-optimal channel reuse. The net effect is an increase in Cisco WLAN Solution capacity and a reduction in co-channel and adjacent channel interference.

Data Rates

The data rates set are negotiated between the client and the controller. If the data rate is set to Mandatory, the client must support it to use the network. If a data rate is set as Supported by the controller, any associated client that also supports that same rate might communicate with the access point using that rate. But it is not required that a client be able to use all the rates marked Supported to associate 6, 9, 12, 18, 24, 36, 48, 54 Mbps.

For each rate, a drop-down list selection of Mandatory or Supported is available. Each data rate can also be set to Disabled to match Client settings.

Channel List

Choose between all channels, country channels, or DCA channels based on the level of monitoring you want. Dynamic Channel Allocation (DCA) automatically selects a reasonably good channel allocation among a set of managed devices connected to the controller.

Mode

Enable or disable the broadcast radio measurement request. When enabled, this enhances the location accuracy of clients.

Interval

Interval in seconds between measurement requests.

Cisco Compatible Extension location measurement interval can be changed only when measurement mode is enabled.


Controller > 802.11b or g or n > Media Parameters

The following tables describe the fields on the Design > Configuration Templates > Features and Technologies > Controller > 802.11b or g or n > Media Parameters page:

Table 31-32—Voice tab

Table 31-33—Video tab

Table 31-34—General tab

Controller > 802.11b or g or n > Media Parameters > Voice

Table 31-32 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > 802.11b or g or n > Media Parameters > Voice tab.

.

Table 31-32 Controller > 802.11b or g or n > Media Parameters > Voice 

Field
Description

Admission Control (ACM)

Select the check box to enable admission control. For end users to experience acceptable audio quality during a VoIP phone call, packets must be delivered from one endpoint to another with low latency and low packet loss. To maintain QoS under differing network loads, Call Admission Control (CAC) is required. CAC on an access point allows it to maintain controlled QoS when the network is experiencing congestion and keep the maximum allowed number of calls to an acceptable quantity.

CAC Method

If Admission Control (ACM) is enabled, specify the CAC method as either load-based or static. Load-based CAC incorporates a measurement scheme that takes into account the bandwidth consumed by all traffic types from itself, from co-channel access points, and by co-located channel interference. Load-based CAC also covers the additional bandwidth consumption resulting from PHY and channel impairment.

Maximum Bandwidth Allowed

Enter the percentage of maximum bandwidth allowed. This option is only available when CAC is enabled.

Reserved Roaming Bandwidth

Enter the percentage of reserved roaming bandwidth. This option is only available when CAC is enabled.

Expedited Bandwidth

Select the check box to enable expedited bandwidth as an extension of CAC for emergency calls. You must have an expedited bandwidth IE that is CCXv5 compliant so that a TSPEC request is given higher priority.

SIP CAC

Select the check box to enable SIP CAC. SIP CAC should be used only for phones that support status code 17 and do not support TSPEC-based admission control.

SIP Codec

Choose the codec name you want to use on this radio from the SIP Codec drop-don list. The available options are G.711, G.729, and User Defined.

SIP Call Bandwidth

Enter the bandwidth in kilobits per second that you want to assign per SIP call on the network. This field can be configured only when the SIP Codec selected is User Defined.

SIP Sample Interval

Enter the sample interval in milliseconds that the codec must operate in.

Max Number of Calls per Radio

Enter the maximum number of calls per radio.

Metric Collection

Select the check box to enable metric collection. Traffic stream metrics are a series of statistics about VoIP over your wireless LAN which inform you of the QoS of the wireless LAN. For the access point to collect measurement values, traffic stream metrics must be enabled. When this is enabled, the controller begins collecting statistical data every 90 seconds for the 802.11b/g interfaces from all associated access points. If you are using VoIP or video, this feature should be enabled.


Related Topics

Table 31-33—Video tab

Table 31-34—General tab

Controller > 802.11b or g or n > Media Parameters > Video

Table 31-32 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > 802.11b or g or n > Media Parameters > Video tab.

Table 31-33 Controller > 802.11b or g or n > Media Parameters > Video 

Field
Description

Admission Control (ACM)

Select the check box to enable admission control.

Maximum Bandwidth

Specify the percentage of maximum bandwidth allowed. This option is only available when CAC is enabled.

Reserved Roaming Bandwidth

Specify the percentage of reserved roaming bandwidth. This option is only available when CAC is enabled.

Unicast Video Redirect

Select the Unicast Video Redirect check box to enable all non-media stream packets in video queue are redirected to the best effort queue. If disabled, all packets with video marking are kept in video queue.

Client Minimum Phy Rate

Choose the physical data rate required for the client to join a media stream from the Client Minimum Phy Rate drop-down list.

Multicast Direct Enable

Select the Multicast Direct Enable check box to set the Media Direct for any WLAN with Media Direct enabled on a WLAN on this radio.

Maximum Number of Streams per Radio

Specify the maximum number of streams per Radio to be allowed.

Maximum Number of Streams per Client

Specify the maximum number of streams per Client to be allowed.

Best Effort QOS Admission

Select the Best Effort QOS Admission check box to redirect new client requests to the best effort queue. This happens only if all the video bandwidth has been used. If disabled and maximum video bandwidth has been used, then any new client request is rejected.


Related Topics

Table 31-32—Voice tab

Table 31-34—General tab

Controller > 802.11b or g or n > Media Parameters > General

Table 31-34 describes the fields on the Design > Configuration Templates> Features and Technologies > Controller > 802.11b or g or n > Media Parameters > General tab.

Table 31-34 Controller > 80211b or g or n > Media Parameters > General 

Field
Description

Maximum Media Bandwidth (0 to 85%)

Specify the percentage of maximum of bandwidth allowed. This option is only available when CAC is enabled.


Related Topics

Table 31-32—Voice tab

Table 31-33—Video tab

Controller > 802.11b or g or n > Roaming Parameters

Table 31-35 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 802.11b or g or n > Roaming Parameters.

.

Table 31-35 Controller > 802.11b or g or n > Roaming Parameters  

Field
Description

Mode

Choose Default Values or Custom Values from the drop-down list. If you select Default Values, the roaming parameters are unavailable and the default values are displayed.

Minimum RSSI

Enter a value for the minimum Received Signal Strength Indicator (RSSI) required for the client to associate to an access point. If the client average received signal power dips below this threshold, reliable communication is usually impossible. Therefore, clients must already have found and roamed to another access point with a stronger signal before the minimum RSSI value is reached. Range: -80 to -90 dBm. Default: -85 dBm.

Roaming Hysteresis

Enter a value to indicate how strong the signal strength of a neighboring access point must be in order for the client to roam to it. This field is intended to reduce the amount of "ping ponging" between access points if the client is physically located on or near the border between two access points. Range: 2 to 4 dB. Default: 2 dB.

Adaptive Scan Threshold

Enter the RSSI value, from a client associated access point, below which the client must be able to roam to a neighboring access point within the specified transition time. This field also provides a power-save method to minimize the time that the client spends in active or passive scanning. For example, the client can scan slowly when the RSSI is above the threshold and scan more rapidly when below the threshold. Range: -70 to -77 dB. Default: -72 dB

Transition Time

Enter the maximum time allowed for the client to detect a suitable neighboring access point to roam to and to complete the roam, whenever the RSSI from the client associated access point is below the scan threshold. Range: 1 to 10 seconds. Default: 5 seconds.


Controller > 802.11b or g or n > CleanAir

Table 31-36 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > 802.11b or g or n > CleanAir

.

Table 31-36 Controller > 802.11b or g or n > CleanAir  

Field
Description

CleanAir

Select the check box to enable CleanAir functionality on the 802.11 b/g/n network, or unselect to prevent the controller from detecting spectrum interference. The default value is selected. If CleanAir is enabled, the Reporting Configuration and Alarm Configuration group boxes appear.

Report Interferers

Select the report interferers check box to enable CleanAir system to report and detect sources of interference, or unselect it to prevent the controller from reporting interferers. The default value is selected. Make sure that any sources of interference that need to be detected and reported by the CleanAir system appear in the Interferences to Detect box and any that do not need to be detected appear in the Interferers to Ignore box. Use the > and < buttons to move interference sources between these two boxes. By default, all interference sources are ignored.

Air Quality Alarm

Select the Air Quality Alarm check box to enable the triggering of air quality alarms, or unselect the box to disable this feature.

Air Quality Alarm Threshold

If you selected the Air Quality Alarm check box, enter a value between 1 and 100 (inclusive) in the Air Quality Alarm Threshold text box to specify the threshold at which you want the air quality alarm to be triggered. When the air quality falls below the threshold level, the alarm is triggered. A value of 1 represents the worst air quality, and 100 represents the best. The default value is 1.

Interferers For Security Alarm

Select the Interferers For Security Alarm check box to trigger interferer alarms when the controller detects specified device types, or unselected it to disable this feature. The default value is unselected. Make sure that any sources of interference that need to trigger interferer alarms appear in the Interferers Selected for Security Alarms box and any that do not need to trigger interferer alarms appear in the Interferers Ignored for Security Alarms box. Use the > and < buttons to move interference sources between these two boxes. By default, all interferer sources for security alarms are ignored.


Controller > dot11b-RRM > Thresholds

Table 31-37 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > dot11b-RRM > Thresholds.

.

Table 31-37 Controller > dot11b-RRM > Thresholds  

Field
Description

Min. Failed Clients (#)

Enter the minimum number of failed clients currently associated with the controller.

Coverage Level

Enter the target range of coverage threshold (dB).

Signal Strength

When the Coverage Level field is adjusted, the value of the Signal Strength (dBm) automatically reflects this change. The Signal Strength field provides information regarding what the signal strength is when adjusting the coverage level.

Data RSSI

Enter the Data RSSI (-60 to -90 dBm). This number indicates the value for the minimum Received Signal Strength Indicator (RSSI) for data required for the client to associate to an access point.

Voice RSSI

Enter the Voice RSSI (-60 to -90 dBm). This number indicates the value for the minimum Received Signal Strength Indicator (RSSI) required for voice for the client to associate to an access point.

Max. Clients

Enter the maximum number of clients able to be associated with the controller.

RF Utilization

Enter the percentage of threshold for this radio type.

Interference Threshold

Enter an interference threshold between 0 and 100 percent.

Noise Threshold

Enter a noise threshold between -127 and 0 dBm. When outside of this threshold, the controller sends an alarm to Prime Infrastructure.

Coverage Exception Level

Enter the coverage exception level percentage. When the coverage drops by this percentage from the configured coverage for the minimum number of clients, a coverage hole is generated.


Controller > dot11b-RRM > TPC

Table 31-38 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > dot11b-RRM > TPC

.

Table 31-38 Controller > dot11b-RRM > TPC  

Field
Description

TPC Version

Choose TPCv1 or TPCv2 from the drop-down list. The TPCv2 option is applicable only for controller Version 7.2.x or later.

Dynamic Assignment

From the Dynamic Assignment drop-down list, choose one of three modes: Automatic—The transmit power is periodically updated for all access points that permit this operation. On Demand—Transmit power is updated when you click Assign Now. Disabled—No dynamic transmit power assignments occur, and values are set to their global default.

Maximum Power Assignment

Indicates the maximum power assigned. Range: -10 to 30 dB. Default: 30 dB.

Minimum Power Assignment

Indicates the minimum power assigned. Range: -10 to 30 dB. Default: 30 dB.

Dynamic Tx Power Control

Click the check box if you want to enable Dynamic Transmission Power Control.

Transmitted Power Threshold

Enter a transmitted power threshold between -50 and -80.

Control Interval

Shows the transmitted power control interval in seconds (read-only).


Controller > dot11b-RRM > DCA

Table 31-39 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > dot11b-RRM > DCA.

.

Table 31-39 Controller > dot11b-RRM > DCA  

Field
Description

Assignment Mode

From the Dynamic Assignment drop-down list, choose one of three modes: Automatic—The transmit power is periodically updated for all access points that permit this operation.On Demand—Transmit power is updated when you click Assign Now.Disabled—No dynamic transmit power assignments occur, and values are set to their global default.

Avoid Foreign AP Interference

Enable this field to have RRM consider interference from foreign Cisco access points (those non-Cisco access points outside RF/mobility domain) when assigning channels. This foreign 802.11 interference. Unselect this check box to have RRM ignore this interference.

In certain circumstances with significant interference energy (dB) and load (utilization) from foreign access points, RRM might adjust the channel assignment to avoid these channels (and sometimes adjacent channels) in access points close to the foreign access points. This increases capacity and reduces variability for the Cisco WLAN Solution.

Avoid Cisco AP Load

Enable this bandwidth-sensing field to have controllers consider the traffic bandwidth used by each access point when assigning channels to access points. Unselect this check box to have RRM ignore this value.

In certain circumstances and with denser deployments, there might not be enough channels to properly create perfect channel reuse. In these circumstances, RRM can assign better re-use patterns to those access points that carry more traffic load.

Avoid non 802.11 Noise

Enable this noise-monitoring field to have access points avoid channels that have interference from non-access point sources, such as microwave ovens or Bluetooth devices. Unselect this check box to have RRM ignore this interference.

In certain circumstances with significant interference energy (dB) from non-802.11 noise sources, RRM might adjust the channel assignment to avoid these channels (and sometimes adjacent channels) in access points close to the noise sources. This increases capacity and reduces variability for the Cisco WLAN Solution.

Signal Strength Contribution

The Signal Strength Contribution check box is always enabled (not configurable). constantly monitors the relative location of all access points within the RF/mobility domain to ensure near-optimal channel re-use. The net effect is an increase in Cisco WLAN Solution capacity and a reduction in co-channel and adjacent channel interference.

Event Driven RRM

Select the checkbox to disable spectrum event-driven RRM. By default, Event Driven RRM is enabled. Event Driven RRM is used when a CleanAir-enabled access point detects a significant level of interference

Sensitivity Threshold

If Event Driven RRM is enabled, this field displays the threshold level at which event-driven RRM is triggered. It can have a value of either Low, Medium, or High. When the interference for the access point rises above the threshold level, RRM initiates a local Dynamic Channel Assignment (DCA) run and changes the channel of the affected access point radio if possible to improve network performance. Low represents a decreased sensitivity to changes in the environment while High represents an increased sensitivity.


Controller > Management > Trap Control

Table 31-40 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Management > Trap Control.

.

Table 31-40 Controller > Management > Trap Control  

Field
Description

Select All Traps

Select this check box to enable all of the traps on this page.

SNMP Authentication

The SNMPv2 entity has received a protocol message that is not properly authenticated. When a user who is configured in SNMP V3 mode tries to access the controller with an incorrect password, the authentication fails and a failure message is displayed. However, no trap logs are generated for the authentication failure.

Link (Port) Up/Down

Link changes states from up or down.

Multiple Users

Two users log in with the same login ID.

Spanning Tree

Spanning Tree traps. See the STP specification for descriptions of individual parameters.

Rogue AP

Whenever a rogue access point is detected or when a rogue access point was detected earlier and no longer exists, this trap is sent with its MAC address.

Controller Config Save

Notification sent when the configuration is modified.

802.11 Association

A trap is sent when a client is associated to a WLAN. This trap does not guarantee that the client is authenticated.

802.11 Disassociation

The disassociate notification is sent when the client sends a disassociation frame.

802.11 Deauthentication

The deauthenticate notification is sent when the client sends a deauthentication frame.

802.11 Failed Authentication

The authenticate failure notification is sent when the client sends an authentication frame with a status code other than successful.

802.11 Failed Association

The associate failure notification is sent when the client sends an association frame with a status code other than successful.

Excluded

The associate failure notification is sent when a client is excluded.

AP Register

Notification sent when an access point associates or disassociates with the controller.

AP Interface Up/Down

Notification sent when access point interface (802.11a/n or 802.11b/g/n) status goes up or down.

Load Profile

Notification sent when Load Profile state changes between PASS and FAIL.

Noise Profile

Notification sent when Noise Profile state changes between PASS and FAIL.

Interference Profile

Notification sent when Interference Profile state changes between PASS and FAIL.

Coverage Profile

Notification sent when Coverage Profile state changes between PASS and FAIL.

Channel Update

Notification sent when the dynamic channel algorithm of an access point is updated.

Tx Power Update

Notification sent when the dynamic transmit power algorithm of an access point is updated.

User Auth Failure

This trap is to inform you that a client RADIUS authentication failure has occurred.

RADIUS Server No Response

This trap is to indicate that no RADIUS server(s) are responding to authentication requests sent by the RADIUS client.

ESP Authentication Failure

IPsec packets with invalid hashes were found in an inbound ESP SA.

ESP Replay Failure

IPsec packets with invalid sequence numbers were found in an inbound ESP SA.

Invalid SPI

A packet with an unknown SPI was detected from the specified peer with the specified SPI using the specified protocol.

IKE Negotiation Failure

An attempt to negotiate a phase 1 IKE SA failed. The notification counts are also sent as part of the trap, along with the current value of the total negotiation error counters.

IKE Suite Failure

An attempt to negotiate a phase 2 SA suite for the specified selector failed. The current total failure counts are passed as well as the notification type counts for the notify involved in the failure.

Invalid Cookie

ISAKMP packets with invalid cookies were detected from the specified source, intended for the specified destination. The initiator and responder cookies are also sent with the trap.

WEP Decrypt Error

Notification sent when the controller detects a WEP decrypting error.

Signature Attack

Select the check box to enable the 802.11 security trap.


Controller > Management > Telnet SSH

Table 31-41 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Management > Telnet SSH.

.

Table 31-41 Controller > Management > Telnet SSH  

Field
Description

Session Timeout

Enter the number of minutes a Telnet session is allowed to remain inactive before being logged off. A zero means there is no timeout. The valid range is 0 to 160, and the default is 5.

Maximum Sessions

Enter the number of simultaneous Telnet sessions allowed. The valid range is 0 to 5, and the default is 5. New Telnet sessions can be allowed or disallowed on the DS (network) port. New Telnet sessions are always allowed on the service port.

Allow New Telnet Session

Select Yes to allow new Telnet sessions on the DS port, No to disallow them. New Telnet sessions can be allowed or disallowed on the DS (network) port. New Telnet sessions are always allowed on the service port. The default is Yes.

Allow New SSH Session

Select Yes to allow Secure Shell Telnet sessions, No to disallow them. The default is Yes.


Controller > Location > Location Configuration

The following tables describe the fields on the Design > Configuration Templates > Features and Technologies > Controller > 802.11b or g or n > Media Parameters page:

Table 31-32—General tab

Table 31-33—Advanced tab

Controller > Location > Location Configuration > General

Table 31-42 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Location > Location Configuration > General.

.

Table 31-42 Controller > Location > Location Configuration > General 

Field
Description

RFID Tag Data Collection

Select the check box to enable tag collection. Before the mobility services engine can collect asset tag data from controllers, you must enable the detection of active RFID tags using the CLI command config rfid status enable on the controllers.

Calibrating Client

Select the check box to enable calibration for the client. Controllers send regular S36 or S60 requests (depending on the client capability) by way of the access point to calibrating clients. Packets are transmitted on all channels. All access points irrespective of channel (and without a channel change) gather RSSI data from the client at each location. These additional transmissions and channel changes might degrade contemporaneous voice or video traffic. To use all radios (802.11a/b/g/n) available, you must enable multiband in the Advanced tab.

Normal Client

Select the check box to have a non-calibrating client. No S36 requests are transmitted to the client. S36 and S60 are client drivers compatible with specific Cisco Compatible Extensions. S36 is compatible with CCXv2 or later. S60 is compatible with CCXv4 or later. For details, see the Cisco Context Aware and Location FAQ.

Tags, Clients and Rogue APs/Clients

Specify how many seconds should elapse before notification of the found tag, client, rogue AP, or rogue client.

For Clients

Enter the number of seconds after which RSSI measurements for clients should be discarded.

For Calibrating Clients

Enter the number of seconds after which RSSI measurements for calibrating clients should be discarded.

For Tags

Enter the number of seconds after which RSSI measurements for tags should be discarded.

For Rogue APs

Enter the number of seconds after which RSSI measurement for rogue access points should be discarded.


Related Topics

Table 31-33—Advanced tab

Controller > Location > Location Configuration > Advanced

Table 31-43 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > Location > Location Configuration > Advanced.

.

Table 31-43 Controller > Location > Location Configuration > Advanced 

Field
Description

RFID Tag Data Timeout

Enter a value in seconds to set the RFID tag data timeout.

Calibrating Client Multiband

Select the check box to send S36 and S60 packets (where applicable) on all channels. Calibrating clients must be enabled on the General tab


Related Topics

Table 31-32—General tab

Controller > PMIP > Global Config

Table 31-44 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Controller > PMIP > Global Config.

.

Table 31-44 Controller > PMIP > Global Config

Field
Description

Domain Name

The name of the domain.

Maximum Bindings Allowed

Maximum number of binding updates that the controller can send to the MAG. The valid range is between 0 to 40000.

Binding Lifetime

Lifetime of the binding entries in the controller. The valid range is between 10 to 65535 seconds. The default value is 65535. The binding lifetime should be a multiple of 4 seconds.

Binding Refresh Time

Refresh time of the binding entries in the controller. The valid range is between 4 to 65535 seconds. The default value is 300 seconds. The binding refresh time should be a multiple of 4 seconds.

Binding Initial Retry Timeout

Initial timeout between the proxy binding updates (PBUs) when the controller does not receive the proxy binding acknowledgments (PBAs). The valid range is between 100 to 65535 seconds. The default value is 1000 seconds.

Binding Maximum Retry Timeout

Maximum timeout between the proxy binding updates (PBUs) when the controller does not receive the proxy binding acknowledgments (PBAs). The valid range is between 100 to 65535 seconds. The default value is 32000 seconds.

Replay Protection Timestamp

Maximum amount of time difference between the timestamp in the received proxy binding acknowledgment and the current time of the day. The valid range is between 1 to 255 milliseconds. The default value is 7 milliseconds.

Minimum BRI Retransmit Timeout

Minimum amount of time that the controller waits before retransmitting the BRI message. The valid range is between 500 to 65535 seconds.

Maximum BRI Retransmit Timeout

Maximum amount of time that the controller waits before retransmitting the Binding Revocation Indication (BRI) message. The valid range is between 500 to 65535 seconds. The default value is 2000 seconds.

BRI Retries

Maximum number of times that the controller retransmits the BRI message before receiving the Binding Revocation Acknowledgment (BRA) message. The valid range is between 1 to 10. The default value is 1.


Security Templates Field Descriptions

The following sections contain field descriptions for pages found in Design > Configuration Templates > Features and Technologies > Security.

Security > DMVPN

Security > GETVPN-GroupMember

Security > GETVPN-KeyServer

Security > ScanSafe

Security > DMVPN

Table 31-45 describes the fields on the following page: Design > Configuration Templates> Features and Technologies > Security > DMVPN.

.

Table 31-45 Security > DMVPN  

Field
Description
Element
Field Description
Template Basic tab

Name

Enter a name for the DMVPN template.

Description

(Optional) Enter a description for the DMVPN template.

Validation Criteria tab

Device Type

Choose the device type from the drop-down list.

OS Version

Enter the OS version for the device.

IPsec Information

Authentication Type

Click the Preshared Keys or Digital Certificates radio button.

Preshared Keys—Allow for a secret key to be shared between two peers and to be used by IKE during the authentication phase.

Digital Certificates—Authentication method in which RSA key pairs are used to sign and encrypt IKE key management messages. Certificates provide nonrepudiation of communication between two peers, meaning that it can be proven that the communication actually took place.

Priority

The priority value of the IKE proposal. The priority value determines the order of the IKE proposals compared by the two negotiating peers when attempting to find a common security association (SA). If the remote IPsec peer does not support the parameters selected in your first priority policy, the device tries to use the parameters defined in the policy with the next lowest priority number.

Valid values range from 1 to 10000. The lower the number, the higher the priority. If you leave this field blank, Security Manager assigns the lowest unassigned value starting with 1, followed by 5, and continuing in increments of 5.

Authenticate

Choose the authentication type from the drop-down list.

Diffie-Hellman Group

The Diffie-Hellman group to use for deriving a shared secret between the two IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires more processing time. The two peers must have a matching modulus group. Options are:

1—Diffie-Hellman Group 1 (768-bit modulus).

2—Diffie-Hellman Group 2 (1024-bit modulus).

5—Diffie-Hellman Group 5 (1536-bit modulus, considered good protection for 128-bit keys, but group 14 is better). If you are using AES encryption, use this group (or higher). The ASA supports this group as the highest group.

Encryption policy

Choose the encryption policy from the drop-down list. Choose the encryption algorithm from the drop-down list. The encryption algorithm used to establish the Phase 1 SA for protecting phase 2 negotiations:

AES-128—Encrypts according to the Advanced Encryption Standard using 128-bit keys.

AES-192—Encrypts according to the Advanced Encryption Standard using 192-bit keys.

AES-256—Encrypts according to the Advanced Encryption Standard using 256-bit keys.

DES—Encrypts according to the Data Encryption Standard using 56-bit keys.

3DES—Encrypts three times using 56-bit keys. 3DES is more secure than DES, but requires more processing for encryption and decryption. It is less secure than AES. A 3DES license is required to use this option.

Hash

The hash algorithm used in the IKE proposal. The hash algorithm creates a message digest, which is used to ensure message integrity. Options are:

SHA (Secure Hash Algorithm)—Produces a 160-bit digest. SHA is more resistant to brute-force attacks than MD5.

MD5 (Message Digest 5)—Produces a 128-bit digest. MD5 uses less processing time than SHA.

Lifetime

The lifetime of the SA, in seconds. When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be. However, with longer lifetimes, future IPsec security associations can be set up more quickly than with shorter lifetimes.

You can specify a value from 60 to 2147483647 seconds. The default is 86400.

Transform Set

Name

Enter the transform set name. The transform set encrypts the traffic on the tunnel.

ESP Encryption Algorithm

The algorithm used to encrypt the payload. Choose the encryption algorithm from the drop-down list. The options are:

ESP with the 128-bit Advanced Encryption Standard (AES) encryption algorithm.

ESP with the 192-bit AES encryption algorithm.

ESP with the 256-bit AES encryption algorithm.

ESP with the 168-bit DES encryption algorithm (3DES or Triple DES).

Null encryption algorithm.

ESP Integrity Algorithm

The algorithm used to check the integrity of the payload. Choose the integrity algorithm from the drop-down list. The options are:

ESP with the MD5 (HMAC variant) authentication algorithm.

ESP with the SHA (HMAC variant) authentication algorithm.

AH Integrity

Choose the AH integrity from the drop-down list. The options are:

AH with the MD5 (Message Digest 5) (a Hash-based Message Authentication Code [HMAC] variant) authentication algorithm.

AH with the SHA (Secure Hash Algorithm) (an HMAC variant) authentication algorithm.

Compression

Enable the IP compression to compress payload. IP compression with the Lempel-Ziv-Stac (LZS) algorithm.

Mode

Choose the mode to transport the traffic.

Device Role and Topology

Spoke radio button

Check the Spoke radio button to configure the router as a Spoke in the topology.

Hub radio button

Check the Hub radio button to configure the router as a Hub in the topology.

Dynamic Connection between Spokes

Check the Create Dynamic Connection between spokes check box to configure the dynamic connection between spokes.

EIGRP

Choose the routing information.

RIPV2

Choose the routing information.

Other

Check the Other check box to select other routing protocol.

NHRP and Tunnel Parameters

Network ID

Enter the NHRP Network ID.The network ID is a globally unique, 32-bit network identifier from a nonbroadcast multiaccess (NBMA) network. The range is from 1 to 4294967295.

Hold Time

Enter the number of seconds that the Next Hop Resolution Protocol (NHRP) NBMA addresses should be advertised as valid. The default value is 7200 seconds.

Tunnel Key

Enter the tunnel key. The tunnel key is used to enable a key ID for a particular tunnel interface. The range is from 0 to 4294967295.

NHRP Authentication String

Enter the Authentication String.

IP MTU

Enter the MTU size of IP packets that are sent on a particular interface. The default value for Ethernet and the serial interface is 1500. The default value varies depending upon the media type.

TCP Maximum Segment Size

Enter the TCP maximum segment size. The range is from 500 to 1460.

Physical Interface

Enter the physical interface.

NHS Fallback Time

(Optional) Enter the NHS fallback time in seconds. The range is from 0 to 60.

NHS Server

Cluster ID

Enter the cluster value to form a group having one or more hubs. The range is from 0 to 10.

Max Connections

Enter the maximum number of connections that can be active in a particular group/cluster.

Priority

The priority of the particular hub in a cluster. Depends on the priority of the spoke router that will form a tunnel with the hub devices.

Next Hop server

Enter the IP address of the next-hop server.

Hub's Physical IP Address

Enter the IP address of the hub's physical interface.


Security > GETVPN-GroupMember

Table 31-46 describes the fields on the following page: Design > Configuration Templates> Features and Technologies > Security > GETVPN-GroupMember.

.

Table 31-46 Security > GETVPN-GroupMember  

Field
Description

Group ID

Enter the Group ID. The Group ID is a unique identity for the GETVPN group member. This can be a number or an IP address.

Group Name

Enter the Group Name for the GETVPN group member.

IKE Authentication Policy

Use this anchored field and its associated popup to specify authentication type and policies for this GETVPN group member.

Pre-Shared Key

Select this radio button o select Pre-Shared Key as the IKE authentication type. If you select this, you must provide the key in the Pre-Shared Key field immediately below the button.

Confirm Secret Key

Enter the pre-shared key again to confirm it. This field is displayed only when you select Pre-Shared Key as the authentication type.

Digital Certificate

Select this radio button o select Digital Certificate as the IKE authentication type. If you choose this authentication type, the router must have a digital certificate issued by a Certificate Authority to authenticate itself.

IKE Policies

Use this edit table to create a set of IKE policies for this GETVPN group member.

Priority

Set the authentication policy's negotiation priority by entering a value from 1 to 10000, with 1 as the highest priority. The priority value determines the order of the IKE proposals compared by the two negotiating peers when attempting to find a common security association (SA). If the remote IPsec peer does not support the parameters selected in your first priority policy, the device tries to use the parameters defined in the policy with the next lowest priority number.

Authentication

Select the authentication policy's authentication type from the list.

D-H Group

Select the authentication policy's Diffie-Hellman group from the list.

Encryption

Select the authentication policy's encryption type from the list.

Hash

Select the authentication policy's hash type from the list

IKE Lifetime

Enter the security association (SA) lifetime in seconds. When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be.

WAN Interface

Enter the registration WAN Interface for the GETVPN group member.

Local Exception Policy ACL

Enter the Local Exception Policy ACL specifying the traffic that the GETVPN group member must send in clear text.

Fail Close ACL

Enter the Fail Close ACL specifying the traffic that must be allowed when GETVPN encryption fails. If the Fail Close ACL feature is configured, all the traffic passing through the group member will be dropped until the group member is registered successfully. Once the group member registers successfully and SAs are downloaded, this feature turns off by itself.

Primary Key Server

Enter the IP address or host name of the primary encryption key server. The primary key server is responsible for creating and distributing group policies to all group members and periodically synchronizing with the secondary key servers.

Secondary Key Servers

Use this edit table to specify the set of secondary key servers. Enter them in order of priority, with the highest priority at the top of the edit table. During periods when the primary key server is down or inaccessible, the accessible secondary key server with the highest priority is elected to serve as the primary key server.

Enable Passive SA

Check the Enable Passive SA check box to enable Passive SA mode on this group member


Security > GETVPN-KeyServer

Table 31-47 describes the fields on the following page: Design > Configuration Templates> Features and Technologies > Security > GETVPN-KeyServer.

.

Table 31-47 Security > GETVPN-KeyServer  

Field
Description
Template Detail

Group Name

Enter the group name for the GETVPN group member template.

Group ID

Enter a unique identity for the GETVPN group member. This can be a number or an IP address. The range is from 0 to 2147483647.

IKE Authentication Policy

Authorization Type

Click the Preshared Keys or Digital Certificates radio button:

Preshared Keys—Preshared keys allow for a secret key to be shared between two peers and to be used by IKE during the authentication phase.

Digital Certificates—An authentication method in which RSA key pairs are used to sign and encrypt IKE key management messages. Certificates provide nonrepudiation of communication between two peers, meaning that it can be proven that the communication actually took place.

Priority

The priority value of the IKE proposal. The priority value determines the order of the IKE proposals compared by the two negotiating peers when attempting to find a common SA. If the remote IPsec peer does not support the parameters selected in your first priority policy, the device tries to use the parameters defined in the policy with the next lowest priority number.

Valid values range from 1 to 10000. The lower the number, the higher the priority.

Encryption

Choose the encryption algorithm from the drop-down box.The encryption algorithm is used to establish the Phase 1 SA for protecting Phase 2 negotiations:

AES-128—Encrypts according to the Advanced Encryption Standard using 128-bit keys.

AES-192—Encrypts according to the Advanced Encryption Standard using 192-bit keys.

AES-256—Encrypts according to the Advanced Encryption Standard using 256-bit keys.

DES—Encrypts according to the Data Encryption Standard using 56-bit keys.

3DES—Encrypts three times using 56-bit keys. 3DES is more secure than DES, but requires more processing for encryption and decryption. It is less secure than AES. A 3DES license is required to use this option.

Hash

The hash algorithm used in the IKE proposal. The hash algorithm creates a message digest, which is used to ensure message integrity. Options are:

SHA (Secure Hash Algorithm)—Produces a 160-bit digest. SHA is more resistant to brute-force attacks than MD5.

MD5 (Message Digest 5)—Produces a 128-bit digest. MD5 uses less processing time than SHA.

Diffie-Hellman Group

The Diffie-Hellman group to use for deriving a shared secret between the two IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires more processing time. The two peers must have a matching modulus group. Options are:

1—Diffie-Hellman Group 1 (768-bit modulus).

2—Diffie-Hellman Group 2 (1024-bit modulus).

5—Diffie-Hellman Group 5 (1536-bit modulus, considered good protection for 128-bit keys, but group 14 is better). If you are using AES encryption, use this group (or higher). The ASA supports this group as the highest group.

Lifetime

The lifetime of the SA, in seconds. When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be. However, with longer lifetimes, future IPsec security associations can be set up more quickly than with shorter lifetimes.

You can specify a value from 60 to 2147483647 seconds. The default is 86400.

Registration Interface

Enter the interface to which the crypto map needs to be associated.

Traffic Details

Local Exception ACL

Choose an ACL for the traffic that must be excluded from the encryption.

Fail Close ACL

Choose an ACL for the traffic that must be sent in clear text until the group member registers with the key server. If the Fail Close feature is configured, all the traffic passing through the group member will be dropped until the group member is registered successfully. Once the group member registers successfully and SAs are downloaded, this feature turns off by itself.

Key Server Information

Primary Key Server

Specify the primary key server IP address to which the client connects. The primary key server is responsible for creating and distributing group policies to all group members and periodically synchronizing with the secondary key servers. The server with the highest priority is elected as a primary key server.

Secondary Key Server

Specify the secondary key server IP address to which the group member falls back when the primary key server registration fails. A group member can be configured to register to any available key server from a list of all secondary key servers. Group member configuration determines the registration order. The key server defined first is contacted first, followed by the second defined key server, and so on. You can have a maximum of eight key servers for a group member.

Migration

Enable Passive SA

The Passive SA mode overrides the receive-only SA option on the key server and encrypts all outbound traffic. Use this option to turn on the Passive SA mode on the group member.

Group Name

Enter the group name for the GETVPN group member template.


Security > ScanSafe

Table 31-48 describes the fields on the following page: Design > Configuration Templates > Features and Technologies > Security > ScanSafe.

.

Table 31-48 Security > ScanSafe

Field
Description

Primary Server

Enter the IPv4 address or host name of the primary ScanSafe server.

HTTP Port

Specify the HTTP port to redirect the HTTP requests to the primary server. By default, the ScanSafe uses port 80 for the HTTP traffic. However, you can choose to use different ports for each request type.

HTTPS Port

Specify the HTTPs port to redirect the HTTPS requests to the primary server. By default, the ScanSafe uses the port 443 for HTTPs traffic. However, you can choose to use different ports for each request type.

Secondary Server

Enter the IPv4 address or host name of the secondary ScanSafe server.

HTTP Port (secondary)

Specify the HTTP port to which to redirect the HTTP requests to the secondary server. By default, ScanSafe uses port 80 for HTTP traffic.

HTTPS Port

Specify the HTTPs port to which to redirect the HTTPS requests to the secondary server. By default, ScanSafe uses port 443 for HTTPs traffic.

ScanSafe License

Specify the license key that the ISR sends to the ScanSafe proxy servers to indicate the organization from which the request originated. The license is a 16-byte hexadecimal key.

Server Timeout

Specify the primary ScanSafe server timeout in seconds. The ISR waits for the specified timeout period before polling the ScanSafe proxy server to check its availability.

Session Timeout

Specify the primary ScanSafe session idle timeout in seconds. If the primary server fails, the ISR will use the secondary server as the active ScanSafe proxy server. The ISR automatically falls back to the primary server as long as it is active for three consecutive timeout periods.

Source Interface

Specify the source IPv4 address or interface name on which ScanSafe Web Security is enabled.

Router behavior when ScanSafe server fail to respond

Specify how the ISR router should handle the incoming traffic when it cannot reach the configured ScanSafe proxy servers: Drop all traffic or Allow all traffic. Drop all traffic is the default.

Global User

Enter a Global User when the web authentication (webauth) is not configured under the router's Ingress Interface.

Global User Group

Enter a Global User Group when the web authentication (webauth) is not configured on the router's Egress Interfaces.

User Group Inclusion & Exclusion Info

Use the two edit tables to specify the user group information to be included or excluded during exchanges with the ScanSafe tower. This is used only when web authentication (webauth) is configured on the router's Ingress and Egress interfaces

Notify Whitelist Info to ScanSafe Tower

Select this option to sending the Whitelist information to the ScanSafe Tower and specify the Safe URL, Safe User Agent, and Safe ACL information to be sent.


Wireless Configuration Templates Field Descriptions

The following sections contain field descriptions for pages found in Design > Wireless Configuration.

Lightweight AP Configuration Templates

Autonomous AP Migration Templates

Lightweight AP Configuration Templates

The following tables describe the fields on the Design > Wireless Configuration > Lightweight AP Configuration Templates page:

Table 31-49—AP Parameters Tab

Table 31-50—Mesh Tab

Table 31-51—802.11a/n Tab

Table 31-52—802.11a SubBand Tab

Table 31-53—802.11b/g/n Tab

Table 31-54—CDP Tab

Table 31-55—FlexConnect Tab

Table 31-56—Select APs Tab

Table 31-57—Apply/Schedule

Table 31-58—Report Tab

Lightweight AP Configuration Templates> AP Parameters

Table 31-49 describes the fields on the following page: Design > Wireless Configuration > Lightweight AP Configuration Templates > AP Parameters.

Table 31-49 Lightweight AP Configuration Templates> AP Parameters 

Field
Description

Admin Status

Select the Admin and Enabled check box to enable administrative status.

To conserve energy, access points can be turned off at specified times during non-working hours. Select the Enabled check box to allow access points to be turned on or off.

AP Mode

From the drop-down list, choose one of the following:

Local—Default

Monitor—Monitor mode only.

Choose Monitor to enable this access point template for Cisco Adaptive wIPS. Once Monitor is selected, select the Enhanced WIPS Engine check box and the Enabled check box. Then select the AP Monitor Mode Optimization check box and choose WIPS from the AP Monitor Mode Optimization drop-down list.

FlexConnect—Cisco 1030 remote edge lightweight access point (REAP) used for Cisco 1030 IEEE 802.11a/b/g/n remote edge lightweight access points.

FlexConnect must be selected to configure an OfficeExtend access point. When the AP mode is FlexConnect, FlexConnect configuration options display including the option to enable OfficeExtend AP and to enable Least Latency Controller Join.

Rogue Detector—Monitors the rogue access points but does not transmit or contain rogue access points.

Bridge

Sniffer—The access point "sniffs" the air on a given channel. It captures and forwards all the packets from the client on that channel to a remote machine that runs airopeek (a packet analyzer for IEEE 802.11 wireless LANs). It includes information on timestamp, signal strength, packet size, and so on. If you choose Sniffer as an operation mode, you are required to enter a channel and server IP address on the AP/Radio Templates 802.11b/g/n or 802.11a/n parameters tab.

The sniffer feature can be enabled only if you are running AiroPeek, which is a third-party network analyzer software that supports decoding of data packets. For more information on AiroPeek, see http://www.wildpackets.com.

SE-Connect—This mode allows a CleanAir-enabled access point to be used extensively for interference detection on all monitored channels. All other functions such as IDS scanning and Wi-Fi are suspended.

This option is displayed only if the access point is CleanAir-capable.

Changing the AP mode reboots the access point.

Enhanced wIPS Engine

Select the Enhanced wIPS engine and the Enabled check box to enable.

AP Sub Mode

Choose an option from the drop-down list.

Country Code

Select the appropriate country code from the drop-down list.

Note Changing the country code might cause the access point to reboot.

AP Failover Priority

Choose Low, Medium, High, or Critical from the drop-down list to indicate the access point failover priority. The default priority is low.

Power Injector State

When enabled, this allows you to manipulate power injector settings through NCS without having to go directly to the controllers. If the Enable Power Injector State is selected, power injector options appear.

Primary, Secondary, and Tertiary Controller IP

The Primary/Secondary/Tertiary Controller IP is the Management IP of the controller.

Domain Name Server IP Address

Domain Name Server IP and Domain Name can be configured only on access points which have static IPs.

Encryption

Enabling or disabling encryption functionality causes the access point to reboot which then causes a loss of connectivity for clients.

DTLS data encryption is enabled automatically for OfficeExtend access points to maintain security. Encryption is only available if the access point is connected to a 5500 series controller with a Plus license. Encryption is not available for all access point models.

Enabling encryption might impair performance.

Rogue Detection

Rogue detection is disabled automatically for OfficeExtend access points because these access points, which are deployed in a home environment, are likely to detect a large number of rogue devices. For more information regarding OfficeExtend access points, see Cisco Wireless LAN Controller Configuration Guide.

Telnet Access

An OfficeExtend access point might be connected directly to the WAN which could allow external access if the default password is used by the access point. Because of this, Telnet and SSH access are disabled automatically for OfficeExtend access points.

Link Latency

You can configure link latency on the controller to measure the link between an access point and the controller. This feature can be used with all access points joined to the controller but is especially useful for FlexConnect access points, for which the link could be a slow or unreliable WAN connection.

Note Link latency is supported for use only with FlexConnect access points in connected mode. FlexConnect access points in standalone mode are not supported.

Reboot AP

Select the check box to enable a reboot of the access point after making any other updates.

AP Failover Priority

Choose Low, Medium, High, or Critical from the drop-down list to indicate the access point failover priority. The default priority is low.

Controllers

Select the Controllers check box to enable the drop-down lists for the primary, secondary, and tertiary controller names.

Override Global Username Password

Select the check box to enable an override for the global username/password. Enter and confirm the new access point username and password in the appropriate text boxes.

Override Supplicant Credentials

Select the Override Supplicant Credentials check box to prevent this access point from inheriting the authentication username and password from the controller. The default value is unselected. The Override Supplicant Credentials option is supported in controller Version 6.0 and later.

In the Username, Password, and Confirm Password text boxes, enter the unique username and password that you want to assign to this access point.

Note The information that you enter is retained across controller and access point reboots and whenever the access point joins a new controller.


Lightweight AP Configuration Templates> Mesh

Table 31-50 describes the fields on the Design > Wireless Configuration > Lightweight AP Configuration Templates > Mesh page.

Table 31-50 Lightweight AP Configuration Templates > Mesh  

Field
Description

Bridge Group Name

Enter a bridge group name (up to 10 characters) in the text box.

Bridge groups are used to logically group the mesh access points to avoid two networks on the same channel from communicating with each other.

For mesh access points to communicate, they must have the same bridge group name.

For configurations with multiple RAPs, make sure that all RAPs have the same bridge group name to allow failover from one RAP to another.

Data Rate (Mbps)

Choose the data rate for the backhaul interface from the drop-down list. Data rates available are dictated by the backhaul interface. The default rate is 18 Mbps.

This data rate is shared between the mesh access points and is fixed for the whole mesh network.

Do not change the data rate for a deployed mesh networking solution.

Ethernet Bridging

Select the Enable check box. From the Ethernet Bridging drop-down list, enable Ethernet bridging for the mesh access point.

Role

Choose the role of the mesh access point from the drop-down list (MAP or RAP). The default setting is MAP


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> 802.11a/n

Lightweight AP Configuration Templates > 802.11a SubBand

Lightweight AP Configuration Templates > 802.11b/g/n

Lightweight AP Configuration Templates > CDP

Lightweight AP Configuration Templates >FlexConnect

Lightweight AP Configuration Templates > Select APs

Lightweight AP Configuration Templates > Report

Lightweight AP Configuration Templates> 802.11a/n

Table 31-51 describes the fields on the Design > Wireless Configuration > Lightweight AP Configuration Templates > 802.11a/n page.

Table 31-51 Lightweight AP Configuration Templates> 802.11a/n  

Field
Descriptions

Channel Assignment

Choose a Global assignment method or choose Custom to specify a channel.

Admin Status

Select if you want to enable administration privileges.

Antenna Mode

Choose an antenna mode.

Antenna Diversity

Choose enabled or disabled. Antenna diversity refers to the access point sampling the radio signal from two integrated antenna ports to choose the preferred antenna.

Antenna Type

Indicate an external or internal antenna.

Antenna Name

Select the Antenna Type check box, then choose the applicable antenna name from the drop-down list.

Power Assignment

Choose a Global assignment method or choose Custom to specify a power assignment.

WLAN Override

Choose Disable or Enable from the drop-down list. The access point must be reset for the WLAN override change to take effect.

Antenna Selection

Select the Antenna Selection check box, then select the appropriate antennas from the list.

CleanAir

Select to enable.


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> Mesh

Lightweight AP Configuration Templates > 802.11a SubBand

Lightweight AP Configuration Templates > 802.11b/g/n

Lightweight AP Configuration Templates > CDP

Lightweight AP Configuration Templates >FlexConnect

Lightweight AP Configuration Templates > Select APs

Lightweight AP Configuration Templates > Report

Lightweight AP Configuration Templates > 802.11a SubBand

Table 31-52 describes the fields on the Design > Wireless Configuration > Lightweight AP Configuration Templates > 802.11a SubBand page.

Table 31-52 Lightweight AP Configuration Templates > 802.11a SubBand  

Field
Description

Admin Status

Click if you want to enable administration privileges.

Channel Assignment

Select the check box and then choose the appropriate channel from the drop-down list.

Note The channel number is validated against the radio list of supported channels.

Power Assignment

Select the check box and then choose the appropriate power level from the drop-down list.

Note The power level is validated against the radio list of supported power levels.

WLAN Override

Select the check box and then choose Disable or Enable from the drop-down list.

Note The access point must be reset for the WLAN override change to take effect.

Antenna Type

Indicate an external or internal antenna.

Antenna Name

Select the Antenna Type check box, then choose the applicable antenna name from the drop-down list.


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> Mesh

Lightweight AP Configuration Templates> 802.11a/n

Lightweight AP Configuration Templates > 802.11b/g/n

Lightweight AP Configuration Templates > CDP

Lightweight AP Configuration Templates >FlexConnect

Lightweight AP Configuration Templates > Select APs

Lightweight AP Configuration Templates > Report

Lightweight AP Configuration Templates > 802.11b/g/n

Table 31-53 describes the fields on the Design > Wireless Configuration > Lightweight AP Configuration Templates > 802.11b/g/n page.

Table 31-53 Lightweight AP Configuration Templates> 802.11b/g/n  

Field
Descriptions

Channel Assignment

Choose a Global assignment method or choose Custom to specify a channel.

Admin Status

Select if you want to enable administration privileges.

Antenna Mode

Choose an antenna mode.

Antenna Diversity

Choose enabled or disabled. Antenna diversity refers to the access point sampling the radio signal from two integrated antenna ports to choose the preferred antenna.

Antenna Type

Indicate an external or internal antenna.

Antenna Name

Select the Antenna Type check box, then choose the applicable antenna name from the drop-down list.

Power Assignment

Choose a Global assignment method or choose Custom to specify a power assignment.

WLAN Override

Choose Disable or Enable from the drop-down list. The access point must be reset for the WLAN override change to take effect.

Tracking Optimized Monitor Mode

Select to enable.

Antenna Selection

Select the Antenna Selection check box, then select the appropriate antennas from the list.

CleanAir

Select to enable.


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> Mesh

Lightweight AP Configuration Templates> 802.11a/n

Lightweight AP Configuration Templates > 802.11a SubBand

Lightweight AP Configuration Templates > CDP

Lightweight AP Configuration Templates >FlexConnect

Lightweight AP Configuration Templates > Select APs

Lightweight AP Configuration Templates > Report

Lightweight AP Configuration Templates > CDP

Table 31-54 describes the fields on the Design > Wireless Configuration > Lightweight AP Configuration Templates > 802.11b/g/n page.

Table 31-54 Lightweight AP Configuration Templates > CDP  

Field
Description

Cisco Discovery Protocol on Ethernet Interfaces

Select the check boxes for the ethernet interface slots for which you want to enable CDP.

Cisco Discovery Protocol on Radio Interfaces

Select the checkbox for the radio interfaces slots for which you want to enable CDP.


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> Mesh

Lightweight AP Configuration Templates> 802.11a/n

Lightweight AP Configuration Templates > 802.11a SubBand

Lightweight AP Configuration Templates > 802.11b/g/n

Lightweight AP Configuration Templates >FlexConnect

Lightweight AP Configuration Templates > Select APs

Lightweight AP Configuration Templates > Report

Lightweight AP Configuration Templates >FlexConnect

Table 31-55 describes the fields on the Lightweight AP Template Details > FlexConnect page.

Table 31-55 Lightweight AP Configuration Templates > FlexConnect  

Field
Description

FlexConnect Configuration

Select the check box to enable FlexConnect configuration (including VLAN support, native VLAN ID, and profile name VLAN mappings).

Note These options are only available for access points in FlexConnect mode.

OfficeExtend

The default is Enabled.

Unselecting the check box simply disables OfficeExtend mode for this access point. It does not undo all of the configuration settings on the access point. If you want to clear the access point configuration and return it to factory default settings, click Clear Config at the bottom of the access point details page. If you want to clear only the access point personal SSID, click Reset Personal SSID at the bottom of the access point details page.

When you select Enable for the OfficeExtend AP, several configuration changes automatically occur including: encryption and link latency are enabled; rogue detection, SSH access, and Telnet access are disabled.

When you enable the OfficeExtend access point, you must configure at least one primary, secondary, and tertiary controller (including name and IP address).

Least Latency Controller Join

When enabled, the access point switches from a priority order search (primary, secondary, and then tertiary controller) to a search for the controller with the best latency measurement (least latency). The controller with the least latency provides the best performance.

The access point only performs this search once when it initially joins the controller. It does not recalculate the latency measurements of primary, secondary, and tertiary controllers once joined to see if the measurements have changed.

Native VLAN ID

The valid native VLAN ID range is 1 to 4094. If you are changing the mode to REAP and if the access point is not already in REAP mode, then all other REAP parameters are not applied on the access point.

VLAN ID ACL Mapping

Enter a VLAN ID and choose the Ingress and Egress ACLs from the drop-down list boxes to map to the VLAN ID specified.

WebAuth ACL Mapping

Enter a WLAN ID and choose the WLAN Profile and WebAuth ACLs from the drop-down list boxes to map to the WLAN ID specified.

WebPolicy ACL Mapping

Choose a WebPolicy ACL from the drop-down list boxes.

Local Split ACL Mapping

Choose a WLAN Profile and Local Split ACL from the drop-down list boxes to map to.


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> Mesh

Lightweight AP Configuration Templates> 802.11a/n

Lightweight AP Configuration Templates > 802.11a SubBand

Lightweight AP Configuration Templates > 802.11b/g/n

Lightweight AP Configuration Templates > CDP

Lightweight AP Configuration Templates > Select APs

Lightweight AP Configuration Templates > Report

Lightweight AP Configuration Templates > Select APs

Table 31-56 describes the fields on the Lightweight AP Template Details > Select APs page.

Table 31-56 Lightweight AP Configuration Templates > Select APs 

Field
Description

Search

Use the Search APs drop-down list to search for and select the APs to which to apply the configuration template:

Last Applied AP(s)

Scheduled AP(s)

All

All Mesh MAP AP(s)

All Mesh RAP AP(s)

You can also search by the following indices, and will be prompted for additional information as described in the fields below:

By Controller

By Controller Name

By Floor Area

By Outdoor Area

By Model

By AP MAC Address

By AP Name,

By AP IP Address Range

Controller

Choose the controller from the drop-down list.

Controller Name

Choose the controller name from the drop-down list

Campus

Choose the campus from the drop-down list.

Building

Choose the building from the drop-down list.

FLoor Area

Choose the floor area from the drop-down list.

Outdoor Area

Choose the outdoor area from the drop-down list.

Models

Choose the model from the drop-down list.

AP MAC Address

Enter the access point MAC address.

AP Name

Enter the complete AP name or the starting characters of the name.

IP Address Range

Enter the range of AP IPv4 addresses. The input text for IP address search can be of two formats X.X.X.* or X.X.X.[0-255]. For example, 10.10.10.* or 10.10.10.[20-50] searches the APs in 10.10.10.10 to 10.10.10.50 IP address range.


Lightweight AP Configuration Templates > Apply/Schedule

Table 31-57 describes the fields on the Lightweight AP Template Details > Apply/Schedule page.

Table 31-57 Lightweight AP Configuration Templates > Select APs 

Field
Description

Schedule

Select the check box to enable scheduling

Start Date

Enter the start date for the scheduled template application, or select the start date by clicking on the calendar icon.

Start Time

Select the starting hour and minute

Recurrence

Select the range of recurrence for this schedule: Daily, Weekly, Hourly, or No Recurrence.


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> Mesh

Lightweight AP Configuration Templates> 802.11a/n

Lightweight AP Configuration Templates > 802.11a SubBand

Lightweight AP Configuration Templates > 802.11b/g/n

Lightweight AP Configuration Templates > CDP

Lightweight AP Configuration Templates >FlexConnect

Lightweight AP Configuration Templates > Report

Lightweight AP Configuration Templates > Report

Table 31-58 describes the fields on the Lightweight AP Template Details > Report page.

Table 31-58 Lightweight AP Configuration Templates > Report  

Field
Description

AP Name

The name of the applicable access point.

Status

Indicates whether the report run was a success, partial failure, failure, or not initiated. For failed or partially failed provisioning, click Details to view the failure details (including what failed and why it failed).

Ethernet MAC

Indicates the Ethernet MAC address for the applicable access point.

Controller

Indicates the controller IP address for the applicable access point.

Map

Identifies a map location for the access point.


Related Topics

Lightweight AP Configuration Templates> AP Parameters

Lightweight AP Configuration Templates> Mesh

Lightweight AP Configuration Templates> 802.11a/n

Lightweight AP Configuration Templates > 802.11a SubBand

Lightweight AP Configuration Templates > 802.11b/g/n

Lightweight AP Configuration Templates > CDP

Lightweight AP Configuration Templates >FlexConnect

Lightweight AP Configuration Templates > Select APs

Autonomous AP Migration Templates

Table 31-59 describes the fields on the following page: Design > Wireless Configuration > Autonomous AP Migration Templates.

Table 31-59 Autonomous AP Migration Templates  

Field
Description

Name

Template name.

Description

Enter a description of the template.

DHCP Support

Ensures that after the conversion every access point gets an IP from the DHCP server.

Retain AP HostName

Allows you to retain the same hostname for this access point.

The hostname is retained in the CAPWAP, only when you are migrating the AP to CAPWAP for the first time. It might not be retained if you are upgrading an AP for several times. The CAPWAP access points hostname is set to default if autonomous access points hostname has more than 32 characters.

If you upgrade the access points to LWAPP from 12.3(11)JA, 12.3(11)JA1, 12.3(11)JA2, 12.3(11)JA3 autonomous images, the converted access points might not retain their Static IP Address, Netmask, Hostname and Default Gateway.

Migrate over WANLink

Increases the default timeouts for the CLI commands executed on the access point.

If you enable this option, the env_vars file stores the remote TFTP server location. This information is copied to the access point. If this option is not selected, then the Prime Infrastructure internal TFTP server is used to copy the env_vars file to the access point.

DNS Address

Enter the DNS address.

Domain Name

Enter the domain name.

Controller IP

Enter controller IP address.

AP Manager IP

Specify the controller the access point should join by entering the access point manager IP address.

For SSC-enabled access points, this IP address must be the same as the controller IP field. For MIC-enabled access points, the IP addresses need not match.

User Name

Enter user name.

Password

Enter password for the user name.

TFTP Server IP

Enter the IP address of the Prime Infrastructure server. Prime Infrastructure provides its own TFTP and FTP server during the installation and setup

File Path

Enter the TFTP directory which was defined during Prime Infrastructure setup.

File Name

Enter the CAPWAP conversion file defined in the TFTP directory during Prime Infrastructure setup (for example, c1240-rcvk9w8-tar.123-11JX1.tar).

Apply Template

Choose an option by which you want to apply the template for migration.

Notification

Enter the email address of recipient to send notifications.


Designing Mobility Services Engine Field Description

The following section contains field descriptions for designing mobility services engine:

Mobility Services Engine Page Field Description

High Availability Field Description

Adding Trap Destinations for a mobility services engine

Adding User to a mobility services engine

Adding User Groups

Provisioning MSAP service advertisement

Mobility Services Engine Page Field Description

The following section contains field description for pages found in Design > Mobility Services > Mobility Services Engine page.

Mobility Services Engine Page Field Description

Mobility Services Engine > Select a command > Add Location Server

Mobility Services Engine > Select a command > Add Location Server

Table 31-60 describes the fields on the Design > Mobility Services > Mobility Services Engine > Select a command > Add Location Server page.

Table 31-60 Add Location Server

Field
Description

Device Name

Device Name of the mobility services engine

IP Address

IP address of the mobility services engine.

Contact Name

The mobility service engine administrator.

User Name

The default username is admin. This is Prime Infrastructure communication username configured for MSE.

Password

The default password is admin.This is Prime Infrastructure communication password configured for MSE.

Port

Port number of the mobility services engines device.

HTTPS

When enabled, HTTPS is used for communication between Prime Infrastructure and location server.


Mobility Services Engine > Select a command > Add Mobility Services Engine

Table 31-61 describes the fields on the Design > Mobility Services > Mobility Services Engine > Select a command > Add a Mobility Services Engine page.

Table 31-61 Add a Mobility Services Engine

Field
Description

Device Name

User-assigned name for the mobility services engine.

IP Address

The IP address of the mobility service engine.

Contact Name

The mobility services engine administrator.

Username

The default username is admin. This is Prime Infrastructure communication username configured for MSE.

Password

The default password is admin.This is Prime Infrastructure communication password configured for MSE.

HTTP

When enabled, HTTP is used for communication between Prime Infrastructure and mobility services engine. By default, Prime Infrastructure uses HTTPS to communicate with MSE.


Mobility Services Engine Database Synchronization

Table 31-61 describes the fields on the Administration > Background Task > Mobility Service Synchronization link > Task > Mobility Service Synchronization > Select a command > Add a Mobility Services Engine page.

Table 31-62 Add a Mobility Services Engine

Field
Description

Device Name

User-assigned name for the mobility services engine.

IP Address

The IP address of the mobility service engine.

Contact Name

The mobility services engine administrator.

Username

The default username is admin. This is Prime Infrastructure communication username configured for MSE.

Password

The default password is admin.This is Prime Infrastructure communication password configured for MSE.

HTTP

When enabled, HTTP is used for communication between Prime Infrastructure and mobility services engine. By default, Prime Infrastructure uses HTTPS to communicate with MSE.


High Availability Field Description

Table 31-63 describes the fields on the Design > Mobility Services > High Availability page.

Table 31-63 Configuring High Availability

Field
Description

Device Name

Secondary device name with which you want to pair the primary MSE.

IP Address

Secondary IP address which is the health monitor IP address of the secondary MSE.

Contact Name

The mobility services engine administrator.

Failover Type

Specify the failover type. You can choose either Manual or Automatic. After 10 seconds, the system fails over. The secondary server waits for a maximum of 10 seconds for the next heartbeat from the primary server. If it does not get the heartbeat in 10 seconds, it declares a failure.

Failback Type

Specify the failback type. It can be either Manual or Automatic.

Long Failover Wait

Specify the long failover wait in seconds. After 10 seconds, the system fails over. The maximum failover wait is 2 seconds.


Adding Trap Destinations for a mobility services engine

Table 31-64 describes the fields on the Design > Mobility Services > Device Name > System > Trap Destinations > Add Trap Destinations page.

Table 31-64 Add Trap Destination

Field
Description

IP Address

IP address of the trap destination

Port No.

Port number for the trap destination. The default port number is 162.

Destination Type

This field is not editable and has a value of Other.

SNMP Version

Select either v2c or v3.

The following set of fields appear only if you select v3 as the SNMP version.

User Name

Username for the SNMP Version 3.

Security Name

Security name for the SNMP Version 3.

Authentication Type

Select one of the following:

HMAC-MD5

HMAC-SHA

Authentication Password

Authentication password for the SNMP Version 3.

Privacy Type

Select one of the following:

CBC-DES

CFB-AES-128

CFB-AES-192

CFB-AES-256

Privacy Password

Privacy password for the SNMP Version 3.


s

Adding User to a mobility services engine

Table 31-65 describes the fields on the Design > Mobility Services > Mobility Services Engine > Device Name > Systems Account > Users > Select a command > Add User page.

Table 31-65 Add User

Field
Description

Username

Enter the username

Password

Enter the password

Confirm Password

Re-enter the password

Group Name

Group name to which the user belongs

Permission Level

Choose a permission level. There are three permission levels to choose from: Read Access, Write Access, and Full Access (required for Prime Infrastructure to access a mobility services engine).


Adding User Groups

Table 31-61 describes the fields on the Design > Mobility Services > Mobility Services Engine > Device > Systems > Accounts > Users > Select a Command > Add Group page.

Table 31-66 Design > Mobility Services > Mobility Services Engine > Device Name > Systems > Accounts > Users > Select a command > Add Group

Field
Description

Group Name

Enter the name of the group.

Permission Level

Choose a permission level. There are three permission levels to choose from: Read Access, Write Access, and Full Access (required for Prime Infrastructure to access a mobility services engine).


Provisioning MSAP service advertisement

Table 31-67 describes the fields on the Design > Mobility Services > MSAP > Select a command > Add Service Advertisement page.

Table 31-67 Design > Mobility Services > MSAP > Select a command > Add Service Advertisement

Field
Description

General

Provider Name

Enter the service provider name. It is the name of the provider who wants to provide advertisements to the client.

Icon

Select an icon that is associated with the service provider by clicking the Choose File. This is the icon that is displayed on the client handset.

Venue Name

Enter the venue name at which you want the advertisements to be broadcasted on.

Area Type

Choose the area type where you want to display the service advertisements.

Campus

Choose the campus type where you want to display the service advertisements.

Building

Choose the building name where you want the advertisements to appear.

Floor

Choose the floor type.

Coverage Area

Choose the coverage area.

Selected Map

Shows the selected map position.

SSID

Choose SSIDs on which you want to broadcast the service advertisements.

Display Rule

You can select either the Display everywhere or Display near selected APs radio button. By default, Display everywhere radio button is selected.

Advertisement

Friendly Name

Enter the service description.

Advertisement Type

Choose the type of advertisement you want to display.


Wireless Operational Tools Field Descriptions

The following sections contain field descriptions for pages found in Operate > Operational Tools > Wireless:

Guest User Controller Templates Field Descriptions

Voice Audit Field Descriptions

Voice Diagnostic Field Descriptions

Guest User Controller Templates Field Descriptions

The following tables describe the fields on the Operate > Operational Tools > Wireless > Guest User > Add Guest User > New Controller Template page:

Table 31-68—General Tab

Table 31-69—Advanced Tab

Guest User > Add Guest User > New Controller Template > General Tab

Table 31-68 describes the fields on the Operate > Operational Tools > Wireless > Guest User > Add Guest User > New Controller Template > General page.

Table 31-68 Guest User > Add Guest User > New Controller Template > General Tab Field Descriptions  

Field
Description

User Name

Enter a guest username. The maximum size is 24 characters.

Generate Password

Select the check box to generate a username and password on every schedule of guest user account creation. If this is enabled, a different password is supplied for each day (up to the number of days chosen). If this is disabled (unselected), one password is supplied for a span of days. The generation of a new password on every schedule is optional.

Password

Enter a password. Password requirements include the following:

The password must have a minimum of eight characters.

The password must include at least three of the following elements: lowercase letters, uppercase letters, numbers, or special characters.

Confirm Password

Reenter the password that you entered in the Password field.

Description

Enter a description of the guest user template.

Disclaimer

The default disclaimer text.

Make this Disclaimer Default

Select the check box to make the disclaimer text as default for this guest user template.


Guest User > Add Guest User > New Controller Template > Advanced Tab

Table 31-69 describes the fields on the Operate > Operational Tools > Wireless > Guest User > Add Guest User > New Controller Template > Advanced page.

Table 31-69 Guest User > Add Guest User > New Controller Template > Advanced Tab Field Descriptions  

Field
Description

Import From File

Select the check box to import bulk guest user templates.

Profile

Select the profile to which the guest users would connect.

User Role

Choose a user role for the guest user from the drop-down list. User roles are predefined by the administrator and are associated with the access of the guest (such as contractor, customer, partner, vendor, visitor, and so on).

User Role is used to manage the amount of bandwidth allocated to specific users within the network.

Life Time

Define how long the guest user account remains active by choosing one of the following options:

Limited—Choose the period of time that the guest user account is active using the hours and minutes drop-down lists. The default value for Limited is one day (8 hours).

Unlimited—There is no expiration date for the guest account.

Apply to

From the drop-down list, choose one of the following:

Indoor Area—Campus, Building, and Floor.

Outdoor Area—Campus, Outdoor Area.

Controller List—List of controller(s) on which the selected profile is created.

Config Groups—Config group names configured on Prime Infrastructure.


Voice Audit Field Descriptions

The following tables describe the fields on the Operate > Operational Tools > Wireless > Voice Audit page:

Table 31-70—Controllers Tab

Table 31-71—Rules Tab

Table 31-72—Report Tab

Voice Audit > Controller Tab

Table 31-70 describes the fields on the Operate > Operational Tools > Wireless > Voice Audit > Controller page.

Table 31-70 Voice Audit > Controller Tab Field Descriptions  

Field
Description

Run audit on

Choose one of the following options:

All Controllers—No additional Controller information is necessary.

A Floor Area—From the drop-down lists, choose the applicable campus, building, floor, and controller.

A Single Controller—Choose the applicable controller from the drop-down list.


Voice Audit > Rules Tab

Table 31-71 describes the fields on the Operate > Operational Tools > Wireless > Voice Audit > Rules page.

Table 31-71 Voice Audit > Rules Tab Field Descriptions  

Rule
Rule Details

VoWLAN SSID

Description—Checks whether or not the VoWLAN SSID exists.

Rule validity—User-defined VoWLAN SSID.

CAC: 7920

Description—Checks whether or not 7920 AP CAC is enabled for VoWLAN.

Rule validity—User-defined VoWLAN SSID.

CAC: 7920 Clients

Description—Checks whether or not the 7920 Client CAC is disabled for VoWLAN.

Rule validity—User-defined VoWLAN SSID.

DHCP Assignment

Description—Checks whether or not DHCP assignment is disabled for VoWLAN.

Rule validity—User-defined VoWLAN SSID.

MFP Client

Description—Checks whether or not MFP Client protection is not set to Required for VoWLAN.

Rule validity—User-defined VoWLAN SSID.

Platinum QoS

Description—Checks whether or not QoS is set to Platinum (Voice) for VoWLAN.

Rule validity—User-defined VoWLAN SSID.

Non Platinum QoS

Description—Checks that QoS is not set to Platinum for non-VoWLAN.

Rule validity—User-defined VoWLAN SSID.

WMM

Description—Checks whether or not WMM is enabled for VoWLAN.

Rule data—Choose Allowed or Required from the drop-down list.

Rule validity—User-defined VoWLAN SSID.

CCKM

Description—Checks whether or not CCKM is enabled for VoWLAN.

Rule validity—User-defined VoWLAN SSID.

CCKM With No AES- for 792x phones

Description—Check that AES encryption is not enabled with Cisco Centralized Key Management (CCKM) for VoWLAN. This rule is only for 792x phones.

Rule validity—User-defined VoWLAN SSID.

TSM

Description—Check that Traffic Stream Metrics (TSM) is Enabled.

Rule data—Choose 802.11a/n TSM, 802.11b/g/n TSM, or both check boxes.

Rule validity—At least one band must be selected.

DFS

Description—Checks whether the Channel Announcement and Channel Quite Mode are Enabled for Dynamic Frequency Selection (DFS).

ACM

Description—Checks whether or not Admission Control is enabled.

Rule data—Choose 802.11a/n ACM, 802.11b/g/n ACM, or both check boxes.

Rule validity—At least one band must be selected.

DTPC

Description—Checks whether or not Dynamic Transmit Power Control is enabled.

Rule data—Select 802.11a/n DTPC, 802.11b/g/n DTPC, or both check boxes.

Rule validity—At least one band must be selected.

Expedited Bandwidth

Description—Checks whether or not Expedited Bandwidth is enabled.

Rule data—Select 802.11a/n Expedited Bandwidth, 802.11b/g/n Expedited Bandwidth, or both check boxes.

Rule validity—At least one band must be selected.

Load Based CAC

Description—Checks whether or not Load Based Admission Control (CAC) is enabled.

Rule data—Select 802.11a/n Load Based CAC, 802.11b/g/n Load Based CAC (LBCAC), or both check boxes.

Rule validity—At least one band must be selected.

CAC: Max Bandwidth

Description—Checks whether or not Maximum RF Bandwidth for Call Admission Control is configured properly.

Rule data—Enter percentages in the text boxes for Maximum Allowed Bandwidth for 802.11a/n and 802.11b/g/n.

Rule validity—Data for at least one band must be provided. The valid range is 0—100%.

CAC: Reserved Roaming Bandwidth

Description—Checks whether or not Reserved Roaming Bandwidth for Call Admission Control is configured properly.

Rule data—Enter percentages in the text boxes for Maximum Reserved Roaming Bandwidth for 802.11a/n and 802.11b/g/n.

Rule validity—Data for at least one band must be provided. The valid range is 0—100%.

Pico Cell mode

Description—Checks whether or not Pico Cell mode is disabled.

Rule data—Select 802.11a/n Pico Cell mode, 802.11b/g/n Pico Cell mode, or both check boxes.

Rule validity—At least one band must be selected.

Beacon Period

Description—Checks whether or not Beacon Period is configured properly.

Rule data—Enter the time (ms) in the text boxes for Beacon Period for 11a/n and 11b/g/n.

Rule validity—Data for at least one band must be provided. The valid range is 20—1000. Enter 0 or keep it empty if a band should not be checked.

Short Preamble

Description—Checks whether or not Short Preamble is enabled for 11b/g.

Fragmentation Threshold

Description—Checks whether or not Fragmentation Threshold is configured properly.

Rule data—Enter the threshold amount (bytes) in the text boxes for Fragmentation Threshold for 11a/n and 11b/g/n.

Rule validity—Data for at least one band must be provided. The valid range is 256—2346. Enter 0 or keep it empty if a band should not be checked.

Data Rate

Description—Checks whether or not Data Rates are configured properly.

Data Rate configuration for 11b/g—Select Disabled, Supported, or Mandatory for each Mbps category.

Data Rate configuration for 11a—Select Disabled, Supported, or Mandatory for each Mbps category.

Aggressive Load Balancing

Description—Checks whether or not Aggressive Load Balancing is disable.

QoS Profile

Description—Checks that QoS Profiles are not altered from default values.

EAP Request Timeout

Description—Checks whether or not EAP Request Timeout is configured properly.

Rule data—Enter the time limit (sec) for the EAP Request Timeout.

Rule validity—Data cannot be left blank or as zero. The valid range is 1—120.

ARP Unicast

Description—Checks whether or not ARP Unicast is disabled.


Voice Audit > Report Tab

Table 31-72 describes the fields on the Operate > Operational Tools > Wireless > Voice Audit > Report page.

Table 31-72 Voice Audit > Report Tab Field Descriptions  

Field
Description

Audit Status

Indicates whether or not the audit is complete.

Start Time and End Time

Indicates the time at which the voice audit starts and ends.

# Total Devices

Indicates the number of devices involved in the voice audit.

# Completed Devices

Indicates the number of devices the tool attempted to audit.

Note If a controller is unreachable, the audit skips it. The Voice Audit does not complete any rule checks for that controller.

# Rules

Indicates the number of rules selected for the voice audit.

Report Results

IP Address

Indicates the IP address for the controller involved in the voice audit.

Rule

Indicates the rule that was applied for this controller.

Result

Indicates the result (Skipped, Violation, Unreachable) of the applied rule.

Note If there is no mismatch between the current configuration and a rule value, no results are displayed for that rule.

Details

Defines an explanation for the rule results.

Note If the applied rule results in a Violation, the Details link provides additional information including Name, the Device Value, and the Rule Value. Hover your mouse cursor over the link to view the additional details.

Time

Provides a timestamp for the voice audit.


Voice Diagnostic Field Descriptions

The following tables describe the fields on the Operate > Operational Tools > Wireless > Voice Diagnostic page:

Table 31-73—Voice Diagnostic Test List Page

Table 31-74—Voice Diagnostic Test Report Page

Voice Diagnostic Test List Page

Table 31-73 describes the fields on the Operate > Operational Tools > Wireless > Voice Diagnostic page.

Table 31-73 Voice Diagnostic Test List Page Field Descriptions  

Field
Description

Test Name

Name of the test.

Duration of Test (Minutes)

The duration for which the test is performed. The duration can be either 10, 20, 30, 40, 50, or 60 minutes. The default selection is 10 minutes.

First Client

Displays the First Client details such as the Client MAC address and all the controllers provisioned for the client and if the controllers are not reachable then the failed provisioned controllers are also listed.

Second Client

Displays the Second Client details (if any) such as the Client MAC address and all the controllers provisioned for the client and if the controllers are not reachable then the failed provisioned controllers are also listed.

Start Time

The time when the test was started.

Remaining Time

The time remaining for the test.

State

The state of the test. It can be one of the four states, Running, Completed, Stopped or Aborted.

Problem

The status of the test. Red indicates a problem was discovered in the test. Green indicates the voice diagnostic test that no problems were discovered during the call.


Voice Diagnostic Test Report Page

Table 31-74 describes the tabs on the Operate > Operational Tools > Wireless > Voice Diagnostic Test Report page.

Table 31-74 Voice Diagnostic Test Report Page Tab Descriptions  

Tab
Description
Summary

This tab is divided into three areas where top area displays the test and client details, the middle area displays the problems, and the bottom area displays the corresponding log messages.

Test and Client Details

The test status displays the test details like the Test Name, First Client MAC address, Second Client MAC address, device type, test status, start time, remaining time and the duration of the test. Restart if the test was stopped or completed the test. A stop button is provided to Stop the running test. The Refresh Status Tab and Refresh Client Tab buttons is used to refresh the status and client details. The client details such as the client user name, IP address, MAC address, Vendor, CCX Version, 802.11 state, protocol, SSID, profile-name, and AP details are displayed. You can click the Client MAC address for more client details.

Problems

The Problems pane appears below the test and client status details pane, This pane displays all the problems regarding the current diagnosis. This pane is updated every 5 seconds independently. There is no need to refresh the whole page. You can sort the information in this pane by clicking on any of the pane columns. A pop-up dialog box appears with the Problem detailed description and Suggested action when you click any row of the Problems pane.

Note In some cases of inter controller roaming failure, the MAC address in the From AP information is incorrect and may appear as "00:00:00:00:00:00".

Logs

The Logs pane appears below the Problems pane. This pane displays all the messages exchanged between the controller and the WCS during this diagnosis. You can sort the information in this pane by clicking on any of the pane columns. This pane is updated every 5 sec independently without refreshing the whole page.

Charts

This tab displays the charts for each client's uplink and downlink traffic. The charts will be updated every 10 secs.

Client Uplink and DownLink TSM Chart with Roaming

The Client Uplink Traffic Stream Metric (TSM) chart shows the clients which support CCX V4 and above. The TSM data is plotted for every 10 sec. The TSM Chart displays the metrics for a set of series, that can be enabled or disabled using the Select Series button in the chart.

Client Uplink and DownLink QoS Chart

For each interval, QoS will be calculated and shown on the chart. represents the Client Uplink QoS chart.This pie chart provides the total Qos Chart counts and its distribution in three categories. These categories generally indicate the quality of a voice call.

Average Uplink and Downlink AC Queue

The AC Queue displays the type of packets and the number of packets for a series. You can enable or disable the series using the Select Series button.

Roam History

This tab shows the roaming history information in the Roaming Table. This Roaming table displays both the successful and the failed roaming history. The roaming table provides the following information:

Time at which the roaming of the client happened

The name of the AP from which the client moved

The type of Radio from which the client moved

The IP address of the controller from which the client moved

The name of the AP to which the client moved

The IP address of the controller to which the client moved

The type of radio to which the client moved

The roaming result, whether it was successful or a failure

If it was a failure it also provides the reason to the failure

Events

The Event tab shows the event history related to client and AP during a voice call in a list. It will show last 10 events. There is two Event tables available, Client Events and AP Events. Client Specific events during the voice call is shown in the Client Events table and AP Specific events in shown in the AP Event table.


Switch Location Configuration Templates

Table 31-75 describes the fields on the Design > Wireless Configuration > Switch Location Configuration page.

Table 31-75 Switch Location Configuration Template Page Field Descriptions  

Field
Description
General

Template Name

 

Map Location

Campus

Choose a campus for the map location for a switch/switch port.

Building

Choose a building for the map location for a switch/switch port.

Floor

Choose a floor for the map location for a switch/switch port.

Import

Imports the civic information for the campus, building, and floor selected.

ELIN and Civic Location

ELIN

The Emergency Location Identification Number.

Civic Address tab

The available civic address information for the switch/switch port.

Advanced tab

Detailed information about the switch/switch port location.

NMSP

Select or unselect this check box to enable or disable NMSP for the switch.