Table Of Contents
Cisco Wireless LAN Controller
Command Reference
Using the ? command
Using the Help Command
Viewing Configurations
show 802.11a
show 802.11b
show 802.11h
show acl
show acl cpu
SHOW ADVANCED 802.11A COMMANDS
Show advanced 802.11a channel
show advanced 802.11a group
show advanced 802.11a logging
show advanced 802.11a monitor
show advanced 802.11a profile
show advanced 802.11a receiver
show advanced 802.11a summary
show advanced 802.11a txpower
SHOW ADVANCED 802.11B COMMANDS
show advanced 802.11b channel
show advanced 802.11b group
show advanced 802.11b logging
show advanced 802.11b monitor
show advanced 802.11b profile
show advanced 802.11b receiver
show advanced 802.11b summary
show advanced 802.11b txpower
show advanced client-handoff
show advanced eap
show advanced max-1x-sessions
show advanced probe-limit
show advanced rate
show advanced send-disassoc-on-handoff
show advanced statistics
show advanced timers
SHOW AP COMMANDS
show ap auto-rf
show ap bmode
show ap bhrate
show ap config
show ap core-dump
show ap crash-file
show ap stats
show ap summary
show ap wlan
show arp switch
show auth-list
show boot
SHOW CERTIFICATE COMMANDS
show certificate compatibility
show certificate summary
SHOW CLIENT COMMANDS
show client ap
show client detail
show client summary
show client username
show country
show cpu
show custom-web
show database summary
show debug
show dhcp
show dhcp proxy
show eventlog
show exclusionlist
show ike
show interface
show inventory
show ipsec
show known ap
show l2tp
show load-balancing
show location summary
show loginsession
show macfilter
SHOW MESH COMMANDS
show mesh linkrate
show mesh neigh
show mesh path
show mesh stats
show mesh summary
show mgmtuser
SHOW MOBILITY COMMANDS
show mobility anchor
show mobility statistics
show mobility summary
show msglog
show nac statistics
show nac summary
show netuser
show network
show pmk-cache
show port
show qos queue_length all
SHOW RADIUS COMMANDS
show radius acct statistics
show radius auth statistics
show radius rfc3576 statistics
show radius summary
SHOW RFID COMMANDS
show rfid config
show rfid detail
show rfid summary
SHOW ROGUE ADHOC COMMANDS
show rogue adhoc detailed
show rogue adhoc summary
SHOW ROGUE AP COMMANDS
show rogue ap clients
show rogue ap detailed
show rogue ap summary
SHOW ROGUE CLIENT COMMANDS
show rogue client detailed
show rogue client summary
show route summary
show rules
show run-config
show serial
show sessions
show snmpcommunity
show snmptrap
show snmpv3user
show snmpversion
show spanningtree port
show spanningtree switch
SHOW STATS COMMANDS
show stats port
show stats switch
show switchconfig
show sysinfo
show syslog
show tech-support
show time
show trapflags
show traplog
show watchlist
show wlan
show wps
Setting Configurations
CONFIG 802.11A COMMANDS
config 802.11a antenna extAntGain
config 802.11a antenna diversity
config 802.11a antenna mode
config 802.11a antenna selection
config 802.11a beaconperiod
config 802.11a channel
config 802.11a disable
config 802.11a dtim
config 802.11a dtpc
config 802.11a enable
config 802.11a fragmentation
config 802.11a pico-cell
config 802.11a rate
config 802.11a txPower
CONFIG 802.11B COMMANDS
config 802.11b 11gSupport
config 802.11b antenna diversity
config 802.11b antenna extAntGain
config 802.11b antenna selection
config 802.11b beaconperiod
config 802.11b channel
config 802.11b disable
config 802.11b dtim
config 802.11b dtpc
config 802.11b enable
config 802.11b fragmentation
config 802.11b pico-cell
config 802.11b preamble
config 802.11b rate
config 802.11b txPower
CONFIG 802.11h COMMANDS
config 802.11h channelswitch
config 802.11h powerconstraint
config 802.11h setchannel
config acl apply
config acl create
config acl cpu
config acl delete
config acl rule
CONFIG ADVANCED 802.11A COMMANDS
config advanced 802.11a channel foreign
config advanced 802.11a channel load
config advanced 802.11a channel noise
config advanced 802.11a channel update
config advanced 802.11a factory
config advanced 802.11a group-mode
config advanced 802.11a logging channel
config advanced 802.11a logging coverage
config advanced 802.11a logging foreign
config advanced 802.11a logging load
config advanced 802.11a logging noise
config advanced 802.11a logging performance
config advanced 802.11a logging txpower
config advanced 802.11a monitor channel-list
config advanced 802.11a monitor coverage
config advanced 802.11a monitor load
config advanced 802.11a monitor mode
config advanced 802.11a monitor noise
config advanced 802.11a monitor signal
config advanced 802.11a profile clients
config advanced 802.11a profile coverage
config advanced 802.11a profile customize
config advanced 802.11a profile exception
config advanced 802.11a profile foreign
config advanced 802.11a profile level
config advanced 802.11a profile noise
config advanced 802.11a profile throughput
config advanced 802.11a profile utilization
config advanced 802.11a receiver
config advanced 802.11a txpower-update
CONFIG ADVANCED 802.11B COMMANDS
config advanced 802.11b 7920VSIEConfig
config advanced 802.11b channel foreign
config advanced 802.11b channel load
config advanced 802.11b channel noise
config advanced 802.11b channel update
config advanced 802.11b factory
config advanced 802.11b group-mode
config advanced 802.11b logging channel
config advanced 802.11b logging coverage
config advanced 802.11b logging foreign
config advanced 802.11b logging load
config advanced 802.11b logging noise
config advanced 802.11b logging performance
config advanced 802.11b logging txpower
config advanced 802.11b monitor channel-list
config advanced 802.11b monitor coverage
config advanced 802.11b monitor load
config advanced 802.11b monitor mode
config advanced 802.11b monitor noise
config advanced 802.11b monitor signal
config advanced 802.11b profile clients
config advanced 802.11b profile coverage
config advanced 802.11b profile customize
config advanced 802.11b profile exception
config advanced 802.11b profile foreign
config advanced 802.11b profile level
config advanced 802.11b profile noise
config advanced 802.11b profile throughput
config advanced 802.11b profile utilization
config advanced 802.11b receiver
config advanced 802.11b txpower-update
config advanced client-handoff
config advanced statistics
CONFIG ADVANCED TIMERS COMMANDS
config advanced timers ap-discovery-timeout
config advanced timers ap-heartbeat-timeout
config advanced timers auth-timeout
config advanced timers eap-timeout
config advanced timers eap-identity-request-delay
CONFIG AP COMMANDS
config ap add
config ap bhmode
config ap bhrate
config ap bridgegroupname
config ap bridging
config ap core-dump
config ap crash-file clear-all
config ap crash-file delete
config ap crash-file get-crash-file
config ap crash-file get-radio-core-dump
config ap delete
config ap disable
config ap enable
config ap group-name
config ap led-state
config ap location
config ap mode
config ap name
config ap port
config ap power injector
config ap power pre-standard
config ap primary-base
config ap remote-debug
config ap reporting-period
config ap reset
config ap role
config ap rst-button
config ap secondary-base
config ap sniff 802.11a
config ap sniff 802.11b
config ap static-ip
config ap stats-timer
config ap tertiary-base
config ap tftp-downgrade
config ap wlan
config ap username
config auth-list add
config auth-list ap-policy
config auth-list delete
config boot
config certificate
config client deauthenticate
config country
config custom-web ext-webauth-mode
config custom-web ext-webauth-url
config custom-web ext-webserver
config custom-web redirectUrl
config custom-web weblogo
config custom-web webmessage
config custom-web webtitle
config database size
config dhcp
config dhcp proxy
config exclusionlist
CONFIG INTERFACE COMMANDS
config interface acl
config interface address
config interface ap-manager
config interface create
config interface delete
config interface dhcp
config interface hostname
config interface port
config interface vlan
config known ap
config load-balancing
config location add
config location delete
config location description
config location disable
config location enable
config location interface-mapping
config loginsession close
CONFIG MACFILTER COMMANDS
config macfilter add
config macfilter delete
config macfilter description
config macfilter ip-address
config macfilter interface
config macfilter mac-delimiter
config macfilter radius-compat
config macfilter wlan-id
CONFIG MGMTUSER COMMANDS
config mgmtuser add
config mgmtuser delete
config mgmtuser description
config mgmtuser password
CONFIG MOBILITY COMMANDS
config mobility group anchor
config mobility group domain
config mobility group member
config mobility secure-mode
config mobility statistics reset
CONFIG MSGLOG LEVEL COMMANDS
config msglog level critical
config msglog level error
config msglog level security
config msglog level verbose
config msglog level warning
config nac acl
config nac add
config nac delete
config nac disable
config nac enable
CONFIG NETUSER COMMANDS
config netuser add
config netuser delete
config netuser description
config netuser maxUserLogin
config netuser password
config netuser wlan-id
CONFIG NETWORK COMMANDS
config network allow-old-bridge-aps
config network ap-fallback
config network apple-talk
config network arptimeout
config network arpunicast
config network bridging-shared-secret
config network fast-ssid-change
config network master-base
config network mgmt-via-wireless
config network multicast
config network otap-mode
config network peer-blocking
config network rf-network-name
config network secureweb
config network ssh
config network telnet
config network usertimeout
config network web-auth-port
config network webmode
config network zero-config
config pmk-cache delete
CONFIG PORT COMMANDS
config port adminmode
config port autoneg
config port linktrap
config port multicast appliance
config port physicalmode
config port power
config prompt
config qos queue_length
CONFIG RADIUS ACCT COMMANDS
config radius acct add
config radius acct delete
config radius acct disable
config radius acct enable
config radius acct network
config radius acct ipsec authentication
config radius acct ipsec disable
config radius acct ipsec enable
config radius acct ipsec encryption
config radius acct ipsec ike
config radius acct retransmit-timeout
CONFIG RADIUS AUTH COMMANDS
config radius auth add
config radius auth delete
config radius auth disable
config radius auth enable
config radius auth ipsec authentication
config radius auth ipsec disable
config radius auth ipsec enable
config radius auth ipsec encryption
config radius auth ipsec ike
config radius auth management
config radius auth network
config radius auth retransmit-timeout
config radius auth rfc3576
config radius backward compatibility
config radius callStationIdType
config rfid auto-timeout
config rfid status
config rfid timeout
config rogue adhoc
config rogue ap
config rogue client
config route add
config route delete
CONFIG SERIAL COMMANDS
config serial baudrate
config serial timeout
CONFIG SESSIONS COMMANDS
config sessions maxsessions
config sessions timeout
CONFIG SNMP COMMUNITY COMMANDS
config snmp community accessmode
config snmp community create
config snmp community delete
config snmp community ipaddr
config snmp community mode
config snmp syscontact
config snmp syslocation
CONFIG SNMP TRAPRECEIVER COMMANDS
config snmp trapreceiver create
config snmp trapreceiver delete
config snmp trapreceiver mode
CONFIG SNMP V3USER COMMANDS
config snmp v3user create
config snmp v3user delete
config snmp version
CONFIG SPANNINGTREE PORT COMMANDS
config spanningtree port mode
config spanningtree port pathcost
config spanningtree port priority
CONFIG SPANNINGTREE SWITCH COMMANDS
config spanningtree switch bridgepriority
config spanningtree switch forwarddelay
config spanningtree switch hellotime
config spanningtree switch maxage
config spanningtree switch mode
CONFIG SWITCHCONFIG COMMANDS
config switchconfig flowcontrol
config switchconfig mode
config syslog
config sysname
config time manual
config time ntp
config time timezone
CONFIG TRAPFLAGS COMMANDS
config trapflags 802.11-Security
config trapflags aaa
config trapflags ap
config trapflags authentication
config trapflags client
config trapflags configsave
config trapflags ipsec
config trapflags linkmode
config trapflags multiusers
config trapflags rogueap
config trapflags rrm-params
config trapflags rrm-profile
config trapflags stpmode
config trapflags wps
CONFIG WATCHLIST COMMANDS
config watchlist add
config watchlist delete
config watchlist disable
config watchlist enable
CONFIG WIRELESS LAN COMMANDS
config wlan 7920-support
config wlan 802.11e
config wlan aaa-override
config wlan broadcast-ssid
config wlan create
config wlan delete
config wlan dhcp_server
config wlan disable
config wlan enable
config wlan exclusionlist
config wlan interface
config wlan IPv6Support
config wlan mac-filtering
config wlan mobility
config wlan qos
config wlan radio
config wlan radius_server
CONFIG WIRELESS LAN SECURITY COMMANDS
config wlan security 802.1X
config wlan security cranite
config wlan security fortress
config wlan security ipsec disable
config wlan security ipsec enable
config wlan security ipsec authentication
config wlan security ipsec encryption
config wlan security ipsec config
config wlan security ipsec ike authentication
config wlan security ipsec ike dh-group
config wlan security ipsec ike lifetime
config wlan security ipsec ike phase1
config wlan security ipsec ike contivity
config wlan security passthru
config wlan security static-wep-key authentication
config wlan security static-wep-key disable
config wlan security static-wep-key enable
config wlan security static-wep-key encryption
config wlan security web-auth
config wlan security web-passthrough acl
config wlan security web-passthrough disable
config wlan security web-passthrough email-input
config wlan security web-passthrough enable
config wlan security wpa1 disable
config wlan security wpa1 enable
config wlan security wpa1 pre-shared-key
config wlan security wpa2 disable
config wlan security wpa2 enable
config wlan security wpa2 pre-shared-key
config wlan security wpa2 tkip
config wlan security wpa2 wpa-compat
config wlan timeout
config wlan wmm
Saving Configurations
save config
Clearing Configurations, Logfiles, and Other Actions
clear ap-config
clear arp
clear config
clear stats mobility
clear stats port
clear stats switch
clear redirect-url
clear transfer
clear traplog
clear webimage
clear webmessage
clear webtitle
clear ext-webauth-url
Uploading and Downloading Files and Configurations
transfer download certpassword
transfer download datatype
transfer download filename
transfer download mode
transfer download path
transfer download serverip
transfer download start
transfer download tftpPktTimeout
transfer download tftpMaxRetries
transfer encrypt
transfer upload datatype
transfer upload filename
transfer upload mode
transfer upload path
transfer upload serverip
transfer upload start
Troubleshooting
debug aaa
debug airewave-director
debug arp
debug bcast
debug crypto
debug dhcp
debug disable-all
debug dot11
debug dot1x
debug l2age
debug lwapp
debug mac
debug mobility
debug nac
debug ntp
debug pem
debug pm
debug poe
debug rbcp
debug snmp
debug transfer
debug wcp
debug wps
Cisco Wireless LAN Controller
Command Reference
The Cisco Wireless LAN Solution command line interface (CLI) enables operators to connect an ASCII console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
This document covers the commands available in the Cisco CLI release 4.0 on all the controllers listed in the Compatibility Matrix in Appendix A. This compatibility matrix allows the user to determine what commands operate on any individual controller. The controllers currently covered include:
•
WiSM
•
4400 series
•
WLCM
This chapter contains the following sections:
•
Using the ? command
•
Using the Help Command
•
Viewing Configurations
•
Setting Configurations
•
Clearing Configurations, Logfiles, and Other Actions
•
Uploading and Downloading Files and Configurations
•
Troubleshooting
Using the ? command
To display all of the commands in your current level of the command tree, or to display more information about a particular command, use the ? command.
?
command name ?
When you enter a command information request, put a space between command name and ?.
Examples
The following command shows you all the commands and levels available from the root level.
clear Clear selected configuration elements.
config Configure switch options and settings.
debug Manages system debug options.
linktest Perform a link test to a specified MAC address.
logout Exit this session. Any unsaved changes are lost.
ping Send ICMP echo packets to a specified IP address.
save Save switch configurations.
show Display switch options and settings.
transfer Transfer a file to or from the switch.
The following command shows you that datatype is the only entry at the transfer download level:
The following command shows you the permissible entries for the transfer download datatype command:
> transfer download datatype ?
config Download Configuration File.
code Download an executable image to the system.
image Download a web page logo to the system.
signature Download a signature file to the system.
webadmincert Download a certificate for web administration to the system.
webauthcert Download a web certificate for web portal to the system.
Using the Help Command
To look up keyboard commands, use the help command at the root level.
help
Examples
DEL, BS... delete previous character
Ctrl-A .... go to beginning of line
Ctrl-E .... go to end of line
Ctrl-F .... go forward one character
Ctrl-B .... go backward one character
Ctrl-D .... delete current character
Ctrl-U, X. delete to beginning of line
Ctrl-K .... delete to end of line
Ctrl-W .... delete previous word
Ctrl-T .... transpose previous character
Ctrl-P .... go to previous line in history buffer
Ctrl-N .... go to next line in history buffer
Ctrl-Z .... return to root command prompt
Tab, <SPACE> command-line completion
Exit .... go to next lower command prompt
Viewing Configurations
To view Cisco Wireless LAN controller options and settings, use the show commands.
show 802.11a
To display basic 802.11a options and settings, use the show 802.11a command.
show 802.11a
Syntax Description
show
|
Display configurations.
|
802.11a
|
802.11a configurations.
|
Defaults
None.
Examples
802.11a Network................................. Enabled
802.11a Low Band......................... Enabled
802.11a Mid Band......................... Enabled
802.11a High Band........................ Enabled
802.11a Operational Rates
802.11a 6M Rate............................ Mandatory
802.11a 9M Rate............................ Supported
802.11a 12M Rate........................... Mandatory
802.11a 18M Rate........................... Supported
802.11a 24M Rate........................... Mandatory
802.11a 36M Rate........................... Supported
802.11a 48M Rate........................... Supported
802.11a 54M Rate........................... Supported
Beacon Interval................................. 100
CF Pollable mandatory........................... Disabled
CF Poll Request mandatory....................... Disabled
CFP Period...................................... 4
CFP Maximum Duration............................ 100
Default Channel................................. 36
Default Tx Power Level.......................... 1
DTPC Status..................................... Enabled
DTIM Period..................................... 10
Fragmentation Threshold......................... 2346
Long Retry Limit................................ 4
Maximum Rx Life Time............................ 512
Max Tx MSDU Life Time........................... 512
Medium Occupancy Limit.......................... 100
Pico-Cell Status................................ Disabled
RTS Threshold................................... 2347
Short Retry Limit............................... 7
TI Threshold.................................... -50
Related Commands
show 802.11b, show advanced 802.11a channel, show advanced 802.11a group, show advanced 802.11a logging, show advanced 802.11a monitor, show advanced 802.11a power, show advanced 802.11a profile, show advanced 802.11a summary
show 802.11b
To display basic 802.11b/g options and settings, use the show 802.11b command.
show 802.11b
Syntax Description
show
|
Display configurations.
|
802.11b
|
802.11b/g configurations.
|
Defaults
None.
Examples
802.11b Network.................................. Enabled
11gSupport....................................... Enabled
802.11b/g Operational Rates
802.11b/g 1M Rate............................ Mandatory
802.11b/g 2M Rate............................ Mandatory
802.11b/g 5.5M Rate.......................... Mandatory
802.11b/g 11M Rate........................... Mandatory
802.11g 6M Rate.............................. Supported
802.11g 9M Rate.............................. Supported
802.11g 12M Rate............................. Supported
802.11g 18M Rate............................. Supported
802.11g 24M Rate............................. Supported
802.11g 36M Rate............................. Supported
802.11g 48M Rate............................. Supported
802.11g 54M Rate............................. Supported
Beacon Interval.................................. 100
CF Pollable mode................................. Disabled
CF Poll Request mandatory........................ Disabled
CFP Period....................................... 4
CFP Maximum Duration............................. 60
Default Channel.................................. 1
Default Tx Power Level........................... 1
DTPC Status..................................... Enabled
Call Admission Limit ........................... 105
G711 CU Quantum ................................. 15
DTIM Period...................................... 1
ED Threshold..................................... -50
Fragmentation Threshold.......................... 2346
Long Retry Limit................................. 4
Maximum Rx Life Time............................. 512
Max Tx MSDU Life Time............................ 512
Medium Occupancy Limit........................... 100
PBCC mandatory................................... Disabled
Pico-Cell Status................................. Disabled
RTS Threshold.................................... 2347
Short Preamble mandatory......................... Enabled
Short Retry Limit................................ 7
Related Commands
show 802.11a, show advanced 802.11b channel, show advanced 802.11b group, show advanced 802.11b logging, show advanced 802.11b monitor, show advanced 802.11b txpower, show advanced 802.11b profile, show advanced 802.11b summary
show 802.11h
To display basic 802.11h options and settings, use the show 802.11h command.
show 802.11h
Syntax Description
show
|
Display configurations.
|
802.11h
|
802.11h configurations.
|
Defaults
None.
Examples
802.11h ......................................... powerconstraint : 0
802.11h ......................................... channelswitch : Disable
802.11h ......................................... channelswitch mode : 0
Related Commands
show 802.11a, show 802.11b, config 802.11h
show acl
To display the access control lists (ACLs) that are configured on the controller, use the show acl command.
show acl {summary | detailed acl_name}
Syntax Description
show acl
|
Command action.
|
summary
|
Display a summary of all ACLs configured on the controller.
|
detailed
|
Display detailed information about a specific ACL.
|
acl_name
|
ACL name up to 32 alphanumeric characters.
|
Defaults
None.
Examples
-------------------------------- -------
Related Commands
config interface acl
show acl cpu
To display the access control lists (ACLs) configured on the central processing unit (CPU), use the show acl cpu command.
show acl cpu
Syntax Description
show acl
|
Command action.
|
cpu
|
Displays a summary of all the ACLs configured on the CPU.
|
Command Default
None
Examples
CPU Acl Name................................
Wireless Traffic............................ Disabled
Wired Traffic............................... Disabled
Applied to NPU.............................. No
Related Commands
config acl cpu
SHOW ADVANCED 802.11A COMMANDS
Use the SHOW ADVANCED 802.11a commands to display advanced 802.11a configuration parameters.
Show advanced 802.11a channel
To display the automatic channel assignment configuration and statistics, use the show advanced 802.11a channel command.
show advanced 802.11a channel
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
channel
|
Channel status.
|
Defaults
None.
Examples
> show advanced 802.11a channel
Automatic Channel Assignment
Channel Assignment Mode........................ AUTO
Channel Update Interval........................ 600 seconds
Channel Update Contribution.................... SNI.
Channel Assignment Leader...................... xx:xx:xx:xx:xx:xx
Last Run....................................... 374 seconds ago
Minimum...................................... -84 dBm
Average...................................... -84 dBm
Maximum...................................... -84 dBm
Minimum...................................... 0 days, 19 h 07 m 57 s
Average...................................... 0 days, 19 h 08 m 29 s
Maximum...................................... 0 days, 19 h 09 m 11 s
Related Commands
config 802.11a channel
show advanced 802.11a group
To display the advanced 802.11a Cisco radio RF grouping, use the show advanced 802.11a group command.
show advanced 802.11a group
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
group
|
RF grouping values.
|
Defaults
None.
Examples
> show advanced 802.11a group
802.11a Group Mode................................... AUTO
802.11a Group Update Interval........................ 600 seconds
802.11a Group Leader................................. xx:xx:xx:xx:xx:xx
802.11a Group Member............................... xx:xx:xx:xx:xx:xx
802.11a Last Run..................................... 133 seconds ago
Related Commands
config advanced 802.11a group-mode
show advanced 802.11a logging
To display advanced 802.11a RF event and performance logging, use the show advanced 802.11a logging command.
show advanced 802.11a logging
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
logging
|
RF event and performance logging.
|
Defaults
None.
Examples
> show advanced 802.11a logging
RF Event and Performance Logging
Channel Update Logging......................... Off
Coverage Profile Logging....................... Off
Foreign Profile Logging........................ Off
Load Profile Logging........................... Off
Noise Profile Logging.......................... Off
Performance Profile Logging.................... Off
TxPower Update Logging......................... Off
Related Commands
config advanced 802.11a logging channel, config advanced 802.11a logging coverage, config advanced 802.11a logging foreign, config advanced 802.11a logging load, config advanced 802.11a logging noise, config advanced 802.11a logging performance, config advanced 802.11a logging power
show advanced 802.11a monitor
To display the advanced 802.11a default Cisco radio monitoring, use the show advanced 802.11a monitor command.
show advanced 802.11a monitor
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
monitor
|
Cisco radio monitoring values.
|
Defaults
None.
Examples
> show advanced 802.11a monitor
Default 802.11a AP monitoring
802.11a Monitor Mode........................... enable
802.11a Monitor Channels....................... Country channels
802.11a AP Coverage Interval................... 180 seconds
802.11a AP Load Interval....................... 60 seconds
802.11a AP Noise Interval...................... 180 seconds
802.11a AP Signal Strength Interval............ 60 seconds
Related Commands
config advanced 802.11a monitor coverage, config advanced 802.11a monitor load, config advanced 802.11a monitor noise, config advanced 802.11a monitor signal
show advanced 802.11a profile
To display the advanced 802.11a Cisco 1000 series lightweight access point performance profiles, use the show advanced 802.11a profile command.
show advanced 802.11a profile {global | Cisco_AP}
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
profile
|
Cisco radio performance profile.
|
global
|
All Cisco 1000 series lightweight access points.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> show advanced 802.11a profile global
Default 802.11a AP performance profiles
802.11a Global Interference threshold.............. 10%
802.11a Global noise threshold..................... -70 dBm
802.11a Global RF utilization threshold............ 80%
802.11a Global throughput threshold................ 1000000 bps
802.11a Global clients threshold................... 12 clients
802.11a Global coverage threshold.................. 12 dB
802.11a Global coverage exception level............ 80%
802.11a Global client minimum exception lev........ 3 clients
> show advanced 802.11a profile AP1
Cisco 1000 series lightweight access point performance profile not customized
This response indicates that the performance profile for this Cisco 1000 series lightweight access point is using the global defaults and has not been individually configured.
Related Commands
config advanced 802.11b profile clients, config advanced 802.11b profile coverage, config advanced 802.11b profile customize, config advanced 802.11b profile exception, config advanced 802.11b profile foreign, config advanced 802.11b profile level, config advanced 802.11b profile noise, config advanced 802.11b profile throughput, config advanced 802.11b profile utilization
show advanced 802.11a receiver
To display the configuration and statistics of the 802.11a receiver, use the show advanced 802.11a receiver command.
show advanced 802.11a receiver
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
receiver
|
Receiver.
|
Defaults
None.
Examples
> show advanced 802.11a receiver
802.11a Advanced Receiver Settings
RxStart : Signal Threshold........................... 15
RxStart : Signal Lamp Threshold...................... 5
RxStart : Preamble Power Threshold................... 2
RxReStart : Signal Jump Status......................... Enabled
RxReStart : Signal Jump Threshold...................... 10
TxStomp : Low RSSI Status.............................. Enabled
TxStomp : Low RSSI Threshold........................... 30
TxStomp : Wrong BSSID Status........................... Enabled
TxStomp : Wrong BSSID Data Only Status................. Enabled
RxAbort : Raw Power Drop Status........................ Disabled
RxAbort : Raw Power Drop Threshold..................... 10
RxAbort : Low RSSI Status.............................. Disabled
RxAbort : Low RSSI Threshold........................... 0
RxAbort : Wrong BSSID Status........................... Disabled
RxAbort : Wrong BSSID Data Only Status................. Disabled
Related Commands
config advanced 802.11a monitor coverage, config advanced 802.11a monitor load, config advanced 802.11a monitor noise, config advanced 802.11a monitor signal
show advanced 802.11a summary
To display the advanced 802.11a Cisco 1000 series lightweight access point name, channel, and transmit level summary, use the show advanced 802.11a summary command.
show advanced 802.11a summary
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
summary
|
Cisco 1000 series lightweight access point name, channel, and transmit level summary.
|
Defaults
None.
Examples
> show advanced 802.11a summary
AP Name Channel TxPower Level
-------------------------------- ----------- -------------
Note
An asterisk (*) next to a channel number or power level indicates that it is being controlled by the global algorithm settings.
Related Commands
show advanced 802.11b summary
show advanced 802.11a txpower
To view the advanced 802.11a automatic transmit power assignment, use the show advanced 802.11a txpower command.
show advanced 802.11a txpower
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11a
|
802.11a network.
|
txpower
|
Transmit power.
|
Defaults
None.
Examples
> show advanced 802.11a txpower
Automatic Transmit Power Assignment
Transmit Power Assignment Mode.................. AUTO
Transmit Power Update Interval.................. 600 seconds
Transmit Power Threshold........................ -65 dBm
Transmit Power Neighbor Count................... 3 APs
Transmit Power Update Contribution.............. SN.
Transmit Power Assignment Leader................ xx:xx:xx:xx:xx:xx
Last Run........................................ 384 seconds ago
Related Commands
config advanced 802.11a txpower-update, config 802.11a txPower
SHOW ADVANCED 802.11B COMMANDS
Use the SHOW ADVANCED 802.11b commands show advanced 802.11b parameters.
show advanced 802.11b channel
To display the automatic channel assignment status and statistics, use the show advanced 802.11b channel command.
show advanced 802.11b channel
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b/g network.
|
channel
|
Channel status.
|
Defaults
None.
Examples
> show advanced 802.11b channel
Automatic Channel Assignment
Channel Assignment Mode........................ OFF
Channel Update Interval........................ 600 seconds
Channel Update Contribution.................... SNI.
Channel Assignment Leader...................... xx:xx:xx:xx:xx:xx
Last Run....................................... 157 seconds ago
Minimum...................................... unknown
Average...................................... unknown
Maximum...................................... unknown
Minimum...................................... unknown
Average...................................... unknown
Maximum...................................... unknown
Related Commands
config 802.11b channel
show advanced 802.11b group
To display the advanced 802.11b/g Cisco radio RF grouping, use the show advanced 802.11b group command.
show advanced 802.11b group
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b/g network.
|
group
|
RF grouping values.
|
Defaults
None.
Examples
> show advanced 802.11b group
802.11b Group Mode.............................. AUTO
802.11b Group Update Interval................... 600 seconds
802.11b Group Leader............................ xx:xx:xx:xx:xx:xx
802.11b Group Member.......................... xx:xx:xx:xx:xx:xx
802.11b Last Run................................ 511 seconds ago
Related Commands
config advanced 802.11b group-mode
show advanced 802.11b logging
To display advanced 802.11b/g RF event and performance logging, use the show advanced 802.11b logging command.
show advanced 802.11b logging
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b network.
|
logging
|
RF event and performance logging.
|
Defaults
None.
Examples
> show advanced 802.11b logging
RF Event and Performance Logging
Channel Update Logging........................... Off
Coverage Profile Logging......................... Off
Foreign Profile Logging.......................... Off
Load Profile Logging............................. Off
Noise Profile Logging............................ Off
Performance Profile Logging...................... Off
Transmit Power Update Logging.................... Off
Related Commands
config advanced 802.11b logging channel, config advanced 802.11b logging coverage, config advanced 802.11b logging foreign, config advanced 802.11b logging load, config advanced 802.11b logging noise, config advanced 802.11b logging performance, config advanced 802.11b logging power
show advanced 802.11b monitor
To display the advanced 802.11b/g default Cisco radio monitoring, use the show advanced 802.11b monitor command.
show advanced 802.11b monitor
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b/g network.
|
monitor
|
Cisco radio monitoring values.
|
Defaults
None.
Examples
> show advanced 802.11b monitor
Default 802.11b AP monitoring
802.11b Monitor Mode......................... enable
802.11b Monitor Channels..................... Country channels
802.11b AP Coverage Interval................. 180 seconds
802.11b AP Load Interval..................... 60 seconds
802.11b AP Noise Interval.................... 180 seconds
802.11b AP Signal Strength Interval.......... 60 seconds
Related Commands
config advanced 802.11b monitor coverage, config advanced 802.11b monitor load, config advanced 802.11b monitor noise, config advanced 802.11b monitor signal
show advanced 802.11b profile
To display the advanced 802.11b/g Cisco radio performance profiles, use the show advanced 802.11b profile command.
show advanced 802.11b profile {global | Cisco_AP}
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b/g network.
|
profile
|
Cisco 1000 series lightweight access point performance profile.
|
global
|
All Cisco 1000 series lightweight access points.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> show advanced 802.11b profile global
Default 802.11b AP performance profiles
802.11b Global Interference threshold.............. 10%
802.11b Global noise threshold..................... -70 dBm
802.11b Global RF utilization threshold............ 80%
802.11b Global throughput threshold................ 1000000 bps
802.11b Global clients threshold................... 12 clients
802.11b Global coverage threshold.................. 12 dB
802.11b Global coverage exception level............ 80%
802.11b Global client minimum exception lev........ 3 clients
> show advanced 802.11b profile AP1
Cisco 1000 series lightweight access point performance profile not customized
This response indicates that the performance profile for this Cisco 1000 series lightweight access point is using the global defaults and has not been individually configured.
Related Commands
config advanced 802.11b profile clients, config advanced 802.11b profile coverage, config advanced 802.11b profile customize, config advanced 802.11b profile exception, config advanced 802.11b profile foreign, config advanced 802.11b profile level, config advanced 802.11b profile noise, config advanced 802.11b profile throughput, config advanced 802.11b profile utilization
show advanced 802.11b receiver
To display the advanced 802.11b/g default Cisco radio receiver parameters, use the show advanced 802.11b receiver command.
show advanced 802.11b receiver
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b/g network.
|
receiver
|
Cisco radio receiver values.
|
Defaults
None.
Examples
> show advanced 802.11b receiver
Default 802.11b Receiver Settings
RxStart : Signal Threshold............... 15
RxStart : Signal Jump Threshold.......... 5
RxStart : Preamble Power Threshold....... 2
RxRestart : Signal Jump Status............. Enabled
RxRestart : Signal Jump Threshold.......... 10
TxStomp : Low RSS Status. .............. Disabled
TxStomp : Low RSSI Threshold............. 37
TxStomp : Wrong BSSID Status............. Disabled
TxStomp : Wrong BSSID Data Only Status... Disabled
RxAbort : Raw Power Drop Status.......... Disabled
RxAbort : Raw Power Drop Threshold....... 0
RxAbort : Low RSSI Status................ Enabled
RxAbort : Low RSSI Threshold............. 0
RxAbort : Wrong BSSID Status............. Disabled
RxAbort : Wrong BSSID Data Only Status... Disabled
Related Commands
config advanced 802.11b monitor coverage, config advanced 802.11b monitor load, config advanced 802.11b monitor noise, config advanced 802.11b monitor signal
show advanced 802.11b summary
To display the advanced 802.11b/g Cisco 1000 series lightweight access point name, channel, and transmit level summary, use the show advanced 802.11b summary command.
show advanced 802.11b summary
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b/g network.
|
summary
|
Cisco 1000 series lightweight access point name, channel, and transmit level summary.
|
Defaults
None.
Examples
> show advanced 802.11b summary
AP name Channel Txpower Level
------------------- ---------- ------------
Note
Asterisks next to channel numbers or power levels indicate that they are being controlled by the global algorithm settings.
Related Commands
show advanced 802.11a summary
show advanced 802.11b txpower
To view the advanced 802.11b/g automatic transmit power assignment, use the show advanced 802.11b txpower command.
show advanced 802.11b txpower
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
802.11b
|
802.11b/g network.
|
txpower
|
Transmit power.
|
Defaults
None.
Examples
> show advanced 802.11b txpower
Automatic Transmit Power Assignment
Transmit Power Assignment Mode................. AUTO
Transmit Power Update Interval................. 600 seconds
Transmit Power Threshold....................... -65 dBm
Transmit Power Neighbor Count.................. 3 APs
Transmit Power Update Contribution............. SNI.
Transmit Power Assignment Leader............... xx:xx:xx:xx:xx:xx
Last Run....................................... 427 seconds ago
Related Commands
config 802.11b txPower
show advanced client-handoff
To display the number of automatic client handoffs after retries, use the show advanced client-handoff command.
show advanced client-handoff
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
client-handoff
|
Advanced client handoff count.
|
Defaults
None.
Examples
> show advanced client-handoff
Client auto handoff after retries................ 130
Related Commands
config advanced timers auth-timeout, config advanced timers rogue-ap
show advanced eap
To displayadvanced Extensible Authentication Potocol settings, use the show advanced eap command.
show advanced eap
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
eap
|
Advanced client handoff count.
|
Defaults
None.
Examples
EAP-Identity-Request Timeout (seconds)........... 1
EAP-Identity-Request Max Retries................. 20
EAP Key-Index for Dynamic WEP.................... 0
EAP-Request Timeout (seconds).................... 1
EAP-Request Max Retries.......................... 2
Related Commands
(tbd)
show advanced max-1x-sessions
To display the maximum number of simultaneous 802.1x sessions allowed per access point, use the show advanced max-1x-sessions command.
show advanced max-1x-sessions
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
max-1x-sessions
|
Maximum number of simultaneous 802.1x sessions allowed per access point.
|
Defaults
None.
Examples
> show advanced max-1x-sessions
Max 802.1x session per AP at a given time........ 0
Related Commands
(tbd)
show advanced probe-limit
To display the number of probes sent to the WLAN controller per access point per client and the probe interval in milliseconds, use the show advanced probe-limit command.
show advanced probe-limit
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
probe-limit
|
Number of probes sent to the WLAN controller per access point per client and the probe interval in milliseconds.
|
Defaults
None.
Examples
> show advanced probe-limit
Probes sent to switch per AP slot per client .... 2
Probe interval in msec........................... 500
Related Commands
(tbd)
show advanced rate
To display whether control path rate limiting is enabled or disabled, use the show advanced rate command.
show advanced rate
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
rate
|
Control path rate limiting enabled or disabled.
|
Defaults
None.
Examples
Control Path Rate Limiting....................... Disabled
Related Commands
(tbd)
show advanced send-disassoc-on-handoff
To display whether the WLAN controller disassociates clients after a handoff, use the show advanced send-disassoc-on-handoff command.
show advanced send-disassoc-on-handoff
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
send-disassoc-on-handoff
|
WLAN controller disassociates clients after a handoff enabled or disabled.
|
Defaults
None.
Examples
> show advanced send-disassoc-on-handoff
Send Disassociate on Handoff..................... Disabled
Related Commands
(tbd)
show advanced statistics
To display whether or not the Cisco Wireless LAN controller port statistics are enabled or disabled, use the show advanced statistics command.
show advanced statistics
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
statistics
|
Show Cisco Wireless LAN controller port statistics state.
|
Defaults
None.
Examples
> show advanced statistics
Switch port statistics........................... Enabled
Related Commands
config advanced timers auth-timeout, config advanced timers rogue-ap
show advanced timers
To display the advanced mobility anchor, authentication response, and rogue access point entry timers, use the show advanced timers command.
show advanced timers
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
timers
|
Advanced system timers.
|
Defaults
Shown below in examples.
Examples
Authentication Response Timeout (seconds)...... 10
Rogue Entry Timeout (seconds).................. 1200
AP Heart Beat Timeout (seconds)................ 30
AP Discovery Timeout (seconds)................. 10
EAP Request Timeout (seconds).................. 8 (only when EAP is enabled)
Related Commands
config advanced timers auth-timeout, config advanced timers rogue-ap
SHOW AP COMMANDS
Use the SHOW AP commands to show access point parameters.
show ap auto-rf
To display the auto-rf settings for a Cisco 1000 series lightweight access point, use the show ap auto-rf command.
show ap auto-rf {802.11a | 802.11b} Cisco_AP
Syntax Description
show
|
Display configurations.
|
ap auto-rf
|
Cisco radio.
|
{802.11a | 802.11b}
|
802.11a or 802.11b/g setting.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> show ap auto-rf 802.11a AP1
Number Of Slots.................................. 2
Rad Name......................................... AP03
MAC Address...................................... 00:0b:85:01:18:b7
Radio Type..................................... RADIO_TYPE_80211a
Noise Profile................................ PASSED
Channel 36................................... -88 dBm
Channel 40................................... -86 dBm
Channel 44................................... -87 dBm
Channel 48................................... -85 dBm
Channel 52................................... -84 dBm
Channel 56................................... -83 dBm
Channel 60................................... -84 dBm
Channel 64................................... -85 dBm
Interference Profile......................... PASSED
Channel 36................................... -66 dBm @ 1% busy
Channel 40................................... -128 dBm @ 0% busy
Channel 44................................... -128 dBm @ 0% busy
Channel 48................................... -128 dBm @ 0% busy
Channel 52................................... -128 dBm @ 0% busy
Channel 56................................... -73 dBm @ 1% busy
Channel 60................................... -55 dBm @ 1% busy
Channel 64................................... -69 dBm @ 1% busy
Load Profile................................. PASSED
Receive Utilization.......................... 0%
Transmit Utilization......................... 0%
Channel Utilization.......................... 1%
Attached Clients............................. 1 clients
Coverage Profile............................. PASSED
Failed Clients............................... 0 clients
RSSI -100 dBm................................ 0 clients
RSSI -92 dBm................................ 0 clients
RSSI -84 dBm................................ 0 clients
RSSI -76 dBm................................ 0 clients
RSSI -68 dBm................................ 0 clients
RSSI -60 dBm................................ 0 clients
RSSI -52 dBm................................ 0 clients
Client Signal To Noise Ratios
SNR 0 dBm................................. 0 clients
SNR 5 dBm................................. 0 clients
SNR 10 dBm................................. 0 clients
SNR 15 dBm................................. 0 clients
SNR 20 dBm................................. 0 clients
SNR 25 dBm................................. 0 clients
SNR 30 dBm................................. 0 clients
SNR 35 dBm................................. 0 clients
SNR 40 dBm................................. 0 clients
SNR 45 dBm................................. 0 clients
RAD 00:0b:85:01:05:08 slot 0................. -46 dBm on 10.1.30.170
RAD 00:0b:85:01:12:65 slot 0................. -24 dBm on 10.1.30.170
Channel Assignment Information
Current Channel Average Energy............... -86 dBm
Previous Channel Average Energy.............. -75 dBm
Channel Change Count......................... 109
Last Channel Change Time..................... Wed Sep 29 12:53e:34 2004
Recommended Best Channel..................... 44
RF Parameter Recommendations
Power Level.................................. 1
RTS/CTS Threshold............................ 2347
Fragmentation Threshold...................... 2346
Antenna Pattern.............................. 0
Related Commands
config 802.11a antenna, config 802.11b antenna, config cell
show ap bmode
To display the backhaul mode for a Cisco 1030 or 1500 Series lightweight access point deployed in bridging or mesh mode, use the show ap bhmode command.
show ap bhmode Cisco_AP
Syntax Description
show
|
Display configurations.
|
ap
|
Cisco radio.
|
bhmode
|
Display the mesh or bridging backhaul mode for a Cisco 1030 or 1500 Series lightweight access point.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
config ap stats-timer
show ap bhrate
To display the backhaul rate for a Cisco 1030 or 1500 Series lightweight access point deployed in bridging or mesh mode, use the show ap bhrate command.
show ap bhrate Cisco_AP
Syntax Description
show
|
Display configurations.
|
ap
|
Cisco radio.
|
bhrate
|
Display the mesh or bridging backhaul rate for a Cisco 1030 or 1500 Series lightweight access point.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
config ap stats-timer
show ap config
To display the detailed configuration for an 802.11b/g Cisco 1000 series lightweight access point, use the show ap config command.
show ap config {802.11a | 802.11b | general} Cisco_AP
Syntax Description
show
|
Display configurations.
|
ap config
|
Cisco radio.
|
802.11a
|
802.11a settings.
|
802.11b
|
802.11b/g settings.
|
general
|
General settings.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> show ap config 802.11a AP02
Cisco AP Identifier.............................. 0
Cisco AP Name.................................... AP02
AP Regulatory Domain............................. Unconfigured
Switch Port Number .............................. 1
MAC Address...................................... 00:0b:85:18:b6:50
IP Address Configuration......................... DHCP
IP Address....................................... 1.100.49.240
IP NetMask....................................... 255.255.255.0
Gateway IP Addr.................................. 1.100.49.1
Cisco AP Location................................ default-location
Cisco AP Group Name.............................. default-group
Primary Cisco Switch............................. Cisco_32:ab:63
Secondary Cisco Switch...........................
Tertiary Cisco Switch............................
Administrative State ............................ ADMIN_ENABLED
Operation State ................................. REGISTERED
Mirroring Mode .................................. Disabled
AP Mode ......................................... Local
Remote AP Debug ................................. Disabled
S/W Version .................................... 3.1.61.0
Boot Version ................................... 1.2.59.6
Stats Re--More-- or (q)uit
porting Period .................................. 180
LED State........................................ Enabled
ILP Pre Standard Switch.......................... Disabled
ILP Power Injector............................... Disabled
Number Of Slots.................................. 2
AP Model......................................... AS-1200
AP Serial Number................................. 044110223A
AP Certificate Type.............................. Manufacture Installed
Radio Type................................... RADIO_TYPE_80211a
Administrative State ........................ ADMIN_ENABLED
Operation State ............................. UP
WLAN Override................................ Disabled
CellId ...................................... 0
Configuration ............................. AUTOMATIC
Number Of WLANs ........................... 1
Medium Occupancy Limit .................... 100
CFP Period ................................ 4
CFP MaxDuration ........................... 60
BSSID ..................................... 00:0b:85:18:b6:50
6000 Kilo Bits........................... MANDATORY
9000 Kilo Bits........................... SUPPORTED
12000 Kilo Bits.......................... MANDATORY
18000 Kilo Bits.......................... SUPPORTED
24000 Kilo Bits.......................... MANDATORY
36000 Kilo Bits.......................... SUPPORTED
48000 Kilo Bits.......................... SUPPORTED
54000 Kilo Bits.......................... SUPPORTED
Beacon Period ............................. 100
DTIM Period ............................... 1
Fragmentation Threshold ................... 2346
Multi Domain Capability Implemented ....... TRUE
Multi Domain Capability Enabled ........... TRUE
Country String ............................ US
Configuration ............................. AUTOMATIC
First Chan Num ............................ 36
Number Of Channels ........................ 4
Configuration ............................. AUTOMATIC
RTS Threshold ............................. 2347
Short Retry Limit ......................... 7
Long Retry Limit .......................... 4
Fragmentation Threshold ................... 2346
Maximum Tx MSDU Life Time ................. 512
Maximum Rx Life Time ...................... 512
Num Of Supported Power Levels ............. 5
Tx Power Level 1 .......................... 18 dBm
Tx Power Level 2 .......................... 15 dBm
Tx Power Level 3........................... 12 dBm
Tx Power Level 4 .......................... 9 dBm
Tx Power Level 5 .......................... 6 dBm
Tx Power Configuration .................... CUSTOMIZED
Current Tx Power Level..................... 5
Configuration ............................. AUTOMATIC
Current Channel ........................... 36
TI Threshold .............................. -50
Antenna Type............................... INTERNAL_ANTENNA
Internal Antenna Gain (in .5 dBm units).... 11
AntennaMode................................ ANTENNA_OMNI
Performance Profile Parameters
Configuration ............................. AUTOMATIC
Interference threshold..................... 10%
Noise threshold............................ -70 dBm
RF utilization threshold................... 80%
Data-rate threshold........................ 1000000 bps
Client threshold........................... 12 clients
Coverage SNR threshold..................... 16 dB
Coverage exception level................... 25%
Client minimum exception level............. 3 clients
Rogue Containment Information
Containment Count............................ 0
> show ap config 802.11b AP02
Cisco AP Identifier.............................. 0
Cisco AP Name.................................... AP02
AP Regulatory Domain............................. Unconfigured
Switch Port Number .............................. 1
MAC Address...................................... 00:0b:85:18:b6:50
IP Address Configuration......................... DHCP
IP Address....................................... 1.100.49.240
IP NetMask....................................... 255.255.255.0
Gateway IP Addr.................................. 1.100.49.1
Cisco AP Location................................ default-location
Cisco AP Group Name.............................. default-group
Primary Cisco Switch............................. Cisco_32:ab:63
Secondary Cisco Switch...........................
Tertiary Cisco Switch............................
Administrative State ............................ ADMIN_ENABLED
Operation State ................................. REGISTERED
Mirroring Mode .................................. Disabled
AP Mode ......................................... Local
Remote AP Debug ................................. Disabled
S/W Version .................................... 3.1.61.0
Boot Version ................................... 1.2.59.6
Stats Reporting Period .......................... 180
LED State........................................ Enabled
ILP Pre Standard Switch.......................... Disabled
ILP Power Injector............................... Disabled
Number Of Slots.................................. 2
AP Model......................................... AS-1200
AP Serial Number................................. 044110223A
AP Certificate Type.............................. Manufacture Installed
Radio Type................................... RADIO_TYPE_80211g
Administrative State ........................ ADMIN_ENABLED
Operation State ............................. UP
WLAN Override ............................... Disabled
CellId ...................................... 0
Configuration ............................. AUTOMATIC
Number Of WLANs ........................... 1
Medium Occupancy Limit .................... 100
CFP Period ................................ 4
CFP MaxDuration ........................... 60
BSSID ..................................... 00:0b:85:18:b6:50
1000 Kilo Bits........................... MANDATORY
2000 Kilo Bits........................... MANDATORY
5500 Kilo Bits........................... MANDATORY
11000 Kilo Bits.......................... MANDATORY
6000 Kilo Bits........................... SUPPORTED
9000 Kilo Bits........................... SUPPORTED
12000 Kilo Bits.......................... SUPPORTED
18000 Kilo Bits.......................... SUPPORTED
24000 Kilo Bits.......................... SUPPORTED
36000 Kilo Bits.......................... SUPPORTED
48000 Kilo Bits.......................... SUPPORTED
54000 Kilo Bits.......................... SUPPORTED
Beacon Period ............................. 100
DTIM Period ............................... 1
Fragmentation Threshold ................... 2346
Multi Domain Capability Implemented ....... TRUE
Multi Domain Capability Enabled ........... TRUE
Country String ............................ US
Configuration ............................. AUTOMATIC
First Chan Num ............................ 1
Number Of Channels ........................ 11
Configuration ............................. AUTOMATIC
RTS Threshold ............................. 2347
Short Retry Limit ......................... 7
Long Retry Limit .......................... 4
Fragmentation Threshold ................... 2346
Maximum Tx MSDU Life Time ................. 512
Maximum Rx Life Time....................... 512
Num Of Supported Power Levels.............. 5
Tx Power Level 1 .......................... 17 dBm
Tx Power Level 2........................... 14 dBm
Tx Power Level 3........................... 11 dBm
Tx Power Level 4........................... 8 dBm
Tx Power Level 5........................... 5 dBm
Tx Power Configuration..................... CUSTOMIZED
Current Tx Power Level..................... 5
Configuration.............................. CUSTOMIZED
Current Channel............................ 1
TI Threshold............................... -50
Antenna Type............................... INTERNAL_ANTENNA
Internal Antenna Gain (in5 dBm units)...... 11
Diversity.................................. DIVERSITY_ENABLED
Performance Profile Parameters
Configuration.............................. AUTOMATIC
Interference threshold..................... 10%
Noise threshold............................ -70 dBm
RF utilization threshold................... 80%
Data-rate threshold........................ 1000000 bps
Client threshold........................... 12 clients
Coverage SNR threshold..................... 12 dB
Coverage exception level................... 25%
Client minimum exception level............. 3 clients
Rogue Containment Information
Containment Count............................ 0
> show ap config general AP02
Cisco AP Identifier.............................. 0
Cisco AP Name.................................... AP02
AP Regulatory Domain............................. Unconfigured
Switch Port Number............................... 1
MAC Address...................................... xx:xx:xx:xx:xx:xx
IP Address Configuration......................... DHCP
IP Address....................................... 1.100.49.240
IP NetMask....................................... 255.255.255.0
Gateway IP Addr.................................. 1.100.49.1
Cisco AP Location................................ default-location
Cisco AP Group Name.............................. default-group
Primary Cisco Switch............................. Cisco_32:ab:63
Secondary Cisco Switch...........................
Tertiary Cisco Switch............................
Administrative State............................. ADMIN_ENABLED
Operation State.................................. REGISTERED
Mirroring Mode................................... Disabled
AP Mode.......................................... Local
Remote AP Debug.................................. Disabled
S/W Version..................................... 3.1.61.0
Boot Version.................................... 1.2.59.6
porting Period................................... 180
LED State........................................ Enabled
ILP Pre Standard Switch.......................... Disabled
ILP Power Injector............................... Disabled
Number Of Slots.................................. 2
AP Model......................................... AS-1200
AP Serial Number................................. 044110223A
AP Certificate Type.............................. Manufacture Installed
Related Commands
config 802.11a antenna, config 802.11b antenna, config cell
show ap core-dump
To display the memory core dump setting for a Cisco 1000 series lightweight access point, use the show ap core-dump command.
show ap core-dump Cisco_AP
Syntax Description
show
|
Display configurations.
|
ap
|
Cisco radio.
|
core-dump
|
Display the memory core dump setting for an access point.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
config ap stats-timer
show ap crash-file
To display the list of both crash and radio core dump files generated by Cisco 1000 series lightweight access points, use the show ap crash-file command.
show ap crash-file
Syntax Description
show
|
Display configurations.
|
ap
|
Cisco radio.
|
crash-file
|
Display the list of both crash and radio core dump files generated by access points. The generated information includes size and memory usage.
|
Defaults
None.
Examples
Related Commands
config ap stats-timer
show ap stats
To display the statistics for a Cisco 1000 series lightweight access point, use the show ap stats command.
show ap stats {802.11a | 802.11b} Cisco_AP
Syntax Description
show
|
Display configurations.
|
ap stats
|
Cisco radio.
|
802.11a
|
802.11a statistics.
|
802.11b
|
802.11b/g statistics.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> show ap stats 802.11b AP02
Number Of Slots.................................. 2
AP Name.......................................... AP02
MAC Address...................................... 00:0b:85:18:b6:50
Radio Type..................................... RADIO_TYPE_80211a
Number of Users.............................. 0
TxFragmentCount.............................. 1679
MulticastTxFrameCnt.......................... 1260
FailedCount.................................. 15892
RetryCount................................... 331
MultipleRetryCount........................... 0
FrameDuplicateCount.......................... 0
RtsSuccessCount.............................. 0
RtsFailureCount.............................. 0
AckFailureCount.............................. 80212
RxFragmentCount.............................. 248671
MulticastRxFrameCnt.......................... 0
FcsErrorCount................................ 105968
TxFrameCount................................. 1679
WepUndecryptableCount........................ 0
Related Commands
config ap stats-timer
show ap summary
To display a summary of all Cisco 1000 series lightweight access points attached to the Cisco Wireless LAN controller, use the show ap summary command. A list containing each Cisco 1000 series lightweight access point name, number of slots, manufacturer, MAC address, location and Cisco Wireless LAN controller port number is displayed.
show ap summary
Syntax Description
show
|
Display configurations.
|
ap
|
All Cisco 1000 series lightweight access points.
|
summary
|
Summary of all Cisco 1000 series lightweight access points.
|
Defaults
None.
Examples
AP Name Slots AP Model EnetMAC Location Port
------------------ ----- ------------------- ----------------- ---------------- -----
AP01 2 AIR-AP1210 xx:xx:xx:xx:xx:xx default location 12
AP02 2 AIR-AP1210 xx:xx:xx:xx:xx:xx default location 11
Related Commands
show advanced 802.11a summary, show advanced 802.11b summary, show certificate summary, show client summary, show mobility summary, show radius summary, show rogue-ap summary, show wlan summary
show ap wlan
To display whether or not a Cisco Wireless LAN controller radio is in wireless LAN override mode (as described in the related product guide), use the show ap wlan command.
show ap wlan {802.11a | 802.11b} Cisco_AP
Syntax Description
show
|
Display configurations.
|
ap
|
All Cisco 1000 series lightweight access points.
|
wlan
|
Wireless LAN parameter.
|
{802.11a | 802.11b}
|
802.11a or 802.11b/g statistics.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> show ap wlan 802.11a AP01
Cisco AP is not in override mode.
Related Commands
show advanced 802.11a summary, show advanced 802.11b summary, show certificate summary, show client summary, show mobility summary, show radius summary, show rogue-ap summary, show wlan summary
show arp switch
To display the Cisco Wireless LAN controller MAC addresses, IP Addresses, and port types, use the show arp switch command.
show arp switch
Syntax Description
show
|
Display configurations.
|
arp
|
arp MAC addresses, IP Addresses, and port types.
|
switch
|
Cisco Wireless LAN controller parameters.
|
Defaults
None.
Examples
MAC Address IP Address Port VLAN Type
------------------- ---------------- ------------ ---- -------------------
xx:xx:xx:xx:xx:xx xxx.xxx.xxx.xxx service port 1
xx:xx:xx:xx:xx:xx xxx.xxx.xxx.xxx service port
xx:xx:xx:xx:xx:xx xxx.xxx.xxx.xxx service port
Related Commands
debug arp
show auth-list
To display the access point authorization list, use the show auth-list command.
show auth-list
Syntax Description
show
|
Display configurations.
|
auth-list
|
Display access point authorization list.
|
Defaults
None.
Examples
Authorize APs against AAA...................... disabled
Allow APs with Self-signed Certificate (SSC)... disabled
Mac Addr Cert Type Key Hash
----------------------- ---------- ------------------------------------------
Related Commands
config auth-list
show boot
Each Cisco Wireless LAN controller retains one primary and one backup operating system software load in non-volatile RAM. This allows operators to have the Cisco Wireless LAN controllers boot off the primary load (default), or revert to the backup load when desired. To display the primary and backup software build numbers with an indication of which is active, use the show boot command.
show boot
Syntax Description
show
|
Display configurations.
|
boot
|
Software bootable versions.
|
Defaults
None.
Examples
Primary Boot Image............................... 3.2.13.0 (active)
Backup Boot Image................................ 3.2.15.0
Related Commands
config exclusionlist add, config exclusionlist delete, config exclusionlist description, show client
SHOW CERTIFICATE COMMANDS
Use the SHOW CERTIFICATE commands to display certificate settings.
show certificate compatibility
To display whether or not certificates are verified as compatible in the Cisco Wireless LAN controller, use the show certificate compatibility command.
show certificate compatibility
Syntax Description
show
|
Display configurations.
|
certificate
|
All certificates.
|
compatibility
|
Compatibility of certificates.
|
Defaults
None.
Examples
> show certificate compatibility
Certificate compatibility mode:................ off
Related Commands
show certificate summary
show certificate summary
To display a summary of all certificates active in the Cisco Wireless LAN controller, use the show certificate summary command.
show certificate summary
Syntax Description
show
|
Display configurations.
|
certificate
|
All certificates.
|
summary
|
Synopsis of all certificates.
|
Defaults
None.
Examples
> show certificate summary
Web Administration Certificate................. Locally Generated
Web Authentication Certificate................. Locally Generated
Certificate compatibility mode:................ off
Related Commands
show certificate compatibility
SHOW CLIENT COMMANDS
Use the SHOW CLIENT commands to display client settings.
show client ap
To display the clients on a Cisco 1000 series lightweight access point, use the show client ap command.
Note
The show client ap command may list the status of automatically disabled clients. Use the show exclusionlist command to view clients on the exclusion list (blacklisted).
show client ap {802.11a | 802.11b} Cisco_AP
Syntax Description
show
|
Display configurations.
|
client ap
|
Cisco radio.
|
802.11a
|
802.11a clients.
|
802.11b
|
802.11b/g clients.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> show client ap 802.11b AP1
MAC Address AP Id Status WLAN Id Authenticated
----------------- ------ ------------- --------- -------------
xx:xx:xx:xx:xx:xx 1 Associated 1 No
Related Commands
show client detail, show client summary, show client username, show exclusionlist
show client detail
To display detailed information for a client on a Cisco 1000 series lightweight access point, use the show client detail command.
Note
The show client ap command may list the status of automatically disabled clients. Use the show exclusionlist command to view clients on the exclusion list (blacklisted).
show client detail MAC
Syntax Description
show
|
Display configurations.
|
client
|
802.11a or 802.11b/g client.
|
detail
|
Connectivity information.
|
MAC
|
MAC address of the specific client.
|
Defaults
None.
Examples
> show client detail 00:0c:41:07:33:a6
Client MAC Address............................... xx:xx:xx:xx:xx:xx
Client Username.................................. N/A
AP MAC Address................................... xx:xx:xx:xx:xx:xx
Client State..................................... Associated
Wireless LAN Id.................................. 1
IP Address....................................... Unknown
Association Id................................... 1
Authentication Algorithm......................... Shared Key
Reason Code...................................... 0
Status Code...................................... 0
Session Timeout.................................. 0
Mirroring........................................ Disabled
QoS Level........................................ Gold
Diff Serv Code Point (DSPC)...................... disabled
802.1P Priority Tag.............................. disabled
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. DHCP_REQD
Policy Manager Rule Created...................... No
NPU Fast Notified................................ Yes
Policy Type...................................... N/A
Encryption Cipher................................ WEP (104 bits)
EAP Type......................................... Unknown
Interface........................................ management
VLAN............................................. 0
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 0
Number of Bytes Received................... 0
Number of Bytes Sent....................... 0
Number of Packets Received................. 0
Number of Packets Sent..................... 0
Number of Policy Errors.................... 0
Radio Signal Strength Indicator............ Unavailable
Signal to Noise Ratio...................... Unavailable
AP03(slot 0) 24643 seconds ago............. -11 dBm
Related Commands
show client ap, show client summary, show client username, show exclusionlist
show client summary
To display a summary of clients associated with a Cisco 1000 series lightweight access point, use the show client summary command.
Note
The show client ap command may list the status of automatically disabled clients. Use the show exclusionlist command to view clients on the exclusion list (blacklisted).
show client summary
Syntax Description
show
|
Display configurations.
|
client
|
802.11a or 802.11b/g client.
|
summary
|
All attached clients.
|
Defaults
None.
Examples
Number of Clients................................ 24
MAC Address AP Name Status WLAN Auth Protocol Port
----------------- ----------------- ------------- ---- ---- -------- ----
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11a 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11a 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11b 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11a 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11b 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11b 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11b 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11b 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11b 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11a 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11a 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11b 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11a 1
xx:xx:xx:xx:xx:xx AP02 Probing N/A No 802.11a 1
Related Commands
show client ap, show client detail, show client username, show exclusionlist
show client username
To display client data by username, use the show client username command.
show client username username
Syntax Description
show
|
Display configurations.
|
client
|
Display client data.
|
username
|
Cisco radio.
|
username
|
Client's username.
|
Defaults
None.
Examples
> show client username IT_007
MAC Address AP ID Status WLAN Id Authenticated
----------------- ------ ------------- --------- -------------
xx:xx:xx:xx:xx:xx 1 Associated 1 No
Related Commands
show client ap, show client detail, show client summary
show country
The Cisco Wireless LAN controller must be configured to comply with the target country's permitted 802.11a and/or 802.11b frequency bands. To display a list of supported countries and their permitted frequency bands, use the show country command. This command also shows you the current country setting for the Cisco Wireless LAN controller.
Note
Refer to the related product guide for the most up-to-date country codes and regulatory domains.
show country
Syntax Description
show
|
Display configuration options.
|
country
|
Supported countries.
|
Defaults
None.
Examples
Related Commands
show sysinfo
show cpu
To display current WLAN Controller CPU usage information, use the show cpu command.
show cpu
Syntax Description
Defaults
None.
Examples
Related Commands
show sysinfo
show custom-web
To display web authentication customization information, use the show custom-web command.
show custom-web
Syntax Description
show custom-web
|
Command action.
|
Defaults
None.
Examples
Radius Authentication Method..................... PAP
Cisco Logo....................................... Enabled
CustomLogo....................................... None
Custom Title..................................... None
Custom Message................................... None
Custom Redirect URL.............................. None
External web authentication Mode................. Disabled
External web authentication URL.................. None
Related Commands
config custom-web
show database summary
To display the local database configuration, use the show database command.
show database summary
Syntax Description
show database
|
Command action.
|
summary
|
Database summary.
|
Defaults
None.
Examples
Current Max database entries.......................... 512
Max database entries on next reboot................... 512
Related Commands
show sysinfo
show debug
Use the show debug command, to determine if MAC address and other flag debugging is enabled or disabled.
show debug
Syntax Description
show
|
Display configurations.
|
debug
|
MAC address debugging.
|
Defaults
disabled.
Examples
MAC debugging............................... disabled
Related Commands
debug mac
show dhcp
Use the show dhcp command, to display the internal DHCP server configuration.
show dhcp {leases | summary | scope}
Syntax Description
show dhcp
|
Display internal DHCP server configuration information.
|
leases
|
Enter leases to display allocated DHCP leases.
|
summary
|
Enter summary to display DHCP summary information.
|
scope
|
Enter the name of a scope to display the DHCP information for that scope.
|
Defaults
None.
Examples
Scope Name Enabled Address Range
003 No 0.0.0.0 -> 0.0.0.0
Enabled....................................... No
Lease Time.................................... 0
Pool Start.................................... 0.0.0.0
Pool End...................................... 0.0.0.0
Network....................................... 0.0.0.0
Netmask....................................... 0.0.0.0
Default Routers............................... 0.0.0.0 0.0.0.0 0.0.0.0
DNS Domain....................................
DNS........................................... 0.0.0.0 0.0.0.0 0.0.0.0
Netbios Name Servers.......................... 0.0.0.0 0.0.0.0 0.0.0.0
Related Commands
config dhcp
show dhcp proxy
Use the show dhcp proxy command to display the status of DHCP proxy handling.
show dhcp proxy
Syntax Description
show dhcp proxy
|
Display the status of DHCP proxy handling.
|
Defaults
None.
Examples
DHCP Proxy Behaviour: enabled
Related Commands
config dhcp proxy
show eventlog
Use the show eventlog command, to display the event log.
show eventlog
Syntax Description
show
|
Display configurations.
|
eventlog
|
System events.
|
Defaults
None.
Examples
File Line TaskID Code d h m s
EVENT> bootos.c 788 125CEBCC AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 125CEBCC AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 125C597C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 125C597C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 125C597C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 125C597C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 125C597C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 125C597C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 1216C36C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 1216C36C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 1216C36C AAAAAAAA 0 0 0 6
EVENT> bootos.c 788 1216C36C AAAAAAAA 0 0 0 11
Related Commands
show msglog
show exclusionlist
To display a summary of all clients on the manual exclusion list (blacklisted) from associating with this Cisco Wireless LAN controller, use the show exclusionlist command. A list containing each manually Excluded MAC address is displayed.
show exclusionlist
Syntax Description
show
|
Display configurations.
|
exclusionist
|
Manual exclusion list.
|
Defaults
None.
Examples
----------------------- --------------------------------
xx:xx:xx:xx:xx:xx Disallowed Client
Related Commands
config exclusionlist add, config exclusionlist delete, config exclusionlist description, show client
show ike
Use the show ike command to display active IKE SAs.
show ike {brief | IP_or_MAC_address}
Syntax Description
show
|
Command action.
|
ike
|
Display active IKE SAs.
|
brief
|
List of all active IKE SAs.
|
IP_or_MAC_address
|
IP or MAC address of active IKE SA.
|
Defaults
None.
Examples
Related Commands
None
show interface
Use the show interface command to display details of the system interfaces.
show interface {summary | detailed interface_name}
Syntax Description
show interface
|
Command action
|
summary
|
Display a summary of the local interfaces.
|
detailed
|
Display detailed interface information.
|
interface_name
|
Identifies interface name for detailed display
|
Defaults
None.
Examples
Interface Name Vlan Id IP Address Type Ap Mgr
-------------------------------- -------- --------------- ------- ------
ap-manager 149 xxx.xxx.xxx.xxx Static Yes
management 149 xxx.xxx.xxx.xxx Static No
service-port N/A xxx.xxx.xxx.xxx Static No
virtual N/A xxx.xxx.xxx.xxx Static No
> show interface detailed management
Interface Name................................... management
MAC Address...................................... 00:0b:85:32:ab:60
IP Address....................................... 1.100.49.30
IP Netmask....................................... 255.255.255.0
IP Gateway....................................... 1.100.49.1
VLAN............................................. 149
Active Physical Port............................. 1
Primary Physical Port............................ 1
Backup Physical Port............................. Unconfigured
Primary DHCP Server.............................. 1.100.2.15
Secondary DHCP Server............................ Unconfigured
ACL.............................................. Unconfigured
AP Manager....................................... No
Note
Some WLAN controllers may have only one physical port listed because they have only one physical port.
Related Commands
config interface
show inventory
To display a physical inventory of the Cisco Wireless LAN controller, use the show inventory command.
show inventory
Syntax Description
show
|
Display configurations.
|
inventory
|
Physical Cisco Wireless LAN controller configuration.
|
Defaults
None.
Examples
Switch Description............................... Cisco Controller
Machine Model.................................... WLC4404-100
Serial Number.................................... FLS0923003B
Burned-in MAC Address............................ 00:0B:85:32:AB:60
Crypto Accelerator 1............................. Absent
Crypto Accelerator 2............................. Absent
Power Supply 1................................... Absent
Power Supply 2................................... Present, OK
Note
Some wireless LAN controllers may have no crypto accelerator (VPN termination module) or power supplies listed because they have no provisions for VPN termination modules or power supplies.
Related Commands
show sysinfo
show ipsec
Use the show ipsec command to display active IPSec SAs.
show ipsec {brief | IP_or_MAC_address}
Syntax Description
show
|
Command action.
|
ipsec
|
Display active IPSec SAs
|
{brief | IP_or_MAC_address}
|
Enter brief to display active IPSec SAs.
Enter the IP address of MAC address of an IPSec SA.
|
Defaults
None.
Examples
Related Commands
None
show known ap
To display known Cisco 1000 series lightweight access point information, use the show known ap command.
show known ap {summary | detailed MAC}
Syntax Description
show
|
Display configurations.
|
known ap
|
Known Cisco 1000 series lightweight access point information.
|
summary
|
Displays a list of all known access points.
|
detailed
|
Provides detailed information for all known access points.
|
MAC
|
MAC address of the known AP
|
Defaults
None.
Examples
MAC Address State # APs # Clients Last Heard
----------- ----------- ----- -------- -----------------
Related Commands
config ap
show l2tp
To display L2TP sessions, use the show l2tp command.
show l2tp {summary | ip_address}
Syntax Description
show l2tp
|
Display configurations.
|
summary
|
Displays all L2TP sessions.
|
ip_address
|
Displays an L2TP session.
|
Defaults
None.
Examples
LAC_IPaddr LTid LSid RTid RSid ATid ASid State
---------- ---- ---- ---- ---- ---- ---- -----
Related Commands
None
show load-balancing
To display the status of the load-balancing feature, use the show load-balancing command.
show load-balancing
Syntax Description
show
|
Display configurations.
|
load-balancing
|
Display the load-balancing status.
|
Defaults
None.
Examples
Aggressive Load Balancing...................... Enabled
Aggressive Load Balancing Window............... 0 clients
Related Commands
config load-balancing
show location summary
To display information about defined locations, use the show location summary command.
show location summary
Syntax Description
show location
|
Display command for locations.
|
summary
|
Display all location information defined in the system.
|
Defaults
None.
Examples
Status...................................................... disabled
Related Commands
config location
show loginsession
To display the existing sessions, use the show loginsession command.
show loginsession
Syntax Description
show
|
Display configurations.
|
loginsession
|
Current session details.
|
Defaults
None.
Examples
ID User Name Connection From Idle Time Session Time
-- --------------- --------------- ------------ ------------
00 admin EIA-232 00:00:00 00:19:04
Related Commands
config loginsession close
show macfilter
To display the MAC filter parameters, use the show macfilter command. The MAC delimiter (none, colon, or hyphen) for MAC addresses sent to RADIUS servers is displayed. The MAC filter table lists the clients that are always allowed to associate with a wireless LAN.
show macfilter {summary | detail MAC}
Syntax Description
show
|
Display configurations.
|
macfilter
|
Filter details.
|
summary
|
Display a summary of all MAC filter entries.
|
detail MAC
|
Detailed display of a MAC filter entry.
|
Defaults
None.
Examples
> show macfilter detail xx:xx:xx:xx:xx:xx
MAC Address...................................... xx:xx:xx:xx:xx:xx
WLAN Identifier.................................. Any
Interface Name................................... management
Description...................................... RAP
MAC Filter RADIUS Compatibility mode............. Cisco ACS
MAC Filter Delimiter............................. None
MAC Address WLAN Id Description
----------------------- -------------- --------------------------------
xx:xx:xx:xx:xx:xx Any RAP
xx:xx:xx:xx:xx:xx Any PAP2 (2nd hop)
xx:xx:xx:xx:xx:xx Any PAP1 (1st hop)
Related Commands
config macfilter mac-delimiter, config macfilter add, config macfilter delete, config macfilter description, config macfilter ip-address, config macfilter wlan-id, show macfilter.
SHOW MESH COMMANDS
Use the SHOW MESH commands to display mesh settings.
show mesh linkrate
To display the mesh link rate for Cisco 1000 series lightweight access points, use the show mesh linkrate command.
show mesh linkrate <from Cisco_AP> <to Cisco_AP name|MAC address>
Syntax Description
show
|
Display configurations.
|
mesh
|
Mesh configuration.
|
linkrate
|
Show link rate statistics
|
from Cisco_AP
|
From Cisco 1000 series lightweight access point name.
|
to Cisco_AP name|MAC address
|
To Cisco 1000 series lightweight access point name or MAC address.
|
Defaults
None.
Examples
Related Commands
None.
show mesh neigh
To display the mesh neighbors for a Cisco 1000 series lightweight access point, use the show mesh neigh command.
show mesh neigh Cisco_AP
Syntax Description
show
|
Display configurations.
|
mesh
|
Mesh configuration.
|
neigh
|
Show Cisco 1000 series lightweight access point neighborhood list.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
None.
show mesh path
To display the mesh configuration for a Cisco 1000 series lightweight access point, use the show mesh path command.
show mesh path Cisco_AP
Syntax Description
show
|
Display configurations.
|
mesh
|
Mesh configuration.
|
path
|
Show Cisco 1000 series lightweight access point path.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
None.
show mesh stats
To display the mesh statistics for a Cisco 1000 series lightweight access point, use the show mesh stats command.
show mesh stats Cisco_AP
Syntax Description
show
|
Display configurations.
|
mesh
|
Mesh configuration.
|
stats
|
Show Cisco 1000 series lightweight access point statistics.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
None.
show mesh summary
To display the mesh configuration for a Cisco 1000 series lightweight access pointr, use the show mesh summary command.
show mesh summary Cisco_AP
Syntax Description
show
|
Display configurations.
|
summary
|
Show summary neighbor information for an access point.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
None.
show mgmtuser
To display the local management user accounts on the Cisco Wireless LAN controller, use the show mgmtuser command.
show mgmtuser
Syntax Description
show
|
Display configurations.
|
mgmtuser
|
List of management users.
|
Defaults
None.
Examples
User Name Permissions Description
----------------------- ------------ --------------------------------
Related Commands
config mgmtuser add, config mgmtuser delete, config mgmtuser password
SHOW MOBILITY COMMANDS
Use the SHOW MOBILITY commands to display mobility settings.
show mobility anchor
To display the wireless LAN anchor list for the Cisco Wireless LAN controller mobility groups, use the show mobility anchor command.
show mobility anchor
Syntax Description
show
|
Display configurations.
|
mobility
|
Mobility group.
|
anchor
|
Display the mobility wireless LAN anchor list.
|
Defaults
None.
Examples
Mobility Anchor Export List
Related Commands
config mobility group discovery, config mobility group member
show mobility statistics
To display the statistics information for the Cisco Wireless LAN controller mobility groups, use the show mobility statistics command.
show mobility statistics
Syntax Description
show
|
Display configurations.
|
mobility
|
Mobility group.
|
statistics
|
Displays statistics for the mobility manager.
|
Defaults
None.
Examples
> show mobility statistics
Global Mobility Statistics
Rx Errors..................................... 0
Tx Errors..................................... 0
Responses Retransmitted....................... 0
Handoff Requests Received..................... 0
Handoff End Requests Received................. 0
State Transitions Disallowed.................. 0
Resource Unavailable.......................... 0
Mobility Initiator Statistics
Handoff Requests Sent......................... 0
Handoff Replies Received...................... 0
Handoff as Local Received..................... 2
Handoff as Foreign Received................... 0
Handoff Denys Received........................ 0
Anchor Request Sent........................... 0
Anchor Deny Received.......................... 0
Anchor Grant Received......................... 0
Anchor Transfer Received...................... 0
Mobility Responder Statistics
Handoff Requests Ignored...................... 0
Ping Pong Handoff Requests Dropped............ 0
Handoff Requests Dropped...................... 0
Handoff Requests Denied....................... 0
Client Handoff as Local....................... 0
Client Handoff as Foreign ................... 0
Client Handoff Inter Group ................... 0
Anchor Requests Received...................... 0
Anchor Requests Denied........................ 0
Anchor Requests Granted....................... 0
Anchor Transferred............................ 0
Related Commands
config mobility group discovery, config mobility group member
show mobility summary
To display the summary information for the Cisco Wireless LAN controller mobility groups, use the show mobility summary command.
show mobility summary
Syntax Description
show
|
Display configurations.
|
mobility
|
Mobility group.
|
summary
|
Display a summary of the mobility manager.
|
Defaults
None.
Examples
Mobility Protocol Port........................... 16666
Mobility Security Mode........................... Disabled
Default Mobility Domain.......................... mikemesh
Mobility Group members configured................ 1
Switches configured in the Mobility Group
MAC Address IP Address Group Name
xx:xx:xx:xx:xx:xx xxx.xxx.xxx.xxx <local>
Note
Some WLAN controllers may list no mobility security mode.
Related Commands
config mobility group discovery, config mobility group member
show msglog
To display the message logs written to the Cisco Wireless LAN controller database, use the show msglog command. If there are more that 15 entries you are prompted to display the messages shown in the example.
show msglog
Syntax Description
show
|
Display configurations.
|
msglog
|
Show message logs.
|
Defaults
None.
Examples
Message Log Severity Level..................... ERROR
Thu Aug 4 14:30:08 2005 [ERROR] spam_lrad.c 1540: AP 00:0b:85:18:b6:50 associated. Last
AP failure was due to Link Failure
Thu Aug 4 14:30:08 2005 [ERROR] spam_lrad.c 13840: Updating IP info for AP 00:
0b:85:18:b6:50 -- static 0, 1.100.49.240/255.255.255.0, gtw 1.100.49.1
Thu Aug 4 14:29:32 2005 [ERROR] dhcpd.c 78: dhcp server: binding to 0.0.0.0
Thu Aug 4 14:29:32 2005 [ERROR] rrmgroup.c 733: Airewave Director: 802.11a switch group
reset
Thu Aug 4 14:29:32 2005 [ERROR] rrmgroup.c 733: Airewave Director: 802.11bg sw
Thu Aug 4 14:29:22 2005 [ERROR] sim.c 2841: Unable to get link state for primary port 0
of interface ap-manager
Thu Aug 4 14:29:22 2005 [ERROR] dtl_l2_dot1q.c 767: Unable to get USP
Thu Aug 4 14:29:22 2005 Previous message occurred 2 times
Thu Aug 4 14:29:14 2005 [CRITICAL] osapi_sem.c 794: Error! osapiMutexTake called with
NULL pointer: osapi_bsntime.c:927
Thu Aug 4 14:29:14 2005 [CRITICAL] osapi_sem.c 794: Error! osapiMutexTake called with
NULL pointer: osapi_bsntime.c:919
Thu Aug 4 14:29:14 2005 [CRITICAL] hwutils.c 1861: Security Module not found
Thu Aug 4 14:29:13 2005 [CRITICAL] bootos.c 791: Starting code...
Related Commands
show eventlog
show nac statistics
To display detailed Network Access Control (NAC) information about a Cisco Wireless LAN controller, use the show nac statistics command.
show nac statistics
Syntax Description
show
|
Display configurations.
|
nac
|
Network access control.
|
statistics
|
Detailed statistics.
|
Defaults
None.
Examples
Server Index....................................................... 1
Server Address..................................................... xxx.xxx.xxx.xxx
Number of requests sent............................................ 0
Number of retransmissions.......................................... 0
Number of requests received........................................ 0
Number of malformed requests received.............................. 0
Number of bad auth requests received............................... 0
Number of pending requests......................................... 0
Number of timed out requests....................................... 0
Number of misc dropped request received............................ 0
Number of requests sent............................................ 0
Related Commands
show nac acl, show nac summary.
show nac summary
To display NAC summary information for a Cisco Wireless LAN controller, use the show nac summary command.
show nac summary
Syntax Description
show
|
Display configurations.
|
nac
|
Network Access Control.
|
summary
|
Summary information.
|
Defaults
None.
Examples
NAC ACL Name ...............................................
Index Server Address Port State
----- ---------------------------------------- ---- -----
1 xxx.xxx.xxx.xxx 13336 Enabled
Related Commands
show nac acl, show nac statistics.
show netuser
To display local network user accounts, use the show netuser command.
show netuser
Syntax Description
show
|
Display configurations.
|
netuser
|
Network users.
|
Defaults
None.
Examples
User Name WLAN Id Description
----------------------- -------------- --------------------------------
Related Commands
config netuser add, config netuser delete, config netuser password, config netuser wlan-id
show network
To display the network configuration of the Cisco Wireless LAN controller, use the show network command.
show network
Syntax Description
show
|
Display configurations.
|
network
|
Network configuration.
|
Defaults
None.
Examples
RF-Network Name............................. mikemesh
Web Mode.................................... Disable
Secure Web Mode............................. Enable
Secure Shell (ssh).......................... Enable
Telnet...................................... Disable
Ethernet Multicast Mode..................... Disable
User Idle Timeout........................... 300 seconds
ARP Idle Timeout............................ 300 seconds
ARP Unicast Mode............................ Disabled
Cisco AP Default Master..................... Disable
Mgmt Via Wireless Interface................. Disable
Bridge AP Zero Config....................... Enable
Bridge Shared Secret........................ admin
Allow Old Bridging Aps To Authenticate...... Enable
Over The Air Provisioning of AP's........... Enable
Mobile Peer to Peer Blocking................ Disable
Apple Talk................................ Disable
AP Fallback............................... Enable
Web Auth Redirect Ports................... 80
Fast SSID Change.......................... Disabled
Related Commands
config network arptimeout, config network bcast-ssid, config network dsport, config network master-base, config network mgmt-via-wireless, config network params, config network rf-mobility-domain, config network secureweb, config network secweb-passwd, config network ssh, config network telnet, config network usertimeout, config network vlan, config network webmode
show pmk-cache
To display information about the PMK cache, use the show port command.
show pmk-cache {all | MAC}
Syntax Description
show
|
Display configurations.
|
pmk-cache
|
PMK cache.
|
all
|
Display information about all entries in the PMK cache.
|
MAC
|
Display information about a single entry in the PMK cache.
|
Defaults
None.
Examples
> show pmk-cache xx:xx:xx:xx:xx:xx
Station Lifetime VLAN Override IP Override
----------------- -------- -------------------- ---------------
Related Commands
config pmk-cache delete
show port
To display the Cisco Wireless LAN controller port settings on an individual or global basis, use the show port command.
show port {port | summary}
Syntax Description
show
|
Display configurations.
|
port
|
Cisco Wireless LAN controller port.
|
{port | summary}
|
Individual port or all ports.
|
Defaults
None.
Examples
STP Admin Physical Physical Link Link Mcast
Pr Type Stat Mode Mode Status Status Trap Appliance POE
-- ------- ---- ------- ---------- ---------- ------ ------- --------- -------
1 Normal Disa Enable Auto 1000 Full Down Enable Enable N/A
Note
Some WLAN controllers may not have multicast or Power over Ethernet (PoE) listed because they do not support those features.
STP Admin Physical Physical Link Link Mcast
Pr Type Stat Mode Mode Status Status Trap Appliance POE
-- ------- ---- ------- ---------- ---------- ------ ------- --------- -------
1 Normal Forw Enable Auto 1000 Full Up Enable Enable N/A
2 Normal Disa Enable Auto 1000 Full Down Enable Enable N/A
3 Normal Disa Enable Auto 1000 Full Down Enable Enable N/A
4 Normal Disa Enable Auto 1000 Full Down Enable Enable N/A
Note
Some WLAN controllers may have only one port listed because they have only one physical port.
config ap port, config network dsport, config mirror port, config port adminmode, config port linktrap, config port power
show qos queue_length all
To display quality of service (QoS) information (queue length), use the show qos command.
show qos queue_length all
Syntax Description
show
|
Display configurations.
|
qos
|
Quality of Service information.
|
queue_length all
|
Display queue lengths.
|
Defaults
None.
Examples
> show qos queue_length all
Platinum queue length.......................... 255
Gold queue length.............................. 255
Silver queue length............................ 150
Bronze queue length............................ 100
Related Commands
config qos
SHOW RADIUS COMMANDS
Use the SHOW RADIUS commands to display RADIUS settings.
show radius acct statistics
To display the RADIUS accounting server statistics for the Cisco Wireless LAN controller, use the show radius acct statistics command.
show radius acct statistics
Syntax Description
show
|
Display configurations.
|
radius acct
|
RADIUS accounting server.
|
statistics
|
Displays RADIUS accounting server statistics.
|
Defaults
None.
Examples
> show radius acct statistics
Server Index..................................... 1
Server Address................................... 10.1.17.10
Msg Round Trip Time.............................. 0 (1/100 second)
First Requests................................... 0
Retry Requests................................... 0
Accounting Responses............................. 0
Malformed Msgs................................... 0
Bad Authenticator Msgs........................... 0
Pending Requests................................. 0
Timeout Requests................................. 0
Unknowntype Msgs................................. 0
Other Drops...................................... 0
Related Commands
show radius auth statistics, show radius summary
show radius auth statistics
To display the RADIUS authentication server statistics for the Cisco Wireless LAN controller, use the show radius auth statistics command.
show radius auth statistics
Syntax Description
show
|
Display configurations.
|
radius auth
|
RADIUS authentication server.
|
statistics
|
Display RADIUS authentication server statistics.
|
Defaults
None.
Examples
> show radius auth statistics
Server Index..................................... 1
Server Address................................... 1.1.1.1
Msg Round Trip Time.............................. 0 (1/100 second)
First Requests................................... 0
Retry Requests................................... 0
Accept Responses................................. 0
Reject Responses................................. 0
Challenge Responses.............................. 0
Malformed Msgs................................... 0
Bad Authenticator Msgs........................... 0
Pending Requests................................. 0
Timeout Requests................................. 0
Unknowntype Msgs................................. 0
Other Drops...................................... 0
Related Commands
show radius acct statistics, show radius summary
show radius rfc3576 statistics
To display the RADIUS rfc3576 server statistics for the Cisco Wireless LAN controller, use the show radius rfc3576 statistics command.
RFC 3576, an extension to the RADIUS protocol, allows dynamic changes to a user session. This includes support for disconnecting users and changing authorizations applicable to a user session; that is, it provides support for Disconnect and Change-of-Authorization (CoA) messages. Disconnect messages cause a user session to be terminated immediately, whereas CoA messages modify session authorization attributes such as data filters.
show radius rfc3576 statistics
Syntax Description
show
|
Display configurations.
|
radius rfc3576
|
RADIUS RFC3576 server.
|
statistics
|
Display RADIUS RFC-3576 server statistics.
|
Defaults
None.
Examples
> show radius rfc3576 statistics
Server Index..................................... 1
Server Address................................... 10.1.17.10
Msg Round Trip Time.............................. 0 (1/100 second)
First Requests................................... 0
Retry Requests................................... 0
Accounting Responses............................. 0
Malformed Msgs................................... 0
Bad Authenticator Msgs........................... 0
Pending Requests................................. 0
Timeout Requests................................. 0
Unknown type Msgs................................. 0
Other Drops...................................... 0
Related Commands
show radius auth statistics, show radius summary, show radius rfc3576
show radius summary
To display the RADIUS authentication and accounting server summary, use the show radius summary command.
show radius summary
Syntax Description
show
|
Display configurations.
|
radius
|
RADIUS authentication server.
|
summary
|
Server summary.
|
Defaults
None.
Examples
Vendor Id Backward Compatibility................. Disabled
Credentials Caching.............................. Disabled
Call Station Id Type............................. IP Address
Administrative Authentication via RADIUS......... Enabled
Index Type Server Address Port State Tout RFC-3576 IPSec - AuthMod
e/Phase1/Group/Lifetime/Auth/Encr
----- ---- ---------------- ------ -------- ---- -------- ---------------
---------------------------------
Index Type Server Address Port State Tout RFC-3576 IPSec - AuthMod
e/Phase1/Group/Lifetime/Auth/Encr
----- ---- ---------------- ------ -------- ---- -------- ---------------
---------------------------------
Related Commands
show radius auth statistics, show radius acct statistics
SHOW RFID COMMANDS
Use the SHOW RFID commands to display rfid settings.
show rfid config
To display Radio Frequency Identification (RFID) tag tracking information, use the show rfid config command.
show rfid config
Syntax Description
show
|
Display configurations.
|
rfid
|
Network configuration.
|
config
|
Configuration options for RFID tag tracking.
|
Defaults
None.
Examples
RFID Tag data Collection.................... Enabled
RRID Tag Auto-Timeout....................... Enable
RFID Client data Collection................. Disabled
RFID data timeout........................... 1200 seconds
Related Commands
config rfid, show rfid summary, show rfid detail.
show rfid detail
To display detailed information about an RFID tag, use the show rfid detail command.
show rfid detail MAC
Syntax Description
show
|
Display configurations.
|
rfid
|
Network configuration.
|
detail
|
Detailed information for one RFID tag.
|
MAC
|
Show tag details for this MAC address.
|
Defaults
None.
Examples
> show rfid detail xx:xx:xx:xx:xx:xx
Related Commands
config rfid, show rfid config, show rfid summary.
show rfid summary
To display summary information about all known RFID tag tracking tags, use the show rfid summary command.
show rfid summary
Syntax Description
show
|
Display configurations.
|
rfid
|
Network configuration.
|
summary
|
Summary information for all known RFID tags.
|
Defaults
None.
Examples
RFID ID TYPE Closest AP RSSI Time Since Last Heard
-------------- ------ ------------- ------ ---------------------
Related Commands
config rfid, show rfid config, show rfid detail.
SHOW ROGUE ADHOC COMMANDS
Use the ROGUE ADHOC commands rogue adhoc settings.
show rogue adhoc detailed
To show details of an ad-hoc rogue access point detected by the Cisco Wireless LAN controller, use the show rogue adhoc client detailed command.
show rogue adhoc detailed MAC
Syntax Description
show
|
Display configurations.
|
rogue adhoc
|
Ad-hoc rogue.
|
detailed
|
Display detailed information.
|
MAC
|
Ad-hoc rogue MAC address.
|
Defaults
None.
Examples
> show rogue adhoc detailed 00:40:96:90:d1:6a
Adhoc Rogue MAC Address........................ 00:40:96:90:d1:6a
State.......................................... Alert
First Time Adhoc Rogue was Reported............ Sat Aug 9 15:48:50 2003
Last Time Adhoc Rogue was Reported............. Sat Aug 9 21:16:50 2003
MAC Address............................ 00:0b:85:01:88:b0
Name................................... AP1
Radio Type............................. 802.11b
SSID................................... Chichen
Channel................................ 6
RSSI................................... -60 dBm
SNR.................................... 40 dB
Related Commands
show rogue adhoc summary
show rogue adhoc summary
To display a summary of the ad-hoc rogue access points detected by the Cisco Wireless LAN controller, use the show rogue adhoc summary command.
show rogue adhoc summary
Syntax Description
show
|
Display configurations.
|
rogue adhoc
|
Ad-hoc rogue access point.
|
summary
|
Displays a list of all Adhoc Rogues.
|
Defaults
None.
Examples
> show rogue adhoc summary
Client MAC Address Adhoc BSSID State # APs Last Heard
------------------ ----- ----- ----- --- -------
xx:xx:xx:xx:xx:xx Alert 1 Sat Aug 9 21:12:50 2004
xx:xx:xx:xx:xx:xx Alert 1 Aug 9 21:12:50 2003
xx:xx:xx:xx:xx:xx Alert 1 Sat Aug 9 21:10:50 2003
Related Commands
show rogue adhoc detailed
SHOW ROGUE AP COMMANDS
Use the ROGUE AP commands to display rogue access point settings.
show rogue ap clients
To show details of a rogue access point clients detected by the Cisco Wireless LAN controller, use the show rogue ap clients command.
show rogue ap clients MAC
Syntax Description
show
|
Display configurations.
|
rogue ap
|
Rogue access point.
|
clients
|
Summary information.
|
MAC
|
Rogue access point MAC address.
|
Defaults
None.
Examples
> show rogue ap clients xx:xx:xx:xx:xx:xx
Related Commands
show rogue ap summary
show rogue ap detailed
To show details of a rogue access point detected by the Cisco Wireless LAN controller, use the show rogue-ap detailed command.
show rogue ap detailed MAC
Syntax Description
show
|
Display configurations.
|
rogue ap
|
Rogue access point.
|
detailed
|
Display detailed information.
|
MAC
|
Rogue access point MAC address.
|
Defaults
None.
Examples
> show rogue ap detailed xx:xx:xx:xx:xx:xx
Rogue BSSID...................................... xx:xx:xx:xx:xx:xx
Is Rogue on Wired Network........................ No (Unknown if WEP is enabled)
State............................................ Alert
First Time Rogue was Reported.................... Thu Aug 4 16:03:08 2005
Last Time Rogue was Reported..................... Thu Aug 4 19:06:08 2005
MAC Address.............................. xx:xx:xx:xx:xx:xx
Name..................................... AP02
Radio Type............................... 802.11a
SSID..................................... vwent
Channel.................................. 60
RSSI..................................... -80 dBm
SNR...................................... 8 dB
Encryption............................... Disabled
ShortPreamble............................ Disabled
WPA Support.............................. Disabled
Last reported by this AP................. Thu Aug 4 19:06:08 2005
Related Commands
show rogue ap summary, show rogue ap clients
show rogue ap summary
To display a summary of the rogue access points detected by the Cisco Wireless LAN controller, use the show rogue-ap summary command.
show rogue ap summary
Syntax Description
show
|
Display configurations.
|
rogue ap
|
Rogue access point.
|
summary
|
Display a list of all rogue access points.
|
Defaults
None.
Examples
Rogue Location Discovery Protocol................ Disabled
RLDP Auto-Contain................................ Disabled
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- -----------------------
xx:xx:xx:xx:xx:xx Alert 1 0 Thu Aug 4 18:57:11 2005
xx:xx:xx:xx:xx:xx Alert 1 0 Thu Aug 4 19:00:11 2005
xx:xx:xx:xx:xx:xx Alert 1 0 Thu Aug 4 18:57:11 2005
xx:xx:xx:xx:xx:xx Alert 1 0 Thu Aug 4 18:57:11 2005
Related Commands
show rogue ap detailed, show rogue ap clients
SHOW ROGUE CLIENT COMMANDS
Use the following ROGUE CLIENT commands to display the rogue client settings.
show rogue client detailed
To show details of a rogue client detected by a Cisco Wireless LAN controller, use the show rogue client detailed command.
show rogue client detailed MAC
Syntax Description
show
|
Display configurations.
|
rogue client
|
Rogue client.
|
detailed
|
Provide detailed information for a rogue client.
|
MAC
|
Rogue client MAC address.
|
Defaults
None.
Examples
> show rogue client detailed xx:xx:xx:xx:xx:xx
Rogue BSSID...................................... xx:xx:xx:xx:xx:xx
State............................................ Alert
First Time Rogue was Reported.................... Thu Aug 4 18:51:08 2005
Last Time Rogue was Reported..................... Thu Aug 4 19:00:08 2005
Rogue Client IP address.......................... 192.168.1.117
MAC Address.............................. xx:xx:xx:xx:xx:xx
Name..................................... AP02
Radio Type............................... 802.11a
RSSI..................................... -1 dBm
SNR...................................... -1 dB
Channel.................................. 56
Last reported by this AP................. Thu Aug 4 19:00:08 2005
Related Commands
show rogue client summary
show rogue client summary
To display a summary of the rogue clients detected by the Cisco Wireless LAN controller, use the show rogue client summary command.
show rogue client summary
Syntax Description
show
|
Display configurations.
|
rogue client
|
Rogue client.
|
summary
|
Display a list of all rogue clients.
|
Defaults
None.
Examples
> show rogue client summary
MAC Address State # APs Last Heard
----------------- ------------------ ----- -----------------------
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:09:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:03:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:03:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:09:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 18:57:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:12:08 2005
Related Commands
show rogue client detailed
show route summary
To show the routes assigned to the Cisco Wireless LAN controller service port, use the show route summary command.
show route summary
Syntax Description
show route
|
Command action.
|
summary
|
Display all the configured routes.
|
Defaults
None.
Examples
Number of Routes............................... 1
Destination Network Genmask Gateway
------------------- ------------------- -------------------
xxx.xxx.xxx.xxx 255.255.255.0 xxx.xxx.xxx.xxx
Related Commands
config route
show rules
To show the active internal firewall rules, use the show rules command.
show rules
Syntax Description
show rules
|
Display active internal firewall rules.
|
Defaults
None.
Examples
--------------------------------------------------------
Precedence..........: 99999999
Flags...............: 00000001 ( PASS )
--------------------------------------------------------
Precedence..........: 99999999
Flags...............: 00000001 ( PASS )
Service name........: GDB
Dest port low.......: 1000
Dest port high......: 1000
IP High............: 0.0.0.0
--------------------------------------------------------
Related Commands
None.
show run-config
To show a comprehensive view of the current Cisco Wireless LAN controller configuration, use the show run-config command.
show run-config
Syntax Description
show run-config
|
Command action.
|
Defaults
None.
Examples
Press Enter to continue...
Switch Description............................... Cisco Controller
Machine Model....................................
Serial Number.................................... FLS0923003B
Burned-in MAC Address............................ xx:xx:xx:xx:xx:xx
Crypto Accelerator 1............................. Absent
Crypto Accelerator 2............................. Absent
Power Supply 1................................... Absent
Power Supply 2................................... Present, OK
Press Enter to continue Or <Ctl Z> to abort...
Note
Some WLAN controllers may have no Crypto Accelerator (VPN Termination Module) or Power Supplies listed because they have no provisions for VPN Termination Modules or Power Supplies.
Related Commands
config route
show serial
To show the serial (console) port configuration, use the show serial command.
show serial
Syntax Description
show
|
Display configurations.
|
serial
|
Display EIA-232 parameters and serial port inactivity timeout.
|
Defaults
9600, 8, off, 1, none.
Examples
Serial Port Login Timeout (minutes)......... 45
Baud Rate................................... 9600
Character Size.............................. 8
Flow Control:............................... Disable
Stop Bits................................... 1
Parity Type:................................ none
Related Commands
config serial baudrate, config serial timeout
show sessions
To show the console port login timeout and maximum number of simultaneous Command Line Interface (CLI) sessions, use the show sessions command.
show sessions
Syntax Description
show
|
Display configurations.
|
sessions
|
Display CLI session configuration information.
|
Defaults
5 minutes, 5 sessions.
Examples
CLI Login Timeout (minutes)............ 0
Maximum Number of CLI Sessions......... 5
The response indicates that the CLI sessions never time out and that the Cisco Wireless LAN controller can host up to five simultaneous CLI sessions.
Related Commands
config sessions maxsessions, config sessions timeout
show snmpcommunity
To display SNMP community entries, use the show snmpcommunity command.
show snmpcommunity
Syntax Description
show
|
Display configurations.
|
snmpcommunity
|
Display SNMP community entries.
|
Defaults
None.
Examples
SNMP Community Name Client IP Address Client IP Mask Access Mode Status
------------------- ----------------- ----------------- ----------- --------
public 0.0.0.0 0.0.0.0 Read Only Enable
********** 0.0.0.0 0.0.0.0 Read/Write Enable
Related Commands
config snmp version, config snmp community mode, config snmp community accessmode, config snmp community create, config snmp community delete, config snmp community ipaddr
show snmptrap
To show the Cisco Wireless LAN controller SNMP trap receivers and their status, use the show snmptrap command.
show snmptrap
Syntax Description
show
|
Display configurations.
|
snmptrap
|
SNMP trap receivers.
|
Defaults
None.
Examples
SNMP Trap Receiver Name IP Address Status
------------------------ ----------------- --------
xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx Enable
Related Commands
config snmp version, config snmp trapreceiver
show snmpv3user
To show the SNMP version 3 configuration, use the show snmpv3user command.
show snmpv3user
Syntax Description
show
|
Display configurations.
|
snmpv3user
|
SNMP version 3 configuration information.
|
Defaults
None.
Examples
SNMP v3 User Name AccessMode Authentication Encryption
-------------------- ----------- -------------- ----------
default Read/Write HMAC-MD5 CBC-DES
Related Commands
config snmp version, config snmp v3user
show snmpversion
To show the SNMP version status, use the show snmpversion command.
show snmpversion
Syntax Description
show
|
Display configurations.
|
snmpversion
|
Display SNMP v1/v2/v3c status (enabled or disabled).
|
Defaults
Enable.
Examples
SNMP v1 Mode.................................. Disable
SNMP v2c Mode.................................. Enable
SNMP v3 Mode.................................. Enable
Related Commands
config snmp version
show spanningtree port
To show the Cisco Wireless LAN controller spanning tree port configuration, use the show spanningtree port command.
When the a Cisco 4400 Series wireless LAN controller is configured for port redundancy, spanning tree protocol must be disabled for all ports on the Cisco 4400 series wireless LAN controller. Spanning tree protocol can remain enabled on the switch connected to the Cisco 4400 series wireless LAN controller.
show spanningtree port port
Syntax Description
show
|
Display configurations.
|
spanningtree
|
Spanning tree.
|
port
|
Display spanning tree values on a per port basis.
|
port
|
Physical port number:
• 1 through 4 on Cisco 2000 series wireless LAN controller.
• 1 or 2 on Cisco 4100 series wireless LAN controller.
• 1 or 2 on Cisco 4402 series wireless LAN controller.
• 1 through 4 on Cisco 4404 series wireless LAN controller.
|
Note
Some WLAN controllers do not support the spanning tree function.
Defaults
800C, Disabled, 802.1D, 128, 100, Auto.
Examples
> show spanningtree port 3
STP Port ID................................. 800C
STP Port State.............................. Disabled
STP Port Administrative Mode................ 802.1D
STP Port Priority........................... 128
STP Port Path Cost.......................... 100
STP Port Path Cost Mode..................... Auto
Related Commands
config spanningtree port
show spanningtree switch
To show the Cisco Wireless LAN controller network (DS port) spanning tree configuration, use the show spanningtree switch command.
show spanningtree switch
Syntax Description
show
|
Display configurations.
|
spanningtree
|
Spanning tree.
|
switch
|
Display spanning tree values on a per switch basis.
|
Note
Some WLAN controllers do not support the spanning tree function.
Defaults
None.
Examples
> show spanningtree switch
STP Specification...................... IEEE 802.1D
STP Base MAC Address................... 00:0B:85:02:0D:20
Spanning Tree Algorithm................ Disable
STP Bridge Priority.................... 32768
STP Bridge Max. Age (seconds).......... 20
STP Bridge Hello Time (seconds)........ 2
STP Bridge Forward Delay (seconds)..... 15
Related Commands
config spanningtree switch bridgepriority, config spanningtree switch forwarddelay, config spanningtree switch hellotime, config spanningtree switch maxage, config spanningtree switch mode
SHOW STATS COMMANDS
Use the SHOW STATS commands to display controller statistics.
show stats port
To show physical port receive and transmit statistics, use the show stats port command.
show stats port {detailed port | summary port}
Syntax Description
show
|
Display configurations.
|
stats
|
Statistics.
|
port
|
Port.
|
detailed
|
Display detailed port statistics.
|
summary
|
Display port summary statistics.
|
port
|
Physical port number:
• 1 through 4 on Cisco 2000 Series wireless LAN controllers.
• 1 or 2 on Cisco 4100 Series wireless LAN controllers.
• 1 or 2 on Cisco 4402 Series wireless LAN controllers.
• 1 through 4 on Cisco 4404 Series wireless LAN controllers.
• 1 on Cisco WLCM Series wireless LAN controllers.
|
Defaults
None.
Examples
> show stats port summary 1
Packets Received Without Error................. 399958
Packets Received With Error.................... 0
Broadcast Packets Received..................... 8350
Packets Transmitted Without Error.............. 106060
Transmit Packets Errors........................ 0
Collisions Frames.............................. 0
Time Since Counters Last Cleared............... 2 day 11 hr 16 min 23 sec
> show stats port detailed 1
PACKETS RECEIVED (OCTETS)
Total Bytes...................................... 267799881
65-127 byte pkts :354016 128-255 byte pkts :1283092
256-511 byte pkts :8406 512-1023 byte pkts :3006
1024-1518 byte pkts :1184 1519-1530 byte pkts :0
PACKETS RECEIVED SUCCESSFULLY
Total............................................ 2567987
Unicast Pkts :2547844 Multicast Pkts:0 Broadcast Pkts:20143
PACKETS RECEIVED WITH MAC ERRORS
Total............................................ 0
Jabbers :0 Undersize :0 Alignment :0
RECEIVED PACKETS NOT FORWARDED
Total............................................ 0
Local Traffic Frames:0 RX Pause Frames :0
Unacceptable Frames :0 VLAN Membership :0
VLAN Viable Discards:0 MulticastTree Viable:0
CFI Discards :0 Upstream Threshold :0
PACKETS TRANSMITTED (OCTETS)
Total Bytes...................................... 353831
64 byte pkts :0 65-127 byte pkts :0
128-255 byte pkts :0 256-511 byte pkts :0
512-1023 byte pkts :0 1024-1518 byte pkts :2
1519-1530 byte pkts :0 Max Info :1522
PACKETS TRANSMITTED SUCCESSFULLY
Total............................................ 5875
Unicast Pkts :5868 Multicast Pkts:0 Broadcast Pkts:7
Total Errors..................................... 0
FCS Error :0 TX Oversized :0 Underrun Error:0
Total Discards................................... 0
Single Coll Frames :0 Multiple Coll Frames:0
Excessive Coll Frame:0 Port Membership :0
BPDUs Received :6 BPDUs Transmitted :0
Time Since Counters Last Cleared............... 2 day 0 hr 39 min 59 sec
Related Commands
config port adminmode
show stats switch
To show the network (DS port) receive and transmit statistics, use the show stats switch command.
show stats switch {detailed | summary}
Syntax Description
show
|
Display configurations.
|
stats
|
Statistics.
|
switch
|
Cisco Wireless LAN controller.
|
detailed
|
Display detailed switch statistics.
|
summary
|
Display switch summary statistics.
|
Defaults
None.
Examples
> show stats switch summary
Packets Received Without Error................. 136410
Broadcast Packets Received..................... 18805
Packets Received With Error.................... 0
Packets Transmitted Without Error.............. 78002
Broadcast Packets Transmitted.................. 3340
Transmit Packet Errors......................... 2
Address Entries Currently In Use............... 26
VLAN Entries Currently In Use.................. 1
Time Since Counters Last Cleared............... 2 day 11 hr 22 min 17 sec
> show stats switch detailed
Octets........................................... 19351718
Total Pkts....................................... 183468
Unicast Pkts..................................... 180230
Multicast Pkts................................... 3219
Broadcast Pkts................................... 19
Pkts Discarded................................... 0
Octets........................................... 354251
Total Pkts....................................... 5882
Unicast Pkts..................................... 5875
Multicast Pkts................................... 0
Broadcast Pkts................................... 7
Pkts Discarded................................... 0
Most Ever Used................................... 1
Currently In Use................................. 1
Maximum.......................................... 128
Most Ever Used................................... 1
Static In Use.................................... 1
Dynamic In Use................................... 0
VLANs Deleted.................................... 0
Time Since Ctrs Last Cleared..................... 2 day 0 hr 43 min 22 sec
Related Commands
config network dsport
show switchconfig
To display parameters that apply to the Cisco Wireless LAN controller use the show switchconfig command.
show switchconfig
Syntax Description
show
|
Display configurations.
|
switchconfig
|
Display parameters that apply to the Cisco Wireless LAN controller.
|
Defaults
None.
Examples
802.3x Flow Control Mode......................... Disable
Current LWAPP Transport Mode..................... Layer 3
LWAPP Transport Mode after next switch reboot.... Layer 3
Related Commands
config switchconfig flowcontrol, config switchconfig mode
show sysinfo
To show high-level Cisco Wireless LAN controller information, use the show sysinfo command.
show sysinfo
Syntax Description
show
|
Display configurations.
|
sysinfo
|
Cisco Wireless LAN controller information.
|
Defaults
None.
Examples
Manufacturer's Name.......................... <company name>
Product Name.................................
Product Version.............................. 1.2.48.0
RTOS Version................................. 1.2.48.0
Bootloader Version........................... 1.1.11.0
System Name.................................. IT2003
System Location.............................. Andrew 1
System Contact............................... Wireless_administrator
System ObjectID.............................. 1.3.6.1.4.1.14179
IP Address................................... 172.168.2.36
System Up Time............................... 2 days 11 hrs 30 mins 1 secs
Configured Country........................... United States
Operating Environment........................ Commercial (0 to 40 C)
Internal Temp Alarm Limits................... 0 to 65 C
Internal Temperature......................... +38 C
State of 802.11b Network..................... Enabled
State of 802.11a Network..................... Enabled
Number of WLANs.............................. 2
3rd Party Access Point Support............... Disabled
Number of Active Clients..................... 1
Related Commands
config ap, config country, config sysname, config wlan
show syslog
To show the Cisco Wireless LAN controller SNMP trap logging status or target IP Address, use the show syslog command.
show syslog
Syntax Description
show
|
Display configurations.
|
syslog
|
Display the state of system syslog.
|
Defaults
None.
Examples
Syslog destination............................. disabled
Syslog destination............................. xxx.xxx.xxx.xxx
Related Commands
config syslog
show tech-support
To show Cisco Wireless LAN controller variables frequently requested by Cisco Technical Assistance Center (TAC), use the show tech-support command.
show tech-support
Syntax Description
show
|
Display configurations.
|
tech-support
|
Display system resource information.
|
Defaults
None.
Examples
Current CPU Load................................. 0%
Max Free Buffers.............................. 4608
Free Buffers.................................. 4604
Buffers In Use................................ 4
Descriptors Allocated......................... 152
Descriptors Used.............................. 3
Segments Allocated............................ 152
Segments Used................................. 3
Uptime........................................ 747040 Secs
Total Ram..................................... 127552 Kbytes
Free Ram...................................... 19540 Kbytes
Shared Ram.................................... 0 Kbytes
Buffer Ram.................................... 460 Kbytes
Related Commands
None.
show time
To show the Cisco Wireless LAN controller time and date, use the show time command.
show time
Syntax Description
show
|
Display configurations.
|
time
|
Cisco Wireless LAN controller time and date.
|
Defaults
None.
Examples
Time............................................. Thu Aug 4 19:51:49 2005
Timezone delta................................... 0:0
Daylight savings................................. disabled
NTP Polling Interval......................... 86400
------- --------------------------------
Related Commands
config time
show trapflags
To show the Cisco Wireless LAN controller SNMP trap flags, use the show trapflags command.
show trapflags
Syntax Description
show
|
Display configurations.
|
trapflags
|
Display the Cisco Wireless LAN controller SNMP trap flags.
|
Defaults
None.
Examples
Authentication Flag............................ Enable
Link Up/Down Flag.............................. Enable
Multiple Users Flag............................ Enable
Spanning Tree Flag............................. Enable
802.11 Disassociation......................... Disable
802.11 Deauthenticate......................... Disable
802.11 Authenticate Failure................... Disable
802.11 Association Failure.................... Disable
Excluded...................................... Disable
802.11 Security related traps
WEP Decrypt Error............................. Enable
Register...................................... Enable
InterfaceUp................................... Enable
Load.......................................... Enable
Noise......................................... Enable
Interference.................................. Enable
Coverage...................................... Enable
tx-power...................................... Enable
channel....................................... Enable
antenna....................................... Enable
auth.......................................... Enable
servers....................................... Enable
rogueap........................................ Enable
wps............................................ Enable
configsave..................................... Enable
esp-auth...................................... Enable
esp-replay.................................... Enable
invalidSPI.................................... Enable
ike-neg....................................... Enable
suite-neg..................................... Enable
invalid-cookie................................ Enable
Related Commands
config trapflags authentication, config trapflags linkmode, config trapflags multiusers, config trapflags stpmode, config trapflags client, config trapflags ap, config trapflags rrm-profile, config trapflags rrm-params, config trapflags aaa, config trapflags rogueap, config trapflags configsave, config trapflags ipsec, show traplog
show traplog
To show the Cisco Wireless LAN controller SNMP trap log, use the show traplog command.
show traplog
Syntax Description
show
|
Display configurations.
|
traplog
|
Cisco Wireless LAN controller SNMP trap log.
|
Defaults
None.
Examples
Number of Traps Since Last Reset........... 2447
Number of Traps Since Log Last Displayed... 2447
--- ------------------------ -------------------------------------------------
0 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:52:62:fe detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -78 and SNR: 10
1 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:52:19:d8 detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -72 and SNR: 16
2 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:26:a1:8d detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -82 and SNR: 6
3 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:14:b3:4f detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -56 and SNR: 30
Would you like to display more entries? (y/n)
Related Commands
show trapflags
show watchlist
To display the client watchlist, use the show watchlist command.
show watchlist
Syntax Description
show
|
Command action.
|
watchlist
|
Display client watchlist entry.
|
Defaults
None.
Examples
client watchlist state is disabled
Related Commands
config watchlist delete, config watchlist enable, config watchlist disable, config watchlist add
show wlan
To show wireless LAN configuration information, use the show wlan command.
show wlan {mobility anchor wlan_id | summary | wlan_id | foreignAp}
Syntax Description
show
|
Display configurations.
|
wlan
|
Wireless LAN.
|
mobility anchor
|
Display the mobility WLAN anchor list.
|
summary
|
Displays a summary of all wireless LANs.
|
wlan_id
|
Wireless LAN identifier from 1 to 16.
|
foreignAp
|
Displays the configuration for support of foreign access points.
|
Defaults
None.
Examples
WLAN Identifier.................................. 1
Network Name (SSID).............................. openssl
Status........................................... Disabled
MAC Filtering.................................... Disabled
Broadcast SSID................................... Enabled
AAA Policy Override.............................. Disabled
Network Access Control........................... Disabled
Number of Active Clients......................... 0
Exclusionlist Timeout............................ 60 seconds
Session Timeout.................................. 1800 seconds
Interface........................................ management
DHCP Server...................................... Default
Quality of Service............................... Silver (best effort)
WMM.............................................. Disabled
802.11e.......................................... Disabled
Dot11-Phone Mode (7920).......................... Disabled
Wired Protocol................................... None
IPv6 Support..................................... Disabled
Radio Policy..................................... All
802.11 Authentication:........................ Open System
Static WEP Keys............................... Disabled
802.1X........................................ Enabled
Encryption:..................................... 104-bit WEP
Wi-Fi Protected Access (WPA1)................. Disabled
Wi-Fi Protected Access v2 (WPA2).............. Disabled
IP Security Passthru.......................... Disabled
Web Based Authentication...................... Disabled
Web-Passthrough............................... Disabled
Auto Anchor................................... Disabled
Number of WLANs.................................. 1
------- ---------------------- ---------
Related Commands
config wlan blacklist, config wlan create, config wlan delete, config wlan dhcp_server, config wlan disable, config wlan enable, config wlan mac-filtering, config wlan qos, config wlan radio, config wlan security 802.1X, config wlan security 802.1X encryption, config wlan security cranite, config wlan security ipsec, config wlan security ipsec authentication, config wlan security ipsec encryption, config wlan security ipsec ike authentication, config wlan security ipsec ike DH-Group, config wlan security ipsec ike lifetime, config wlan security ipsec ike phase1, config wlan security passthru, config wlan security static-wep-key, config wlan security static-wep-key encryption, config wlan security web, config wlan security web passthru, config wlan security wpa, config wlan security wpa encryption, config wlan timeout
show wps
To display the Wireless Protection System configuration on the Cisco Wireless LAN controller, use the show wps command.
show wps {ap-authentication summary | signature summary | summary}
Syntax Description
show
|
Command action.
|
wps
|
Display WPS configuration.
|
ap-authentication summary
|
Display AP neighbor WPS authentication.
|
signature summary
|
Display the WPS signature summary.
|
summary
|
Display the WPS summary.
|
Defaults
None.
Examples
> show wps ap-authentication summary
AP neighbor authentication is <disabled>.
Authentication alarm threshold is 1.
> show wps signature summary
Precedence....................................... 1
Signature Name................................... Bcast deauth
Type............................................. Standard
FrameType........................................ management
State............................................ enabled
Action........................................... report
Frequency........................................ 30 pkts/sec
Interval......................................... 1 sec
Quiet Time....................................... 300 sec
Description...................................... Broadcast Deauthentication Frame
Precedence....................................... 2
Signature Name................................... NULL probe resp 1
Type............................................. Standard
FrameType........................................ management
State............................................ enabled
Action........................................... report
Frequency........................................ 1 pkts/sec
Interval......................................... 1 sec
Quiet Time....................................... 300 sec
Description...................................... NULL Probe Response - Zero length SSID
element
Excessive 802.11-association failures.......... Enabled
Excessive 802.11-authentication failures....... Enabled
Excessive 802.1x-authentication................ Enabled
Network access control failure................. Enabled
IP-theft....................................... Enabled
Excessive Web authentication failure........... Enabled
Mis-configured AP Action....................... Alarm Only
Enforced encryption policy................... none
Enforced preamble policy..................... none
Enforced radio type policy................... none
Validate SSID................................ Disabled
Alert if Trusted AP is missing................. Disabled
Trusted AP timeout............................. 120
Rogue Location Discovery Protocol.............. Disabled
RLDP Action.................................. Alarm Only
Automatically contain rogues advertising .... Alarm Only
Detect Ad-Hoc Networks....................... Alarm Only
Validate rogue clients against AAA........... Disabled
Detect trusted clients on rogue APs.......... Alarm Only
Rogue AP timeout............................... 1200
Signature Processing........................... Enabled
Related Commands
config watchlist delete, config watchlist enable, config watchlist disable, config watchlist add
Setting Configurations
Use the config commands to configure Cisco Wireless LAN controller options and settings.
CONFIG 802.11A COMMANDS
Use the CONFIG 802.11a commands to configure 802.11a settings.
config 802.11a antenna extAntGain
To configure the 802.11a external antenna gain, use the config 802.11a antenna extAntGain command.
Use the config 802.11a disable command to disable the 802.11a Cisco radio before using the config 802.11a antenna command. After configuring the external antenna gain, use the config 802.11a enable command to enable the 802.11a Cisco radio.
config 802.11a antenna extAntGain antenna_gain Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11a antenna
|
Antennas for 802.11a Cisco radio.
|
extAntGain
|
Configure external antenna gain.
|
antenna_gain
|
Enter antenna gain in 0.5 dBm units.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
To set AP1 to use the 802.11a internal antennas:
> config 802.11a antenna extAntGain 1 AP02
Related Commands
config 802.11a disable, config 802.11a enable, config 802.11a diversity, config 802.11a antenna mode, config 802.11a selection.
config 802.11a antenna diversity
To configure the diversity option for 802.11a antennas, use the config 802.11a antenna diversity command.
config 802.11a antenna diversity {enable | sideA | sideB} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11a antenna diversity
|
Diversity antennas for 802.11a.
|
enable
|
Between the two internal antennas.
|
sideA
|
Between the internal antennas and an external antenna connected to the Cisco 1000 series lightweight access point right port.
|
sideB
|
Between the internal antennas and an external antenna connected to the Cisco 1000 series lightweight access point left port.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
To enable diversity for AP01:
> config 802.11a antenna diversity enable AP01
To enable diversity for AP01 using an external antenna connected to the Cisco lightweight access point Left port (sideA).
> config 802.11a antenna diversity sideA AP01
Related Commands
show ap config 802.11a, config 802.11a disable, config 802.11a enable, config 802.11a extAntGain, config 802.11a antenna mode, config 802.11a selection.
config 802.11a antenna mode
To configure the Cisco 1000 series lightweight access point to use one internal antenna for an 802.11a sectorized 180-degree coverage pattern, or both internal antennas for an 802.11a 360-degree omnidirectional pattern, use the config 802.11a antenna mode command.
config 802.11a antenna mode {omni | sectorA | sectorB} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11a antenna mode
|
Antenna for 802.11a Cisco radio.
|
omni
|
Use both internal antennas.
|
sectorA
|
Use only the Side A internal antenna.
|
sectorB
|
Use only the Side B internal antenna.
|
Cisco_AP
|
Cisco 1000 series IEEE 802.11a/b/g lightweight access point name.
|
Defaults
None.
Examples
> config 802.11a antenna mode omni AP01
Related Commands
show ap config 802.11a, config 802.11a disable, config 802.11a enable, config 802.11a diversity, config 802.11a antenna extAntGain, config 802.11a selection
config 802.11a antenna selection
To configure the 802.11a antenna selection (internal or external), use the config 802.11a antenna selection command.
config 802.11a antenna selection {internal | external} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11a antenna selection
|
Antenna selection (internal or external) for 802.11a.
|
internal
|
Select internal antennas.
|
external
|
Select external antenna.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> config 802.11a antenna selection internal AP02
Related Commands
show ap config 802.11a, config 802.11a disable, config 802.11a enable, config 802.11a extAntGain, config 802.11a diversity, config 802.11a antenna mode.
config 802.11a beaconperiod
In Cisco wireless LAN solution 802.11a networks, all Cisco 1000 series lightweight access point wireless LANs broadcast a beacon at regular intervals. This beacon notifies clients that 802.11a service is available, and allows the clients to synchronize with the Cisco 1000 series lightweight access point. To change the 802.11a beacon period for the whole 802.11a network, use the config 802.11a beaconperiod command.
Before you change the beacon period using the config 802.11a beaconperiod command, make sure that you have disabled the 802.11a network using the config 802.11a disable command. When you are done changing the beacon period, remember to enable the 802.11a network using the config 802.11a enable command.
config 802.11a beaconperiod time_units
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
beaconperiod
|
Send a beacon every 20 to 1000 milliseconds.
|
time_units
|
Beacon interval in time units (TU). One TU is 1024 micro seconds.
|
Defaults
None.
Examples
To configure an 802.11a network for a beacon period of 120 time units:
> config 802.11a beaconperiod 120
Related Commands
show 802.11a, config 802.11b beaconperiod, config 802.11a disable, config 802.11a enable
config 802.11a channel
To configure an 802.11a network for automatic or manual channel selection, use the config 802.11a channel command.
When configuring 802.11a channels for a single Cisco 1000 series lightweight access point, use the config 802.11a disable command to disable the 802.11a network. Then use the config 802.11a channel command to set automatic channel selection by Radio Resource Management (RRM) or manually set the channel for the 802.11a Cisco radio. Then enable the 802.11a network using the config 802.11a enable command.
config 802.11a channel {global {auto | once | off} | Cisco_AP {global | channel}}
Syntax Description
config
|
Configure parameters.
|
802.11a channel
|
Cisco radio channel number.
|
global {auto | once | off}
|
Global channel control:
• Enter auto to enable auto-RF.
• Enter once to enable one-time auto-RF.
• Enter off to disable auto-RF and set all channels to default.
|
Cisco_AP {global | channel}
|
Name of Cisco 1000 series lightweight access point or global setting for all Cisco 1000 series lightweight access points.
• Enter global to enable auto-RF.
• Enter a channel number to set the default channel.
|
Defaults
None.
Examples
To have RRM automatically configure all 802.11a channels based on availability and interference:
> config 802.11a channel global auto
To have RRM automatically reconfigure all 802.11a channels one time based on availability and interference:
> config 802.11a channel global once
To turn 802.11a RRM automatic configuration off:
> config 802.11a channel global off
To configure all 802.11a channels in AP01:
> config 802.11a channel AP01 global
To configure 802.11a channel 36 in AP01 as the default channel:
> config 802.11a channel AP01 36
Related Commands
show 802.11a, config 802.11a disable, config 802.11a enable, config 802.11b channel
config 802.11a disable
To disable 802.11a transmission for the whole network or for an individual Cisco radio, use the config 802.11a disable command. This command can be used any time the CLI interface is active.
Note
You must use this command to disable the network before using many config 802.11a commands.
config 802.11a disable {network | Cisco_AP}
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
disable
|
Disables 802.11a transmission.
|
network
|
Disables transmission for the entire 802.11a network.
|
Cisco_AP
|
Disables transmission for an individual Cisco 1000 series lightweight access point Cisco radio.
|
Defaults
Transmission is enabled for the entire network by default.
Examples
To disable the whole 802.11a network:
> config 802.11a disable network
To disable AP01 802.11a transmissions:
> config 802.11a disable AP01
Related Commands
show sysinfo, show 802.11a, config 802.11a enable, config 802.11b disable, config 802.11b enable, config 802.11a beaconperiod
config 802.11a dtim
In 802.11 networks, the Cisco 1000 series lightweight access point wireless LANs broadcast a beacon at regular intervals, which coincides with the DTIM (Delivery Traffic Indication Map). After the DTIM, if the Cisco 1000 series lightweight access point has any frames buffered for broadcast or multicast, it transmits the buffered frames. This protocol allows power-saving clients to wake up at the appropriate time if they are expecting broadcast or multicast data.
Normally, the DTIM value is set to 1 (transmit broadcast and multicast after every beacon) or 2 (transmit after every other beacon). For instance, if the beaconperiod is 100 ms, and the DTIM value is set to 1, the Cisco 1000 series lightweight access point transmits buffered broadcast and multicast frames 10 times a second; if the beaconperiod is 100 ms, and the DTIM value is set to 2, the Cisco 1000 series lightweight access point transmits buffered broadcast and multicast frames five times a second; either of these settings may be suitable for applications, including VoIP, that expect frequent broadcast and multicast frames.
However, the DTIM value can be set as high as 255 (transmit broadcast and multicast after every 255th beacon), if all 802.11a clients have power save enabled. Because the clients only have to listen when the DTIM time is reached, they can be set to listen for broadcasts and multicasts less frequently, resulting in longer battery life. For instance, if the beaconperiod is 100 ms, and the DTIM value is set to 100, the Cisco 1000 series lightweight access point transmits buffered broadcast and multicast frames once every 10 seconds, allowing the power saving clients to sleep longer between periods when they have to wake up and listen for broadcasts and multicasts, resulting in longer battery life.
Many applications cannot tolerate a long time between broadcast and multicast messages, resulting in poor protocol and application performance. A low DTIM value is indicated for 802.11a networks that support such clients.
To change the DTIM value for the whole 802.11a network, use the config 802.11a dtim command.
config 802.11a dtim period
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
dtim
|
Delivery Traffic Indication Map.
|
period
|
DTIM value in number of beaconperiods.
|
Defaults
1 (every beaconperiod)
Examples
To configure the 802.11a network to transmit multicast and broadcast messages every other DTIM, or beaconperiod:
Related Commands
show 802.11a, config 802.11a beaconperiod, config 802.11b dtim, config 802.11a disable, config 802.11a enable
config 802.11a dtpc
To configure the 802.11a DTPC setting, use the config 802.11a dtpc command.
config 802.11a dtpc {enable | disable}
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
dtpc
|
Dynamic Transmit Power Control.
|
{enable | disable}
|
• Enter enable to enable DTPC setting configuration.
• Enter disable to disable DTPC setting configuration.
|
Defaults
Enabled by default.
Examples
> config 802.11a dtpc disable
Related Commands
show 802.11a, config 802.11a beaconperiod, config 802.11a dtim, config 802.11a disable, config 802.11a enable
config 802.11a enable
Enable 802.11a transmissions for the whole network or for an individual Cisco 1000 series lightweight access point using the config 802.11a enable command. You must use this command to enable the network after configuring other 802.11a parameters.
Note that this command only enables the Cisco wireless LAN solution 802.11a network. To disable the 802.11a, 802.11b and/or 802.11g networks for an individual wireless LAN, use the config wlan radio command.
This command can be used any time the CLI interface is active.
config 802.11a enable {network | Cisco_AP}
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
enable
|
Disables/enables 802.11a.
|
network
|
For the whole network.
|
Cisco_AP
|
Override the network setting for an individual Cisco 1000 series lightweight access point Cisco radio.
|
Defaults
Network = enabled.
Examples
To enable the whole 802.11a network:
> config 802.11a enable network
To enable AP1 802.11a transmissions:
> config 802.11a enable AP1
Related Commands
show sysinfo, show 802.11a, config wlan radio, config 802.11a disable, config 802.11b disable, config 802.11b enable, config 802.11b 11gSupport enable, config 802.11b 11gSupport disable
config 802.11a fragmentation
To configure the 802.11a fragmentation threshold, use the config 802.11a fragmentation command.
This command can only be used when the network is not in operation.
config 802.11a fragmentation threshold
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
fragmentation
|
Fragmentation threshold.
|
threshold
|
Fragmentation threshold value.
|
Defaults
None.
Examples
> config 802.11a fragmentation 6500
Related Commands
config 802.11b fragmentation, show 802.11b, show ap auto-rtf
config 802.11a pico-cell
To enable or disable the 802.11a pico-cell extensions, use the config 802.11a pico-cell command.
This command can only be used when the network is not operational.
config 802.11a pico-cell {enable | disable}
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
pico-cell
|
Pico cell extensions.
|
{enable | disable}
|
Enable or disable.
|
Defaults
None.
Examples
> config 802.11a pico-cell enable
Related Commands
config 802.11b pico-cell, config 802.11a, show 802.11a
config 802.11a rate
To set 802.11a mandatory and supported operational rates, use the config 802.11a rate command.
The data rates set here are negotiated between the client and the Cisco Wireless LAN controller. If the data rate is set to Mandatory, the client must support it in order to use the network. If a data rate is set as Supported by the Cisco Wireless LAN controller, any associated client that also supports that rate may communicate with the Cisco 1000 series IEEE 802.11a/b/g lightweight access point using that rate. But it is not required that a client be able to use all the rates marked Supported in order to associate.
config 802.11a rate {disabled | mandatory | supported} rate
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
rate
|
Set data rate.
|
{disabled | mandatory | supported}
|
• Enter disabled to disable a rate.
• Enter mandatory to set a rate to mandatory.
• Enter supported to set a rate to supported.
|
rate
|
6, 9, 12, 18, 24, 36, 48, or 54 Mbps.
|
Defaults
None.
Examples
To set 802.11a transmission at a mandatory rate at 12 Mbps:
> config 802.11a rate mandatory 12
Related Commands
show ap config 802.11a, config 802.11b rate
config 802.11a txPower
To configure the 802.11a Tx (transmit) power level, use the config 802.11a txPower command.
config 802.11a txPower {global {auto | once | power_level} | Cisco_AP {global | power_level}}
Syntax Description
config
|
Configure parameters.
|
802.11a
|
802.11a network parameters.
|
txPower
|
Transmit power parameter.
|
global
|
All Cisco 1000 series lightweight access points.
|
auto
|
Periodic RRM automatic configuration.
|
once
|
Enable one-time auto-RF.
|
Cisco_AP
|
Cisco 1000 series IEEE 802.11a/b/g lightweight access point name.
|
power_level
|
Transmit power level number. The supported number of levels depends on the access point used. For example, the 1240 access point supports 8 levels and the 1200 access point supports 6 levels.
Note Refer to the related product guide for the maximum regulatory transmit power level limits published for each country code. The power levels and available channels are defined by the country code setting, and are regulated on a country by country basis. Also, the actual maximum transmit power levels may be less than the published regulatory limits.
|
Defaults
Global, Auto.
Examples
To have RRM automatically set the transmit power for all 802.11a Cisco radios at periodic intervals:
> config 802.11a txPower global auto
To set transmit power for all 802.11a Cisco radios to power level 5:
> config 802.11a txPower global 5
To set transmit power for 802.11a AP1 to global:
> config 802.11a txPower AP1 global
To set transmit power for 802.11a AP1 to power level 2:
> config 802.11a txPower AP1 2
Related Commands
show ap config 802.11a, config 802.11b txPower, config country
CONFIG 802.11B COMMANDS
Use the CONFIG 802.11b commands to configure 802.11b settings.
config 802.11b 11gSupport
After enabling the Cisco wireless LAN solution 802.11b network using the config 802.11b enable command, enable or disable the Cisco wireless LAN solution 802.11g network using the config 802.11b 11gSupport command. Note that you must use this command to enable the network after configuring other 802.11b parameters.
Note that this command only enables the Cisco wireless LAN solution 802.11g network after the Cisco wireless LAN solution 802.11b network is enabled using the config 802.11b enable command. To disable the 802.11a, 802.11b and/or 802.11g networks for an individual wireless LAN, use the config wlan radio command.
This command can be used any time the CLI interface is active.
config 802.11b 11gSupport {enable | disable}
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b network parameters.
|
11gSupport
|
Support for the 802.11g network.
|
{enable | disable}
|
Enable or disable 802.11g.
|
Defaults
Enabled.
Examples
> config 802.11b 11gSupport enable
Changing the 11gSupport will cause all the APs to reboot when you enable 802.11b network.
Are you sure you want to continue? (y/n) n
Related Commands
show sysinfo, show 802.11b, config 802.11b enable, config wlan radio, config 802.11b disable, config 802.11a disable, config 802.11a enable
config 802.11b antenna diversity
To configure the diversity option for 802.11b antennas, use the config 802.11b antenna diversity command.
config 802.11b antenna diversity {enable | sideA | sideB} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11b antenna diversity
|
Diversity antennas for 802.11b/g.
|
enable
|
Between the two internal antennas.
|
sideA
|
Between the internal antennas and an external antenna connected to the Cisco 1000 series lightweight access point Left port.
|
sideB
|
Between the internal antennas and an external antenna connected to the Cisco 1000 series lightweight access point Right port.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
To enable diversity for AP01:
> config 802.11b antenna diversity enable AP01
To enable diversity for AP01 using an external antenna connected to the Cisco lightweight access point Left port (sideA):
> config 802.11b antenna diversity sideA AP01
Related Commands
show ap config 802.11b, config 802.11b disable, config 802.11b enable, config 802.11b extAntGain, config 802.11b selection.
config 802.11b antenna extAntGain
To configure the 802.11b/g external antenna gain, use the config 802.11b antenna extAntGain command.
Use the config 802.11b disable command to disable the 802.11b/g Cisco radio before using the config 802.11b antenna extAntGain command. After configuring the external antenna gain, use the config 802.11b enable command to enable the 802.11a Cisco radio.
config 802.11b antenna extAntGain antenna_gain Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11a antenna
|
Antennas for 802.11a/g Cisco radio.
|
extAntGain
|
Configure external antenna gain.
|
antenna_gain
|
Enter antenna gain in 0.5 dBm units.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
To set AP1 to use the 802.11b internal antennas:
> config 802.11b antenna extAntGain 1 AP02
Related Commands
config 802.11b disable, config 802.11b enable, config 802.11b diversity, config 802.11b selection.
config 802.11b antenna selection
To configure the 802.11b/g antenna selection (internal or external), use the config 802.11b antenna selection command.
config 802.11b antenna selection {internal | external} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11b antenna selection
|
Antenna selection (internal or external) for 802.11b.
|
internal
|
Select internal antennas.
|
external
|
Select external antenna.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> config 802.11b antenna selection internal AP02
Related Commands
show ap config 802.11b, config 802.11b disable, config 802.11b enable, config 802.11b extAntGain, config 802.11b diversity.
config 802.11b beaconperiod
In Cisco wireless LAN solution 802.11b/g networks, all Cisco 1000 series lightweight access point wireless LANs broadcast a beacon at regular intervals. This beacon notifies clients that 802.11b/g service is available, and allows the clients to synchronize with the Cisco 1000 series lightweight access point. To change the 802.11b/g beacon period for the whole 802.11b/g network, use the config 802.11b beaconperiod command.
Before you change the beacon period using the config 802.11b beaconperiod command, make sure that you have disabled the 802.11b/g network using the config 802.11b disable command. When you are done changing the beacon period, remember to enable the 802.11b/g network using the config 802.11b enable command.
config 802.11b beaconperiod time_units
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b/g network parameters.
|
beaconperiod
|
Send a beacon every 20 to 1000 milliseconds.
|
time_units
|
Beacon interval (20-1000) in time units (TUs). One TU is 1024 micro seconds.
|
Defaults
100
Examples
To configure an 802.11b/g network for a beacon period of 180 time units:
> config 802.11b beaconperiod 180
Related Commands
show 802.11a, config 802.11a beaconperiod, config 802.11b disable, config 802.11b enable
config 802.11b channel
To configure the 802.11b/g network for automatic or manual channel selection, use the config 802.11b channel command.
When configuring 802.11b/g channels for a single Cisco 1000 series lightweight access point, use the config 802.11b disable command to disable the 802.11b/g network. Then use the config 802.11b channel command to set automatic channel selection by RRM or manually set the channel for the 802.11b/g Cisco radio. Then enable the 802.11b/g network using the config 802.11b enable command.
config 802.11b channel {global {auto | once | off}} | {Cisco_AP {global | channel}}
Syntax Description
config
|
Configure parameters.
|
802.11b channel
|
802.11b/g Cisco radio channel number.
|
global {auto | once | off}
|
Global channel control:
• Enter auto to enable auto-RF.
• Enter once to enable one-time auto-RF.
• Enter off to disable auto-RF and set all channels to default.
|
Cisco_AP
|
Name of Cisco 1000 series lightweight access point or global setting for all Cisco 1000 series lightweight access points.
|
Defaults
None.
Examples
To have RRM automatically configure all 802.11b/g channels based on availability and interference:
> config 802.11b channel global auto
To have RRM automatically reconfigure all 802.11b/g channels one time based on availability and interference:
> config 802.11b channel global once
To turn 802.11b/g RRM automatic configuration off:
> config 802.11b channel global off
To have AP1 use the global (whole network) settings.
> config 802.11b channel AP1 global
To have AP1 start and continue using channel 11.
> config 802.11b channel AP1 channel 11
Only channels 1, 6 and 11 are nonoverlapping.
Related Commands
show 802.11b, config 802.11b disable, config 802.11b enable, config 802.11a channel
config 802.11b disable
Disable or enable 802.11b/g transmissions for the whole network or for an individual Cisco radio using the config 802.11b disable command.
Note that you must use this command to disable the network before using other config 802.11b commands.
This command can be used any time the CLI interface is active.
config 802.11b disable {network | Cisco_AP}
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b/g network parameters.
|
disable
|
Disable 802.11b/g.
|
network
|
Whole network.
|
Cisco_AP
|
Override the network setting for an individual Cisco 1000 series lightweight access point Cisco radio.
|
Defaults
Enabled.
Examples
To disable the whole 802.11b/g network:
> config 802.11b disable network
To disable AP01 802.11b/g transmissions:
> config 802.11b disable AP01
Related Commands
show sysinfo, show 802.11b, config 802.11a disable, config 802.11a enable, config 802.11b enable, config 802.11b beaconperiod
config 802.11b dtim
In 802.11 networks, the Cisco 1000 series lightweight access point wireless LANs broadcast a beacon at regular intervals, which coincide with the DTIM. After the DTIM, if the Cisco 1000 series lightweight access point has any frames buffered for broadcast or multicast, it transmits the buffered frames. This protocol allows power-saving clients to wake up at the appropriate time if they are expecting broadcast or multicast data.
Normally, the DTIM value is set to 1 (transmit broadcast and multicast after every beacon) or 2 (transmit after every other beacon). For instance, if the 802.11b/g beaconperiod is 100 ms, and the DTIM value is set to 1, the Cisco 1000 series lightweight access point transmits buffered broadcast and multicast frames 10 times a second; if the beaconperiod is 100 ms, and the DTIM value is set to 2, the Cisco 1000 series lightweight access point transmits buffered broadcast and multicast frames five times a second; either of these settings may be suitable for applications, including VoIP, that expect frequent broadcast and multicast frames.
However, the DTIM value can be set as high as 255 (transmit broadcast and multicast after every 255th beacon), if all 802.11a clients have power save enabled. Because the clients only have to listen when the DTIM time is reached, they can be set to listen for broadcasts and multicasts less frequently, resulting in longer battery life. For instance, if the 802.11b/g beaconperiod is 100 ms, and the DTIM value is set to 100, the Cisco 1000 series lightweight access point transmits buffered broadcast and multicast frames once every 10 seconds, allowing the power saving clients to sleep longer between periods when they have to wake up and listen for broadcasts and multicasts, resulting in longer battery life.
Note that many applications cannot tolerate a long time between broadcast and multicast messages, resulting in poor protocol and application performance. A low DTIM value is indicated for 802.11b/g networks that support such clients.
To change the DTIM value for the whole 802.11b/g network, use the config 802.11b dtim command.
Before you change the 802.11b/g DTIM value using the config 802.11b dtim command, make sure that you have disabled the 802.11b/g network using the config 802.11b disable command. When you are done changing the DTIM value, remember to enable the 802.11b/g network using the config 802.11b enable command.
config 802.11b dtim period
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b/g network parameters.
|
dtim
|
Delivery Traffic Indication Map.
|
period
|
DTIM period in number of beaconperiods.
|
Defaults
1 (every beaconperiod)
Examples
To configure the 802.11b/g network to transmit multicast and broadcast messages every DTIM, or beaconperiod:
Related Commands
show 802.11b, config 802.11b beaconperiod, config 802.11a dtim, config 802.11b disable, config 802.11b enable
config 802.11b dtpc
To configure the 802.11b DTPC setting, use the config 802.11b dtpc command.
config 802.11b dtpc {enable | disable}
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b network parameters.
|
dtpc
|
Dynamic Transmit Power Control.
|
{enable | disable}
|
• Enter enable to enable DTPC setting configuration.
• Enter disable to disable DTPC setting configuration.
|
Defaults
Enabled by default.
Examples
> config 802.11b dtpc disable
Related Commands
show 802.11b, config 802.11b beaconperiod, config 802.11b dtim, config 802.11b disable, config 802.11b enable
config 802.11b enable
Note that you must use this command to enable the network after configuring other 802.11b parameters.
Note that this command only enables the Cisco wireless LAN solution 802.11b network. To enable the Cisco wireless LAN solution 802.11g network, you MUST have the 802.11b network enabled, and then use the config 802.11b 11gSupport enable command. To disable the 802.11a, 802.11b and/or 802.11g networks for an individual wireless LAN, use the config wlan radio command.
This command can be used any time the CLI interface is active. Note that you must reboot the Cisco Wireless LAN controller to implement this command.
config 802.11b enable {network | Cisco_AP}
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b network parameters.
|
enable
|
Enable or disable 802.11b. Allow support for 802.11g.
|
network
|
For the whole network.
|
Cisco_AP
|
To override the network setting for individual Cisco 1000 series lightweight access point Cisco radio.
|
Defaults
Enabled.
Examples
To enable the whole 802.11b network and provide support for the 802.11g network:
> config 802.11b enable network
To enable AP1 802.11b transmissions and support AP1 802.11g transmissions:
> config 802.11b enable AP1
Related Commands
show sysinfo, show 802.11b, config 802.11b 11gSupport, config wlan radio, config 802.11b disable, config 802.11a disable, config 802.11a enable
config 802.11b fragmentation
To configure the 802.11b/g fragmentation threshold, use the config 802.11b fragmentation command.
This command can only be used when the network is not operational.
config 802.11b fragmentation threshold
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b network parameters.
|
fragmentation
|
Fragmentation threshold.
|
threshold
|
Fragmentation threshold value.
|
Defaults
None.
Examples
> config 802.11b fragmentation 6500
Related Commands
config 802.11a fragmentation, show 802.11a, show auto-rft
config 802.11b pico-cell
To enable or disable the 802.11b/g pico-cell extensions, use the config 802.11b pico-cell command. This command can only be used when the network is not operational.
config 802.11b pico-cell {enable | disable}
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b network parameters.
|
pico-cell
|
Pico cell extensions.
|
{enable | disable}
|
Enable or disable.
|
Defaults
(None.)
Examples
> config 802.11b pico-cell enable
Related Commands
config 802.11a pico-cell, show 802.11b
config 802.11b preamble
Use this command to change the 802.11b preamble as defined in subclause 18.2.2.2 to long (slower, but more reliable) or short (faster, but less reliable). This command can be used any time the CLI interface is active.
This parameter must be set to long to optimize this Cisco Wireless LAN controller for some clients, including SpectraLink NetLink telephones.
Note
You must reboot the Cisco Wireless LAN controller (reset system) with save to implement this command.
config 802.11b preamble {long | short}
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b network parameters.
|
preamble
|
As defined in subclause 18.2.2.2.
|
{long | short}
|
Long or short 802.11b preamble.
|
Defaults
Short.
Examples
> config 802.11b preamble short
>(reset system with save)
Short Preamble mandatory......................... Enabled
> config 802.11b preamble long
>(reset system with save)
Short Preamble mandatory......................... Disabled
Related Commands
show 802.11b
config 802.11b rate
To configure 802.11b/g mandatory and supported operational rates, use the config 802.11b rate command.
config 802.11b rate {disabled | mandatory | supported} rate
The data rates set here are negotiated between the client and the Cisco Wireless LAN controller. If the data rate is set to Mandatory, the client must support it in order to use the network. If a data rate is set as Supported by the Cisco Wireless LAN controller, any associated client that also supports that rate may communicate with the Cisco 1000 series IEEE 802.11a/b/g lightweight access point using that rate. But it is not required that a client be able to use all the rates marked Supported in order to associate.
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b/g network parameters.
|
rate
|
Configure mandatory and supported operational rates.
|
{disabled | mandatory | supported}
|
• Enter disabled to disable a rate.
• Enter mandatory to set a rate to mandatory.
• Enter supported to set a rate to supported.
|
rate
|
1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, or 54 Mbps data rate.
|
Defaults
None.
Examples
To set 802.11b/g transmission at a mandatory rate at 5.5 Mbps:
> config 802.11b rate mandatory 5.5
Related Commands
show ap config 802.11b, config 802.11a rate
config 802.11b txPower
To configure the 802.11b/g Tx (Transmit) Power Level, use the config 802.11b txPower command.
config 802.11b txPower {global {auto | once | power_level} | Cisco_AP {global | power_level}}
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11b/g network parameters.
|
txPower
|
Transmit power parameter.
|
global
|
All Cisco 1000 series lightweight access points.
|
auto
|
Periodic RRM automatic configuration.
|
Cisco_AP
|
Cisco 1000 series IEEE 802.11a/b/g lightweight access point name.
|
power_level
|
Transmit power level number. The supported number of levels depends on the access point used. For example, the 1240 access point supports 8 levels and the 1200 access point supports 6 levels.
Note Refer to the related product guide for the maximum regulatory transmit power level limits published for each country code. The power levels and available channels are defined by the country code setting, and are regulated on a country by country basis. Also, the actual maximum transmit power levels may be less than the published regulatory limits.
|
Defaults
Global, Auto.
Examples
To have RRM automatically set the transmit power for all 802.11b/g Cisco radios at periodic intervals:
> config 802.11a txPower global auto
To have RRM automatically reset the transmit power for all 802.11b/g Cisco radios one time:
> config 802.11b txPower global once
To set transmit power for all 802.11b/g Cisco radios to power level 5:
> config 802.11b txPower global 5
To set transmit power for 802.11b/g AP1 to global:
> config 802.11b txPower AP1 global
To set transmit power for 802.11b/g AP1 to power level 2:
> config 802.11b txPower AP1 2
Related Commands
show ap config 802.11b, config 802.11a txPower, config country
CONFIG 802.11h COMMANDS
Use the CONFIG 802.11h commands to configure 802.11h settings.
config 802.11h channelswitch
To configure 802.11h channel switch announcement, use the config 802.11h channelswitch command.
config 802.11h channelswitch {enable mode value | disable}
Syntax Description
config
|
Configure parameters.
|
802.11h
|
802.11h network parameters.
|
channelswitch
|
|
{enable | disable}
|
Enable or disable 802.11h channel switch announcement.
|
mode
|
802.11h channel switch announcement mode.
|
value
|
802.11h channel announcement value.
|
Defaults
None.
Examples
> config 802.11h channelswitch disable
Related Commands
show 802.11h
config 802.11h powerconstraint
To configure 802.11h power constraint value, use the config 802.11h powerconstraint command.
config 802.11h powerconstraint value
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11h network parameters.
|
value
|
802.11h power constraint value.
|
Defaults
None.
Examples
> config 802.11h powerconstraint 5
Related Commands
show 802.11h
config 802.11h setchannel
To configure a new channel using 802.11h channel announcement, use the config 802.11h setchannel command.
config 802.11h setchannel Cisco_AP
Syntax Description
config
|
Configure parameters.
|
802.11b
|
802.11h network parameters.
|
Cisco_AP
|
Cisco 1000 series IEEE 802.11a/b/g lightweight access point name.
|
Defaults
None.
Examples
> config 802.11h setchannel ap02
Related Commands
show 802.11h
config acl apply
To apply the Access Control List (ACL) to the data path, use the config acl apply command.
config acl apply rule_name
Note
For a Cisco 2000 series wireless LAN controller, you must configure a pre-authentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL under Web Policy. However, you do not need to configure any pre-authentication ACL for Cisco 4100 series wireless LAN controllers and Cisco 4400 series wireless LAN controllers.
Syntax Description
config acl
|
Command action.
|
apply
|
Applies the ACL (name with up to 32 alphanumeric characters) to the data path.
|
rule_name
|
ACL name up to 32 alphanumeric characters.
|
Defaults
None.
Examples
Related Commands
show acl
config acl create
To create a new ACL, use the config acl create command.
config acl create rule_name
Note
For a Cisco 2000 series wireless LAN controller, you must configure a pre-authentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL under Web Policy. However, you do not need to configure any pre-authentication ACL for Cisco 4100 series wireless LAN controllers and Cisco 4400 series wireless LAN controllers.
Syntax Description
config acl
|
Command action.
|
create
|
Create a new ACL.
|
rule_name
|
ACL name up to 32 alphanumeric characters.
|
Defaults
None.
Examples
> config acl create acl01
Related Commands
show acl
config acl cpu
To create a new ACL rule that restricts the traffic reaching the CPU, use the config acl cpu command. This allows you to control the type of packets reaching the CPU.
config acl cpu rule_name {wired} {wireless} {both}
Syntax Description
config acl cpu
|
Command action.
|
None
|
Disable the CPU ACL.
|
rule_name
|
ACL name up to 32 alphanumeric characters.
|
Wired
|
Enable ACL on wired traffic.
|
Wireless
|
Enable ACL on wireless traffic
|
Both
|
Enable ACL on both wired and wireless traffic.
|
Defaults
None.
Examples
The following example shows how to create an ACL named acl101 on the CPU and apply it to wired traffic.
> config acl cpu acl01 wired
Related Commands
None.
config acl delete
To delete an ACL, use the config acl delete command.
config acl delete rule_name
Note
For a Cisco 2000 series wireless LAN controller, you must configure a pre-authentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL under Web Policy. However, you do not need to configure any pre-authentication ACL for Cisco 4100 series wireless LAN controllers and Cisco 4400 series wireless LAN controllers.
Syntax Description
config acl
|
Command action.
|
delete
|
Delete an ACL.
|
rule_name
|
ACL name up to 32 alphanumeric characters.
|
Defaults
None.
Examples
> config acl delete acl01
Related Commands
show acl
config acl rule
To configure ACL rules, use the config acl rule command.
config acl rule {
action rule_name rule_index {permit | deny} |
add rule_name rule_index |
change index rule_name old_index new_index |
delete rule_name rule_index |
destination address rule_name rule_index ip_address netmask |
destination port range rule_name rule_index start_port end_port |
direction rule_name rule_index {in | out | any} |
dscp rule_name rule_index dscp |
protocol rule_name rule_index protocol |
source address rule_name rule_index ip_address netmask |
source port range rule_name rule_index start_port end_port |
swap index rule_name index_1 index_2}
Note
For a Cisco 2000 series wireless LAN controller, you must configure a pre-authentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL under Web Policy. However, you do not need to configure any pre-authentication ACL for Cisco 4100 series wireless LAN controllers and Cisco 4400 series wireless LAN controllers.
Syntax Description
config acl
|
Command action.
|
rule
|
Configures ACL rules.
|
action
|
Configures a rule's action whether to permit or deny access.
|
add
|
Adds a new rule.
|
change
|
Changes a rule's index.
|
delete
|
Deletes a rule.
|
destination address
|
Configures a rule's destination IP address and netmask.
|
destination port range
|
Configures a rule's destination port range.
|
direction
|
Configures a rule's direction to in, out, or any.
|
dscp
|
Configures a rule's DSCP.
|
protocol
|
Configures a rule's IP Protocol.
|
source address
|
Configures a rule's source IP address, netmask.
|
source port range
|
Configures a rule's source port range.
|
swap
|
Swaps two rules' indices.
|
rule_name
|
ACL name up to 32 alphanumeric characters.
|
rule_index
|
Rule index between 1 and 32.
|
ip_address
|
The rule's IP Address.
|
netmask
|
The rule's netmask.
|
start_port
|
The start port number (between 0 and 65535).
|
end_port
|
The end port number (between 0 and 65535).
|
dscp
|
A number between 0 and 63, or any.
|
protocol
|
A number between 0 and 255, or any.
|
Defaults
None.
Examples
> config acl rule action lab1 4 permit
Related Commands
show acl
CONFIG ADVANCED 802.11A COMMANDS
Use the ADVANCED 802.11a commands to configure advanced 802.11a settings.
config advanced 802.11a channel foreign
To have RRM consider or ignore foreign 802.11a interference avoidance in making channel selection updates for all 802.11a Cisco 1000 series lightweight access points, use the config advanced 802.11a channel foreign command.
config advanced 802.11a channel foreign {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
channel
|
RRM channel selections.
|
foreign
|
Foreign interference.
|
{enable | disable}
|
Enable foreign access point 802.11a interference avoidance in the channel assignment.
Disable foreign access point 802.11a interference avoidance in the channel assignment.
|
Defaults
Enabled.
Examples
To have RRM consider foreign 802.11a interference when making channel selection updates for all 802.11a Cisco 1000 series lightweight access points:
> config advanced 802.11a channel foreign enable
Related Commands
show advanced 802.11a channel, config advanced 802.11b channel foreign
config advanced 802.11a channel load
To have RRM consider or ignore traffic load in making channel selection updates for all 802.11a Cisco 1000 series lightweight access points, use the config advanced 802.11a channel load command.
config advanced 802.11a channel load {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
channel
|
RRM channel selections.
|
load
|
Traffic load.
|
{enable | disable}
|
Enable Cisco 1000 Series lightweight access point 802.11a load avoidance in the channel assignment.
Disable Cisco 1000 Series lightweight access point 802.11a load avoidance in the channel assignment.
|
Defaults
Disabled.
Examples
To have RRM consider traffic load when making channel selection updates for all 802.11a Cisco 1000 series lightweight access points:
> config advanced 802.11a channel load enable
Related Commands
show advanced 802.11a channel, config advanced 802.11b channel load
config advanced 802.11a channel noise
To have RRM consider or ignore non-802.11a noise in making channel selection updates for all 802.11a Cisco 1000 series lightweight access points, use the config advanced 802.11a channel noise command.
config advanced 802.11a channel noise {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
channel
|
RRM channel selections.
|
noise
|
Non-802.11a noise.
|
{enable | disable}
|
Enable non-802.11a noise avoidance in the channel assignment. or ignore.
Disable non-802.11a noise avoidance in the channel assignment.
|
Defaults
Disabled.
Examples
To have RRM consider non-802.11a noise when making channel selection updates for all 802.11a Cisco 1000 series lightweight access points:
> config advanced 802.11a channel noise enable
Related Commands
show advanced 802.11a channel, config advanced 802.11b channel noise
config advanced 802.11a channel update
To have RRM initiate a channel selection update for all 802.11a Cisco 1000 series lightweight access points, use the config advanced 802.11a channel update command.
config advanced 802.11a channel update
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
channel update
|
Have RRM update the channel selections.
|
Defaults
None.
Examples
> config advanced 802.11a channel update
Related Commands
show advanced 802.11a channel, config advanced 802.11b channel update
config advanced 802.11a factory
To reset 802.11a advanced settings back to the factory defaults, use the config advanced 802.11a factory command.
config advanced 802.11a factory
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
factory
|
Return all 802.11a advanced settings to their factory defaults.
|
Defaults
None.
Examples
> config advanced 802.11a factory
Related Commands
show advanced 802.11a channel
config advanced 802.11a group-mode
To set the 802.11a automatic RF group selection mode on or off, use the config advanced 802.11a group-mode command.
config advanced 802.11a group-mode {auto | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
group-mode
|
Cisco radio RF grouping.
|
{auto | off}
|
Enter auto to set the 802.11a RF group selection to automatic update mode.
Enter off to set the 802.11a RF group selection off.
|
Defaults
Auto.
Examples
To turn the 802.11a automatic RF group selection mode on:
> config advanced 802.11a group-mode auto
To turn the 802.11a automatic RF group selection mode off:
> config advanced 802.11a group-mode off
Related Commands
show advanced 802.11a group, config advanced 802.11b group-mode
config advanced 802.11a logging channel
To turn the channel change logging mode on or off, use the config advanced 802.11a logging channel command.
config advanced 802.11a logging channel {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
logging channel
|
Log channel changes.
|
{on | off}
|
Enable or disable 802.11a channel logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11a logging channel on
Related Commands
show advanced 802.11a logging, config advanced 802.11b logging channel
config advanced 802.11a logging coverage
To turn the coverage profile logging mode on or off, use the config advanced 802.11a logging coverage command.
config advanced 802.11a logging coverage {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
logging coverage
|
Log coverage changes.
|
{on | off}
|
Enable or disable 802.11a coverage profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11a logging coverage on
Related Commands
show advanced 802.11a logging, config advanced 802.11b logging coverage
config advanced 802.11a logging foreign
To turn the foreign interference profile logging mode on or off, use the config advanced 802.11a logging foreign command.
config advanced 802.11a logging foreign {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
logging foreign
|
Log foreign changes.
|
{on | off}
|
Enable or disable 802.11a foreign interference profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11a logging foreign on
Related Commands
show advanced 802.11a logging, config advanced 802.11b logging foreign
config advanced 802.11a logging load
To turn the 802.11a load profile logging mode on or off, use the config advanced 802.11a logging load command.
config advanced 802.11a logging load {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
logging load
|
Log load changes.
|
{on | off}
|
Enable or disable 802.11a load profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11a logging load on
Related Commands
show advanced 802.11a logging, config advanced 802.11b logging load
config advanced 802.11a logging noise
To turn the 802.11a noise profile logging mode on or off, use the config advanced 802.11a logging noise command.
config advanced 802.11a logging noise {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
logging noise
|
Log noise changes.
|
{on | off}
|
Enable or disable 802.11a noise profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11a logging noise on
Related Commands
show advanced 802.11a logging, config advanced 802.11b logging noise
config advanced 802.11a logging performance
To turn the 802.11a performance profile logging mode on or off, use the config advanced 802.11a logging performance command.
config advanced 802.11a logging performance {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
logging performance
|
Log performance changes.
|
{on | off}
|
Enable or disable 802.11a performance profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11a logging performance on
Related Commands
show advanced 802.11a logging, config advanced 802.11b logging performance
config advanced 802.11a logging txpower
To turn the 802.11a transmit power change logging mode on or off, use the config advanced 802.11a logging txpower command.
config advanced 802.11a logging txpower {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
logging txpower
|
Log power changes.
|
{on | off}
|
Enable or disable 802.11a transmit power change logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11a logging txpower off
Related Commands
show advanced 802.11a logging, config advanced 802.11b logging power
config advanced 802.11a monitor channel-list
To set the 802.11a noise, interference, and rogue monitoring channel list, use the config advanced 802.11a monitor channel-list command.
config advanced 802.11a monitor channel-list {all | country | dca}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
monitor channel-list
|
Monitor coverage interval.
|
{all | country | dca}
|
• Enter all to monitor all channels.
• Enter country to monitor the channels used in the configured country code.
• Enter dca to monitor the channels used by the automatic channel assignment.
|
Defaults
country.
Examples
> config advanced 802.11a monitor channel-list country
Related Commands
show advanced 802.11a monitor coverage
config advanced 802.11a monitor coverage
To set the coverage measurement interval between 60 and 3600 seconds, use the config advanced 802.11a monitor coverage command.
config advanced 802.11a monitor coverage seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
monitor coverage
|
Monitor coverage interval.
|
seconds
|
Coverage measurement interval between 60 and 3600 seconds.
|
Defaults
180 seconds.
Examples
To set the coverage measurement interval to 60 seconds:
> config advanced 802.11a monitor coverage 60
Related Commands
show advanced 802.11a monitor, config advanced 802.11b monitor coverage
config advanced 802.11a monitor load
To set the load measurement interval between 60 and 3600 seconds, use the config advanced 802.11a monitor load command.
config advanced 802.11a monitor load seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
monitor load
|
Monitor load interval.
|
seconds
|
Load measurement interval between 60 and 3600 seconds.
|
Defaults
60 seconds.
Examples
To set the load measurement interval to 60 seconds:
> config advanced 802.11a monitor load 60
Related Commands
show advanced 802.11a monitor, config advanced 802.11b monitor load
config advanced 802.11a monitor mode
To enable or disable 802.11a access point monitoring, use the config advanced 802.11a monitor mode command.
config advanced 802.11a monitor mode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
monitor mode
|
Monitor mode.
|
{enable | disable}
|
Enable or disable 802.11a access point monitoring.
|
Defaults
Enabled.
Examples
> config advanced 802.11a monitor mode enable
Related Commands
show advanced 802.11a monitor, config advanced 802.11b monitor mode
config advanced 802.11a monitor noise
To set the 802.11a noise measurement interval between 60 and 3600 seconds, use the config advanced 802.11a monitor noise command.
config advanced 802.11a monitor noise seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
monitor noise
|
Monitor noise interval.
|
seconds
|
Noise measurement interval between 60 and 3600 seconds.
|
Defaults
180 seconds.
Examples
To set the noise measurement interval to 120 seconds:
> config advanced 802.11a monitor noise 120
Related Commands
show advanced 802.11a monitor, config advanced 802.11b monitor noise
config advanced 802.11a monitor signal
To set the signal measurement interval between 60 and 3600 seconds, use the config advanced 802.11a monitor signal command.
config advanced 802.11a monitor signal seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
monitor signal
|
Monitor signal interval.
|
seconds
|
Signal measurement interval between 60 and 3600 seconds.
|
Defaults
60 seconds.
Examples
To set the signal measurement interval to 120 seconds:
> config advanced 802.11a monitor signal 120
Related Commands
show advanced 802.11a monitor, config advanced 802.11b monitor signal
config advanced 802.11a profile clients
To set the Cisco 1000 series IEEE 802.11a/b/g lightweight access point clients threshold between 1 and 75 clients, use the config advanced 802.11a profile clients command.
config advanced 802.11a profile clients {global | Cisco_AP} clients
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile clients
|
Cisco 1000 series lightweight access point Client profile
|
{global | Cisco_AP}
|
• Enter global to configure all 802.11a Cisco 1000 Series lightweight access points.
• Enter a Cisco 1000 Series lightweight access point name.
|
clients
|
802.11a Cisco 1000 Series lightweight access point clients threshold between 1 and 75 clients.
|
Defaults
12 clients.
Examples
To set all Cisco 1000 series lightweight access point clients thresholds to 25 clients:
> config advanced 802.11a profile clients global 25
Global client count profile set.
To set the AP1 clients threshold to 75 clients:
> config advanced 802.11a profile clients AP1 75
Global client count profile set.
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile clients
config advanced 802.11a profile coverage
To set the Cisco 1000 series lightweight access point coverage threshold between 3 and 50 dB, use the config advanced 802.11a profile coverage command.
config advanced 802.11a profile coverage {global | Cisco_AP} dBm
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile coverage
|
Cisco 1000 series lightweight access point profile coverage
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
dBm
|
3 to 50 dB.
|
Defaults
12 dB.
Examples
To set all Cisco 1000 series lightweight access point coverage thresholds to 30 dB:
> config advanced 802.11a profile coverage global 30
To set AP1 coverage thresholds to 50 dB:
> config advanced 802.11a profile coverage AP1 50
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile coverage
config advanced 802.11a profile customize
To turn customizing on or off for an 802.11a Cisco 1000 series lightweight access point performance profile, use the config advanced 802.11a profile customize command.
config advanced 802.11a profile customize Cisco_AP {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
customize
|
Performance profile.
|
Cisco_AP
|
Cisco 1000 series lightweight access point.
|
{on | off}
|
Enter on to customize performance profiles for this Cisco 1000 Series lightweight access point.
Enter off to use global default performance profiles for this Cisco 1000 Series lightweight access point.
|
Defaults
Off.
Examples
To turn performance profile customization on for 802.11a Cisco 1000 series lightweight access point AP1:
> config advanced 802.11a profile customize AP1 on
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile customize
config advanced 802.11a profile exception
To set the Cisco 1000 series lightweight access point coverage exception level between 0 and 100 percent, use the config advanced 802.11a profile exception command.
config advanced 802.11a profile exception {global | Cisco_AP} percent
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile exception
|
Cisco 1000 series lightweight access point profile exception
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
percent
|
802.11a Cisco 1000 Series lightweight access point coverage exception level between 0 and 100 percent.
|
Defaults
25 percent.
Examples
To set all Cisco 1000 series lightweight access point coverage exception levels to 0 percent:
> config advanced 802.11a profile exception global 0
To set the AP1 coverage exception level to 100 percent:
> config advanced 802.11a profile exception AP1 100
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile exception
config advanced 802.11a profile foreign
To set the foreign 802.11a transmitter interference threshold between 0 and 100 percent, use the config advanced 802.11a profile foreign command.
config advanced 802.11a profile foreign {global | Cisco_AP} percent
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile foreign
|
Foreign interference profile.
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
percent
|
802.11a foreign 802.11a interference threshold between 0 and 100 percent.
|
Defaults
10.
Examples
To set the Other 802.11a transmitter interference threshold for all Cisco 1000 series lightweight access points to 50 percent:
> config advanced 802.11a profile foreign global 50
To set the Other 802.11a transmitter interference threshold for AP1 to 0 percent:
> config advanced 802.11a profile foreign AP1 0
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile foreign
config advanced 802.11a profile level
To set the Cisco 1000 series lightweight access point client minimum exception level between 1 and 75 clients, use the config advanced 802.11a profile level command.
config advanced 802.11a profile level {global | Cisco_AP} clients
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile level
|
Cisco 1000 series lightweight access point profile level
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
clients
|
802.11a Cisco 1000 Series lightweight access point client minimum exception level between 1 and 75 clients.
|
Defaults
3 clients.
Examples
To set all Cisco 1000 series lightweight access point client minimum exception levels to 10 clients:
> config advanced 802.11a profile level global 10
To set the AP1 client minimum exception level to 25 clients:
> config advanced 802.11a profile level AP1 25
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile level
config advanced 802.11a profile noise
To set the 802.11a foreign noise threshold between -127 and 0 dBm, use the config advanced 802.11a profile noise command.
config advanced 802.11a profile noise {global | Cisco_AP} dBm
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile noise
|
Profile noise limits
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
dBm
|
802.11a foreign noise threshold between -127 and 0 dBm.
|
Defaults
-70 dBm.
Examples
To set the 802.11a foreign noise threshold for all Cisco 1000 series lightweight access points to -127 dBm:
> config advanced 802.11a profile noise global -127
To set the 802.11a foreign noise threshold for AP1 to 0 dBm:
> config advanced 802.11a profile noise AP1 0
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile noise
config advanced 802.11a profile throughput
To set the Cisco 1000 series lightweight access point data-rate throughput threshold between 1000 and 10000000 bytes per second, use the config advanced 802.11a profile throughput command.
config advanced 802.11a profile throughput {global | Cisco_AP} value
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile throughput
|
Data rate threshold.
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
value
|
802.11a Cisco 1000 Series lightweight access point throughput threshold between 1000 and 10000000 bytes per second.
|
Defaults
1,000,000 bytes per second.
Examples
To set all Cisco 1000 series lightweight access point data-rate thresholds to 1000 bytes per second:
> config advanced 802.11a profile data-rate global 1000
To set the AP1 data-rate threshold to 10000000 bytes per second:
> config advanced 802.11a profile data-rate AP1 10000000
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile data-rate
config advanced 802.11a profile utilization
To set the RF utilization threshold between 0 and 100 percent, use the config advanced 802.11a profile utilization command. OS generates a trap when this threshold is exceeded.
config advanced 802.11a profile utilization {global | Cisco_AP} percent
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
profile utilization
|
Cisco 1000 series lightweight access point profile utilization
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
percent
|
802.11a RF utilization threshold between 0 and 100 percent.
|
Defaults
80 percent.
Examples
To set the RF utilization threshold for all Cisco 1000 series lightweight access points to 0 percent:
> config advanced 802.11a profile utilization global 0
To set the RF utilization threshold for AP1 to 100 percent:
> config advanced 802.11a profile utilization AP1 100
Related Commands
show advanced 802.11a profile, config advanced 802.11b profile utilization
config advanced 802.11a receiver
To set the advanced receiver configuration, use the config advanced 802.11a receiver command.
config advanced 802.11a receiver {default | rxstart jumpThreshold value}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
receiver
|
Receiver configuration.
|
default
|
Default advanced receiver configuration.
|
rxstart jumpThreshold value
|
802.11a advanced receiver start signal jump threshold configuration value (between 0 and 127).
|
Defaults
None.
Examples
To prevent changes to receiver parameters while network is enabled:
> config advanced802.11a receiver default
Related Commands
config advanced 802.11b receiver
config advanced 802.11a txpower-update
To initiate updates of the 802.11a transmit power for every Cisco 1000 series lightweight access point, use the config advanced 802.11a txpower-update command.
config advanced 802.11a txpower-update
Syntax Description
config
|
Configure parameters.
|
advanced 802.11a
|
Advanced 802.11a parameters.
|
txpower-update
|
Update transmission power
|
Defaults
None.
Examples
> config advanced 802.11a txpower-update
Related Commands
config advance 802.11b txpower-update
CONFIG ADVANCED 802.11B COMMANDS
Use the ADVANCED 802.11b commands to configure advanced 802.11b settings.
config advanced 802.11b 7920VSIEConfig
To configure the 7920 VISE parameters, use the config advanced 802.11b 7920VSIEConfig command.
config advanced 802.11b 7920VSIEConfig {call-admission-limit limit |
G711-CU-Quantum quantum}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
7920VSIEConfig
|
Configure 7920 VISE parameters.
|
{call-admission-limit | G711-CU-Quantum}
|
• Enter call-admission-limit to configure the call admission limit for the 7920s.
• Enter G711-CU-Quantum to configure the value supplied by the infrastructure indicating the current number of channel utilization units which would be used by a single G.711-20ms call.
|
limit
|
Call admission limit (from 0 to 255). The default value is 105.
|
quantum
|
G711 quantum value. The default value is 15.
|
Defaults
None.
Examples
> config advanced 802.11b 7920VSIEConfig call-admission-limit 4
Related Commands
None.
config advanced 802.11b channel foreign
To have RRM consider or ignore foreign 802.11b/g interference in making channel selection updates for all 802.11b/g Cisco 1000 series lightweight access points, use the config advanced 802.11b channel foreign command.
config advanced 802.11b channel foreign {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
channel
|
RRM channel selections.
|
foreign
|
Foreign interference.
|
{enable | disable}
|
Consider or ignore foreign access point 802.11b interference avoidance in the channel assignment.
|
Defaults
Enabled.
Examples
To have RRM consider foreign 802.11b/g interference when making channel selection updates for all 802.11b/g Cisco 1000 series lightweight access points:
> config advanced 802.11b channel foreign enable
Related Commands
show advanced 802.11b channel, config advanced 802.11a channel foreign
config advanced 802.11b channel load
To have RRM consider or ignore traffic load in making channel selection updates for all 802.11b/g Cisco 1000 series lightweight access points, use the config advanced 802.11b channel load command.
config advanced 802.11b channel load {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
channel
|
RRM channel selections.
|
load
|
Traffic load.
|
{enable | disable}
|
Consider or ignore access point 802.11b load avoidance in the channel assignment.
|
Defaults
Disabled.
Examples
To have RRM consider traffic load when making channel selection updates for all 802.11b/g Cisco 1000 series lightweight access points:
> config advanced 802.11b channel load enable
Related Commands
show advanced 802.11b channel, config advanced 802.11a channel load
config advanced 802.11b channel noise
To have RRM consider or ignore non-802.11b/g noise in making channel selection updates for all 802.11b/g Cisco 1000 series lightweight access points, use the config advanced 802.11b channel noise command.
config advanced 802.11b channel noise {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
channel
|
RRM channel selections.
|
noise
|
Non-802.11b/g noise.
|
{enable | disable}
|
Consider or ignore non-802.11b/g noise avoidance in the channel assignment.
|
Defaults
Disabled.
Examples
To have RRM consider non-802.11b/g noise when making channel selection updates for all 802.11b/g Cisco 1000 series lightweight access points:
> config advanced 802.11b channel noise enable
Related Commands
show advanced 802.11b channel, config advanced 802.11a channel noise
config advanced 802.11b channel update
To have RRM initiate a channel selection update for all 802.11b/g Cisco 1000 series lightweight access points, use the config advanced 802.11b channel update command.
config advanced 802.11b channel update
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
channel update
|
Update the channel selections.
|
Defaults
None.
Examples
> config advanced 802.11b channel update
Related Commands
show advanced 802.11b channel, config advanced 802.11a channel update
config advanced 802.11b factory
To reset 802.11b/g advanced settings back to the factory defaults, use the config advanced 802.11b factory command.
config advanced 802.11b factory
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
factory
|
Return all 802.11b/g advanced settings to their factory defaults.
|
Defaults
None.
Examples
To reset all 802.11b/g advanced settings back to the factory defaults:
> config advanced 802.11b factory
Related Commands
show advanced 802.11b channel
config advanced 802.11b group-mode
To set the 802.11b/g RF group selection mode on or off, use the config advanced 802.11b group-mode command.
config advanced 802.11b group-mode {auto | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
group-mode
|
Cisco radio RF grouping.
|
{auto | off}
|
• Enter auto to set the 802.11b RF group selection to automatic update mode.
• Enter off to set the 802.11b RF group selection to off.
|
Defaults
Auto.
Usage Guidelines
Use to enable or disable 802.11b/g automatic RF group selection mode.
Examples
To set the 802.11b/g RF group selection mode to automatic:
> config advanced 802.11b group-mode auto
To disable the 802.11b/g RF group selection mode:
> config advanced 802.11b group-mode off
Related Commands
show advanced 802.11b group, config advanced 802.11a group-mode
config advanced 802.11b logging channel
To turn the 802.11b/g channel change logging mode on or off, use the config advanced 802.11b logging channel command.
config advanced 802.11b logging channel {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
logging channel
|
Log channel changes.
|
{on | off}
|
Enable or disable 802.11b channel logging.
|
Defaults
Disabled.
Examples
> config advanced 802.11b logging channel on
Related Commands
show advanced 802.11b logging, config advanced 802.11a logging channel
config advanced 802.11b logging coverage
To turn the 802.11b/g coverage profile logging mode on or off, use the config advanced 802.11b logging coverage command.
config advanced 802.11b logging coverage {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
logging coverage
|
Log coverage changes.
|
{on | off}
|
Enable or disable 802.11b coverage profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11b logging coverage on
Related Commands
show advanced 802.11b logging, config advanced 802.11a logging coverage
config advanced 802.11b logging foreign
To turn the 802.11b/g foreign interference profile logging mode on or off, use the config advanced 802.11b logging foreign command.
config advanced 802.11b logging foreign {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
logging foreign
|
Log foreign changes.
|
{on | off}
|
Enable or disable foreign interference profile logging mode.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11b logging foreign on
Related Commands
show advanced 802.11b logging, config advanced 802.11a logging foreign
config advanced 802.11b logging load
To turn the 802.11b/g load profile logging mode on or off, use the config advanced 802.11b logging load command.
config advanced 802.11b logging load {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
logging load
|
Log load changes.
|
{on | off}
|
Enable or disable 802.11b load profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11b logging load on
Related Commands
show advanced 802.11b logging, config advanced 802.11a logging load
config advanced 802.11b logging noise
To turn the 802.11b/g noise profile logging mode on or off, use the config advanced 802.11b logging noise command.
config advanced 802.11b logging noise {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
logging noise
|
Log noise changes.
|
{on | off}
|
Enable or disable 802.11b noise profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11b logging noise on
Related Commands
show advanced 802.11b logging, config advanced 802.11a logging noise
config advanced 802.11b logging performance
To turn the 802.11b/g performance profile logging mode on or off, use the config advanced 802.11b logging performance command.
config advanced 802.11b logging performance {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
logging performance
|
Log performance changes.
|
{on | off}
|
Enable or disable 802.11b performance profile violation logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11b logging performance on
Related Commands
show advanced 802.11b logging, config advanced 802.11a logging performance
config advanced 802.11b logging txpower
To turn the 802.11b/g transmit power change logging mode on or off, use the config advanced 802.11b logging txpower command.
config advanced 802.11b logging txpower {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
logging txpower
|
Log power changes.
|
{on | off}
|
Enable or disable 802.11b transmit power change logging.
|
Defaults
Off (disabled).
Examples
> config advanced 802.11b logging txpower off
Related Commands
show advanced 802.11b logging, config advanced 802.11a logging power
config advanced 802.11b monitor channel-list
To set the 802.11b/g noise/interference/rogue monitoring channel list coverage, use the config advanced 802.11b monitor channel-list command.
config advanced 802.11b monitor channel-list {all | country | dca}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
monitor channel-list
|
Monitor channel list.
|
{all | country | dca}
|
• Enter all to monitor all channels.
• Enter country to monitor channels used in configured country code.
• Enter dca to monitor channels used by automatic channel assignment.
|
Defaults
country.
Examples
> config advanced 802.11b monitor channel-list country
Related Commands
show advanced 802.11b monitor, config advanced 802.11a monitor coverage
config advanced 802.11b monitor coverage
To set the 802.11b/g coverage measurement interval between 60 and 3600 seconds, use the config advanced 802.11b monitor coverage command.
config advanced 802.11b monitor coverage seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
monitor coverage
|
Monitor coverage interval.
|
seconds
|
Coverage measurement interval between 60 and 3600 seconds.
|
Defaults
180 seconds.
Examples
To set the coverage measurement interval to 60 seconds:
> config advanced 802.11b monitor coverage 60
Related Commands
show advanced 802.11b monitor, config advanced 802.11a monitor coverage
config advanced 802.11b monitor load
To set the 802.11b/g load measurement interval between 60 and 3600 seconds, use the config advanced 802.11b monitor load command.
config advanced 802.11b monitor load seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
monitor load
|
Monitor load interval.
|
seconds
|
Load measurement interval between 60 and 3600 seconds.
|
Defaults
60 seconds.
Examples
To set the load measurement interval to 60 seconds:
> config advanced 802.11b monitor load 60
Related Commands
show advanced 802.11b monitor, config advanced 802.11a monitor load
config advanced 802.11b monitor mode
To enable or disable the 802.11b monitor mode, use the config advanced 802.11b monitor mode command.
config advanced 802.11b monitor mode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b parameters.
|
monitor mode
|
Monitor mode.
|
{enable | disable}
|
Enable or disable 802.11b access point monitoring.
|
Defaults
Enabled.
Examples
> config advanced 802.11b monitor mode enable
Related Commands
show advanced 802.11b monitor, config advanced 802.11a monitor mode
config advanced 802.11b monitor noise
To set the 802.11b/g noise measurement interval between 60 and 3600 seconds, use the config advanced 802.11b monitor noise command.
config advanced 802.11b monitor noise seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
monitor noise
|
Monitor noise interval.
|
seconds
|
Noise measurement interval between 60 and 3600 seconds.
|
Defaults
180 seconds.
Examples
To set the noise measurement interval to 120 seconds:
> config advanced 802.11b monitor noise 120
Related Commands
show advanced 802.11b monitor, config advanced 802.11a monitor noise
config advanced 802.11b monitor signal
To set the 802.11b/g signal measurement interval between 60 and 3600 seconds, use the config advanced 802.11b monitor signal command.
config advanced 802.11b monitor signal seconds
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
monitor signal
|
Monitor signal interval.
|
seconds
|
Signal measurement interval between 60 and 3600 seconds.
|
Defaults
60 seconds.
Examples
To set the signal measurement interval to 120 seconds:
> config advanced 802.11b monitor signal 120
Related Commands
show advanced 802.11b monitor, config advanced 802.11a monitor signal
config advanced 802.11b profile clients
To set the number of 802.11b/g Cisco 1000 series lightweight access point clients threshold between 1 and 75 clients, use the config advanced 802.11b profile clients command.
config advanced 802.11b profile clients {global | Cisco_AP} clients
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile clients
|
Client profiles.
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
clients
|
802.11b Cisco 1000 Series lightweight access point clients threshold between 1 and 75 clients.
|
Defaults
12 clients
Examples
To set the Cisco 1000 series lightweight access point clients threshold for all Cisco radios to 25:
> config advanced 802.11b profile clients global 25
To set the Cisco 1000 series lightweight access point clients threshold for AP1 to 75:
> config advanced 802.11b profile clients AP1 75
Related Commands
config advanced 802.11a profile clients
config advanced 802.11b profile coverage
To set the 802.11b/g Cisco 1000 series lightweight access point coverage threshold between 3 and 50 dB, use the config advanced 802.11b profile coverage command.
config advanced 802.11b profile coverage {global | Cisco_AP} dBm
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile coverage
|
Cisco 1000 series lightweight access point profile coverage
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile
|
dBm
|
802.11b Cisco 1000 Series lightweight access point coverage threshold between 3 and 50 dB.
|
Defaults
12 dB
Examples
To set the Cisco 1000 series lightweight access point coverage threshold for all Cisco 1000 series lightweight access points to 30 dB:
> config advanced 802.11b profile coverage global 30
To set the Cisco 1000 series lightweight access point coverage threshold for AP1 to 50 dB:
> config advanced 802.11b profile coverage AP1 50
Related Commands
config advanced 802.11a profile coverage
config advanced 802.11b profile customize
To turn customization on or off for an 802.11b/g Cisco 1000 series lightweight access point performance profile, use the config advanced 802.11b profile customize command.
config advanced 802.11b profile customize Cisco_AP {on | off}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile customize
|
Customize the performance profile for a Cisco 1000 Series lightweight access point.
|
Cisco_AP
|
Cisco 1000 Series lightweight access point name.
|
{on | off}
|
• Enter on to customize performance profiles for the specified Cisco 1000 Series lightweight access point.
• Enter off to use global default performance profiles for the specified Cisco 1000 Series lightweight access point.
|
Defaults
Off
Examples
To turn customization on for the AP1 performance profile:
> config advanced 802.11b profile customize on
Related Commands
config advanced 802.11a profile customize
config advanced 802.11b profile exception
To set the 802.11b/g Cisco 1000 series lightweight access point coverage exception level between 0 and 100 percent, use the config advanced 802.11b profile exception command.
config advanced 802.11b profile exception {global | Cisco_AP} percent
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile exception
|
Cisco 1000 series lightweight access point profile exception
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile
|
percent
|
802.11b Cisco 1000 Series lightweight access point coverage exception level between 0 and 100 percent.
|
Defaults
25%
Examples
To set the Cisco 1000 series lightweight access point coverage exception level for all Cisco 1000 series lightweight access points to 0 percent:
> config advanced 802.11b profile exception global 0
To set the Cisco 1000 series lightweight access point coverage exception level for AP1 to 100 percent:
> config advanced 802.11b profile exception AP1 100
Related Commands
config advanced 802.11a profile exception
config advanced 802.11b profile foreign
To set the foreign 802.11b/g transmitter interference threshold between 0 and 100 percent, use the config advanced 802.11b profile foreign command.
config advanced 802.11b profile foreign {global | Cisco_AP} percent
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile foreign
|
Foreign interference profile.
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
percent
|
802.11b foreign 802.11b interference threshold between 0 and 100 percent.
|
Defaults
10.
Examples
To set the foreign 802.11b/g transmitter interference threshold for the whole 802.11b/g network to 50 percent:
> config advanced 802.11b profile foreign global 50
To set the foreign 802.11b/g transmitter interference threshold for AP1 to 0 percent:
> config advanced 802.11b profile foreign AP1 0
Related Commands
config advanced 802.11b profile foreign
config advanced 802.11b profile level
To set the 802.11b/g Cisco 1000 series lightweight access point client minimum exception level between 1 and 75 clients, use the config advanced 802.11b profile level command.
config advanced 802.11b profile level {global | Cisco_AP} clients
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile minimum
|
Cisco 1000 series lightweight access point profile level
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile
|
clients
|
802.11b Cisco 1000 Series lightweight access point client minimum exception level between 1 and 75 clients.
|
Defaults
3 clients
Examples
To set the Cisco 1000 series lightweight access point client minimum exception level for all Cisco radios to 75 clients:
> config advanced 802.11b profile level global 75
To set the Cisco 1000 series lightweight access point client minimum exception level for AP1 to 25 clients:
> config advanced 802.11b profile level AP1 25
Related Commands
config advanced 802.11a profile level
config advanced 802.11b profile noise
To set the 802.11b/g foreign noise threshold between -127 and 0 dBm, use the config advanced 802.11b profile noise command.
config advanced 802.11b profile noise {global | Cisco_AP} dBm
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile noise
|
Cisco 1000 series lightweight access point profile noise
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile
|
dBm
|
802.11b foreign noise threshold between -127 and 0 dBm.
|
Defaults
-70 dB
Examples
To set the 802.11b/g foreign noise threshold for the whole 802.11b/g network to -90 dBm:
> config advanced 802.11b profile noise global -90
To set the 802.11b/g foreign noise threshold for AP1 to -30 dBm:
> config advanced 802.11b profile noise AP1 -30
Related Commands
config advanced 802.11a profile noise
config advanced 802.11b profile throughput
To set the 802.11b/g Cisco 1000 series lightweight access point throughput threshold between 1000 and 10000000 bytes per second, use the config advanced 802.11b profile throughput command.
config advanced 802.11b profile throughput {global | Cisco_AP} rate
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile throughput
|
Throughput profile.
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile.
|
rate
|
1,000 to 10,000,000 bps.
|
Defaults
1,000,000 bps
Examples
To set the Cisco 1000 series lightweight access point throughput threshold for all Cisco radios to 1000 bytes per second:
> config advanced 802.11b profile throughput global 1000
To set the Cisco 1000 series lightweight access point throughput threshold for AP1 to 10000000 bytes per second:
> config advanced 802.11b profile throughput AP1 10000000
Related Commands
config advanced 802.11a profile throughput
config advanced 802.11b profile utilization
To set the 802.11b/g RF utilization threshold between 0 and 100 percent, use the config advanced 802.11b profile utilization command.
config advanced 802.11b profile utilization {global | Cisco_AP} percent
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b/g parameters.
|
profile utilization
|
Cisco 1000 series lightweight access point profile utilization
|
{global | Cisco_AP}
|
Global or Cisco 1000 series lightweight access point specific profile
|
percent
|
802.11b RF utilization threshold between 0 and 100 percent.
|
Defaults
80%
Examples
To set the RF utilization threshold for the whole 802.11b/g network to 100 percent:
> config advanced 802.11b profile utilization global 100
To set the RF utilization threshold for the AP1 to 50 percent:
> config advanced 802.11b profile utilization AP1 50
Related Commands
config advanced 802.11a profile utilization
config advanced 802.11b receiver
To set the advanced receiver configuration, use the config advanced 802.11b receiver command.
config advanced 802.11b receiver {default | rxstart}
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b parameters.
|
receiver
|
Receiver configuration.
|
{default | rxstart}
|
• Enter default to specify default advanced receiver configuration.
• Enter rxstart to specify advanced receiver start configuration.
|
Defaults
None.
Examples
Cannot change receiver params while network is enabled:
> config advanced 802.11b receiver default
Related Commands
config advanced 802.11a receiver
config advanced 802.11b txpower-update
To initiate updates of the 802.11b transmit power for every Cisco 1000 series lightweight access point, use the config advanced 802.11b txpower-update command.
config advanced 802.11b txpower-update
Syntax Description
config
|
Configure parameters.
|
advanced 802.11b
|
Advanced 802.11b parameters.
|
txpower-update
|
Update transmission power
|
Defaults
None.
Examples
> config advanced 802.11b txpower-update
Related Commands
config advance 802.11a txpower-update
config advanced client-handoff
To set the client handoff to occur after a selected number of 802.11 data packet excessive retries, use the config advanced client-handoff command.
config advanced client-handoff num_of_retries
Syntax Description
config
|
Configure parameters.
|
advanced
|
Advanced parameters.
|
client-handoff
|
Client handoff.
|
num_of_retries
|
Number of excessive retries before client handoff (from 0 to 255).
|
Defaults
0 excessive retries (disabled).
Examples
To set the client handoff to 100 excessive retries:
> config advanced client-handoff 100
Related Commands
show advanced client-handoff
config advanced statistics
To enable or disable Cisco Wireless LAN controller port statistics collection, use the config advanced statistics command.
config advanced statistics {enable | disable}
Syntax Description
config
|
Configure parameters.
|
advanced
|
Advanced parameters.
|
statistics
|
Statistics.
|
{enable | disable}
|
Enable or disable switch port statistics.
|
Defaults
Enabled.
Examples
To disable statistics:
> config advanced statistics disable
Related Commands
show advanced statistics, show stats port, show stats switch
CONFIG ADVANCED TIMERS COMMANDS
User the advanced timers commands to configure advanced 802.11a settings.
config advanced timers ap-discovery-timeout
The Cisco 1000 series lightweight access point discovery time-out is how often a Cisco Wireless LAN controller attempts to discover unconnected Cisco 1000 series lightweight access points. To configure the Cisco 1000 series lightweight access point discovery time-out, use the config advanced timers ap-discovery-timeout command.
config advanced timers ap-discovery-timeout seconds
Syntax Description
config
|
Configure parameters.
|
advanced
|
Advanced parameters.
|
timers
|
Network timers.
|
ap-discovery-timeout
|
Cisco 1000 series lightweight access point discovery timeout.
|
seconds
|
Timeout value between 1 and 10 seconds.
|
Defaults
10 seconds.
Examples
> config advanced timers ap-discovery-timeout 20
Related Commands
show advanced timers
config advanced timers ap-heartbeat-timeout
The Cisco 1000 series lightweight access point heartbeat timeout controls how often the Cisco 1000 series lightweight access point sends a heartbeat keep-alive signal to the Cisco Wireless LAN controller. To configure the Cisco 1000 series lightweight access point heartbeat timeout, use the config advanced timers ap-heartbeat-timeout command.
config advanced timers ap-heartbeat-timeout seconds
Syntax Description
config
|
Configure parameters.
|
advanced
|
Advanced parameters.
|
timers
|
Network timers.
|
ap-heartbeat-timeout
|
Cisco 1000 series lightweight access point heartbeat timeout.
|
seconds
|
Timeout value between 1 and 30 seconds.
|
Defaults
30 seconds.
Examples
> config advanced timers ap-heartbeat-timeout 20
Related Commands
show advanced timers
config advanced timers auth-timeout
To configure the authentication timeout, use the config advanced timers auth-timeout command.
config advanced timers auth-timeout seconds
Syntax Description
config
|
Configure parameters.
|
advanced
|
Advanced parameters.
|
timers
|
Network timers.
|
auth-timeout
|
Authentication response timeout.
|
seconds
|
Timeout value in seconds between 5 and 600.
|
Defaults
10 seconds.
Examples
> config advanced timers auth-timeout 20
Related Commands
show advanced timers
config advanced timers eap-timeout
To configure the EAP expiration timeout, use the config advanced timers eap-timeout command.
config advanced timers eap-timeout seconds
Syntax Description
config
|
Configure parameters.
|
advanced
|
Advanced parameters.
|
timers
|
Network timers.
|
eap-timeout
|
EAP timeout.
|
seconds
|
Timeout value in seconds between 8 and 120.
|
Defaults
(None.)
Examples
> config advanced timers eap-timeout 10
Related Commands
show advanced timers
config advanced timers eap-identity-request-delay
To configure the advanced EAP identity request delay in seconds, use the config advanced timers eap-identity-request-delay command.
config advanced timers eap-identity-request-delay seconds
Syntax Description
show
|
Display configurations.
|
advanced
|
Advanced parameters.
|
timers eap-identity-request-delay
|
Advanced system timers.
|
seconds
|
Number of seconds between 0 and 10.
|
Defaults
None.
Examples
> show advanced timers eap-identity-request-delay 8
Related Commands
config advanced timers auth-timeout, config advanced timers rogue-ap, show advanced timers
CONFIG AP COMMANDS
Use the following CONFIG AP commands.
config ap add
To add a Foreign Access Point, use the config ap add command.
config ap add MAC port {enable | disable} IP_address
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
add
|
Add a Foreign Access Point.
|
MAC
|
Foreign Access Point MAC address.
|
port
|
Port number for accessing the Foreign Access Point.
|
{enable | disable}
|
Enable or disable 802.1X authentication for a Foreign Access Point.
|
IP_address
|
IP Address for a Foreign Access Point. A value of 0 (default) means that the address is assigned by a DHCP server.
|
Defaults
None.
Examples
> config ap add 12:12:12:12:12:12 2033 enable 192.12.12.1
Related Commands
config ap
config ap bhmode
To configure the Cisco Bridge Backhaul Mode, use the config ap bhmode command.
config ap bhmode {11a | 11b | 11g} Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
bhmode
|
Configure the Cisco Bridge Backhaul Mode.
|
{11a | 11b | 11g}
|
• Enter 11a to set 11a as the Cisco Bridge Backhaul Mode.
• Enter 11b to set 11b as the Cisco Bridge Backhaul Mode.
• Enter 11g to set 11g as the Cisco Bridge Backhaul Mode.
|
Cisco_AP
|
Name of a Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap bhmode 11g AP02
Changing the AP's backhaul mode will cause the AP to reboot.
Are you sure you want to continue? (y/n)
Related Commands
config ap
config ap bhrate
To configure the Cisco Bridge Backhaul Tx Rate, use the config ap bhrate command.
config ap bhrate rate Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
bhrate
|
Configure Cisco Bridge Backhaul Tx Rate.
|
rate
|
Cisco Bridge Backhaul Tx Rate in Kbps. The legal values are: 6000, 12000, 18000, 24000, 36000, 48000, and 54000.
|
Cisco_AP
|
Name of a Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap bhrate 54000 AP01
Related Commands
config ap
config ap bridgegroupname
To set or delete bridgegroupname on a Cisco 1000 Series lightweight access point, use the config ap bridgegroupname command.
Note
Only access points with the same bridgegroupname can connect to each other.
config ap bridgegroupname {set groupname | delete} Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
bridgegroupname
|
Set or delete bridgegroupname on a Cisco 1000 Series lightweight access point
|
{set groupname | delete}
|
• Enter set groupname to set a Cisco 1000 Series lightweight access point's bridgegroupname.
• Enter delete to delete a Cisco 1000 Series lightweight access point's bridgegroupname.
|
Cisco_AP
|
Name of a Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap bridgegroupname delete AP02
Changing the AP's bridgegroupname may strand the bridge AP. Please continue with caution.
Changing the AP's bridgegroupname will also cause the AP to reboot.
Are you sure you want to continue? (y/n)
Related Commands
config ap
config ap bridging
To enable or disable Ethernet-to-Ethernet bridging on a Cisco 1000 Series lightweight access point, use the config ap bridging command.
config ap bridging {enable | disable} Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
bridging
|
enable or disable Ethernet-to-Ethernet bridging on a Cisco 1000 Series lightweight access point.
|
{enable | disable}
|
Enable or disable Ethernet-to-Ethernet bridging.
|
Cisco_AP
|
Name of a Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
Related Commands
config ap
config ap core-dump
To configure a Cisco 1000 Series lightweight access point's memory core dump, use the config ap core-dump command.
config ap core-dump {enable IP_address filename {compress | uncompress} | disable}
{Cisco_AP | all}
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
core-dump
|
Configure a Cisco 1000 Series lightweight access point's memory core dump.
|
{enable | disable}
|
Enable or disable Ethernet-to-Ethernet bridging.
|
IP_address
|
IP Address for the TFTP server.
|
filename
|
Image file name on the TFTP server.
|
{compress | uncompress}
|
• Enter compress to compress the core dump file.
• Enter uncompress to not compress the core dump file.
|
{Cisco_AP | all}
|
Name of a Cisco 1000 Series lightweight access point or all to specify all access points.
|
Defaults
None.
Examples
> config ap core-dump enable 192.1.1.1 log compress AP02
Related Commands
config ap
config ap crash-file clear-all
To delete all crash and radio core dump files, use the config ap crash-file clear-all command.
config ap crash-file clear-all
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
crash-file clear-all
|
Delete all crash and radio core dump files.
|
Defaults
None.
Examples
> config ap crash-file clear-all
Related Commands
config ap
config ap crash-file delete
To delete a single crash or radio core dump file, use the config ap crash-file delete command.
config ap crash-file delete filename
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
crash-file delete
|
Delete a single crash or radio core dump file.
|
filename
|
Name of the file to delete.
|
Defaults
None.
Examples
> config ap crash-file delete crash-file-1
Related Commands
config ap
config ap crash-file get-crash-file
To collect the latest crash data for a Cisco 1000 series lightweight access point, use the config ap crash-file get-crash-file command. Use the transfer upload datatype command to transfer the collected data to the Cisco Wireless LAN controller.
config ap crash-file get-crash-file Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
crash-file get-crash-file
|
Collect the latest crash data for an access point.
|
Cisco_AP
|
Name of the Cisco 1000 series lightweight access point.
|
Defaults
None.
Examples
> config ap crash-file get-crash-file AP3
config ap crash-file get-radio-core-dump
To get a Cisco 1000 Series lightweight access point's radio core dump, use the config ap crash-file get-radio-core-dump command.
config ap crash-file get-radio-core-dump Slot_ID Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
crash-file radio-core-dump
|
Get a Cisco 1000 Series lightweight access point's radio core dump.
|
Slot_ID
|
The slot ID (either 0 or 1).
|
Cisco_AP
|
Name of a Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap crash-file get-radio-core-dump 0 AP02
Related Commands
config ap
config ap delete
To delete a Foreign Access Point, use the config ap delete command.
config ap delete MAC
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
delete
|
Delete a Foreign Access Point.
|
MAC
|
Foreign Access Point MAC address.
|
Defaults
None.
Examples
> config ap delete 12:12:12:12:12:12
Related Commands
config ap
config ap disable
To disable a Cisco 1000 series lightweight access point, use the config ap disable command.
config ap disable Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
disable
|
Disable command.
|
Cisco_AP
|
Name of the Cisco 1000 series lightweight access point.
|
Defaults
None.
Examples
Related Commands
config ap enable
config ap enable
To enable a Cisco 1000 series lightweight access point, use the config ap enable command.
config ap enable Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
enable
|
Enable command.
|
Cisco_AP
|
Name of the Cisco 1000 series lightweight access point.
|
Defaults
None.
Examples
Related Commands
config ap disable
config ap group-name
To specify a descriptive group name for a Cisco 1000 series lightweight access point, use the config ap group-name command. The Cisco 1000 series lightweight access point must be disabled before changing this parameter.
config ap group-name groupname Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
groupname
|
Descriptive group name.
|
Cisco_AP
|
Name of the Cisco 1000 series lightweight access point.
|
Defaults
None.
Examples
> config ap group-name superusers AP01
Related Commands
show ap summary
config ap led-state
To enable or disable the LED-State for an access point, use the config ap led-state command.
config ap led-state {enable | disable} {Cisco_AP | all}
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
led-state
|
Enable or disable the LED-State for an access point.
|
{enable | disable}
|
Enable or disable the access point's LED-State.
|
{Cisco_AP | all}
|
Name of a Cisco 1000 Series lightweight access point or all to specify all access points.
|
Defaults
None.
Examples
> config ap led-state enable AP02
Related Commands
config ap
config ap location
To modify the descriptive location of a Cisco 1000 series lightweight access point, use the config ap location command. The Cisco 1000 series lightweight access point must be disabled before changing this parameter.
config ap location location Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
location
|
Descriptive location.
|
location
|
Location name (enclosed by double quotation marks).
|
Cisco_AP
|
Name of the Cisco 1000 series lightweight access point.
|
Defaults
None.
Examples
> config ap location "Building 1" AP1
Related Commands
show ap summary
config ap mode
Cisco Wireless LAN controllers communicate with Cisco 1000 series lightweight access points in one of three modes: local (normal), reap (remote office, must connect to a Cisco 1030 remote edge lightweight access point), or monitor (listen-only). To change a Cisco Wireless LAN controller communication option for an individual Cisco 1000 series lightweight access point, use the config ap mode command.
Note that the bridge mode can be set only on Cisco 1030 remote edge lightweight access points.
config ap mode {local | reap | monitor | rogue | sniffer | bridge} Cisco_AP
Syntax Description
config ap mode
|
Configure boot option.
|
{local | reap | monitor | rogue | sniffer | bridge}
|
You have six choices:
• Enter local to specify the local mode.
• Enter reap to specify the remote edge access point mode.
• Enter monitor to specify the monitor-only mode.
• Enter rogure to specify the rogue detector mode.
• Enter sniffer to specify the wireless sniffer mode.
• Enter bridge to specify the bridge access point mode.
|
Cisco_AP
|
Name of the Cisco 1000 series lightweight access point.
|
Defaults
Local.
Examples
Sets the Cisco Wireless LAN controller to communicate with AP01 in local (normal) mode:
> config ap mode local AP01
Sets the Cisco Wireless LAN controller to communicate with Cisco 1030 remote edge lightweight access point AP91 in remote office mode:
> config ap mode reap AP91
Sets the Cisco Wireless LAN controller to communicate with AP02 in monitor (listen-only) mode:
> config ap mode monitor AP02
Sets the AP91 in rogue access point detector mode:
> config ap mode rogue AP91
Sets the AP02 in wireless sniffer mode. It will capture and forward all the packets from the clients on that channel to a remote machine that runs AiroPeek (A packet analyzer for IEEE 802.11 wireless LANs). It will include information on timestamp, signal strength, packet size and so on.
> config ap mode sniffer AP02
Sets the AP91 in bridge mode:
> config ap mode bridge AP91
Note
The bridge mode can be set only on a Cisco 1030 remote edge lightweight access point.
Related Commands
show ap config
config ap name
To modify the name of a Cisco 1000 series lightweight access point, use the config ap name command.
config ap name new_name old_name
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
name
|
Name of the Cisco 1000 series lightweight access point.
|
new_name
|
Desired Cisco 1000 series lightweight access point name.
|
old_name
|
Current Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
show ap config
config ap port
To configure the port for a Foreign Access Point., use the config ap port command.
config ap port MAC port
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
port
|
Configure the port for a Foreign Access Point
|
MAC
|
Foreign Access Point MAC address.
|
port
|
Port number for accessing the Foreign Access Point.
|
Defaults
None.
Examples
> config ap port 12:12:12:12:12:12 20
Related Commands
config ap
config ap power injector
To configure the power injector state for an access point, use the config ap power injector command.
config ap power injector {enable | disable} {Cisco_AP | all} {installed | override | switch_MAC}
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
power
|
Configure the power injector state for an access point.
|
{enable | disable}
|
Enable or disable the power injector state for an access point.
|
Cisco_AP
|
Name of the Cisco lightweight access point.
|
all
|
Configure all Cisco lightweight access points connected to the controller.
|
installed
|
Detect the MAC address of the current switch port that has a power injector.
|
override
|
Override the safety checks and assume a power injector is always installed.
|
switch_MAC
|
The MAC address of the switch port with an installed power injector.
|
Defaults
None.
Examples
> config ap power injector enable ap02 installed
Related Commands
config ap
config ap power pre-standard
To enable or disables the Inline Power Cisco Pre-Standard switch state for an access point, use the config ap power pre-standard command.
config ap power pre-standard {enable | disable} Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
power pre-standard
|
Configure the Inline Power Cisco Pre-Standard switch state for an access point.
|
{enable | disable}
|
Enable or disable the Inline Power Cisco pre-standard switch state for an access point.
|
Cisco_AP
|
Name of the Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap power pre-standard enable AP02
Related Commands
config ap
config ap primary-base
To set the Cisco 1000 series lightweight access point primary Cisco Wireless LAN controller, use the config ap primary-base command. The Cisco 1000 series lightweight access point associates with this Cisco Wireless LAN controller for all network operation and in the event of a hardware reset.
config ap primary-base controller_name Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
primary-base
|
Cisco 1000 series lightweight access point primary Cisco Wireless LAN controller.
|
controller_name
|
Name of Cisco Wireless LAN controller.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> config ap primary-base SW_1 AP2
Related Commands
show sysinfo, config sysname, config ap secondary-base, config ap tertiary-base
config ap remote-debug
To enable or disable remote debugging of a Cisco 1000 series lightweight access point or to remotely execute a command on a Cisco 1000 series lightweight access point, use the config ap remote-debug command.
config ap remote-debug {enable | disable | exc-command cmd} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
remote-debug
|
Cisco 1000 series lightweight access point remote debug/remote command.
|
{enable | disable | exc-command cmd}
|
Enable or disable remote debugging of a Cisco 1000 series lightweight access point, or remotely execute a command.
|
cmd
|
Command to be executed.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
Disabled.
Examples
To enable remote debugging on AP01:
> config ap remote-debug enable AP01
To disable remote debugging on AP02:
> config ap remote-debug disable AP02
To execute Cisco TAC-provided commands on AP03:
> config ap remote-debug exc-command (command) AP03
Related Commands
show sysinfo, config sysname
config ap reporting-period
To reset a Cisco 1000 series lightweight access point, use the config ap reset command.
config ap reporting-period period
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
reporting-period
|
Reporting-period command.
|
period
|
Time period in seconds between 10 and 120.
|
Defaults
None.
Examples
> config ap reporting-period 120
Related Commands
show ap config 802.11a, show ap config 802.11ab
config ap reset
To reset a Cisco 1000 series lightweight access point, use the config ap reset command.
config ap reset Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
reset
|
Reset command.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
Related Commands
show ap config
config ap role
To configure a Cisco Bridge role of operation, use the config ap role command.
config ap role {rooftop | poletop | auto} Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
role
|
Configure a Cisco Bridge role of operation.
|
{rooftop | poletop | auto}
|
Set the Cisco Bridge role of operation to rooftop, poletop, or auto.
• Rooftop role for the Cisco Bridge.
• Poletop role for the Cisco Bridge.
• Auto Role for the Cisco Bridge.
|
Cisco_AP
|
Name of the Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap role auto AP02
Changing the AP's role will cause the AP to reboot.
Are you sure you want to continue? (y/n)
Related Commands
config ap
config ap rst-button
To configure the Reset button for an access point, use the config ap rst-button command.
config ap rst-button {enable | disable} Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
rst-button
|
Configure the Reset button for an access point.
|
{enable | disable}
|
Enable or disable the Reset button for an access point.
|
Cisco_AP
|
Name of the Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap rst-button enable AP03
Related Commands
config ap
config ap secondary-base
To set the Cisco 1000 series lightweight access point secondary Cisco Wireless LAN controller, use the config ap secondary-base command. The Cisco 1000 series lightweight access point associates with this Cisco Wireless LAN controller for all network operation and in the event of a hardware reset.
config ap secondary-base controller_name Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
primary-base
|
Cisco 1000 series lightweight access point secondary Cisco Wireless LAN controller.
|
controller_name
|
Name of Cisco Wireless LAN controller.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> config ap secondary-base SW_1 AP2
Related Commands
show sysinfo, config sysname, config ap primary-base, config ap tertiary-base
config ap sniff 802.11a
To enable or disable sniffing on a Cisco 1000 series lightweight access point radio, use the config ap sniff 802.11a command.
When the sniffer feature is enabled on a Cisco 1000 series lightweight access point, it starts sniffing the signal on the given channel. It captures and forwards all the packets to the remote computer that runs airopeek, a packet analyzer for IEEE 802.11 wireless LANs. It includes information on timestamp, signal strength, packet size and so on.
Before a Cisco 1000 series lightweight access point can act as a sniffer, a remote computer that runs Airopeek must be set up so that it can receive packets sent by the Cisco 1000 series lightweight access point. After the Airopeek installation, copy the following .dll files to the location where airopeek is installed.
•
socket.dll file to the Plug-ins folder (for example, C:\Program Files\WildPackets\AiroPeek\Plugins)
•
socketres.dll file to the PluginRes folder (for example, C:\Program Files\WildPackets\AiroPeek\1033\PluginRes)
config ap sniff 802.11a {enable channel ip_address | disable} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
sniff
|
Sniffer command.
|
802.11a {enable | disable}
|
Enable or disable sniffing.
|
channel
|
Channel to be sniffed.
|
ip_address
|
The IP address of the sniffer server (remote Airopeek ip address)
|
Cisco_AP
|
Cisco 1000 Series lightweight access point name.
|
Defaults
None.
Examples
> config ap sniff 80211a enable 23 11.22.44.55 AP01
Related Commands
show ap config, config ap sniff 802.11b
config ap sniff 802.11b
To enable or disable sniffing on a Cisco 1000 series lightweight access point radio, use the config ap sniff 802.11b command.
When the sniffer feature is enabled on a Cisco 1000 series lightweight access point, it starts sniffing the signal on the given channel. It captures and forwards all the packets to the remote computer that runs airopeek (a packet analyzer for IEEE 802.11 wireless LANs). It includes information on timestamp, signal strength, packet size and so on.
Before a Cisco 1000 series lightweight access point can act as a sniffer, a remote computer that runs Airopeek must be set up so that it can receive packets sent by the Cisco 1000 series lightweight access point. After the Airopeek installation, copy the following .dll files to the location where airopeek is installed.
•
socket.dll file to the Plug-ins folder (for example, C:\Program Files\WildPackets\AiroPeek\Plugins)
•
socketres.dll file to the PluginRes folder (for example, C:\Program Files\WildPackets\AiroPeek\1033\PluginRes)
config ap sniff 802.11b {enable channel ip_address | disable} Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
sniff 802.11b
|
Sniffer command.
|
{enable | disable}
|
Enable or disable sniffing.
|
channel
|
Channel to be sniffed.
|
ip_address
|
IP address of the sniffer server (remote Airopeek ip address).
|
Cisco_AP
|
Cisco 1000 Series lightweight access point name.
|
Defaults
None.
Examples
> config ap sniff 80211b enable 23 11.22.44.55 AP01
Related Commands
show ap config, config ap sniff 802.11a
config ap static-ip
To configure Cisco 1000 Series lightweight access point static IP address settings, use the config ap static-ip command.
config ap static-ip {enable Cisco_AP ip_address net_mask gateway | disable Cisco_AP}
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
static-ip
|
configure Cisco 1000 Series lightweight access point static IP address settings.
|
{enable | disable}
|
Configure the Cisco 1000 series lightweight access point static IP address.
Disable the Cisco 1000 series lightweight access point static IP address. The Cisco 1000 series lightweight access point uses DHCP to get the IP address.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
ip_address
|
Cisco 1000 series lightweight access point IP address
|
net_mask
|
The Cisco 1000 Series lightweight access point network mask.
|
gateway
|
IP address of the Cisco 1000 Series lightweight access point gateway.
|
Defaults
None.
Examples
> config ap static-ip enable AP2 1.1.1.1 255.255.255.0 10.1.1.1
Related Commands
show sysinfo, config sysname, config ap secondary-base, config ap primary-base
config ap stats-timer
Use this command to set the time in seconds that the Cisco 1000 series lightweight access point sends its DOT11 statistics to the Cisco Wireless LAN controller. A value of 0 (zero) means the Cisco 1000 series lightweight access point will not send any DOT11 statistics. The acceptable range for the timer is from 0 to 65535 seconds, and the Cisco 1000 series lightweight access point must be disabled to set this value.
config ap stats-timer period Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
stats-timer
|
Cisco 1000 series lightweight access point primary Cisco Wireless LAN controller.
|
period
|
Time in seconds from 0 to 65535. A zero value disables the timer.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
0 (disabled).
Examples
> config ap stats-timer 600 AP2
Related Commands
config ap disable
config ap tertiary-base
To set the Cisco 1000 series lightweight access point tertiary Cisco Wireless LAN controller, use the config ap tertiary-base command. The Cisco 1000 series lightweight access point associates with this Cisco Wireless LAN controller for all network operation and in the event of a hardware reset.
config ap tertiary-base controller_name Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
tertiary-base
|
Cisco 1000 series lightweight access point tertiary Cisco Wireless LAN controller.
|
controller_name
|
Name of Cisco Wireless LAN controller.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
> config ap tertiary-base SW_1 AP2
Related Commands
show sysinfo, config sysname, config ap secondary-base, config ap primary-base
config ap tftp-downgrade
To initiate access point image downgrade from a TFTP server, use the config ap tftp-downgrade command.
config ap tftp-downgrade IP_address filename Cisco_AP
Syntax Description
config
|
Display configurations.
|
ap
|
Advanced parameters.
|
tftp-downgrade
|
Initiate access point image downgrade from a TFTP server.
|
IP_address
|
static IP address of the specified Cisco 1000 Series lightweight access point.
|
filename
|
Image file name on the TFTP server.
|
Cisco_AP
|
Name of the Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config ap tftp-downgrade 192.1.1.1 img1 AP02
Related Commands
config ap
config ap wlan
To enable or disable wireless LAN override for a Cisco 1000 series lightweight access point radio, and to add or delete wireless LANs to or from a Cisco 1000 series lightweight access point radio, as described in the related product guide, use the config ap wlan command.
config ap wlan {add | delete | enable | disable} {802.11a | 802.11b} wlan_id Cisco_AP
Syntax Description
config
|
Configure parameters.
|
ap
|
Cisco 1000 series lightweight access point.
|
wlan
|
Reset command.
|
{add | delete | enable | disable}
|
• Add or delete a wireless LAN on an access point. (Cisco 1000 series lightweight access point must have wireless LAN override enabled to add or delete a wireless LAN.)
• Enable or disable per access point wireless LAN override on an access point.
|
{802.11a | 802.11b}
|
Select 802.11a or 802.11b/g radio.
|
wlan_id
|
Optional Cisco Wireless LAN controller ID assigned to a wireless LAN.
|
Cisco_AP
|
Cisco 1000 series lightweight access point name.
|
Defaults
None.
Examples
To enable wireless LAN override on the AP03 802.11a radio:
> config ap wlan enable 802.11a AP03
To add wireless LAN ID 1 on the AP03 802.11a radio:
> config ap wlan add 802.11a 1 AP03
To delete wireless LAN ID 1 from the AP03 802.11a radio:
> config ap wlan delete 802.11a AP03
To disable wireless LAN override on the AP03 802.11a radio:
> config ap wlandisable 802.11a AP03
Related Commands
show ap wlan
config ap username
To configure a username and password for access points that are in deployed in remote places, use the config ap username command.
config ap username {name} {password}
Syntax Description
config
|
Configure parameters.
|
name
|
Access point name.
|
password
|
Access point password.
|
Defaults
None.
Examples
> config ap username test test
config auth-list add
To create an authorized access point entry, use the config auth-list add command.
config auth-list add {mic | ssc} AP_MAC [AP_key]
Syntax Description
config auth-list
|
Command action.
|
add
|
Create an authorized access point entry.
|
mic
|
Access point has manufacture installed certificate.
|
ssc
|
Access point has self-signed certificate.
|
AP_MAC
|
MAC address of a Cisco 1000 Series lightweight access point.
|
AP_key
|
A key hash value equal to 20 bytes or 40 digits.
|
Defaults
None.
Examples
> config auth-list add mic 00:0b:85:02:0d:20
Related Commands
config auth-list delete, config auth-list ap-policy.
config auth-list ap-policy
To configure an access point authorization policy, use the config auth-list ap-policy command.
config auth-list ap-policy {authorize-ap {enable | disable} | ssc {enable | disable}}
Syntax Description
config auth-list
|
Command action.
|
ap-policy
|
Create an authorized access point entry.
|
authorize-ap {enable | disable}
|
Enable or disable access point authorization.
|
ssc {enable | disable}
|
Enable or disable access point with self-signed certificate to connect.
|
Defaults
None.
Examples
> config auth-list ap-policy authorize-ap enable
> config auth-list ap-policy ssc disable
Related Commands
config auth-list add, config auth-list delete.
config auth-list delete
To delete an access point entry, use the config auth-list delete command.
config auth-list delete AP_MAC
Syntax Description
config auth-list
|
Command action.
|
delete
|
Delete an access point entry.
|
AP_MAC
|
MAC address of a Cisco 1000 Series lightweight access point.
|
Defaults
None.
Examples
> config auth-list delete 00:0b:85:02:0d:20
Related Commands
config auth-list add, config auth-list ap-policy.
config boot
Each Cisco Wireless LAN controller can boot off the primary, last-loaded OS image or boot off the backup, earlier-loaded OS image. To change a Cisco Wireless LAN controller boot option, use the config boot command.
config boot {primary | backup}
Syntax Description
config boot
|
Configure boot option.
|
{primary | backup}
|
Set the primary image or backup image as active.
|
Defaults
primary
Examples
Related Commands
show boot
config certificate
To configures SSL certificates, use the config certificate command.
config certificate {generate {webadmin | webauth} | compatibility {on | off}}
Syntax Description
config certificate
|
Command action.
|
generate {webadmin | webauth}
|
Generates a new web administration certificate or a a new web authentication certificate.
|
compatibility {on | off}
|
Enables or disables compatibility mode for inter-Cisco Wireless LAN controller ipsec
|
Defaults
None.
Examples
> config certificate generate webadmin
Creating a certificate may take some time. Do you wish to continue? (y/n)
> config certificate compatibility
Related Commands
show certificate summary, show certificate compatibility
config client deauthenticate
To disconnect a client, use the config client deauthenticate command.
config client deauthenticate MAC
Syntax Description
config
|
Configure parameters.
|
client
|
Network client.
|
deauthenticate
|
Deauthenticate command.
|
MAC
|
Client MAC address.
|
Defaults
None.
Examples
> config client deauthenticate 11:11:11:11:11:11
Related Commands
show client summary, show client detail
config country
To configure the controller's country code, use the config country command. Use the show country command to display a list of supported countries.
config country country_code
Note
Cisco Wireless LAN controllers must be installed by a network administrator or qualified IT professional and the installer must select the proper country code. Following installation, access to the unit should be password protected by the installer to maintain compliance with regulatory requirements and to ensure proper unit functionality. Refer to the related product guide for the most recent country codes and regulatory domains.
Syntax Description
config
|
Configure parameters.
|
country
|
Set this Cisco Wireless LAN controller to comply with selected country's regulations.
|
country_code
|
A two-letter or three-letter country code.
|
Defaults
us (country code of the United States of America).
Examples
Related Commands
show country
config custom-web ext-webauth-mode
To configure external URL web-based client authorization for the custom-web authentication page, use the config custom-web ext-webauth-mode command.
config custom-web ext-webauth-mode {enable | disable}
Syntax Description
config custom-web
|
Command action.
|
ext-webauth-mode {enable | disable}
|
Enable or disable external URL web-based client authorization.
|
Defaults
None.
Examples
> config custom-web ext-webauth-mode enable
Related Commands
config custom-web redirectUrl, config custom-web weblogo, config custom-web webmessage, config custom-web webtitle, config custom-web ext-webauth-url, show custom-web
config custom-web ext-webauth-url
To configure the complete external web authentication URL for the custom-web authentication page, use the config custom-web ext-webauth-url command.
config custom-web ext-webauth-url URL
Syntax Description
config custom-web
|
Command action.
|
ext-webauth-url URL
|
Set the complete external web authentication URL used for web-based client authorization.
|
Defaults
None.
Examples
> config custom-web ext-webauth-url http://www.AuthorizationURL.com/
Related Commands
config custom-web redirectUrl, config custom-web weblogo, config custom-web webmessage, config custom-web webtitle, config custom-web ext-webauth-mode, show custom-web
config custom-web ext-webserver
To configure an external web server, use the config custom-web ext-webserver command.
config custom-web ext-webserver {add index IP_address | delete index}
Syntax Description
config custom-web
|
Command action.
|
ext-webserver
|
The URL used for web-based client authorization.
|
{add | delete}
|
Add or delete an external web server.
|
index
|
Index of the external web server in the list of external web server. Must be a number between 1 and 20.
|
IP_address
|
The IP address of the external web server.
|
Defaults
None.
Examples
> config custom-web ext-webserver add 2 192.23.32.19
Related Commands
config custom-web redirectUrl, config custom-web weblogo, config custom-web webmessage, config custom-web webtitle, config custom-web ext-webauth-mode, config custom-web ext-webauth-url, show custom-web
config custom-web redirectUrl
To configure the redirect URL for the custom-web authentication page, use the config custom-web redirectUrl command.
config custom-web redirectUrl URL
Syntax Description
config custom-web
|
Command action.
|
redirectUrl URL
|
Set the redirect URL to the specified address.
|
Defaults
None.
Examples
> config custom-web redirectUrl abc.com
Related Commands
config custom-web weblogo, config custom-web webmessage, config custom-web webtitle, config custom-web ext-webauth-mode, config custom-web ext-webauth-url, show custom-web
config custom-web weblogo
To configure the web authentication logo for the custom-web authentication page, use the config custom-web weblogo command.
config custom-web weblogo {enable | disable}
Syntax Description
config custom-web
|
Command action.
|
weblogo {enable | disable}
|
Enable or disable the web authentication logo.
|
Defaults
None.
Examples
> config custom-web weblogo enable
Related Commands
config custom-web redirectUrl, config custom-web webmessage, config custom-web webtitle, config custom-web ext-webauth-mode, config custom-web ext-webauth-url, show custom-web
config custom-web webmessage
To configure the custom web authentication message text for the custom-web authentication page, use the config custom-web webmessage command.
config custom-web webmessage message
Syntax Description
config custom-web
|
Command action.
|
webmessage message
|
Set custom message text for web authentication.
|
Defaults
None.
Examples
> config custom-web webmessage Thisistheplace
Related Commands
config custom-web redirectUrl, config custom-web weblogo, config custom-web webtitle, config custom-web ext-webauth-mode, config custom-web ext-webauth-url, show custom-web
config custom-web webtitle
To configure the web authentication title text for the custom-web authentication page, use the config custom-web webtitle command.
config custom-web webtitle title
Syntax Description
config custom-web
|
Command action.
|
webtitle title
|
Set the custom title text for web authentication.
|
Defaults
None.
Examples
> config custom-web webtitle Helpdesk
Related Commands
config custom-web redirectUrl, config custom-web weblogo, config custom-web webmessage, config custom-web ext-webauth-mode, config custom-web ext-webauth-url, show custom-web
config database size
To configure the local database, use the config database command. Use the show database command to display local database configuration.
config database size count
Syntax Description
config database size
|
Command action.
|
count
|
A database size value between 512 and 2040
|
Defaults
None.
Examples
Configures the dhcp lease for scope 003.
> config database size 1024
Related Commands
show database
config dhcp
To configure the internal DHCP, use the config dhcp command. Use the show dhcp command to display the internal DHCP configuration.
config dhcp {address-pool scope start end | create-scope scope |
default-router scope router_1 [router_2] [router_3] | delete-scope scope | disable scope |
dns-servers scope dns1 [dns2] [dns3] | domain scope domain |
enable scope | lease scope lease_duration |
netbios-name-server scope wins1 [wins2] [wins3] |
network scope network netmask}
Syntax Description
config dhcp
|
Command action.
|
address-pool scope start end
|
Configure an address range to allocate. You must specify the scope name and the first and last addresses of the address range.
|
create-scope name
|
Create a new dhcp scope. You must specify the scope name.
|
default-router scope router_1 [router_2] [router_3]
|
Configure the default routers for the specified scope and specify the IP address of a router. Optionally, you can specify the IP addresses of secondary and tertiary routers.
|
delete-scope scope
|
Delete the specified DHCP scope.
|
disable scope
|
Disable the specified DHCP scope.
|
dns-servers scope dns1 [dns2] [dns3]
|
Configure the name servers for the given scope. You must also specify at least one name server. Optionally, you can specify secondary and tertiary name servers.
|
domain scope domain
|
Configure the DNS domain name. You must specify the scope and domain names.
|
enable scope
|
Enable the specified dhcp scope.
|
lease scope lease_duration
|
Configure the lease duration (in seconds) for the specified scope.
|
netbios-name-server scope wins1 [wins2] [wins3]
|
Configure the netbios name servers. You must specify the scope name and the IP address of a name server. Optionally, you can specify the IP addresses of secondary and tertiary name servers.
|
network scope network netmask
|
Configure the network and netmask. You must specify the scope name, the network address, and the network mask.
|
Defaults
None.
Examples
Configures the DHCP lease for the scope 003.
Related Commands
show dhcp
config dhcp proxy
To specify the level at which DHCP packets are modified, use the config dhcp proxy command. Use the show dhcp proxy command to display the status of DHCP proxy handling.
config dhcp proxy {enable | disable}
Syntax Description
config dhcp proxy
|
Command action.
|
{enable | disable}
|
• Enter enable to allow the controller to modify the DHCP packets without limit.
• Enter disable to reduce DHCP packet modification to the level of a relay.
|
Defaults
Enabled.
Examples
> config dhcp proxy disable
Related Commands
show dhcp proxy
config exclusionlist
To create or delete an exclusion list entry, use the config exclusionlist command.
config exclusionlist {add MAC [description] | delete MAC | description MAC [description]}
Syntax Description
config exclusionlist
|
Configure the exclusion list.
|
{add | delete | description}
|
• Enter add to create a local exclusion-list entry.
• Enter delete to delete a local exclusion-list entry.
• Enter description to set the description for an exclusion-list entry.
|
MAC
|
MAC address of the local Excluded entry.
|
[description]
|
[Optional] The description, up to 32 characters, for an excluded entry.
|
Defaults
None.
Examples
> config exclusionlist add xx:xx:xx:xx:xx:xx lab
> config exclusionlist delete xx:xx:xx:xx:xx:xx lab
Related Commands
show exclusionlist
CONFIG INTERFACE COMMANDS
Use the CONFIG INTERFACE commands to configure interface commands.
config interface acl
To configure an interface's Access Control List, use the config interface acl command.
config interface acl {ap-manager | management | interface_name} {ACL | none}
Note
For a Cisco 2000 series wireless LAN controller, you must configure a pre-authentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL under Web Policy. However, you do not need to configure any pre-authentication ACL for Cisco 4100 series wireless LAN controllers and Cisco 4400 series wireless LAN controllers.
Syntax Description
config interface acl
|
Command action
|
ap-manager
|
Configures the access point manager interface.
|
management
|
Configures the management interface.
|
interface_name
|
Enter interface name.
|
{ACL | none}
|
Specify an ACL name up to 32 alphanumeric characters or enter none.
|
Defaults
None.
Examples
> config interface acl management none
Related Commands
show interface
config interface address
To configure an interface's address information, use the config interface address command.
config interface address {ap-manager IP_address netmask gateway |
management IP_address netmask gateway | service-port IP_address netmask |
virtual IP_address | interface-name IP_address netmask gateway}
Syntax Description
config interface address
|
Command action.
|
ap-manager IP_address netmask gateway
|
Configures the access point manager interface. You must specify the IP address, network mask, and gateway information.
|
management IP_address netmask gateway
|
Configures the management interface. You must specify the IP address, network mask, and gateway information.
|
service-port IP_address netmask
|
Configures the out-of-band service Port for the interface. You must specify the IP address of the interface and its network mask.
|
virtual IP_address
|
Configures the virtual gateway interface. You must specify the IP address of the interface.
|
interface-name IP_address netmask gateway
|
Configures the specified interface name. You must specify the interface's IP address, network mask, and gateway information.
|
Defaults
None.
Examples
> config interface address ap-manager 172.168.2.3 255.255.0.0 172.168.2.1
Related Commands
show interface
config interface ap-manager
To enable or disable access point manager features on a dynamic interface, use the config interface ap-manager command.
config interface ap-manager interface_name {enable | disable}
Syntax Description
config interface
|
Command action.
|
ap-manager
|
Configures access point manager features on a dynamic interface.
|
interface_name
|
Interface's name.
|
{enable | disable}
|
Enable or disable access point manager features on a dynamic interface.
|
Defaults
None.
Examples
> config interface ap-manager myinterface disable
Related Commands
show interface
config interface create
To add a new dynamic interface, use the config interface create command.
config interface create interface_name vlan-id
Syntax Description
config interface
|
Command action
|
create
|
Create a new dynamic interface.
|
interface_name
|
Interface's name.
|
vlan-id
|
VLAN identifier.
|
Defaults
None.
Examples
> config interface create lab2 6
Related Commands
show interface
config interface delete
To delete a dynamic interface, use the config interface delete command.
config interface delete interface-name
Syntax Description
config interface
|
Command action.
|
delete
|
Delete the specified dynamic interface.
|
interface-name
|
Interface's name.
|
Defaults
None.
Examples
> config interface delete VLAN501
Related Commands
show interface
config interface dhcp
To configure DHCP options on an interface, use the config interface dhcp command.
config interface dhcp {ap-manager server1 [server2] |
management server1 [server2] | service-port {enable | disable} |
interface-name server1 [server2]}
Syntax Description
config interface dhcp
|
Command action.
|
ap-manager server1 [server2]
|
Configures the access point manager interface. You must enter the address of the primary DHCP server. Optionally, you can also enter the address of the alternate DHCP server.
|
management server1 [server2]
|
Configures the management interface. You must enter the address of the primary DHCP server. Optionally, you can also enter the address of the alternate DHCP server.
|
service-port {enable | disable}
|
Enables or disables DHCP for the out-of-band service port.
|
interface-name server1 [server2]
|
Enter the interface name and the primary DHCP server. Optionally, you can also enter the address of the alternate DHCP server.
|
Defaults
None.
Examples
> config interface dhcp service-port DHCP02
Related Commands
show interface
config interface hostname
To configure the DNS host name of the virtual gateway interface, use the config interface hostname command.
config interface hostname virtual DNS_host
Syntax Description
config interface
|
Command action.
|
hostname
|
Configure the DNS host name
|
virtual DNS_host
|
Configures the virtual gateway interface to use the specified virtual address of the fully qualified DNS name.
(The Virtual Gateway IP Address is any fictitious, unassigned IP address, such as 1.1.1.1, to be used by Layer 3 security and mobility managers.)
|
Defaults
None.
Examples
> config interface hostname virtual DNS_Host
Related Commands
show interface
config interface port
To assign an interface to a physical port, use the config interface port command.
config interface port {ap-manager | management | interface_name} port1 [port2]
Syntax Description
config interface port
|
Command action.
|
ap-manager
|
Configures the access point management interface to the specified port number.
|
management
|
The management interface.
|
vlan-intf-name
|
VLAN or interface name
|
port1 [port2]
|
Interface's physical port number.
|
Defaults
None.
Examples
> config interface port management 3
Related Commands
show interface
config interface vlan
To configure an interface's VLAN identifier, use the config interface vlan command.
config interface vlan {ap-manager | management | interface-name} vlan
Syntax Description
config interface
|
Command action.
|
vlan
|
Configure an interface's VLAN identifier
|
{ap-manager | management | interface-name}
|
• Enter ap-manager to configure the access point manager interface.
• Enter management to configure the management interface.
• Enter the interface's name.
|
interface-name
|
Interface's name.
|
vlan
|
VLAN identifier.
|
Defaults
None.
Examples
> config interface vlan management 01
Request failed - Active WLAN using interface. Disable WLAN first.
Related Commands
show interface
config known ap
To configure a known Cisco 1000 series lightweight access point, use the config known ap command.
config known ap {add | alert | delete} MAC
Syntax Description
config
|
Configure parameters.
|
known ap
|
Known Cisco 1000 series lightweight access point.
|
{add | alert | delete}
|
• Add a new known access point Entry.
• Generate a trap upon detection of the access point.
• Delete an existing known access point Entry.
|
MAC
|
MAC address of the known Cisco 1000 series lightweight access point.
|
Defaults
None.
Examples
> config known ap add ac:10:02:72:2f:bf 12
Related Commands
config ap
config load-balancing
To change the state of the load-balancing feature, use the config load-balancing command.
config load-balancing {status {enable | disable} | window clients}
Syntax Description
config
|
Configure parameters.
|
load-balancing
|
Configures aggressive load-balancing.
|
status {enable | disable}
|
Enable or disable the aggressive load balancing status.
|
window clients
|
Set the aggressive load balancing client window with the number of clients from 0 to 20.
|
Defaults
Enabled
Examples
> config load-balancing enable
Related Commands
show load-balancing
config location add
To create a new Cisco 1000 series lightweight access point location, use the config location add command.
config location add location [description]
Syntax Description
config
|
Configure parameters.
|
location
|
Cisco 1000 series lightweight access point location.
|
add
|
Add a location.
|
location
|
Location name.
|
[description]
|
(Optional) Location description.
|
Defaults
None.
Examples
> config location add warehouse
Related Commands
show location, config location enable, config location disable, config location delete, config location description, config interlace-mapping
config location delete
To delete an existing Cisco 1000 series lightweight access point location, use the config location delete command.
config location delete location
Syntax Description
config
|
Configure parameters.
|
location
|
Cisco 1000 series lightweight access point location.
|
delete
|
Delete a location.
|
location
|
Location name.
|
Defaults
None.
Examples
> config location delete warehouse
Related Commands
show location, config location add, config location enable, config location disable, config location description, config interlace-mapping
config location description
To specify a description of a Cisco 1000 series lightweight access point location, use the config location description command.
config location description location_name description
Syntax Description
config
|
Configure parameters.
|
location
|
Cisco 1000 series lightweight access point location.
|
description
|
Description of a location.
|
location_name
|
Location name.
|
description
|
Location description.
|
Defaults
None.
Examples
> config location description warehouse bld02
Related Commands
show location, config location add, config location delete, config location enable, config location disable, config interlace-mapping
config location disable
To enable or disable Cisco 1000 series lightweight access point location-based overrides, use the config location disable command.
config location disable
Syntax Description
config
|
Configure parameters.
|
location
|
Cisco 1000 series lightweight access point location.
|
disable
|
Disable location-based overrides.
|
Defaults
None.
Examples
> config location disable
Related Commands
show location, config location add, config location delete, config location description, config interlace-mapping, config location enable
config location enable
To enable or disable Cisco 1000 series lightweight access point location-based overrides, use the config location enable command.
config location enable
Syntax Description
config
|
Configure parameters.
|
location
|
Cisco 1000 series lightweight access point location.
|
enable
|
Enable location-based overrides.
|
Defaults
None.
Examples
Related Commands
show location, config location add, config location delete, config location description, config interlace-mapping, config location disable
config location interface-mapping
To add or delete a new Cisco 1000 series lightweight access point location/wireless LAN/interface mapping, use the config location interface-mapping command.
config location interface-mapping {add location_name wlan_id interface_name |
delete location_name wlan_id}
Syntax Description
config
|
Configure parameters.
|
location
|
Cisco 1000 series lightweight access point location.
|
interface-mapping
|
Add or delete location/wireless LAN/interface mapping.
|
{add | delete}
|
Add or delete a new location/wireless LAN/interface mapping.
|
location_name
|
Location name.
|
wlan_id
|
Wireless LAN Identifier between 1 and 16.
|
interface_name
|
Interface's name.
|
Defaults
None.
Examples
> config location interface-mapping add warehouse 13
Related Commands
show location, config location add, config location delete, config location description, config location
config loginsession close
To manage user connections to the switch, use the config loginsession close command.
config loginsession close {session_id | all}
Syntax Description
config
|
Configure parameters.
|
loginsession close
|
Close specified telnet sessions/
|
{session_id | all}
|
Enter the ID of the session to close.
Enter all to close all telnet sessions.
|
Defaults
None.
Examples
> config location interface-mapping add warehouse 13
Related Commands
show location, config location add, config location delete, config location description, config location
CONFIG MACFILTER COMMANDS
Use the CONFIG MACFILTER commands to configure macfilter settings.
config macfilter add
To create a MAC filter entry on the Cisco Wireless LAN controller, use the config mac filter add command. Use this command to add a client locally to a wireless LAN on the Cisco Wireless LAN controller. This filter bypasses the RADIUS authentication process.
config macfilter add MAC wlan_id interface_name description
Syntax Description
config
|
Configure parameters.
|
macfilter
|
Local MAC address filter.
|
add
|
Creates a local MAC filter entry.
|
MAC
|
Client MAC address.
|
wlan_id
|
Wireless LAN Identifier to associate with. A zero value associates the entry with any wireless LAN.
|
interface_name
|
Interface's name. Enter 0 to specify no interface.
|
description
|
Short description of the interface (up to 32 characters), in double quotes.
|
Defaults
None.
Examples
> config macfilter add xx:xx:xx:xx:xx:xx 1 lab02 "labconnect"
Related Commands
config macfilter ip-address, show macfilter
config macfilter delete
Use to remove a local client from the Cisco Wireless LAN controller, use the config macfilter delete command.
config macfilter delete MAC
Syntax Description
config
|
Configure parameters.
|
macfilter
|
Local MAC address filter.
|
delete
|
Delete a client.
|
MAC
|
Client MAC address.
|
Defaults
None.
Examples
> config macfilter delete 11:11:11:11:11:11
Deleted user 111111111111
Related Commands
show macfilter
config macfilter description
Use to add a description to a MAC filter, use the config macfilter description command.
config macfilter description MAC [description]
Syntax Description
config
|
Configure parameters.
|
macfilter
|
Local MAC address filter.
|
description
|
Sets the description for a mac filter.
|
MAC
|
Client MAC address.
|
[description]
|
Optional description within double quotes (up to 32 characters).
|
Defaults
None.
Examples
> config macfilter description 11:11:11:11:11:11 "MAC Filter 01"
Related Commands
show macfilter
config macfilter ip-address
To assign an IP address to an existing MAC filter entry, if one was not assigned using the config macfilter add command, use the following command:
config macfilter ip-address MAC_address IP address
Syntax Description
MAC_address
|
Client MAC address.
|
IP address
|
Specifies the IP address for a specific MAC address in the local MAC filter database.
|
Defaults
None.
Examples
> config macfilter ip-address 00:E0:77:31:A3:55 10.92.125.51
Related Commands
config macfilter add, show macfilter
config macfilter interface
Use to create a MAC filter client interface, use the config macfilter interface command.
config macfilter interface MAC interface
Syntax Description
config
|
Configure parameters.
|
macfilter
|
Local MAC address filter.
|
interface
|
Create interface.
|
MAC
|
Client MAC address.
|
interface
|
Interface's name. A value of zero is equivalent to no name.
|
Defaults
None.
Examples
> config macfilter interface 11:11:11:11:11:11 Lab01
Related Commands
show macfilter
config macfilter mac-delimiter
To set the MAC delimiter (colon, hyphen, none, and single-hyphen) for MAC addresses sent to RADIUS servers, use the config macfilter mac-delimiter command.
config macfilter mac-delimiter {none | colon | hyphen | single-hyphen}
Syntax Description
config
|
Configure parameters.
|
macfilter
|
Local MAC address filter.
|
mac-delimiter
|
Configure MAC address format for RADIUS servers.
|
{none | colon | hyphen | single-hyphen}
|
• Enter none to disable delimiters (for example, xxxxxxxxxx).
• Enter colon to set the delimiter to colon (for example, xx:xx:xx:xx:xx:xx).
• Enter hyphen to set the delimiter to hyphen (for example, xx-xx-xx-xx-xx-xx).
• Enter single-hyphen to set the delimiter to a single hyphen (for example, xxxxxx-xxxxxx).
|
Defaults
None.
Examples
To have OS send MAC address to RADIUS servers in the form aa:bb:cc:dd:ee:ff:
> config macfilter mac-delimiter colon
To have OS send MAC address to RADIUS servers in the form aa-bb-cc-dd-ee-ff:
> config macfilter mac-delimiter hyphen
To have OS send MAC address to RADIUS servers in the form aabbccddeeff:
> config macfilter mac-delimiter none
Related Commands
show macfilter
config macfilter radius-compat
Use to configure the Cisco Wireless LAN controller for compatibility with selected RADIUS servers.
config macfilter radius-compat {cisco | free | other}
Syntax Description
config
|
Configure parameters.
|
macfilter
|
Local MAC address filter.
|
radius-compat
|
Compatibility with selected RADIUS server.
|
{cisco | free | other}
|
• Enter cisco to configure Cisco ACS Compatibility mode (password is the MAC address of the server).
• Enter free to configure Free RADIUS Server Compatibility mode (password is secret).
• Enter other to configure for other server behaviors (no password necessary).
|
Defaults
Other.
Examples
> config macfilter radius-compat other
Related Commands
show macfilter
config macfilter wlan-id
To modify a wireless LAN ID for a MAC filter, use the config macfilter wlan-id command.
config macfilter wlan-id MAC wlan_id
Syntax Description
config
|
Configure parameters.
|
macfilter
|
Local MAC address filter
|
wlan-id
|
Modify client wireless LAN ID.
|
MAC
|
Client MAC address
|
wlan_id
|
Wireless LAN Identifier to associate with. A value of zero is not allowed.
|
Defaults
None.
Examples
> config macfilter wlanid 11:11:11:11:11:11 2
Related Commands
show macfilter, show wlan
CONFIG MGMTUSER COMMANDS
Use the CONFIG MGMTUSER commands to configure mgmtuser settings.
config mgmtuser add
To add a local management user to the Cisco Wireless LAN controller, use the config mgmtuser add command.
config mgmtuser add username password {read-write | read-only} [description]
Syntax Description
config
|
Configure parameters.
|
mgmtuser
|
Management user account.
|
add
|
Add a management user account.
|
username
|
Account username. Up to 24 alphanumeric characters.
|
password
|
Account password. Up to 24 alphanumeric characters.
|
lobby-admin
|
Adds a management user of type lobby ambassodar who can create guest accounts.
|
{read-write | read-only}
|
• Enter read-write to create a management user with read-write access.
• Enter read-only to create a management user with read-only access.
|
[description]
|
Optional description of the account. Up to 32 alphanumeric characters within double quotes.
|
Defaults
None.
Examples
> config mgmtuser add admin admin read-write "Main account"
Related Commands
show mgmtuser
config mgmtuser delete
To delete a management user from the Cisco Wireless LAN controller, use the config mgmtuser delete command.
config mgmtuser delete username
Syntax Description
config
|
Configure parameters.
|
mgmtuser
|
Management user account.
|
delete
|
Delete a management user account.
|
username
|
Account username up to 24 alphanumeric characters.
|
Defaults
None.
Examples
> config mgmtuser delete admin
Related Commands
show mgmtuser
config mgmtuser description
To add a description to an existing management user login to the Cisco Wireless LAN controller, use the config mgmtuser delete command.
config mgmtuser description username description
Syntax Description
config
|
Configure parameters.
|
mgmtuser
|
Management user account.
|
description
|
Delete a management user account.
|
username
|
Account username. Up to 24 alphanumeric characters.
|
description
|
Description of the account. Up to 32 alphanumeric characters within double quotes.
|
Defaults
None.
Examples
> config mgmtuser description admin "master-user"
Related Commands
show mgmtuser
config mgmtuser password
To change a management user password, use the config mgmtuser password command.
config mgmtuser password username password
Syntax Description
config
|
Configure parameters.
|
mgmtuser
|
Management user account
|
password
|
Add a management user account
|
username
|
Account username. Up to 24 alphanumeric characters.
|
password
|
Account password. Up to 24 alphanumeric characters.
|
Defaults
None.
Examples
> config mgmtuser password admin 5rTfm
Related Commands
show mgmtuser
CONFIG MOBILITY COMMANDS
Use the CONFIG MOBILITY commands to configure mobility settings.
config mobility group anchor
To configures the mobility wireless LAN anchor list, use the config mobility group anchor command.
config mobility group anchor {add | delete} wlan_id IP_address
Syntax Description
config
|
Configure parameters.
|
mobility group
|
Mobility group member.
|
{add | delete}
|
• Enter add to add or change a mobility anchor to a wireless LAN.
• Enter delete to delete a mobility anchor from a wireless LAN.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
IP_address
|
Member switch IP address to anchor wireless LAN.
|
Defaults
None.
Examples
> config mobility group anchor add 2 192.12.1.5
Related Commands
show mobility, config mobility group domain, config mobility group member
config mobility group domain
To configure the mobility domain name, use the config mobility group domain command.
config mobility group domain domain_name
Syntax Description
config
|
Configure parameters.
|
mobility group
|
Mobility group member.
|
domain
|
Enable or disable mobility group feature.
|
domain_name
|
Domain name. Up to 31 characters; case sensitive.
|
Defaults
None.
Examples
> config mobility group domain lab1
Related Commands
show mobility, config mobility group anchor, config mobility group member
config mobility group member
To add or delete users from the mobility group member list, use the config mobility group member command.
config mobility group member {add MAC IP_address [group_name] | delete MAC}
Syntax Description
config
|
Configure parameters.
|
mobility group member
|
Mobility group member.
|
{add | delete}
|
• Enter add to add or change a mobility group member to the list.
• Enter delete to delete a mobility group member from the list.
|
MAC
|
Member switch MAC address.
|
IP_address
|
Member switch IP address.
|
group_name
|
Optional member switch group name (if different from the default group name.
|
Defaults
None.
Examples
> config mobility group member add 11:11:11:11:11:11 192.12.1.2
Related Commands
show mobility, config mobility group anchor, config mobility group domain
config mobility secure-mode
To configure the secure mode for mobility messages between Cisco Wireless LAN controllers/appliances, use the config mobility secure-mode command.
config mobility secure-mode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
mobility
|
Mobility group member.
|
secure-mode
|
Configure the secure mode for mobility messages.
|
{enable | disable}
|
Enable or disable mobility group message security.
|
Defaults
None.
Examples
> config mobility secure-mode enable
Related Commands
show mobility summary
config mobility statistics reset
To reset the mobility statistics, use the config mobility statistics command.
config mobility statistics reset
Syntax Description
config
|
Configure parameters.
|
mobility
|
Mobility group.
|
statistics reset
|
Reset mobility group statistics.
|
Defaults
None.
Examples
> config mobility statistics reset
Related Commands
show mobility statistics
CONFIG MSGLOG LEVEL COMMANDS
Use the CCONFIG MSGLOG commands to configure msglog level settings.
config msglog level critical
To reset the message log so that it collects and displays only critical (highest-level) messages, use the config msglog level critical command.
Note
The message log always collects and displays critical messages, regardless of the message log level setting.
config msglog level critical
Syntax Description
config
|
Configure parameters.
|
msglog level
|
Configure msglog severity levels.
|
critical
|
Collect and display critical messages.
|
Defaults
Config msglog level error.
Examples
> config msglog level critical
Message Log Severity Level...................... CRITICAL
Related Commands
show msglog
config msglog level error
To reset the message log so that it collects and displays both critical (highest-level) and error (second-highest) messages, use the config msglog level error command.
config msglog level error
Syntax Description
config
|
Configure parameters.
|
msglog level
|
Configure msglog severity levels.
|
error
|
Collect and display critical and non-critical error messages.
|
Defaults
Config msglog level error.
Examples
> config msglog level error
Message Log Severity Level...................... ERROR
Related Commands
show msglog
config msglog level security
To reset the message log so that it collects and displays critical (highest-level), error (second-highest), and security (third-highest) messages, use the config msglog level security command.
config msglog level security
Syntax Description
config
|
Configure parameters.
|
msglog level
|
Configure msglog severity levels.
|
security
|
Collect and display critical, non-critical, and authentication- or security-related errors.
|
Defaults
Config msglog level error.
Examples
> config msglog level security
Message Log Severity Level...................... SECURITY
Related Commands
show msglog
config msglog level verbose
To reset the message log so that it collects and displays all messages, use the config msglog level verbose command.
config msglog level verbose
Syntax Description
config
|
Configure parameters.
|
msglog level
|
Configure msglog severity levels.
|
verbose
|
Collect and display all messages.
|
Defaults
Config msglog level error.
Examples
> config msglog level verbose
Message Log Severity Level...................... VERBOSE
Related Commands
show msglog
config msglog level warning
To reset the message log so that it collects and displays critical (highest-level), error (second-highest), security (third-highest), and warning (fourth-highest) messages, use the config msglog level warning command.
config msglog level warning
Syntax Description
config
|
Configure parameters.
|
msglog level
|
Configure msglog severity levels.
|
warning
|
Collect and display warning messages in addition to critical, non-critical, and authentication- or security-related errors.
|
Defaults
Config msglog level error.
Examples
> config msglog level warning
Message Log Severity Level...................... WARNING
Related Commands
show msglog
config nac acl
To configure the NAC ACL name for a Cisco Wireless LAN controller, use the config nac acl command.
config nac acl {none | acl-name}
Note
For a Cisco 2000 series wireless LAN controller, you must configure a pre-authentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL under Web Policy. However, you do not need to configure any pre-authentication ACL for Cisco 4100 series wireless LAN controllers and Cisco 4400 series wireless LAN controllers.
Syntax Description
config
|
Configure.
|
nac acl
|
Network Access Control acl.
|
{none | acl-name}
|
• Enter none to clear the ACL name.
• Enter acl-name to specify the ACL name.
|
Defaults
None.
Examples
Related Commands
show nac, config nac add, config nac delete, config nac disable, config nac enable, show nac summary, show nac statistics
config nac add
To add a NAC server index for a Cisco Wireless LAN controller, use the config nac add command.
config nac add index IP_address port secret
Syntax Description
config
|
Configure.
|
nac
|
Network Access Control.
|
add
|
Command action.
|
index
|
NAC server index number.
|
IP_address
|
NAC server IP address.
|
port
|
NAC server UDP port number.
|
secret
|
NAC server secret.
|
Defaults
None.
Examples
Related Commands
show nac, config nac acl, config nac delete, config nac disable, config nac enable, show nac summary, show nac statistics
config nac delete
To delete a NAC server for a Cisco Wireless LAN controller, use the config nac delete command.
show nac delete index
Syntax Description
config
|
Configure.
|
nac
|
Network Access Control.
|
delete
|
Delete a NAC server.
|
index
|
NAC server index.
|
Defaults
None.
Examples
Related Commands
show nac, config nac acl, config nac add, config nac disable, config nac enable, show nac summary, show nac statistics
config nac disable
To disable a NAC server for a Cisco Wireless LAN controller, use the config nac disable command.
show nac disable index
Syntax Description
config
|
Configure.
|
nac
|
Network Access Control.
|
disable
|
Disable a NAC server.
|
index
|
Index number for NAC server.
|
Defaults
None.
Examples
Related Commands
show nac, config nac acl, config nac add, config nac delete, show nac summary, show nac statistics, config nac enable
config nac enable
To enable a NAC server for a Cisco Wireless LAN controller, use the config nac disable command.
show nac enable index
Syntax Description
config
|
Configure.
|
nac
|
Network Access Control.
|
enable
|
Enable a NAC server.
|
index
|
Index number for NAC server.
|
Defaults
None.
Examples
Related Commands
show nac, config nac acl, config nac add, config nac delete, show nac summary, show nac statistics, config nac disable
CONFIG NETUSER COMMANDS
Use the CONFIG NETUSER commands to configure netuser settings.
config netuser add
To add a user to the local network, use the config netuser add command.
config netuser add username password wlan_id [description]
Syntax Description
config
|
Configure parameters.
|
netuser
|
Local network user.
|
add
|
Add a user.
|
username
|
Network username. Up to 24 alphanumeric characters.
|
password
|
User password. Up to 24 alphanumeric characters.
|
wlan_id
|
Wireless LAN Identifier assigned to the user. A zero value associates the user with any wireless LAN.
|
[description]
|
Short optional description. Up to 32 characters enclosed in double-quotes.
|
lifetime
|
Specify a lifetime for the guest user.
|
Defaults
None.
Examples
> config netuser add able1 able1 1
Related Commands
show netuser
config netuser delete
To delete an existing user from the local network, use the config netuser delete command.
config netuser delete username
Syntax Description
config
|
Configure parameters.
|
netuser
|
Local network user.
|
delete
|
Delete a user.
|
username
|
Network username. Up to 24 alphanumeric characters.
|
Defaults
None.
Examples
> config netuser delete able1
Related Commands
show netuser
config netuser description
To add a description to an existing net user, use the config netuser description command.
config netuser description username description
Syntax Description
config
|
Configure parameters.
|
netuser
|
Local network user of up to 24 alphanumeric characters.
|
description
|
Add a user description.
|
username
|
Network username.
|
description
|
Optional user description. Up to 32 alphanumeric characters enclosed in double quotes.
|
Defaults
None.
Examples
> config netuser description able1 "HQ1 Contact"
Related Commands
show netuser
config netuser maxUserLogin
To configure the maximum number of login sessions allowed for a network user, use the config netuser maxUserLogin command.
config netuser maxUserLogin count
Syntax Description
config
|
Configure parameters.
|
netuser
|
Local network user.
|
maxUserLogin
|
Configure the maximum number of login sessions allowed for a network user.
|
count
|
Maximum number of login sessions for a single user. The allowed values are from 0 (unlimited) to 8.
|
Defaults
0 (unlimited).
Examples
> config netuser maxUserLogin 8
Related Commands
show netuser
config netuser password
To change a local network user password, use the config netuser password command.
config netuser password username password
Syntax Description
config
|
Configure parameters.
|
netuser
|
Local network user
|
password
|
Modify the password.
|
username
|
Network username. Up to 24 alphanumeric characters.
|
password
|
Network user password. Up to 24 alphanumeric characters.
|
Defaults
None.
Examples
> config netuser password aire1 aire2
Related Commands
show netuser
config netuser wlan-id
To configure a wireless LAN ID for a network user, use the config netuser wlan-id command.
config netuser wlan-id username wlan_id
Syntax Description
config
|
Configure parameters.
|
netuser
|
Local network user.
|
wlan-id
|
Configure a wireless LAN ID for a network user.
|
username
|
Network username. Up to 24 alphanumeric characters.
|
wlan_id
|
Wireless LAN identifier to associate with the user. A zero value associates the user with any wireless LAN.
|
Defaults
None.
Examples
> config netuser wlan-id aire1 2
Related Commands
show netuser, show wlan summary
CONFIG NETWORK COMMANDS
Use the CONFIG NETWORK commands to configure network settings.
config network allow-old-bridge-aps
To configure an old bridge access point's ability to associate with a switch, use the config network allow-old-bridge-aps command.
config network allow-old-bridge-aps {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
allow-old-bridge-aps
|
Configure an old bridge access point's ability to associate with a switch.
|
{enable | disable}
|
Enable or disable switch association.
|
Defaults
Enabled.
Examples
> config network allow-old-bridge-aps enable
Related Commands
show network
config network ap-fallback
To configure Cisco 1000 Series lightweight access point fallback, use the config network ap-fallback command.
config network ap-fallback {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
ap-fallback
|
Configure Cisco 1000 Series lightweight access point fallback.
|
{enable | disable}
|
Enable or disable Cisco 1000 Series lightweight access point fallback.
|
Defaults
Enabled.
Examples
> config network ap-fallback enable
Related Commands
show network
config network apple-talk
To configure AppleTalk bridging, use the config network apple-talk command.
config network apple-talk {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
apple-talk
|
Configure AppleTalk bridging.
|
{enable | disable}
|
Enable or disable AppleTalk bridging.
|
Defaults
None.
Examples
> config network apple-talk enable
Related Commands
show network
config network arptimeout
To set the ARP entry timeout value, use the config network arptimeout command.
config network arptimeout seconds
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
arptimeout
|
Set the ARP entry timeout value.
|
seconds
|
Timeout in seconds. Minimum value is 10. Default value is 300.
|
Defaults
300
Examples
> config network arptimeout 240
Related Commands
show network
config network arpunicast
To set the ARP proxy ARP mode, use the config network arpunicast command.
config network arpunicast {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
arpunicast
|
Set the ARP proxy ARP mode.
|
{enable | disable}
|
• Enter enable to enable unicast ARP translation.
• Enter disable to use standard proxy ARP.
|
Defaults
None.
Examples
> config network arpunicast enable
Related Commands
show network
config network bridging-shared-secret
To configure the bridging shared secret, use the config network bridging-shared-secret command. This command creates a secret that encrypts backhaul user data for the mesh access points that connect to the switch.
Note
zero-touch-config must be enabled for this command to work.
config network bridging-shared-secret shared_secret
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
bridging-shared-secret
|
Configure the bridging shared secret.
|
shared_secret
|
Bridging shared secret string. Up to ten bytes.
|
Defaults
Enabled.
Examples
> config network bridging-shared-secret shhh2
Related Commands
show network
config network fast-ssid-change
To enable or disable fast SSID (Service Set Identifier) changing for mobile stations, use the config network fast-ssid-change command.
SSID is a code attached to all packets on a wireless network to identify each packet as part of that network.
Each client is connected to a particular wireless LAN (through a Cisco 1000 series lightweight access point) identified by the SSID. If the client moves out of reach of the connected Cisco 1000 series lightweight access point, the client has to reconnect to the Cisco Wireless LAN controller using a different Cisco 1000 series lightweight access point. This procedure consumes some time as the Dynamic Host Configuration Protocol (DHCP) Server has to assign an IP Address to the client.
When the Fast SSID option is enabled, the Cisco Wireless LAN controller uses the existing IP Address of the client even if the client is on a different wireless LAN.
config network fast-ssid-change {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
fast-ssid-change
|
Configure fast ssid on mobile stations.
|
{enable | disable}
|
Enable or disable fast SSID changing for mobile stations.
|
Defaults
None.
Examples
> config network fast-ssid-change enable
Related Commands
show network
config network master-base
To enable or disable the Cisco Wireless LAN controller as an access point default master, use the config network master-base command. This setting is only used upon network installation and should be disabled after the initial network configuration.
Note
Because the Master Cisco Wireless LAN controller is normally not used in a deployed network, the Master Cisco Wireless LAN controller setting is automatically disabled upon reboot or OS code upgrade.
config network master-base {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
master-base
|
Configure the Cisco Wireless LAN controller.
|
{enable | disable}
|
Enables or disables a Cisco Wireless LAN controller acting as a Cisco 1000 series lightweight access point default master.
|
Defaults
None.
Examples
> config network master-base enable
Related Commands
None
config network mgmt-via-wireless
To enable Cisco Wireless LAN controller management from an associated wireless client, use the config network mgmt-via-wireless command.
Note
This feature allows wireless clients to manage only the Cisco Wireless LAN controller associated with the client AND the associated Cisco 1000 series lightweight access point. That is, clients cannot manage another Cisco Wireless LAN controller with which they are not associated.
config network mgmt-via-wireless {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
mgmt-via-wireless
|
Configure switch management via wireless interface.
|
{enable | disable}
|
Enable or disable switch management via wireless interface.
|
Defaults
Disabled.
Examples
> config network mgmt-via-wireless enable
Related Commands
show network
config network multicast
To enable or disable the Cisco Wireless LAN controller multicast support, use the config network multicast command.
config network multicast {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
multicast
|
Configure multicast support.
|
{enable | disable}
|
Enable or disable the Cisco Wireless LAN controller multicast support.
|
Defaults
Disabled.
Examples
> config network multicast enable
Related Commands
show network
config network otap-mode
To enable or disable over-the-air provisioning (OTAP) of Cisco 1000 series lightweight access points, use the config network otap-mode command.
config network otap-mode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
otap-mode
|
Configure OTAP provisioning.
|
{enable | disable}
|
Enable or disable OTAP provisioning.
|
Defaults
Enabled.
Examples
> config network otap-mode disable
Related Commands
show network
config network peer-blocking
To configure the peer-to-peer blocking feature, use the config network peer-blocking command.
config network peer-blocking {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
peer-blocking
|
Configure peer-to-peer blocking.
|
{enable | disable}
|
• Enter enable to force same-subnet clients to communicate through a higher-level router.
• Enter disable to allow same-subnet clients to communicate through the Cisco Wireless LAN controller.
|
Defaults
Disabled.
Examples
> config network peer-blocking enable
Related Commands
show network
config network rf-network-name
To set the RF-Network name, use the config network rf-network-name command.
config network rf-network-name name
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
rf-network-name
|
Set the RF-network name.
|
name
|
RF-Network name. Up to 19 characters.
|
Defaults
None.
Examples
> config network rf-network-name travelers
Related Commands
show network
config network secureweb
To change the state of the secure web (https = http + SSL) interface, use the config network secureweb command.
config network secureweb {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
secureweb
|
Configure the secure web interface.
|
{enable | disable}
|
Enable or disable the secure web interface.
|
Defaults
Enabled.
Examples
> config network secureweb enable
You must reboot for the change to take effect.
Related Commands
show network
config network ssh
To allow or disallow new ssh sessions, use the config network ssh command.
config network ssh {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
ssh
|
Secure Shell sessions
|
{enable | disable}
|
Allow or disallow new ssh sessions.
|
Defaults
Enabled.
Examples
> config network ssh enable
Related Commands
show network
config network telnet
To allow or disallow new telnet sessions, use the config network telnet command.
config network telnet {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
telnet
|
Configure new telnet sessions.
|
{enable | disable}
|
Allow or disallow new telnet sessions.
|
Defaults
Disabled.
Examples
> config network telnet enable
Related Commands
show network
config network usertimeout
To change the timeout for idle client sessions, use the config network usertimeout command. Use this command to set the idle client session duration on the Cisco Wireless LAN controller. The minimum duration is 10 seconds.
config network usertimeout seconds
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
usertimeout
|
Configure idle session timeout.
|
seconds
|
Timeout duration in seconds. Minimum value is 10. Default value is 300.
|
Defaults
300
Examples
> config network usertimeout 1200
Related Commands
show network
config network web-auth-port
To configure an additional port to be redirected for web authentication, use the config network web-auth-port command.
config network web-auth-port port
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
web-auth-port
|
Configure an additional port to be redirected for web authentication.
|
port
|
Port number.
|
Defaults
None.
Examples
> config network web-auth-port 1200
Related Commands
show network
config network webmode
To enable or disable the web interface, use the config network webmode command.
config network webmode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Network parameters.
|
webmode
|
Configure web user interface access.
|
{enable | disable}
|
Enable or disable the web interface.
|
Defaults
Enabled.
Examples
> config network webmode disable
Related Commands
show network
config network zero-config
To configure bridge access point ZeroConfig support, use the config network zero-config command.
config network zero-config {enable | disable}
Syntax Description
config
|
Configure parameters.
|
network
|
Cisco Wireless LAN controller network parameter.
|
zero-config
|
Configure bridge access point ZeroConfig support.
|
{enable | disable}
|
Enable or disable bridge access point ZeroConfig support.
|
Defaults
Enabled.
Examples
> config network zero-config enable
Related Commands
show network
config pmk-cache delete
To delete an entry in the PMK cache from all Cisco Wireless LAN controllers in the mobility group, use the config pmk-cache delete command.
config pmk-cache delete {all | MAC}
Syntax Description
config
|
Configure parameters.
|
pmk-cache delete
|
Delete an entry in the PMK cache.
|
{all | MAC}
|
• Enter all to delete all Cisco Wireless LAN controllers.
• Enter the MAC address of the Cisco Wireless LAN controller to delete.
|
Defaults
None.
Examples
> config pmk-cache delete all
Related Commands
show pmk-cache
CONFIG PORT COMMANDS
Use the CONFIG PORT commands to configure port settings.
config port adminmode
To configure the administration mode of a single port or all Cisco Wireless LAN controller ports, use the config port adminmode command.
config port adminmode {all | port} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
port
|
Port parameters.
|
adminmode
|
Administrative mode.
|
{all | port}
|
• Enter all to configure all ports.
• Enter the number of the port to configure.
|
{enable | disable}
|
Enable or disable the specified ports.
|
Defaults
Enabled.
Examples
To disable port 8:
> config port adminmode 8 disable
To enable all ports:
> config port adminmode all enable
Related Commands
show port
config port autoneg
To configure 10/100BASE-T Ethernet ports for physical port autonegotiation, use the config port autoneg command.
Note
Port autoconfiguration must be disabled before you make physical mode manual settings using the config port physicalmode command. Also note that the config port autoneg command overrides settings made using the config port physicalmode command.
config port autoneg {all | port} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
port
|
10/100BASE-T Ethernet.
|
autoneg
|
Configure a port's auto negotiation mode.
|
{all | port}
|
• Enter all to configure all ports.
• Enter the number of the port to configure.
|
{enable | disable}
|
Enable or disable the specified ports.
|
Defaults
All Ports = autonegotiation enabled.
Examples
To turn on physical port autonegotiation for all front-panel Ethernet ports:
> config port autoneg all enable
To disable physical port autonegotiation for front-panel Ethernet port 19:
> config port autoneg 19 disable
Related Commands
show port, config port physicalmode
config port linktrap
To change up/down trap settings for link status alert for a single port or all Cisco Wireless LAN controller ports, use the config port linktrap command.
config port linktrap {all | port} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
port
|
Port parameters.
|
linktrap
|
Link status alert.
|
{all | port}
|
• Enter all to configure all ports.
• Enter the number of the port to configure.
|
{enable | disable}
|
Enable or disable the specified ports.
|
Defaults
Enabled.
Examples
To disable port 8 traps:
> config port linktrap 8 disable
To enable all port traps:
> config port linktrap all enable
Related Commands
show port
config port multicast appliance
To change the multicast appliance service for a single port or all Cisco Wireless LAN controller ports, use the config port multicast appliance command.
config port multicast appliance port {enable | disable}
Syntax Description
config
|
Configure parameters.
|
port
|
Port parameters.
|
multicast appliance
|
Configure multicast appliance service for the specified port.
|
port
|
Number of the port to configure.
|
{enable | disable}
|
Enable or disable service for the specified port.
|
Defaults
Enabled.
Examples
To enable appliance service for port 3:
> config port multicast appliance 3 enable
Related Commands
show port
config port physicalmode
To set any or all front-panel 10/100BASE-T Ethernet ports for dedicated 10 Mbps or 100 Mbps, Half or Full Duplex operation, use the config port physicalmode command.
Note that you must disable autonegotiation using the config port autoneg command before manually configuring any port's physical mode. Also note that the config port autoneg command overrides settings made using the config port physicalmode command.
config port physicalmode {all | port} {100h | 100f | 10h | 10f}
Syntax Description
config
|
Configure parameters.
|
port
|
Port parameters.
|
physicalmode
|
Port physical mode.
|
{all | port}
|
• Enter all to configure all ports.
• Enter the number of the port to configure.
|
{100h | 100f | 10h | 10f}
|
• Enter 100h for 100 Mbps/Half Duplex operation.
• Enter 100f for 100 Mbps/Full Duplex operation.
• Enter 10h for 10 Mbps/Half Duplex operation.
• Enter 10f for 10 Mbps/Full Duplex operation.
|
Defaults
All Ports are set to auto negotiate.
Examples
To set all ports to 100 Mbps/Full Duplex operation:
> config port physicalmode all 100f
To set port 20 to 100 Mbps/Half Duplex operation:
> config port physicalmode 20 100h
To set port 21 to 10 Mbps/Full Duplex operation:
> config port physicalmode 21 10f
To set port 22 to 10 Mbps/Half Duplex operation:
> config port physicalmode 22 10h
Related Commands
config port autoneg, show port
config port power
To configure a Cisco Wireless LAN controller's port's power over ethernet, use the config port power command.
config port power {all | port} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
port
|
Port parameters.
|
power
|
Configure a port's power over ethernet.
|
{all | port}
|
• Enter all to configure all ports.
• Enter the number of the port to configure.
|
{enable | disable}
|
Enable or disable the specified ports.
|
Defaults
Enabled.
Examples
To enable all ports' power:
> config port power all enable
Related Commands
show port
config prompt
To change the CLI system prompt, use the config prompt command.
config prompt prompt
Because the system prompt is a user-defined variable, it is omitted from the rest of this documentation.
Syntax Description
config
|
Configure parameters.
|
prompt
|
Change the CLI system prompt.
|
prompt
|
New CLI system prompt enclosed in double quotes. Up to 31 alphanumeric characters; case sensitive.
|
Defaults
The system prompt is configured using the startup wizard.
Examples
> config prompt "Cisco 4400"
Related Commands
None.
config qos queue_length
To configure the Quality of Service parameter, use the config qos command.
config qos queue_length {bronze | silver | gold | platinum} length
Syntax Description
config qos
|
Command action.
|
queue_length
|
Configure QoS queue length.
|
{bronze | silver | gold | platinum}
|
Enter one of the four supported queue names.
|
length
|
Queue length (10 to 255).
|
Defaults
None.
Examples
> config qos queue_length gold 12
Related Commands
show qos queue_length all
CONFIG RADIUS ACCT COMMANDS
Use the CONFIG RADIUS ACCT commands to configure RADIUS account server settings.
config radius acct add
To configure a RADIUS accounting server for the Cisco Wireless LAN controller, use the config radius acct add command.
config radius acct add index ip_address port {ascii | hex} secret
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
add
|
Add a RADIUS server.
|
index
|
RADIUS server index. Cisco Wireless LAN controller begins search with 1.
|
ip_address
|
RADIUS server's IP address.
|
port
|
RADIUS server's UDP port number for the interface protocols.
|
{ascii | hex}
|
RADIUS server's secret type: ascii or hex.
|
secret
|
RADIUS server's secret.
|
Defaults
When added the port number defaults to 1813 and state is enabled.
Examples
To configure a priority 1 RADIUS server at 10.10.10.10 using port 1813 with a login password of admin:
> config radius acct add 1 10.10.10.10 1813 ascii admin
Related Commands
show radius acct statistics
config radius acct delete
To delete a RADIUS accounting server for the Cisco Wireless LAN controller, use the config radius acct delete command.
config radius acct delete index
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
delete
|
Delete a RADIUS server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct delete 1
Related Commands
show radius acct statistics
config radius acct disable
To disable a RADIUS accounting server for the Cisco Wireless LAN controller, use the config radius acct disable command.
config radius acct disable index
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
disable
|
Disable a RADIUS server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct disable 1
Related Commands
show radius acct statistics
config radius acct enable
To enable a RADIUS accounting server for the Cisco Wireless LAN controller, use the config radius acct enable command.
config radius acct enable index
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
enable
|
Enable a RADIUS server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct enable 1
Related Commands
show radius acct statistics
config radius acct network
To configure a default RADIUS server for network users, use the config radius acct network command.
config radius acct network index {enable | disable}
Syntax Description
config
|
Configure parameters.
|
radius acct
|
Default RADIUS accounting server.
|
network
|
Configure a default RADIUS server for network users.
|
index
|
RADIUS server index.
|
{enable | disable}
|
Enable or disable the server as a network user's default RADIUS Server.
|
Defaults
None.
Examples
> config radius acct network 1 enable
Related Commands
show radius acct statistics
config radius acct ipsec authentication
To configure IPSec authentication for the Cisco Wireless LAN controller, use the config radius acct ipsec authentication command.
config radius acct ipsec authentication {hmac-md5 | hmac-sha1} index
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
ipsec authentication
|
Configure IPSec authentication service.
|
{hmac-md5 | hmac-sha1}
|
• Enter hmac-md5 to enable IPSec HMAC-MD5 authentication.
• Enter hmac-sha1 to IPSec HMAC-SHA1 authentication.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct ipsec authentication hmac-md5 1
Related Commands
show radius acct statistics
config radius acct ipsec disable
To disable IPSec support for an accounting server for the Cisco Wireless LAN controller, use the config radius acct ipsec disable command.
config radius acct ipsec disable index
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
ipsec disable
|
Disable IPSec support for an accounting server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct ipsec disable 1
Related Commands
show radius acct statistics
config radius acct ipsec enable
To enable IPSec support for an accounting server for the Cisco Wireless LAN controller, use the config radius acct ipsec enable command.
config radius acct ipsec enable index
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
ipsec enable
|
Enable IPSec support for an accounting server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct ipsec enable 1
Related Commands
show radius acct statistics
config radius acct ipsec encryption
To configure IPSec encryption for an accounting server for the Cisco Wireless LAN controller, use the config radius acct ipsec encryption command.
config radius acct ipsec encryption {3des | aes | des}
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
ipsec encryption
|
Configure IPSec encryption.
|
{3des | aes | des}
|
• Enter 3des to enable IPSec 3DES Encryption.
• Enter aes to enable IPSec AES Encryption.
• Enter des to enable IPSec DES Encryption.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct ipsec encryption 3des 3
Related Commands
show radius acct statistics
config radius acct ipsec ike
To configure Internet Key Exchange (IKE) for the Cisco Wireless LAN controller, use the config radius acct ipsec command.
config radius acct ipsec ike {dh-group {group-1 | group-2 | group-5} |
lifetime seconds | phase1 {aggressive | main}} index
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
ipsec ike
|
Configure IKE.
|
dh-group {group-1 | group-2 | group-5}
|
Configure the IKE Diffie-Hellman group.
• Enter group-1 to configure DH Group 1 (768 bits).
• Enter group-2 to configure DH Group 2 (1024 bits).
• Enter group-5 to configure DH Group 2 (1024 bits).
|
lifetime seconds
|
Configure the IKE lifetime in seconds.
|
phase1 {aggressive | main}
|
Configure the IKE Phase1 mode.
• Enter aggressive to enable the aggressive mode.
• Enter main to enable the main mode.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct ipsec ike lifetime 23 1
Related Commands
show radius acct statistics
config radius acct retransmit-timeout
To change the default transmission timeout for a RADIUS accounting server for the Cisco Wireless LAN controller, use the config radius acct retransmit-timeout command.
config radius acct retransmit-timeout index timeout
Syntax Description
config
|
Configure parameters.
|
radius acct
|
RADIUS accounting server.
|
retransmit-timeout
|
Configure retransmission timeout.
|
index
|
RADIUS server index.
|
timeout
|
Number of seconds (from 2 to 30) between retransmissions.
|
Defaults
None.
Examples
> config radius acct retransmit-timeout 5
Related Commands
show radius acct statistics
CONFIG RADIUS AUTH COMMANDS
Use the CONFIG RADIUS AUTH commands to configure RADIUS authentication server settings.
config radius auth add
To configure a RADIUS authentication server for the Cisco Wireless LAN controller, use the config radius auth add command.
config radius auth add index ip_address port {ascii | hex} secret
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
add
|
Add a RADIUS server.
|
index
|
RADIUS server index. Cisco Wireless LAN controller begins search with 1.
|
ip_address
|
RADIUS server's IP address.
|
port
|
RADIUS server's UDP port number for the interface protocols.
|
{ascii | hex}
|
RADIUS server's secret type: ascii or hex.
|
secret
|
RADIUS server's secret.
|
Defaults
When added the port number defaults to 1812 and state is enabled.
Examples
To configure a priority 1 RADIUS server at 10.10.10.10 using port 1812 with a login password of admin:
> config radius auth add 1 10.10.10.10 1812 ascii admin
Related Commands
show radius auth statistics
config radius auth delete
To delete a RADIUS authentication server for the Cisco Wireless LAN controller, use the config radius auth delete command.
config radius auth delete index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
delete
|
Delete a RADIUS server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth delete 1
Related Commands
show radius auth statistics
config radius auth disable
To disable a RADIUS authentication server for the Cisco Wireless LAN controller, use the config radius auth disable command.
config radius auth disable index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
disable
|
Disable a RADIUS server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth disable 1
Related Commands
show radius auth statistics
config radius auth enable
To enable a RADIUS authentication server for the Cisco Wireless LAN controller, use the config radius auth enable command.
config radius auth enable index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
enable
|
Enable a RADIUS server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth enable 1
Related Commands
show radius auth statistics
config radius auth ipsec authentication
To configure IPSec support for an authentication server for the Cisco Wireless LAN controller, use the config radius auth ipsec authentication command.
config radius auth ipsec authentication {hmac-md5 | hmac-sha1} index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
ipsec authentication
|
Configure IPSec authentication service.
|
{hmac-md5 | hmac-sha1}
|
• Enter hmac-md5 to enable IPSec HMAC-MD5 authentication.
• Enter hmac-sha1 to IPSec HMAC-SHA1 authentication.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth ipsec authentication hmac-md5 1
Related Commands
show radius acct statistics
config radius auth ipsec disable
To disable IPSec support for an authentication server for the Cisco Wireless LAN controller, use the config radius auth ipsec disable command.
config radius auth ipsec disable index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
ipsec disable
|
Disable IPSec support for an authentication server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth ipsec disable 1
Related Commands
show radius acct statistics
config radius auth ipsec enable
To configure IPSec support for an authentication server for the Cisco Wireless LAN controller, use the config radius auth ipsec enable command.
config radius auth ipsec enable index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
ipsec enable
|
Enable IPSec support for an authentication server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth ipsec enable 1
Related Commands
show radius acct statistics
config radius auth ipsec encryption
To configure IPSec support for an authentication server for the Cisco Wireless LAN controller, use the config radius auth ipsec command.
config radius auth ipsec encryption {3des | aes | des} index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
ipsec encryption
|
Configure IPSec encryption.
|
{3des | aes | des}
|
• Enter 3des to enable IPSec 3DES Encryption.
• Enter aes to enable IPSec AES Encryption.
• Enter des to enable IPSec DES Encryption.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius acct ipsec encryption 3des 3
Related Commands
show radius acct statistics
config radius auth ipsec ike
To configure IKE for the Cisco Wireless LAN controller, use the config radius auth ipsec ike command.
config radius auth ipsec ike {dh-group {group-1 | group-2 | group-5} |
lifetime seconds | phase1 {aggressive | main}} index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
ipsec ike
|
Configure IKE.
|
dh-group {group-1 | group-2 | group-5}
|
Configure the IKE Diffie-Hellman group.
• Enter group-1 to configure DH Group 1 (768 bits).
• Enter group-2 to configure DH Group 2 (1024 bits).
• Enter group-5 to configure DH Group 2 (1024 bits).
|
lifetime seconds
|
Configure the IKE lifetime in seconds.
|
phase1 {aggressive | main}
|
Configure the IKE Phase1 mode.
• Enter aggressive to enable the aggressive mode.
• Enter main to enable the main mode.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth ipsec ike lifetime 23 1
Related Commands
show radius acct statistics
config radius auth management
To configure a default RADIUS server for management users, use the config radius auth management command.
config radius auth management index {enable | disable}
Syntax Description
config
|
Configure parameters.
|
radius auth
|
Default RADIUS authentication server.
|
management
|
Configure a RADIUS server for management users.
|
index
|
RADIUS server index.
|
{enable | disable}
|
Enable or disable the server as a management user's default RADIUS Server.
|
Defaults
None.
Examples
> config radius auth management 1 enable
Related Commands
show radius acct statistics, config radius acct network
config radius auth network
To configure a default RADIUS server for network users, use the config radius auth network command.
config radius auth network index {enable | disable}
Syntax Description
config
|
Configure parameters.
|
radius auth
|
Default RADIUS authentication server.
|
network
|
Configure a default RADIUS server for network users.
|
index
|
RADIUS server index.
|
{enable | disable}
|
Enable or disable the server as a network user default RADIUS Server.
|
Defaults
None.
Examples
> config radius auth network 1 enable
Related Commands
show radius acct statistics, config radius acct network
config radius auth retransmit-timeout
To change the default transmission timeout for a RADIUS authentication server for the Cisco Wireless LAN controller, use the config radius auth retransmit-timeout command.
config radius auth retransmit-timeout index timeout
Syntax Description
config
|
Configure parameters.
|
radius auth
|
RADIUS authentication server.
|
retransmit-timeout
|
Configure retransmission timeout.
|
index
|
RADIUS server index.
|
timeout
|
Number of seconds (from 2 to 30) between retransmissions.
|
Defaults
None.
Examples
> config radius auth retransmit-timeout 5
Related Commands
show radius auth statistics
config radius auth rfc3576
To configure RADIUS rfc3576 support for the authentication server for the Cisco Wireless LAN controller, use the config radius auth rfc3576 command.
RFC 3576, an extension to the RADIUS protocol, allows dynamic changes to a user session. This includes support for disconnecting users and changing authorizations applicable to a user session, that is, provide support for disconnect and CoA messages. Disconnect messages cause a user session to be terminated immediately, whereas CoA messages modify session authorization attributes such as data filters.
config radius auth rfc3576 {enable | disable} index
Syntax Description
config
|
Configure parameters.
|
radius auth
|
Default RADIUS authentication server.
|
rfc3576
|
Configure RADIUS rfc3576 support.
|
{enable | disable}
|
Enable or disable RFC-3576 support for an authentication server.
|
index
|
RADIUS server index.
|
Defaults
None.
Examples
> config radius auth rfc3576 enable 2
Related Commands
show radius auth statistics, show radius summary, show radius rfc3576
config radius backward compatibility
To configure RADIUS backward compatibility for the Cisco Wireless LAN controller, use the config radius backward command.
config radius backward compatibility {enable | disable}
Syntax Description
config
|
Configure parameters.
|
radius backward
|
RADIUS authentication server.
|
compatibility
|
Configure RADIUS backward compatibility.
|
{enable | disable}
|
Enable or disable RADIUS vendor ID backward compatibility.
|
Defaults
Enabled.
Examples
> config radius backward compatibility disable
Related Commands
show radius summary
config radius callStationIdType
To configure callStationIdType information sent in radius messages for the Cisco Wireless LAN controller, use the config radius callStationIdType command. This command uses the selected calling station ID for communications with RADIUS servers and other applications.
config radius callStationIdType {ipAddr | macAddr | ap-macAddr}
Syntax Description
config
|
Configure parameters.
|
radius callStationIdType
|
Configure callStationIdType information.
|
{ipAddr | macAddr | ap-macAddr}
|
• Enter ipAddr to configure Call Station ID type to IP address (only layer 3).
• Enter macAddr to configure Call Station ID type to the system's MAC address (layers 2 and 3).
• Enter ap-macAddr to configure Call Station ID type to use the access point's MAC address (layers 2 and 3).
|
Defaults
Enabled.
Examples
> config radius callStationIdType ipAddr
> config radius callStationIdType macAddr
> config radius callStationIdType ap-macAddr
Related Commands
show radius summary
config rfid auto-timeout
To configure the automatic timeout of RFID tags, use the config rfid auto-timeout command.
config rfid auto-timeout {enable | disable}
Syntax Description
config
|
Configure parameters.
|
rfid auto-timeout
|
Configure automatic timeout of RFID tags.
|
{enable | disable}
|
Enable or disable automatic timeout.
|
Defaults
None.
Examples
> config rfid auto-timeout enable
Related Commands
show rfid summary, config rfid status, config rfid timeout.
config rfid status
To configure RFID tag data collection, use the config rfid status command.
config rfid status {enable | disable}
Syntax Description
config
|
Configure parameters.
|
rfid status
|
Configure RFID tag data collection.
|
{enable | disable}
|
Enable or disable RFID tag tracking.
|
Defaults
None.
Examples
> config rfid status enable
Related Commands
show rfid summary, config rfid auto-timeout, config rfid timeout.
config rfid timeout
To configure the static RFID tag data timeout, use the config rfid timeout command.
config rfid timeout seconds
Syntax Description
show
|
Display configurations.
|
rfid timeout
|
Configure the static RFID tag data timeout.
|
seconds
|
Timeout in seconds (from 60 to 7200).
|
Defaults
None.
Examples
Related Commands
show rfid summary, config rfid statistics
config rogue adhoc
To configure the status of an ad-hoc rogue access point (IBSS), use the config rogue adhoc command.
config rogue adhoc {acknowledged MAC | alert MAC | contain MAC num_of_APs}
Syntax Description
config
|
Configure parameters.
|
rogue adhoc
|
Ad hoc rogue access point.
|
{acknowledged | alert | contain}
|
Enter acknowledged to acknowledge presence of a adhoc rogue.
Enter alert to generate a trap upon detection of the adhoc rogue.
Enter contain to start containing adhoc rogue.
|
MAC
|
MAC address of the ad-hoc rogue access point.
|
num_of_APs
|
The maximum number of Cisco access points to actively contain the rogue access point (1-4).
|
Defaults
None.
Examples
> config rogue adhoc acknowledge 11:11:11:11:11:11
Related Commands
show rogue adhoc summary, show rogue adhoc detailed, config adhoc rogue
config rogue ap
To configure the status of a rogue access point, use the config rogue ap command.
config rogue ap {acknowledged MAC | alert MAC | known MAC | contain MAC num_of_APs}
Syntax Description
config
|
Configure parameters.
|
rogue ap
|
Rogue access point status.
|
{acknowledged | alert | contain | known}
|
• Enter acknowledged to acknowledge presence of an access point.
• Enter alert to generate a trap upon detection of the access point.
• Enter contain to start containing a rogue access point.
• Enter known to trust a foreign access point.
|
MAC
|
MAC address of the rogue access point.
|
num_of_APs
|
The maximum number of Cisco access points to actively contain the rogue access point (1-4).
|
Defaults
None.
Examples
> config rogue ap acknowledge 11:11:11:11:11:11
Related Commands
show rogue ap summary, show rogue ap detailed
config rogue client
To configure rogue clients, use the config rogue client command.
config rogue client {alert MAC | contain MAC num_of_APs}
Syntax Description
config
|
Configure parameters.
|
rogue client
|
Rogue client status.
|
{alert | contain}
|
• Enter alert to configure the rogue client to the alarm state.
• Enter contain to start containing a rogue client.
|
MAC
|
MAC address of the rogue client.
|
num_of_APs
|
The maximum number of Cisco access points to actively contain the rogue access point (1-4).
|
Defaults
None.
Examples
> config rogue client acknowledge 11:11:11:11:11:11 5
Related Commands
show rogue client summary, show rogue client detailed, config rogue client
config route add
To configure a network route from the Service Port to a dedicated workstation IP address range, use the config route add command.
config route add ip_address netmask gateway
Syntax Description
config
|
Configure parameters.
|
route
|
Network route.
|
add
|
Add a route.
|
ip_address
|
Network IP Address.
|
netmask
|
The subnet mask for the network.
|
gateway
|
IP Address of the gateway for the route network.
|
Defaults
None.
Examples
> config route add 10.1.1.0 255.255.255.0 10.1.1.1
Related Commands
show route summary, config route delete
config route delete
To remove a network route from the Service Port, use the config route delete command.
config route delete ip_address
Syntax Description
config
|
Configure parameters.
|
route
|
Network route.
|
delete
|
Delete a route.
|
ip_address
|
Network IP Address.
|
Defaults
None.
Examples
> config route delete 10.1.1.0
Related Commands
show route all, config route add
CONFIG SERIAL COMMANDS
Use the CONFIG SERIAL commands to configure serial port settings.
config serial baudrate
To set the serial port baud rate, use the config serial baudrate command.
config serial baudrate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600}
Syntax Description
config
|
Configure parameters.
|
serial baudrate
|
Configure serial port baud rate.
|
{1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600}
|
Enter one of the supported connection speeds.
|
Defaults
9600.
Examples
> config serial baudrate 9600
Related Commands
config serial timeout
config serial timeout
To set the timeout of a serial port session, use the config serial timeout command.
Use this command to set the timeout for a serial connection to the front of the Cisco Wireless LAN controller from 0 to 160 minutes where 0 is no timeout.
config serial timeout minutes
Syntax Description
config
|
Configure parameters.
|
serial
|
Serial connection settings.
|
timeout
|
Configure timeout of a serial port session.
|
minutes
|
Timeout in minutes from 0 to 160. A value of 0 indicates no timeout.
|
Defaults
0 (no timeout).
Examples
> config serial timeout 10
Related Commands
config serial timeout
CONFIG SESSIONS COMMANDS
Use the CONFIG SESSIONS commands to configure CLI session settings.
config sessions maxsessions
To configure the number of telnet CLI sessions allowed by the Cisco Wireless LAN controller, use the config sessions maxsessions command. Up to five sessions are possible while a setting of zero prohibits any telnet CLI sessions.
config sessions maxsessions session_num
Syntax Description
config
|
Configure parameters.
|
sessions
|
Telnet CLI session parameters.
|
maxsessions
|
Configure the number of allowed CLI sessions.
|
session_num
|
Number of sessions from 0 to 5.
|
Defaults
5.
Examples
> config sessions maxsessions 2
Related Commands
show sessions
config sessions timeout
To configure the inactivity timeout for telnet CLI sessions, use the config sessions timeout command.
config sessions timeout timeout
Syntax Description
config
|
Configure parameters.
|
sessions
|
Telnet CLI session parameters.
|
timeout
|
Configure the inactivity timeout for telnet CLI sessions
|
timeout
|
Timeout of telnet session in minutes (from 0 to 160). A value of 0 indicates no timeout.
|
Defaults
5.
Examples
> config sessions timeout 20
Related Commands
show sessions
CONFIG SNMP COMMUNITY COMMANDS
Use the CONFIG SNMP COMMUNITY commands to configure SNMP community settings.
config snmp community accessmode
To modify the access mode (Read only or Read/Write) of an SNMP community, use the config snmp community accessmode command.
config snmp community accessmode {ro | rw} name
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
community
|
SNMP community parameters.
|
accessmode
|
Configure the access mode for an SNMP community.
|
{ro | rw}
|
• Enter ro to specify a Read Only mode.
• Enter rw to specify a Read/Write mode.
|
name
|
SNMP community name.
|
Defaults
Two communities are provided by default with the following parameters:
SNMP Community Name Client IP Address Client IP Mask Access Mode Status
------------------- ----------------- ---------------- ----------- ------
public 0.0.0.0 0.0.0.0 Read Only Enable
private 0.0.0.0 0.0.0.0 Read/Write Enable
Examples
> config snmp community accessmode rw private
Related Commands
show snmp community, config snmp community mode, config snmp community create, config snmp community delete, config snmp community ipaddr
config snmp community create
To create a new SNMP community, use the config snmp community create command. Use this command to create a new community with the following default configuration:
config snmp community create name
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
community
|
SNMP community parameters.
|
create
|
Create a new community.
|
name
|
SNMP community name. Up to 16 characters.
|
Defaults
None.
Examples
> config snmp community create test
SNMP Community Name Client IP Address Client IP Mask Access Mode Status
------------------- ----------------- ----------------- ----------- --------
public 0.0.0.0 0.0.0.0 Read Only Enable
********** 0.0.0.0 0.0.0.0 Read/Write Enable
test 0.0.0.0 0.0.0.0 Read Only Disable
Related Commands
show snmp community, config snmp community mode, config snmp community accessmode, config snmp community delete, config snmp community ipaddr
config snmp community delete
To delete an SNMP community, use the config snmp community delete command.
config snmp community delete name
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
community
|
SNMP community parameters.
|
delete
|
Delete an SNMP community.
|
name
|
SNMP community name.
|
Defaults
None.
Examples
> config snmp community delete test
Related Commands
show snmp community, config snmp community mode, config snmp community accessmode, config snmp community create, config snmp community ipaddr
config snmp community ipaddr
To configure the IP Address of an SNMP community, use the config snmp community ipaddr command.
config snmp community ipaddr ip_address ip_mask name
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
community
|
SNMP community parameters.
|
ipaddr
|
Set IP Address parameters.
|
ip_address
|
SNMP community IP address.
|
ip_mask
|
SNMP community subnet mask.
|
name
|
SNMP community name.
|
Defaults
None.
Examples
> config snmp community ipaddr 10.10.10.10.2 255.255.255.0 public
Related Commands
show snmp community, config snmp community mode, config snmp community accessmode, config snmp community create, config snmp community delete, config snmp community ipaddr
config snmp community mode
To enable or disable an SNMP community, use the config snmp community mode command.
config snmp community mode {enable | disable} name
Syntax Description
config snmp community
|
Configure SNMP community parameters.
|
mode
|
Configure an SNMP community
|
{enable | disable}
|
Enable or disable the community.
|
name
|
SNMP community name.
|
Defaults
None.
Examples
> config snmp community mode disable public
Related Commands
show snmp community, config snmp community accessmode, config snmp community create, config snmp community delete, config snmp community ipaddr
config snmp syscontact
To set the SNMP system contact name, use the config snmp syscontact command.
config snmp syscontact contact
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
syscontact
|
Set the SNMP system contact name.
|
contact
|
SNMP system contact name. Up to 31 alphanumeric characters.
|
Defaults
None.
Examples
> config snmp syscontact Cisco WLAN Solution_administrator
Related Commands
show snmpcommunity
config snmp syslocation
To configure the SNMP system location name, use the config snmp syslocation command.
config snmp syslocation location
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
syslocation
|
configure the SNMP system location name.
|
location
|
SNMP system location name. Up to 31 alphanumeric characters.
|
Defaults
None.
Examples
> config snmp syslocation Building_2a
Related Commands
show snmpcommunity
CONFIG SNMP TRAPRECEIVER COMMANDS
Use the CONFIG SMP TRAPRECEIVER commands to configure SNMP trapreceiver settings.
config snmp trapreceiver create
To add server to receive a SNMP traps, use the config snmp trapreceiver create command. The IP Address must be valid for the command to add the new server.
config snmp trapreceiver create name ip_address
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
trapreceiver
|
SNMP trap server parameters.
|
create
|
Add a new SNMP trap receiver.
|
name
|
SNMP community name. Up to 16 characters.
|
ip_address
|
SNMP community IP address.
|
Defaults
None.
Examples
> config snmp trapreceiver create test 10.1.1.1
Related Commands
show snmp trap
config snmp trapreceiver delete
To delete a server from the trap receiver list, use the config snmp trapreceiver delete command.
config snmp trapreceiver delete name
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
trapreceiver
|
Server to receive traps.
|
delete
|
Delete an SNMP trap receiver.
|
name
|
SNMP community name. Up to 16 characters.
|
Defaults
None.
Examples
> config snmp trapreceiver delete test
Related Commands
show snmp trap
config snmp trapreceiver mode
To send or disable sending traps to a selected server, use the config snmp trapreceiver mode command. This enables or disables the Cisco Wireless LAN controller from sending the traps to the selected server.
config snmp trapreceiver mode {enable | disable} name
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
trapreceiver
|
Server to receive traps.
|
mode
|
Configure an SNMP trap receiver.
|
{enable | disable}
|
Enable or disable an SNMP trap receiver.
|
name
|
SNMP community name.
|
Defaults
None.
Examples
> config snmp trapreceiver mode disable server1
Related Commands
show snmp trap
CONFIG SNMP V3USER COMMANDS
Use the CONFIG SNMP V3USER commands to configure SNMP version 3 settings.
config snmp v3user create
To create a version 3 SNMP user, use the config snmp v3user create command.
config snmp v3user create username {ro | rw} {none | hmacmd5 | hmacsha} {none | des}
[auth_key] [encrypt_key]
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
v3user create
|
Create a version 3 SNMP.
|
username
|
Version 3 SNMP username.
|
{ro | rw}
|
• Enter ro to specify a Read Only user privileges.
• Enter rw to specify a Read/Write user privileges.
|
{none | hmacmd5 | hmacsha}
|
Enter an authentication protocol for a v3 user or none if no authentication is required.
|
{none | des}
|
• Enter none if no encryption is required.
• Enter des to use the des encryption protocol.
|
[auth_key]
|
Authentication key for the hmacmd5 or hmacsha authentication protocol.
|
[encrypt_key]
|
Encryption key for the des encryption protocol.
|
Defaults
SNMP v3 User Name AccessMode Authentication Encryption
-------------------- ----------- -------------- ----------
default Read/Write HMAC-MD5 CBC-DES
Examples
To add an SNMP username test with read-only privileges and no encryption or authentication:
> config snmp v3user create test ro none none
Related Commands
show snmp v3user
config snmp v3user delete
To delete a version 3 SNMP user, use the config snmp v3user delete command.
config snmp v3user delete username
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
v3user
|
Version 3 SNMP.
|
delete
|
Delete a v3 user.
|
username
|
Username to delete.
|
Defaults
SNMP v3 User Name AccessMode Authentication Encryption
-------------------- ----------- -------------- ----------
default Read/Write HMAC-MD5 CBC-DES
Examples
This will remove an SNMP user named test.
> config snmp v3user delete test
Related Commands
show snmp v3user
config snmp version
To enable or disable selected SNMP versions, use the config snmp version command.
config snmp version {v1 | v2 | v3} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
snmp
|
SNMP parameters.
|
version
|
Configure SNMP version.
|
{v1 | v2 | v3}
|
Enter an SNMP version to enable or disable.
|
{enable | disable}
|
Enable or disable specified version
|
Defaults
All versions enabled
Examples
> config sessions timeout 20
Related Commands
show snmpversion
CONFIG SPANNINGTREE PORT COMMANDS
Use the CONFIG SPANNINGTREE PORT commands to configure spanningtree port settings.
config spanningtree port mode
To turn fast or 802.1D Spanning Tree Protocol on or off for one or all Cisco Wireless LAN controller ports, use the config spanningtree port mode command.
Note
When the a Cisco 4400 series wireless LAN controller is configured for port redundancy, Spanning Tree Protocol must be disabled for all ports on the Cisco 4400 series wireless LAN controller. Spanning tree protocol can remain enabled on the switch connected to the Cisco 4400 series wireless LAN controller.
Note that you must disable Cisco Wireless LAN controller STP using the config spanningtree switch mode command, select STP mode for all Ethernet ports using this command, and then enable Cisco Wireless LAN controller STP using the config spanningtree switch mode command. This procedure allows the Cisco Wireless LAN controller to most efficiently set up STP, detect logical network loops, place redundant ports on standby, and build a network with the most efficient pathways.
config spanningtree port mode {off | 802.1d | fast} {port | all}
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
port
|
Configure spanning tree values on a per port basis.
|
mode
|
Configure the STP port mode.
|
{off | 802.1d | fast}
|
Enter a supported port mode or off to disable STP for the specified ports.
|
{port | all}
|
Enter a port number (1 through 12 or 1 through 24), or all to configure all ports.
|
Defaults
Port STP = off.
Examples
To disable STP for all Ethernet ports:
> config spanningtree port mode off all
To turn on STP 802.1D mode for Ethernet port 24:
> config spanningtree port mode 802.1d 24
To turn on fast STP mode for Ethernet port 2:
> config spanningtree port mode fast 2
Related Commands
show spanningtree port, config spanningtree switch mode, config spanningtree port pathcost, config spanningtree port priority
config spanningtree port pathcost
To set the STP path cost for an Ethernet port, use the config spanningtree port pathcost command.
Note
When the a Cisco 4400 series wireless LAN controller is configured for port redundancy, Spanning Tree Protocol must be disabled for all ports on the Cisco 4400 series wireless LAN controller. Spanning tree protocol can remain enabled on the switch connected to the Cisco 4400 series wireless LAN controller.
config spanningtree port pathcost {cost | auto} {port | all}
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
port
|
Configure spanning tree values on a per port basis.
|
pathcost
|
Configure the STP port path cost.
|
{cost | auto}
|
Enter cost in decimal as determined by the network planner or auto (default cost).
|
{port | all}
|
Enter a port number (1 through 12 or 1 through 24), or all to configure all ports.
|
Defaults
auto.
Examples
To have the STP algorithm automatically assign a path cost for all ports:
> config spanningtree port pathcost auto all
To have the STP algorithm use a port cost of 200 for port 22:
> config spanningtree port pathcost 200 22
Related Commands
show spanningtree port, config spanningtree port mode, config spanningtree port priority
config spanningtree port priority
To configure the STP port priority, use the config spanningtree port priority command.
Note
When the a Cisco 4400 series wireless LAN controller is configured for port redundancy, Spanning Tree Protocol must be disabled for all ports on the Cisco 4400 series wireless LAN controller. Spanning tree protocol can remain enabled on the switch connected to the Cisco 4400 series wireless LAN controller.
config spanningtree port priority priority_num port
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
port
|
Configure spanning tree values on a per port basis.
|
priority
|
Configure the STP port priority.
|
priority_num
|
Enter a priority number from 0 to 255.
|
port
|
Enter a port number (1 through 12 or 1 through 24).
|
Defaults
STP Priority = 128.
Examples
To set Ethernet port 2 to STP priority 100:
> config spanningtree port priority 100 2
Related Commands
show spanningtree port, config spanningtree switch mode, config spanningtree port mode, config spanningtree port pathcost
CONFIG SPANNINGTREE SWITCH COMMANDS
Use the CONFIG SPANNINGTREE SWITCH commands to configure spanningtree switch settings.
config spanningtree switch bridgepriority
To set the bridge ID, use the config spanningtree switch bridgepriority command. The value of the writable portion of the Bridge ID, that is, the first two octets of the (8 octet long) Bridge ID. The other (last) 6 octets of the Bridge ID are given by the value of Bridge MAC Address. The value may be specified as a number between 0 and 65535.
Note
When the a Cisco 4400 series wireless LAN controller is configured for port redundancy, Spanning Tree Protocol must be disabled for all ports on the Cisco 4400 series wireless LAN controller. Spanning tree protocol can remain enabled on the switch connected to the Cisco 4400 series wireless LAN controller.
config spanningtree switch bridgepriority priority_num
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
switch
|
Configure spanning tree values on a per switch basis.
|
bridgepriority
|
Configure the STP bridge priority.
|
priority_num
|
Enter a priority number between 0 and 65535.
|
Defaults
The factory default is 32768.
Examples
> config spanningtree switch bridgepriority 40230
Related Commands
show spanningtree switch, config spanningtree switch forwarddelay, config spanningtree switch hellotime, config spanningtree switch maxage, config spanningtree switch mode
config spanningtree switch forwarddelay
To set the bridge timeout, use the config spanningtree switch forwarddelay command.
The value that all bridges use for ForwardDelay when this bridge is acting as the root. Note that 802.1D-1990 specifies that the range for this parameter is related to the value of Stp Bridge Maximum Age. The granularity of this timer is specified by 802.1D-1990 to be 1 second. An agent may return a badValue error if a set is attempted to a value which is not a whole number of seconds. The Factory default is 15. Valid values are 4 through 30 seconds.
config spanningtree switch forwarddelay seconds
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
switch
|
Configure spanning tree values on a per switch basis.
|
forwarddelay
|
Configure the STP bridge forward delay.
|
seconds
|
Timeout in seconds (between 4 and 30).
|
Defaults
The factory default is 15.
Examples
> config spanningtree switch forwarddelay 20
Related Commands
show spanningtree switch, config spanningtree switch bridgepriority, config spanningtree switch hellotime, config spanningtree switch maxage, config spanningtree switch mode
config spanningtree switch hellotime
To set the hello time, use the config spanningtree switch hellotime command.
This is the value all bridges use for HelloTime when this bridge is acting as the root. The granularity of this timer is specified by 802.1D- 1990 to be 1 second. Valid values are 1 through 10 seconds.
config spanningtree switch hellotime seconds
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
switch
|
Configure spanning tree values on a per switch basis.
|
hellotime
|
Configure the STP hello time.
|
seconds
|
STP hello time in seconds.
|
Defaults
The factory default is 15.
Examples
> config spanningtree switch hellotime 4
Related Commands
show spanningtree switch, spanningtree switch bridgepriority, config spanningtree switch forwarddelay, config spanningtree switch maxage, config spanningtree switch mode
config spanningtree switch maxage
To set the maximum age, use the config spanningtree switch maxage command.
This is the value all bridges use for MaxAge when this bridge is acting as the root. Note that 802.1D-1990 specifies that the range for this parameter is related to the value of Stp Bridge Hello Time. The granularity of this timer is specified by 802.1D-1990 to be 1 second. Valid values are 6 through 40 seconds.
config spanningtree switch maxage seconds
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
switch
|
Configure spanning tree values on a per switch basis.
|
maxage
|
Configure the STP bridge maximum age.
|
seconds
|
STP bridge maximum age in seconds.
|
Defaults
The factory default is 20.
Examples
> config spanningtree switch maxage 30
Related Commands
show spanningtree switch, config spanningtree switch bridgepriority, config spanningtree switch forwarddelay, config spanningtree switch hellotime, config spanningtree switch mode
config spanningtree switch mode
To turn the Cisco Wireless LAN controller Spanning Tree Protocol on or off, use the config spanningtree switch mode command.
Note that you must disable the Cisco Wireless LAN controller STP using this command, select STP mode for all Ethernet ports using the config spanningtree port mode command, and then enable the Cisco Wireless LAN controller STP using this command. This procedure allows the Cisco Wireless LAN controller to most efficiently set up STP, detect logical network loops, place redundant ports on standby, and build a network with the most efficient pathways.
config spanningtree switch mode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
spanningtree
|
Spanning Tree Protocol.
|
switch
|
Configure spanning tree values on a per switch basis.
|
mode
|
Configure Spanning Tree Protocol on the switch.
|
{enable | disable}
|
Enable or disable Spanning Tree Protocol on the switch.
|
Defaults
STP = Disabled.
Examples
To support STP on all Cisco Wireless LAN controller Ports:
> config spanningtree switch mode enable
Related Commands
show spanningtree switch, config spanningtree switch bridgepriority, config spanningtree switch forwarddelay, config spanningtree switch hellotime, config spanningtree switch maxage, config spanningtree port mode
CONFIG SWITCHCONFIG COMMANDS
Use the CONFIG SWITCHCONFIG commands to configure switch settings.
config switchconfig flowcontrol
To enable or disable 802.3x flow control, use the config switchconfig flowcontrol command.
config switchconfig flowcontrol {enable | disable}
Syntax Description
config
|
Configure parameters.
|
switchconfig
|
Cisco Wireless LAN controller parameters.
|
flowcontrol
|
Configure flow control.
|
{enable | disable}
|
Enable or disable 802.3x flow control.
|
Defaults
Disabled
Examples
> config switchconfig flowcontrol enable
Related Commands
show switchconfig
config switchconfig mode
To configure LWAPP transport mode for Layer 2 or Layer 3, use the config switchconfig flowcontrol command.
config switchconfig mode {L2 | L3}
Note
The 2000 series controllers do not support Layer 2 LWAPP.
Syntax Description
config
|
Configure parameters.
|
switchconfig
|
Cisco Wireless LAN controller parameters.
|
mode
|
Configure LWAPP transport mode to Layer 2 or Layer 3.
|
{L2 | L3}
|
Enter a transport mode: L2 for Layer 2 or L3 for Layer 3.
|
Defaults
L3
Examples
> config switchconfig mode L3
Related Commands
show switchconfig
config syslog
To send or disable sending system logs, use the config syslog command.
config syslog {ip_address | disable}
Syntax Description
config
|
Configure parameters.
|
syslog
|
Configure system logs.
|
{ip_address | disable}
|
• Enter an IP address to send logs to.
• Enter disable to disable system logs.
|
Defaults
Disable
Examples
Related Commands
show syslog
config sysname
To set the Cisco Wireless LAN controller system name, use the config sysname command.
config sysname name
Syntax Description
config
|
Configure parameters.
|
sysname
|
Configures the system name.
|
name
|
System name. Up to 31 alphanumeric characters.
|
Defaults
None.
Examples
Related Commands
show sysinfo
config time manual
To set the system time, use the config time manual command.
config time manual MM/DD/YY HH:MM:SS
Syntax Description
config
|
Command action.
|
time
|
Configures system time or servers.
|
manual
|
Configures the system time.
|
MM/DD/YY
|
Enter date.
|
HH:MM:SS
|
Enter time.
|
Defaults
None.
Examples
> config time manual 02/11/2003 15:29:00
Related Commands
show time
config time ntp
To set the Network Time Protocol, use the config time ntp command.
config time ntp {interval seconds | server index ip_address}
Syntax Description
config
|
Command action.
|
time
|
Configures system time or servers.
|
ntp
|
Configures the Network Time Protocol.
|
interval
|
|
{interval | server}
|
• Enter interval to configure the Network Time Protocol polling interval.
• Enter server to configure the Network Time Protocol servers.
|
seconds
|
NTP polling interval in seconds (between 6800 and 604800).
|
index
|
NTP server index.
|
ip_address
|
NTP server's IP address. Use 0.0.0.0 to delete entry.
|
Defaults
None.
Examples
> config time ntp interval 7000
Related Commands
show time
config time timezone
To configures the system's timezone, use the config time timezone command.
config time timezone {enable | disable} delta_hours [delta_mins]
Syntax Description
config
|
Command action.
|
time
|
Configures system time or servers.
|
timezone
|
Disables or enables daylight savings time for the system.
|
{enable | disable}
|
Enable or disable daylight savings time.
|
delta_hours
|
Enter the local hour difference from Universal Coordinated Time (UCT).
|
[delta_mins]
|
[Optional] Enter the local minute difference from UCT.
|
Defaults
None.
Examples
> config time timezone enable 2 0
Related Commands
show time
CONFIG TRAPFLAGS COMMANDS
Use the CONFIG TRAPFLAGS commands to configure trapflags settings.
config trapflags 802.11-Security
To enable or disable sending 802.11 Security related traps, use the config trapflags 802.11-Security command.
config trapflags 802.11-Security wepDecryptError {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
802.11-Security
|
802.11 security traps flag.
|
wepDecryptError
|
Send the WEP decrypt error to clients.
|
{enable | disable}
|
Enable or disable sending 802.11 Security related traps.
|
Defaults
Enabled
Examples
> config trapflags 802.11-Security wepDecryptError disable
Related Commands
show trapflags
config trapflags aaa
To enable or disable the sending of AAA server related traps, use the config trapflags aaa command.
config trapflags aaa {auth | servers} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
aaa
|
Configure the of sending AAA related traps.
|
{auth | servers}
|
• Enter auth to enable trap sending when AAA authentication failure occurs for mgmt user or net user or macfilter.
• Enter servers to enable trap sending when No Radius servers are responding.
|
{enable | disable}
|
Enable or disable the sending of AAA server related traps.
|
Defaults
Enabled
Examples
> config trapflags aaa auth disable
Related Commands
show trapflags
config trapflags ap
To enable or disable the sending of Cisco 1000 series lightweight access point related traps, use the config trapflags ap command.
config trapflags ap {register | interfaceUp} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
ap
|
Cisco 1000 series lightweight access point traps flag.
|
{register | interfaceUp}
|
• Enter register to enable sending trap when a Cisco 1000 Series lightweight access point registers with Cisco switch.
• Enter interfaceUp to enable sending trap when a Cisco 1000 Series lightweight access point interface (A or B) comes up.
|
{enable | disable}
|
Enable or disable sending access point related traps.
|
Defaults
Enabled
Examples
> config trapflags ap register disable
Related Commands
show trapflags
config trapflags authentication
To enable or disable sending traps on invalid SNMP access, use the config trapflags authentication command.
config trapflags authentication {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
authentication
|
Configure trap sending on invalid SNMP access.
|
{enable | disable}
|
Enable or disable sending traps on invalid SNMP access.
|
Defaults
Enabled
Examples
> config trapflags authentication disable
Related Commands
show trapflags
config trapflags client
To enable or disable the sending of client related DOT11 traps, use the config trapflags client command.
config trapflags client {802.11-disassocate | 802.11-deauthenticate | 802.11-authfail |
802.11-assocfail | excluded} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
client
|
Configure the sending of client related Dot11 traps.
|
{802.11-disassocate | 802.11-deauthenticate | 802.11-authfail | 802.11-assocfail | excluded}
|
• Enter 802.11-disassocate to enable the sending of Dot11 disassociation traps to clients.
• Enter 802.11-deauthenticate to enable the sending of Dot11 deauthentication traps to clients.
• Enter 802.11-authfail to enable the sending of Dot11 authentication fail traps to clients.
• Enter 802.11-assocfail to enable the sending of Dot11 association fail traps to clients.
• Enter excluded to enable the sending of excluded trap to clients.
|
{enable | disable}
|
Enable or disable the sending of client related DOT11 traps.
|
Defaults
Disabled
Examples
> config trapflags client 802.11-disassociate disable
Related Commands
show trapflags
config trapflags configsave
To enable or disable the sending of configuration saved traps, use the config trapflags configsave command.
config trapflags configsave {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
configsave
|
Configure the sending of configuration saved traps.
|
{enable | disable}
|
Enable or disable the sending of configuration saved traps.
|
Defaults
Enabled
Examples
> config trapflags configsave disable
Related Commands
show trapflags
config trapflags ipsec
To enable or disable the sending of IPSec traps, use the config trapflags ipsec command.
config trapflags ipsec {esp-auth | esp-reply | invalidSPI | ike-neg | suite-neg | invalid-cookie}
{enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
ipsec
|
IPSec trap flags.
|
{esp-auth | esp-reply | invalidSPI | ike-neg | suite-neg | invalid-cookie}
|
• Enable the sending of IPSec traps when ESP authentication failure occurs.
• Enable the sending of IPSec traps when ESP replay failure occurs.
• Enable the sending of IPSec traps when ESP invalid SPI is detected.
• Enable the sending of IPSec traps when IKE negotiation failure occurs.
• Enable the sending of IPSec traps when suite negotiation failure occurs.
• Enable the sending of IPSec traps when Isakamp invalid cookie is detected.
|
{enable | disable}
|
Enable or disable the sending of IPSec traps.
|
Defaults
Enabled
Examples
> config trapflags ipsec esp-auth disable
Related Commands
show trapflags
config trapflags linkmode
To enable or disable Cisco Wireless LAN controller level Link up/down trap flags, use the config trapflags linkmode command.
config trapflags linkmode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
linkmode
|
Configure switch-level link up/down trap flag.
|
{enable | disable}
|
Enable or disable Cisco Wireless LAN controller level Link up/down trap flags.
|
Defaults
Enabled
Examples
> config trapflags linkmode disable
Related Commands
show trapflags
config trapflags multiusers
To enable or disable the sending of traps when multiple logins active, use the config trapflags multiusers command.
config trapflags multiusers {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
multiusers
|
Configure trap sending when multiple logins are active.
|
{enable | disable}
|
Enable or disable the sending of traps when multiple logins active.
|
Defaults
Enabled
Examples
> config trapflags multiusers disable
Related Commands
show trapflags
config trapflags rogueap
To enable or disable sending rogue access point detection traps, use the config trapflags rogueap command.
config trapflags rogueap {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
rogueap
|
Configure rogue access point detection trap sending.
|
{enable | disable}
|
Enable or disable the sending of rogue access point detection traps.
|
Defaults
Enabled
Examples
> config trapflags rogueap disable
Related Commands
show trapflags
config trapflags rrm-params
To enable or disable the sending of RRM profile related traps, use the config trapflags rrm-params command.
config trapflags rrm-params {tx-power | channel | antenna} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
rrm-params
|
RRM parameters traps flag.
|
{tx-power | channel | antenna}
|
• Enter tx-power to enable trap sending when RF manager automatically changes tx-power level for the Cisco 1000 series lightweight access point interface.
• Enter channel to enable trap sending when RF manager automatically changes channel for the Cisco 1000 series lightweight access point interface.
• Enter antenna to enable trap sending when RF manager automatically changes antenna for the Cisco 1000 series lightweight access point interface.
|
{enable | disable}
|
Enable or disable the sending of RRM profile related traps.
|
Defaults
Enabled
Examples
> config trapflags rrm-params tx-power disable
Related Commands
show trapflags
config trapflags rrm-profile
To enable or disable the sending of RRM profile related traps, use the config trapflags rrm-profile command.
config trapflags rrm-profile {load | noise | interference | coverage} {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
rrm-profile
|
RRM profile traps flag.
|
{load | noise | interference | coverage}
|
• Enter load to enable trap sending when the load profile maintained by the RF manager fails.
• Enter noise to enable trap sending when the noise profile maintained by the RF manager fails.
• Enter interference to enable trap sending when the interference profile maintained by the RF manager fails.
• Enter coverage to enable trap sending when the coverage profile maintained by the RF manager fails.
|
{enable | disable}
|
Enable or disable the sending of RRM profile related traps.
|
Defaults
Enabled
Examples
> config trapflags rrm-profile load disable
Related Commands
show trapflags
config trapflags stpmode
To enable or disable the sending of spanning tree traps, use the config trapflags stpmode command.
config trapflags stpmode {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
stpmode
|
Configure spanning tree trap sending.
|
{enable | disable}
|
Enable or disable the sending of spanning tree traps.
|
Defaults
Enabled
Examples
> config trapflags stpmode disable
Related Commands
show trapflags
config trapflags wps
To enable or disable wireless protection system (WPS) trap sending, use the config trapflags wps command.
config trapflags wps {enable | disable}
Syntax Description
config
|
Configure parameters.
|
trapflags
|
Trap parameters.
|
wps
|
Configure WPS trap sending.
|
{enable | disable}
|
Enable or disable WPS trap sending.
|
Defaults
Enabled
Examples
> config trapflags wps disable
Related Commands
show trapflags
CONFIG WATCHLIST COMMANDS
Use the CONFIG WATCHLIST commands to configure watchlist settings.
config watchlist add
To add a watchlist entry for a wireless LAN, use the config watchlist add command.
config watchlist add {mac MAC | username username}
Syntax Description
config watchlist
|
Command action.
|
add
|
Add a watchlist entry.
|
{mac MAC | username username}
|
• Enter mac and specify the MAC address of the wireless LAN.
• Enter username and specify the name of the user to watch.
|
Defaults
None.
Examples
> config watchlist add mac a5:6b:ac:10:01:6b
Related Commands
config watchlist delete, config watchlist enable, config watchlist disable, show watchlist
config watchlist delete
To delete a watchlist entry for a wireless LAN, use the config watchlist delete command.
config watchlist delete {mac MAC | username username}
Syntax Description
config watchlist
|
Command action.
|
delete
|
Delete a watchlist entry.
|
{mac MAC | username username}
|
• Enter mac and specify the MAC address of the wireless LAN to delete from the list.
• Enter username and specify the name of the user to delete from the list.
|
Defaults
None.
Examples
> config watchlist delete mac a5:6b:ac:10:01:6b
Related Commands
config watchlist add, config watchlist enable, config watchlist disable, show watchlist
config watchlist disable
To disable the client watchlist, use the config watchlist disable command.
config watchlist disable
Syntax Description
config
|
Command action.
|
watchlist
|
Configure the client watchlist.
|
disable
|
Disable the client watchlist.
|
Defaults
None.
Examples
> config watchlist disable
Related Commands
config watchlist add, config watchlist delete, show watchlist
config watchlist enable
To enable a watchlist entry for a wireless LAN, use the config watchlist enable command.
config watchlist enable
Syntax Description
config watchlist
|
Command action.
|
watchlist
|
Configure the client watchlist.
|
enable
|
Enable the client watchlist.
|
Defaults
None.
Examples
> config watchlist enable
Related Commands
config watchlist add, config watchlist delete, show watchlist
CONFIG WIRELESS LAN COMMANDS
Use the CONFIG WLAN commands to configure wireless LAN command settings.
config wlan 7920-support
To configure support for phones, use the config wlan 7920-support command.
config wlan 7920-support {ap-cac-limit | client-cac-limit} {enable | disable} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
7920-support
|
Configure support for phones.
|
{ap-cac-limit | client-cac-limit}
|
• Enter ap-cac-limit to support phones that expect the Cisco vendor-specific IE.
• Enter client-cac-limit to support phones that expect the IEEE 802.11e Draft 6 QBSS-load.
|
{enable | disable}
|
Enable or disable phone support.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan 7920-support ap-cac-limit enable 8
Related Commands
show wlan
config wlan 802.11e
To configure 802.11e support on a wireless LAN, use the config wlan 802.11e command.
802.11e provides Quality of Service (QoS) support for LAN applications, which are critical for delay sensitive applications such as Voice over Wireless IP (VoWIP).
802.11e enhances the 802.11 Media Access Control layer (MAC layer) with a coordinated time division multiple access (TDMA) construct, and adds error-correcting mechanisms for delay sensitive applications such as voice and video. The 802.11e specification provides seamless interoperability and is especially well suited for use in networks that include multimedia capability.
config wlan 802.11e {allow | disable | require} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
802.11e
|
Configure 802.11e.
|
{allow | disable | require}
|
• Enter allow to allow 802.11e on the wireless LAN.
• Enter disable to disable 802.11e on the wireless LAN.
• Enter require to require 802.11e-enabled clients on the wireless LAN.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan 802.11e allow 1
Related Commands
show trapflags
config wlan aaa-override
To configure user policy override via AAA on a wireless LAN, use the config wlan aaa-override command.
When AAA override is enabled, and a client has conflicting AAA and Cisco Wireless LAN controller wireless LAN authentication parameters, client authentication is performed by the AAA server. As part of this authentication, the operating system will move clients from the default Cisco wireless LAN solution wireless LAN VLAN to a VLAN returned by the AAA server and predefined in the Cisco Wireless LAN controller interface configuration (only when configured for MAC filtering, 802.1X, and/or WPA operation). In all cases, the operating system will also use QoS and ACL provided by the AAA server, as long as they are predefined in the Cisco Wireless LAN controller interface configuration. (This VLAN switching by AAA override is also referred to as Identity Networking.)
For instance, if the Corporate wireless LAN primarily uses a management interface assigned to VLAN 2, and if AAA override returns a redirect to VLAN 100, the Operating System redirects all client transmissions to VLAN 100, regardless of the physical port to which VLAN 100 is assigned.
When AAA override is disabled, all client authentication defaults to the Cisco Wireless LAN controller authentication parameter settings, and authentication is only performed by the AAA server if the Cisco Wireless LAN controller wireless LAN do not contain any client-specific authentication parameters.
The AAA override values may come from a RADIUS server, for example.
config wlan aaa-override {enable | disable} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
aaa-override
|
Configures user policy override via AAA on a wireless LAN.
|
{enable | disable}
|
Enable or disable policy override.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
Disabled.
Examples
> config wlan aaa-override enable 1
Related Commands
show wlan
config wlan broadcast-ssid
To configure an SSID broadcast on a wireless LAN, use the config wlan broadcast-ssid command.
config wlan broadcast-ssid {enable | disable} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
broadcast-ssid
|
Configure an SSID broadcast on a wireless LAN.
|
{enable | disable}
|
Enable or disable SSID broadcasts on a wireless LAN.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
Disabled.
Examples
> config wlan broadcast-ssid enable 1
Related Commands
show wlan
config wlan create
To create a wireless LAN, use the config wlan create command.
config wlan create {wlan_id wlan_name | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
create
|
Create a wireless LAN.
|
{wlan_id wlan_name | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16. Also enter the SSID network name (up to 32 alphanumeric characters).
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan create 1 SSID01
Related Commands
show trapflags
config wlan delete
To delete a wireless LAN, use the config wlan delete command.
config wlan delete {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
delete
|
Delete a wireless LAN.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
Related Commands
show wlan, show wlan summary
config wlan dhcp_server
To configure the internal DHCP server for a wireless LAN, use the config wlan dhcp_server command.
config wlan dhcp_server {wlan_id | foreignAp} ip_address [required]
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
dhcp_server
|
Configure internal DHCP server.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
ip_address
|
IP Address of the internal DHCP server (this parameter is required).
|
[required]
|
Optionally, specify whether DHCP address assignment is required.
|
Defaults
None.
Examples
> config wlan dhcp_server 16 10.10.2.1
Related Commands
show wlan
config wlan disable
To disable a wireless LAN, use the config wlan disable command.
config wlan disable {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
disable
|
Disable a wireless LAN.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
Related Commands
show wlan
config wlan enable
To enable a wireless LAN, use the config wlan enable command.
config wlan enable {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
enable
|
Enable a wireless LAN.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
Related Commands
show wlan
config wlan exclusionlist
To configure exclusion list (blacklist) timeout for a wireless LAN, use the config wlan exclusionlist command.
Set the timeout in seconds for an automatically disabled client. Client machines are disabled by MAC address. A timeout setting of 0 indicates that the client is permanently disabled and that administrative control is required to remove the client from the automatic disable.
config wlan exclusionlist {wlan_id | foreignAp} {enabled | disabled | seconds}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
exclusionlist
|
Configure exclusion list timeout.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
{enabled | disabled | seconds}
|
• Enter enabled to enable exclusion-listing.
• Enter disabled to disable exclusion-listing.
• Enter the exclusion-list timeout in seconds. A zero value requires administrator override.
|
Defaults
Not enabled
Examples
> config wlan exclusionlist 1 3
> config wlan exclusionlist 1 disabled
Related Commands
show exclusionlist
config wlan interface
To associate a wireless LAN with an existing interface, use the config wlan interface command.
config wlan interface {wlan_id | foreignAp} interface-name
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
interface
|
Configure the wireless LAN's interface.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
interface-name
|
Existing interface name.
|
Defaults
None.
Examples
> config wlan interface 16 VLAN901
Related Commands
show wlan
config wlan IPv6Support
To configure IPv6 support on a wireless LAN, use the config wlan IPv6Support command.
config wlan IPv6support {enable | disable} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
IPv6support
|
Configure IPv6 support on a wireless LAN.
|
{enable | disable}
|
Enable of disable IPv6 support on a wireless LAN.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan IPv6support enable 6
Related Commands
show wlan
config wlan mac-filtering
To change the state of MAC filtering on a wireless LAN, use the config wlan mac-filtering command.
config wlan mac-filtering {enable | disable} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
mac-filtering
|
Configure MAC filtering on a wireless LAN.
|
{enable | disable}
|
Enable or disable MAC filtering on a wireless LAN.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan mac-filtering enable 1
Related Commands
show wlan
config wlan mobility
To change the state of MAC filtering on a wireless LAN, use the config wlan mobility anchor command.
config wlan mobility anchor {add | delete} wlan_id ip_address
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
mobility anchor
|
Configure the Mobility wireless LAN anchor list.
|
{add | delete}
|
Enable or disable MAC filtering on a wireless LAN.
|
wlan_id
|
Enter a wireless LAN identifier between 1 and 16.
|
ip_address
|
Member switch IP address for anchoring the wireless LAN.
|
Defaults
None.
Examples
> config wlan mobility anchor delete 1 192.12.1.3
Related Commands
show wlan
config wlan qos
To change the quality of service for a wireless LAN, use the config wlan qos command.
config wlan qos {wlan_id | foreignAp} {bronze | silver | gold | platinum}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
qos
|
Quality of service.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
{bronze | silver | gold | platinum}
|
Enter QoS policy: bronze, silver, gold, or platinum.
|
Defaults
None.
Examples
To set the highest level of service on wireless LAN 1, use the following command:
Related Commands
show wlan
config wlan radio
To set the Cisco radio policy on a wireless LAN, use the config wlan radio command.
config wlan radio wlan_id {all | 802.11a | 802.11bg | 802.11g | 802.11ag}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
radio
|
Configure the Cisco radio policy.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
{all | 802.11a | 802.11bg | 802.11g | 802.11ag}
|
• Enter all to configure the wireless LAN on all radio bands.
• Enter 802.11a to configure the wireless LAN on only 802.11a.
• Enter 802.11bg to configure the wireless LAN on only 802.11b/g (only 802.11b if 802.11g is disabled).
• Enter 802.11g to configure the wireless LAN on 802.11g only.
• Enter 802.11ag to configure the wireless LAN on 802.11a and 802.11g only.
|
Defaults
None.
Examples
> config wlan radio 1 all
Related Commands
config 802.11a enable, config 802.11a disable, config 802.11b enable, config 802.11b disable, config 802.11b 11gSupport enable, config 802.11b 11gSupport disable, show wlan
config wlan radius_server
To configure a wireless LAN's radius servers, use the config wlan radius_server command.
config wlan radius_server {auth | acct} {add wlan_id server_id | delete wlan_id {all | server_id}}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
radius-server
|
RADIUS servers.
|
{auth | acct}
|
Configures a RADIUS authentication or accounting server.
|
{add | delete}
|
Add or delete a link to a configured RADIUS Server.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
server_id
|
RADIUS Server Index.
|
all
|
Enter all to delete all links to configured RADIUS servers.
|
Defaults
None.
Examples
> config wlan radius_server auth add 1 1
> config wlan radius_server auth delete 1 1
> config wlan radius_server auth delete 1 all
Related Commands
config 802.11a enable, config 802.11a disable, config 802.11b enable, config 802.11b disable, config 802.11b 11gSupport enable, config 802.11b 11gSupport disable, show wlan
CONFIG WIRELESS LAN SECURITY COMMANDS
Use the CONFIG WLAN SECURITY commands to configure wireless LAN security settings.
config wlan security 802.1X
To change the state of 802.1X security on the wireless LAN Cisco radios, use the config wlan security 802.1X command.
Use to change the encryption level of 802.1X security on the wireless LAN Cisco radios to:
•
40/64 bit key
•
104/128 bit key
•
128/152 bit key
config wlan security 802.1X {enable {wlan_id | foreignAp} | disable {wlan_id | foreignAp} |
encryption {wlan_id | foreignAp} {40 | 104 | 128}}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
802.1X
|
Configure 802.1X security.
|
{enable | disable | encryption}
|
• Enter disable to disable 802.1X.
• Enter enable to enable 802.1X.
• Enter encryption to set the static WEP keys and indexes.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
{40 | 104 | 128}
|
If you're setting the static WEP keys and indexes using the config wlan security 802.1X encryption command, enter a WEP key size of either 40, 104, or 128 bits.
Note All keys within a wireless LAN must be same size.
|
Defaults
None.
Examples
> config wlan security 802.1X enable 16
Related Commands
show wlan
config wlan security cranite
To change the state of the Cranite passthrough, use the config wlan security cranite command.
config wlan security cranite {enable | disable} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
cranite
|
Configure Cranite passthrough.
|
{enable | disable}
|
Enable or disable cranite passthrough.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security cranite enable 16
Related Commands
show wlan
config wlan security fortress
To change the state of the Fortress passthrough, use the config wlan security fortress command.
config wlan security fortress {enable | disable} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
fortress
|
Configure Fortress passthrough.
|
{enable | disable}
|
Enable or disable Fortress passthrough.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security fortress enable 16
Related Commands
show wlan
config wlan security ipsec disable
To disable IPSec security, use the config wlan security ipsec disable command.
config wlan security ipsec disable {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec disable
|
Disable IPSec.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security IPSec disable 16
Related Commands
show wlan
config wlan security ipsec enable
To enable IPSec security, use the config wlan security ipsec enable command.
config wlan security ipsec enable {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec enable
|
Enable IPSec.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security IPSec enable 16
Related Commands
show wlan
config wlan security ipsec authentication
To modify the IPSec security authentication protocol used on the wireless LAN, use the config wlan security ipsec authentication command.
config wlan security ipsec authentication {hmac-md5 | hmac-sha-1} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec authentication
|
Configure IPSec security authentication parameter.
|
{hmac-md5 | hmac-sha-1}
|
Enter the IPSec HMAC-MD5 or IPSec HMAC-SHA-1 authentication protocol.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security ipsec authentication hmac-sha-1 1
Related Commands
show wlan
config wlan security ipsec encryption
To modify the IPSec security encryption protocol used on the wireless LAN, use the config wlan security ipsec encryption command.
config wlan security ipsec encryption {3des | aes | des} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec
|
IPSec security.
|
encryption
|
Encryption parameter.
|
{3des | aes | des}
|
Enable IPSec DES encryption, IPSec AES 128-bit encryption, or IPSec 3DES encryption.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security ipsec encryption aes 1
Related Commands
show wlan
config wlan security ipsec config
To configure the propriety IKE CFG-Mode parameters used on the wireless LAN, use the config wlan security ipsec config command.
IKE is used as a method of distributing the session keys (encryption and authentication), as well as providing a way for the VPN endpoints to agree on how the data should be protected. IKE keeps track of connections by assigning a bundle of Security Associations (SAs), to each connection.
config wlan security ipsec config qotd ip_address {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Configure wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec
|
Configure IPSec security.
|
config
|
Configure proprietary IKE CFG-MODE parameters.
|
qotd
|
Configure quote-of-the-day server IP for cfg-mode.
|
ip_address
|
quote-of-the-day server IP for cfg-mode.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security ipsec config qotd 44.55.66.77 1
Related Commands
show wlan
config wlan security ipsec ike authentication
To modify the IPSec ike authentication protocol used on the wireless LAN, use the config wlan security ipsec ike authentication command.
config wlan security ipsec ike authentication {certificates {wlan_id | foreignAp} |
pre-share-key {wlan_id | foreignAp} key | xauth-psk {wlan_id | foreignAp} key}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec
|
IPSec security.
|
ike
|
IKE protocol.
|
authentication
|
Authentication parameter.
|
{certificates | pre-share-key | xauth-psk}
|
• Enter certificates to enable IKE certificate mode.
• Enter pre-share-key to enable IKE Xauth with pre-shared keys.
• Enter xauth-psk to enable IKE Pre-Shared Key.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
key
|
Key required for pre-share and xauth-psk.
|
Defaults
None.
Examples
> config wlan security ipsec ike authentication certificates 16
Related Commands
show wlan
config wlan security ipsec ike dh-group
To modify the IPSec IKE Diffie Hellman group used on the wireless LAN, use the config wlan security ipsec ike authentication command.
config wlan security ipsec ike dh-group {wlan_id | foreignAp} {group-1 | group-2 | group-5}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec
|
Configure IPSec security.
|
ike
|
Configure the IKE protocol.
|
dh-group
|
Diffie Hellman group parameter.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
{group-1 | group-2 | group-5}
|
• Enter group-1 to specify DH group 1 (768 bits).
• Enter group-2 to specify DH group 2 (1024 bits).
• Enter group-5 to specify DH group 5 (1536 bits).
|
Defaults
None.
Examples
> config wlan security ipsec ike dh-group 1 group-1
Related Commands
show wlan
config wlan security ipsec ike lifetime
To modify the IPSec IKE lifetime used on the wireless LAN, use the config wlan security ipsec ike lifetime command.
config wlan security ipsec ike lifetime {wlan_id | foreignAp} seconds
Syntax Description
config
|
Configure parameters.
|
wlan
|
Configure wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec
|
Configure IPSec security.
|
ike
|
Configure IKE protocol.
|
lifetime
|
Configure IKE timeout.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
seconds
|
The IKE lifetime in seconds, between 1800 and 345600.
|
Defaults
None.
Examples
> config wlan security ipsec ike lifetime 1 1900
Related Commands
show wlan
config wlan security ipsec ike phase1
To modify IPSec IKE Phase 1 used on the wireless LAN, use the config wlan security ipsec ike phase1 command.
config wlan security ipsec ike phase1 {aggressive | main} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Configure wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec
|
Configure IPSec security.
|
ike
|
Configure IKE.
|
phase1
|
Configure IKE's phase one mode.
|
{aggressive | main}
|
• Enter aggressive to enable the IKE aggressive mode.
• Enter main to enable the IKE main mode.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security ipsec ike phase1 aggressive 16
Related Commands
show wlan
config wlan security ipsec ike contivity
To modify Nortel's Contivity VPN client support on the wireless LAN, use the config wlan security ipsec ike contivity command.
config wlan security ipsec ike contivity {enable | disable} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Configure wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
ipsec
|
Configure IPSec security.
|
ike
|
Configure IKE protocol.
|
contivity
|
Configure Nortel Contivity VPN client support.
|
{enable | disable}
|
Enable or disable contivity support for this wlan.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security ipsec ike contivity enable 14
Related Commands
show wlan
config wlan security passthru
To modify the IPSec pass-through used on the wireless LAN, use the config wlan security ipsec ike passthru command.
config wlan security passthru {enable | disable} {wlan_id | foreignAp} [ip_address]
Syntax Description
config
|
Configure parameters.
|
wlan
|
Configure wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
passthru
|
Configure IPSec pass-through.
|
{enable | disable}
|
Enable or disable IPSec pass-through.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
[ip_address]
|
If you enable security pass-through, you must specify the IP address of the IPSec gateway.
|
Defaults
None.
Examples
> config wlan security ipsec enable 3 192.12.1.1
Related Commands
show wlan
config wlan security static-wep-key authentication
To configure static WEP key 802.11 authentication on a wireless LAN, use the config wlan security static-wep-key authentication command.
config wlan security static-wep-key authentication {shared-key | open} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
static-wep-key
|
Configure static WEP keys on a wireless LAN.
|
authentication
|
Authentication setting.
|
{shared-key | open}
|
• Enter shared-key to enable shared key authentication.
• Enter open to enable open system authentication.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security static-wep-key authentication shared-key 1
> config wlan security static-wep-key authentication open 1
Related Commands
show wlan
config wlan security static-wep-key disable
To disable the use of static WEP keys, use the config wlan security static-wep-key disable command.
config wlan security static-wep-key disable wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
static-wep-key
|
Configure static WEP keys on a wireless LAN.
|
disable
|
Disable the use of static WEP keys.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security static-wep-key disable 1
Related Commands
config wlan security wpa encryption
config wlan security static-wep-key enable
To enable the use of static WEP keys, use the config wlan security static-wep-key enable command.
config wlan security static-wep-key enable wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
static-wep-key
|
Configure static WEP keys on a wireless LAN.
|
enable
|
Disable the use of static WEP keys.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security static-wep-key enable 1
Related Commands
config wlan security wpa encryption
config wlan security static-wep-key encryption
To configure the static WEP keys and indexes, use the config wlan security static-wep-key encryption command. Make sure to disable 802.1X before using this command.
Note
One unique WEP Key Index can be applied to each wireless LAN. As there are only four WEP Key Indexes, only four wireless LANs can be configured for Static WEP Layer 2 encryption.
config wlan security static-wep-key encryption wlan_id {40 | 104 | 128} {hex | ascii} key
key-index
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
static-wep-key
|
Configure static WEP keys on a wireless LAN.
|
encryption
|
Encryption setting.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
{40 | 104 | 128}
|
Encryption level.
|
{hex | ascii}
|
Specify whether to use hexadecimal or ASCII characters to enter key.
|
key
|
Enter WEP key in ascii
|
key-index
|
Key index (1 to 4).
|
Defaults
None.
Examples
> config wlan security wpa encryption 1 40 hex 0201702001 2
Related Commands
show wlan
config wlan security web-auth
To change the status of Web authentication used on the wireless LAN, use the config wlan security web command.
config wlan security web-auth {acl | enable | disable} {wlan_id | foreignAp} [{acl_name |
none}]
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
web-auth
|
Web authentication.
|
{acl | enable | disable}
|
Configure the Access Control List, or enable or disable web authentication.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
[{acl_name | none}]
|
If configuring an ACL, enter the ACL name (up to 32 alphanumeric characters) or none.
|
Defaults
None.
Examples
> config wlan security web-auth acl 1 ACL03
> config wlan security web-auth enable 1
> config wlan security web-auth disable 1
Related Commands
show wlan
config wlan security web-passthrough acl
To add an ACL to the wireless LAN definition, use the config wlan security web acl command.
config wlan security web-passthrough acl {wlan_id | foreignAp} {acl_name | none}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
web-passthrough
|
Configure the web captive portal with no authentication required.
|
acl
|
Add an ACL to the wireless LAN definition.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
{acl_name | none}
|
Enter the ACL name (up to 32 alphanumeric characters) or none.
|
Defaults
None.
Examples
> config wlan security web-passthrough acl 1 ACL03
Related Commands
show wlan
config wlan security web-passthrough disable
To disable web captive portal with no authentication required on a wireless LAN, use the config wlan security web-passthrough disable command.
config wlan security web-passthrough disable {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
web-passthrough
|
Configure the web captive portal with no authentication required.
|
disable
|
Disable web captive portal with no authentication required.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security web-passthrough disable 1
Related Commands
show wlan
config wlan security web-passthrough email-input
To configure web captive portal using an email address, use the config wlan security web-passthrough email-input command.
config wlan security web-passthrough email-input {enable | disable} {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
web-passthrough
|
Configure the web captive portal with no authentication required.
|
email-input
|
Configure web captive portal using an email address.
|
{enable | disable}
|
Enable or disable web captive portal using email address.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security web-passthrough email-input enable 1
Related Commands
show wlan
config wlan security web-passthrough enable
To enable web captive portal with no authentication required on the wireless LAN, use the config wlan security web-passthrough enable command.
config wlan security web-passthrough enable {wlan_id | foreignAp}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
web-passthrough
|
Configure the web captive portal with no authentication required.
|
enable
|
Enable web captive portal with no authentication required.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
Defaults
None.
Examples
> config wlan security web-passthrough enable 1
Related Commands
show wlan
config wlan security wpa1 disable
To disable WPA1, use the config wlan security wpa1 disable command.
config wlan security wpa1 disable wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa1
|
Configure WiFi protected access.
|
disable
|
Disable WPA1.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security wpa1 disable 1
Related Commands
show wlan
config wlan security wpa1 enable
To enable WPA1, use the config wlan security wpa1 enable command.
config wlan security wpa1 enable wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa1
|
Configure WiFi protected access.
|
enable
|
Enable WPA1.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security wpa1 enable 1
Related Commands
show wlan
config wlan security wpa1 pre-shared-key
To configure the WPA pre-shared key mode, use the config wlan security wpa1 pre-shared-key command.
config wlan security wpa1 pre-shared-key {enable wlan_id key | disable wlan_id}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa1
|
Configure WiFi protected access.
|
pre-shared-key
|
Configure WPA pre-shared key mode (WPA-PSK).
|
{enable | disable}
|
Enable or disable WPA-PSK.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
key
|
WPA pre-shared key.
|
Defaults
None.
Examples
> config wlan security wpa1 pre-shared-key enable 1 r45
Related Commands
show wlan
config wlan security wpa2 disable
To disable WPA2, use the config wlan security wpa2 disable command.
config wlan security wpa2 disable wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa2
|
Configure WPA2.
|
disable
|
Disable WPA2
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security wpa2 disable 1
Related Commands
show wlan
config wlan security wpa2 enable
To enable WPA2, use the config wlan security wpa2 enable command.
config wlan security wpa2 enable wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa2
|
Configure WPA2.
|
enable
|
Enable WPA2
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security wpa2 enable 1
Related Commands
show wlan
config wlan security wpa2 pre-shared-key
To configure the WPA pre-shared key mode, use the config wlan security wpa2 pre-shared-key command.
config wlan security wpa2 pre-shared-key {enable wlan_id key | disable wlan_id}
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa2
|
Configure WPA2.
|
pre-shared-key
|
Configure WPA2 pre-shared key mode (WPA2-PSK).
|
{enable | disable}
|
Enable or disable WPA2-PSK.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
key
|
WPA pre-shared key.
|
Defaults
None.
Examples
> config wlan security wpa2 pre-shared-key disable 2
Related Commands
show wlan
config wlan security wpa2 tkip
To change the status of WPA authentication, use the config wlan security wpa2 tkip command.
config wlan security wpa2 tkip {enable | disable} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa2
|
Configure WPA2.
|
tkip
|
Configure WPA2 TKIP mode.
|
{enable | disable}
|
Enable or disable the WPA2 TKIP mode.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security wpa2 tkip enable 1
Related Commands
show wlan
config wlan security wpa2 wpa-compat
To change the status of WPA authentication, use the config wlan security wpa2 wpa-compat command.
config wlan security wpa2 wpa-compat {enable | disable} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
security
|
Configure the wireless LAN security policy.
|
wpa2
|
Configure WPA2.
|
wpa-compat
|
Configure WPA compatibility mode.
|
{enable | disable}
|
Enable or disable WPA compatibility mode.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan security wpa2 wpa-compat enable 1
Related Commands
show wlan
config wlan timeout
To change the timeout of wireless LAN clients, use the config wlan timeout command.
config wlan timeout {wlan_id | foreignAp} seconds
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
timeout
|
Configure client timeout.
|
{wlan_id | foreignAp}
|
• Enter a wireless LAN identifier between 1 and 16.
• Enter foreignAp for third party access points.
|
seconds
|
Timeout or session duration in seconds. A value of zero is equivalent to no timeout.
|
None.
Examples
> config wlan timeout 1 6000
Related Commands
show wlan
config wlan wmm
To configure WMM (WME), use the config wlan wmm command.
config wlan wmm {allow | disable | require} wlan_id
Syntax Description
config
|
Configure parameters.
|
wlan
|
Wireless LAN parameters.
|
wmm
|
Configure WMM.
|
{allow | disable | require}
|
• Enter allow to allow WMM on the wireless LAN.
• Enter disable to disable WMM on the wireless LAN.
• Enter require to require WMM-enabled clients on the wireless LAN.
|
wlan_id
|
Wireless LAN identifier between 1 and 16.
|
Defaults
None.
Examples
> config wlan wmm allow 1
Related Commands
show trapflags
Saving Configurations
Use the SAVE CONFIG command before you log out of the command line interface to save all previous configuration changes.
•
save config
save config
To save Cisco Wireless LAN controller configurations, use the save config command.
save config
Syntax Description
save
|
Save switch configurations.
|
config
|
Save current settings to NVRAM.
|
Defaults
None.
Examples
Are you sure you want to save? (y/n) y
Related Commands
show sysinfo
Clearing Configurations, Logfiles, and Other Actions
To clear existing configurations, log files, and other functions, use the clear commands.
clear ap-config
To restore a Cisco 1000 series lightweight access point configuration database to its factory default, use the clear ap-config command.
clear ap-config Cisco_AP
Syntax Description
clear
|
Clear selected configuration elements.
|
ap-config
|
Reset Cisco 1000 Series lightweight access point configuration data to factory defaults.
|
Cisco_AP
|
Name of the Cisco 1000 series lightweight access point.
|
Defaults
None.
Usage Guidelines
Entering this command does not clear the static IP address of the access point.
Examples
Related Commands
clear transfer, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload datatype, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear arp
To clear the ARP table to a Cisco 1000 series lightweight access point its factory default, use the clear arp command.
clear arp
Syntax Description
clear
|
Clear selected configuration elements.
|
arp
|
Clear the ARP table.
|
Defaults
None.
Examples
Are you sure you want to clear the ARP cache? (y/n)
Related Commands
clear transfer, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload datatype, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear config
To reset configuration data to factory defaults, use the clear config command.
clear config
Syntax Description
clear
|
Clear selected configuration elements.
|
config
|
Reset configuration data to factory defaults.
|
Defaults
None.
Examples
Are you sure you want to clear the configuration? (y/n)
Configuration not cleared!
Related Commands
clear transfer, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload datatype, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear stats mobility
To clear mobility manager statistics, use the clear stats mobility command.
clear stats mobility
Syntax Description
clear
|
Clear selected configuration elements.
|
stats
|
Clear statistics counters.
|
mobility
|
Clear mobility manager statistics
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download serverip, clear download start, clear upload datatype, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start, clear stats port
clear stats port
To clear statistics counters for a specific port, use the clear stats port command.
clear stats port port
Syntax Description
clear
|
Clear selected configuration elements.
|
stats
|
Clear statistics counters.
|
port
|
Clear statistics counters for a specific port.
|
port
|
Physical interface port number.
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download serverip, clear download start, clear upload datatype, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear stats switch
To clear all switch statistics counters on a Cisco Wireless LAN controller, use the clear stats switch command.
clear stats switch
Syntax Description
clear
|
Clear selected configuration elements.
|
stats
|
Clear statistics counters.
|
switch
|
Clear all switch statistics counters.
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download start, clear upload datatype, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear redirect-url
To clear the custom web authentication redirect URL on the Cisco Wireless LAN controller, use the clear redirect-url command.
clear redirect-url
Syntax Description
clear
|
Clear selected configuration elements.
|
redirect-url
|
Clear the custom web authentication redirect URL.
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download start, clear upload datatype, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear transfer
To clear the transfer information, use the clear transfer command.
clear transfer
Syntax Description
clear
|
Clear selected configuration elements.
|
transfer
|
Clear the transfer information.
|
Defaults
None.
Examples
Are you sure you want to clear the transfer information? (y/n) y
Transfer Information Cleared.
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download serverip, clear upload datatype, clear download filename, clear download mode, clear download path, clear download serverip, clear download start
clear traplog
To clear the trap log, use the clear traplog command.
clear traplog
Syntax Description
clear
|
Clear selected configuration elements.
|
traplog
|
Clear the trap log.
|
Defaults
None.
Examples
Are you sure you want to clear the trap log? (y/n) y
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear webimage
To clear the custom web authentication image, use the clear webimage command.
clear webimage
Syntax Description
clear
|
Clear selected configuration elements.
|
webimage
|
Clear the custom web authentication image.
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear webmessage
To clear the custom web authentication message, use the clear webmessage command.
clear webmessage
Syntax Description
clear
|
Clear selected configuration elements.
|
webmessage
|
Clear the custom web authentication message.
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear webtitle
To clear the custom web authentication title, use the clear webtitle command.
clear webtitle
Syntax Description
clear
|
Clear selected configuration elements.
|
webtitle
|
Clear the custom web authentication title.
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
clear ext-webauth-url
To clear the external web authentication URL, use the clear ext-webauth-url command.
clear ext-webauth-url
Syntax Description
clear
|
Clear selected configuration elements.
|
ext-webauth-url
|
Clear the external web authentication URL.
|
Defaults
None.
Examples
Related Commands
clear transfer, clear download datatype, clear download filename, clear download mode, clear download path, clear download serverip, clear download start, clear upload filename, clear upload mode, clear upload path, clear upload serverip, clear upload start
Uploading and Downloading Files and Configurations
To transfer files to or from the Cisco Wireless LAN controller, use the transfer commands.
transfer download certpassword
To set a certificate's private key password, use the transfer download certpassword command.
transfer download certpassword [password]
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
certpassword
|
Set a certificate's private key password.
|
[password]
|
Enter a certificate's private key password or blank to clear the current password.
|
Defaults
None.
Examples
> transfer download certpassword
Related Commands
clear transfer, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start
transfer download datatype
To set the download file type, use the transfer download datatype command.
transfer download datatype {config | code | image | signature | webadmincert | webauthcert}
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
datatype
|
Set download file type.
|
{config | code | image | signature | webadmincert | webauthcert}
|
• Enter config to download configuration file.
• Enter code to download an executable image to the system.
• Enter image to download a web page logo to the system.
• Enter signature to download a signature file to the system.
• Enter webadmincert to download a certificate for web administration to the system.
• Enter webauthcert to download a web certificate for web portal to the system.
|
Defaults
None.
Examples
Related Commands
clear transfer, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start, transfer download datatype image, transfer download start
transfer download filename
To download a specific file, use the transfer download filename command.
transfer download filename filename
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
filename
|
Set the TFTP filename.
|
filename
|
File name up to 16 alphanumeric characters.
|
Defaults
None.
Examples
> transfer download filename build603
Related Commands
clear transfer, transfer download datatype, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start
transfer download mode
To set transfer mode, use the transfer download mode command.
transfer download mode tftp
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
mode
|
Set transfer mode.
|
tftp
|
Set the transfer mode to tftp.
|
Defaults
None.
Examples
> transfer download mode tftp
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start
transfer download path
To set a specific TFTP path, use the transfer download path command.
transfer download path path
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
path
|
Set TFTP Path.
|
path
|
Directory path.
|
Defaults
None.
Examples
> transfer download path c:\install\version2
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start
transfer download serverip
To configure the IP address of the TFTP server from which to download information, use the transfer download serverip command.
transfer download serverip ip_address
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
serverip
|
Enter IP address of the server.
|
ip_address
|
Server IP address.
|
Defaults
None.
Examples
> transfer download serverip 175.34.56.78
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start
transfer download start
To initiate a download, use the transfer download start command.
transfer download start
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
start
|
Initiate a download.
|
Defaults
None.
Examples
> transfer download start
Mode........................................... TFTP
Data Type...................................... Code
TFTP Server IP................................. 172.16.16.78
TFTP Packet Timeout............................ 6
TFTP Max Retries............................... 10
TFTP Path...................................... c:\find\off/
TFTP Filename.................................. wps_2_0_75_0.aes
Are you sure you want to start? (y/n) n
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer upload datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start
transfer download tftpPktTimeout
To specify the TFTP packet timeout, use the transfer download tftpPktTimeout command.
transfer download tftpPktTimeout timeout
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
tftpPktTimeout
|
Enter the tftp packet timeout.
|
timeout
|
Timeout in seconds between 1 and 254.
|
Defaults
None.
Examples
> transfer download tftpPktTimeout 55
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer upload datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start
transfer download tftpMaxRetries
To specify the number of allowed TFTP packet retries, use the transfer download tftpMaxRetries command.
transfer download tftpMaxRetries retries
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
download
|
Transfer a file to the switch.
|
tftpMaxRetries
|
Enter the number of allowed TFTP packet retries.
|
retries
|
Number of allowed TFTP packet retries between 1 and 254 seconds.
|
Defaults
None.
Examples
> transfer download tftpMaxRetries 55
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer upload datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start
transfer encrypt
To configure encryption for config file transfers, use the transfer encrypt command.
transfer encrypt {enable | disable | set-key key}
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
encrypt
|
Transfer a file to the switch.
|
{enable | disable | set-key}
|
• Enter enable to enable encryption for config file transfers.
• Enter disable to disables encryption for config file transfers.
• Enter set-key to configures the encryption key for config file transfers.
|
key
|
Encryption key for config file transfers.
|
Defaults
None.
Examples
> transfer encrypt enable
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer upload datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start
transfer upload datatype
To set the upload file type, use the transfer upload datatype command.
transfer upload datatype {config | crashfile | errorlog | radio-core-dump | signature | systemtrace |
traplog}
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
upload
|
Transfer a file from the switch.
|
datatype
|
Set upload file type.
|
{config | crashfile | errorlog | radio-core-dump | signature | systemtrace | traplog}
|
• Enter config to upload the system's configuration file.
• Enter crashfile to upload the system's crash file.
• Enter errorlog to upload the system's error log.
• Enter radio-core-dump to upload the system's error log.
• Enter signature to upload the system's signature files.
• Enter systemtrace to upload the system's trace file.
• Enter traplog to upload the system's trap log.
|
Defaults:
None.
Examples
> transfer upload datatype errorlog
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start
transfer upload filename
To upload a specific file, use the transfer upload filename command.
transfer upload filename filename
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
upload
|
Transfer a file from the switch.
|
filename
|
Set the TFTP filename.
|
filename
|
File name up to 16 alphanumeric characters.
|
Defaults
None.
Examples
> transfer upload filename build603
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload mode, transfer upload path, transfer upload serverip, transfer upload start
transfer upload mode
To configure the transfer mode, use the transfer upload mode command.
transfer upload mode tftp
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
upload
|
Transfer a file from the switch.
|
mode
|
Set transfer mode.
|
tftp
|
Set the transfer mode to TFTP.
|
Defaults
None.
Examples
> transfer upload mode tftp
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload path, transfer upload serverip, transfer upload start
transfer upload path
To set a specific upload path, use the transfer upload path command.
transfer upload path path
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
upload
|
Transfer a file from the switch.
|
path
|
Set TFTP Path.
|
path
|
Directory path.
|
Defaults
None.
Examples
> transfer upload path c:\install\version2
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload serverip, transfer upload start
transfer upload serverip
To configure the IP address of the TFTP server to upload files to, use the transfer upload serverip command.
transfer upload serverip ip_address
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
upload
|
Transfer a file from the switch.
|
serverip
|
Enter IP address of the server.
|
ip_address
|
Server IP address.
|
Defaults
None.
Examples
> transfer upload serverip 175.34.56.78
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload start
transfer upload start
To initiate an upload, use the transfer upload start command.
transfer upload start
Syntax Description
transfer
|
Transfer a file to or from the switch.
|
upload
|
Transfer a file from the switch.
|
start
|
Initiate upload.
|
Defaults
None.
Examples
Mode........................................... TFTP
TFTP Server IP................................. 172.16.16.78
TFTP Path...................................... c:\find\off/
TFTP Filename.................................. wps_2_0_75_0.aes
Data Type...................................... Code
Are you sure you want to start? (y/n) n
Related Commands
clear transfer, transfer download datatype, transfer download filename, transfer download mode, transfer download path, transfer download serverip, transfer download start, transfer upload datatype, transfer upload filename, transfer upload mode, transfer upload path, transfer upload serverip
Troubleshooting
Use the DEBUG commands to manage system debugging.
Caution 
Debug commands are reserved for use only under direction of Cisco personnel. Please do not use these commands without direction from Cisco-certified staff.
debug aaa
To configure AAA debug options, use the debug aaa command.
debug aaa {all | detail | events | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
aaa
|
AAA parameters.
|
{all | detail | events | packet}
|
• Enter all to configure debug of all AAA messages.
• Enter detail to configure debug of AAA detailed events.
• Enter events to configure debug of AAA events.
• Enter packet to configure debug of AAA packets.
|
{enable | disable}
|
• Enter enable to enable AAA debug setting.
• Enter disable to disable AAA debug setting.
|
Defaults
None.
Examples
> debug aaa packet enable
> debug aaa packet disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug airewave-director
To configure the Airewave Director Software debug options, use the debug airwave-director command.
debug airwave-director {all | channel | detail | error | group | manager | message | packet |
power | profile | radar | rf-change} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
airewave-director
|
Airewave Director parameters.
|
{all | channel | detail | error | group | manager | message | packet | power | profile | radar | rf-change}
|
• Enter all to configure debug of all Airewave Director logs.
• Enter channel to configure debug of Airewave Director channel assignment protocol
• Enter detail to configure debug of Airewave Director detail logs.
• Enter error to configure debug of Airewave Director error logs.
• Enter group to configure debug of Airewave Director grouping protocol.
• Enter manager to configure debug of Airewave Director manager.
• Enter message to configure debug of Airewave Director messages.
• Enter packet to configure debug of Airewave Director packets.
• Enter power to configure debug of Airewave Director power assignment protocol.
• Enter profile to configure debug of Airewave Director profile events.
• Enter radar to configure debug of Airewave Director radar detection/avoidance protocol.
• Enter rf-change to configure debug of Airewave Director rf changes.
|
{enable | disable}
|
• Enter enable to enable Airewave Director debug setting.
• Enter disable to disable Airewave Director debug setting.
|
Defaults
None.
Examples
> debug airewave-director profile enable
> debug airewave-director profile disable
Related Commands
debug aaa, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug arp
To configure ARP debug options, use the debug arp command.
debug arp {all | detail | events | message} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
arp
|
ARP parameters.
|
{all | detail | error | message}
|
• Enter all to configure debug of all arp logs.
• Enter detail to configure debug of arp detail messages..
• Enter error to configure debug of arp errors.
• Enter message to configure debug of arp messages.
|
{enable | disable}
|
• Enter enable to enable arp debug setting.
• Enter disable to disable arp debug setting.
|
Defaults
None.
Examples
> debug arp error disable
Related Commands
debug aaa, debug airewave-director, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug bcast
To configure debug of broadcast options, use the debug bcast command.
debug bcast {all | detail | events | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
bcast
|
bcast parameters.
|
{all | detail | error | message}
|
• Enter all to configure debug of all broadcast logs.
• Enter detail to configure debug of broadcast detail messages..
• Enter error to configure debug of broadcast errors.
• Enter message to configure debug of broadcast messages.
|
{enable | disable}
|
• Enter enable to enable broadcast debug setting.
• Enter disable to disable broadcast debug setting.
|
Defaults
None.
Examples
> debug bcast message enable
> debug bcast message disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug crypto
To configure hardware cryptographic debug options, use the debug crypto command.
debug crypto {all | sessions | trace | warning} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
dhcp
|
DHCP parameters.
|
{all | sessions | trace | warning}
|
• Enter all to configure debug of all hardware crypto messages.
• Enter sessions to configure debug of hardware crypto sessions.
• Enter sessions to configure debug of hardware crypto sessions.
• Enter sessions to configure debug of hardware crypto sessions.
|
{enable | disable}
|
• Enter enable to enable DHCP debug setting.
• Enter disable to disable DHCP debug setting.
|
Defaults
None.
Examples
> debug dhcp message enable
> debug dhcp message disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug dhcp
To configure DHCP debug options, use the debug dhcp command.
debug dhcp {message | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
dhcp
|
DHCP parameters.
|
{message | packet}
|
• Enter message to configure debug of DHCP error messages.
• Enter packet to configure debug of DHCP packets.
|
{enable | disable}
|
• Enter enable to enable DHCP debug setting.
• Enter disable to disable DHCP debug setting.
|
Defaults
None.
Examples
> debug dhcp message enable
> debug dhcp message disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug disable-all
To disable all debug messages, use the debug disable-all command.
debug disable-all
Syntax Description
debug
|
Debug parameters.
|
disable-all
|
Disables all debug messages.
|
Defaults
Disabled by default.
Examples
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug dot11
To configure dot11 events debug options, use the debug dot11 command.
debug dot11 {all | load-balancing | management | mobile | rfid | rldp | rogue | state} {enable |
disable}
Syntax Description
debug
|
Debug parameters.
|
dot11
|
dot11 events parameters.
|
{all | load-balancing | management | mobile | rfid | rldp | rogue | state}
|
• Enter all to configure debug of all 802.11 messages.
• Enter load-balancing to configure debug of 802.11 load balancing events.
• Enter management to configure debug of 802.11 MAC management messages.
• Enter mobile to configure debug of 802.11 mobile events.
• Enter rfid to configure debug of 802.11 RFID tag module.
• Enter rldp to configure debug of 802.11 Rogue Location Discovery.
• Enter rogue to configure debug of 802.11 rogue events.
• Enter state to configure debug of 802.11 mobile state transitions.
|
{enable | disable}
|
• Enter enable to enable dot11 debug setting.
• Enter disable to disable dot11 debug setting.
|
Defaults
None.
Examples
> debug dot11 state enable
> debug dot11 state disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug dot1x
To configure dot1x debug options, use the debug dot1x command.
debug dot1x {aaa | all | events | packet | states} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
dot1x
|
dot1x parameters.
|
{aaa | all | events | packet | states}
|
• Enter aaa to configure debug of 802.1X AAA interactions.
• Enter all to configure debug of all 802.1x messages.
• Enter events to configure debug of 802.1x 802.1X events.
• Enter packet to configure debug of 802.1x 802.1X packets.
• Enter states to configure debug of 802.1x mobile state transitions.
|
{enable | disable}
|
• Enter enable to enable dot1x debug setting.
• Enter disable to disable dot1x debug setting.
|
Defaults
None.
Examples
> debug dot1x state enable
> debug dot1x state disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug l2age
To configure debug of Layer 2 Ago timeout messages, use the debug l2age command.
debug l2age {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
l2age
|
Layer 2 Ago Timeout Messages.
|
{enable | disable}
|
• Enter enable to enable l2age debug setting.
• Enter disable to disable l2age debug setting.
|
Defaults
None.
Examples
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug lwapp
To configure LWAPP debug options, use the debug lwapp command. This is a helpful command to debug when an AP does not join a controller.
debug lwapp {detail | error | events | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
lwapp
|
lwapp parameters.
|
{detail | error | events | packet}
|
• Enter detail to configure debug of LWAPP detail.
• Enter error to configure debug of LWAPP errors.
• Enter events to configure debug of LWAPP events and errors.
• Enter packet to configure debug of LWAPP packet trace.
|
{enable | disable}
|
• Enter enable to enable lwapp debug setting.
• Enter disable to disable lwapp debug setting.
|
Defaults
None.
Examples
> debug lwapp packet enable
> debug lwapp packet disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug mac
To configure MAC debugging, use the debug mac command.
debug mac {disable | addr MAC}
Syntax Description
debug
|
Debug parameters.
|
mac
|
MAC address parameters.
|
disable
|
Enter disable to disable MAC debugging.
|
addr
|
Enter addr to configure the MAC address.
|
MAC
|
MAC address.
|
Defaults
None.
Examples
> debug mac addr 00.oc.41.07.33.a6
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug crypto, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug mobility
To configure the Mobility debug options, use the debug mobility command.
debug mobility {directory | handoff} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
mobility
|
Mobility parameters.
|
{directory | handoff}
|
• Enter directory to configure debug of mobility error messages.
• Enter handoff to configure debug of mobility packets.
|
{enable | disable}
|
• Enter enable to enable mobility debug setting.
• Enter disable to disable mobility debug setting.
|
Defaults
None.
Examples
> debug mobility directory enable
> debug mobility directory disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug nac
To configure debug of Network Access Control (NAC), use the debug nac command.
debug nac {events | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
nac
|
Network Access Control (NAC) parameters.
|
{events | packet}
|
• Enter events to configure debug of NAC events.
• Enter packet to configure debug of NAC packets.
|
{enable | disable}
|
• Enter enable to enable NAC debug setting.
• Enter disable to disable NAC debug setting.
|
Defaults
None.
Examples
> debug nac events enable
> debug nac events disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11,
debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug ntp, debug pem, debug pm,
debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug ntp
To configure debug of debug of Network Time Protocol (NTP), use the debug ntpp command.
debug ntp {detail | low | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
nac
|
Network Time Protocol (NTP) parameters.
|
{detail | low | packet}
|
• Enter detail to configure debug of detailed NTP messages.
• Enter low to configure debug of low NTP messages.
• Enter packet to configure debug of NTP packets.
|
{enable | disable}
|
• Enter enable to enable NTP debug setting.
• Enter disable to disable NTP debug setting.
|
Defaults
None.
Examples
> debug ntp packet enable
> debug ntp packet disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11,
debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug pem, debug pm,
debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug pem
To configure the access policy manager debug options, use the debug pem command.
debug pem {events | state} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
pem
|
Access policy manager debug options.
|
{events | state}
|
• Enter packet to configure debug of policy manager events..
• Enter events to configure debug of policy manager State Machine.
|
{enable | disable}
|
• Enter enable to enable access policy manager debug setting.
• Enter disable to disable access policy manager debug setting.
|
Defaults
None.
Examples
> debug pem state disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11,
debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pm,
debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug pm
To configure debug of security policy manager module, use the debug pm command.
debug pm all disable
debug pm {config | hwcrypto | ikemsg | init | list | message | pki | rng | rules | sa-export |
sa-import | ssh-l2tp | ssh-appgw | ssh-engine | ssh-int | ssh-pmgr | ssh-ppp | ssh-tcp} {enable
| disable}
Syntax Description
debug
|
Debug parameters.
|
pm
|
Security policy manager module parameters.
|
all disable
|
Used to disable all debugging in the policy manager module.
|
{config | hwcrypto | ikemsg | init | list | message | pki | rng | rules | sa-export | sa-import | ssh-l2tp | ssh-appgw | ssh-engine | ssh-int | ssh-pmgr | ssh-ppp | ssh-tcp}
|
• Enter config to configure debug of policy manager configuration.
• Enter hwcrypto to configure debug of hardware offload events.
• Enter ikemsg to configure debug of IKE messages.
• Enter init to configure debug of policy manager initialization events.
• Enter list to configure debug of policy manager list mgmt.
• Enter message to configure debug of policy manager message queue events.
• Enter pki to configure debug of PKI-related events.
• Enter rng to configure debug of random number generation.
• Enter rules to configure debug of layer 3 policy events.
• Enter sa-export to configure debug of SA export (mobility).
• Enter sa-import to configure debug of SA import (mobility).
• Enter ssh-l2tp to configure debug of policy manager l2tp handling.
• Enter ssh-appgw to configure debug of application gateways.
• Enter ssh-engine to configure debug of the policy manager engine.
• Enter ssh-int to configure debug of the policy manager interceptor.
• Enter ssh-pmgr to configure debug of the policy manager policy mgr.
• Enter ssh-ppp to configure debug of policy manager ppp handling.
• Enter ssh-tcp to configure debug of policy manager tcp handling.
|
{enable | disable}
|
• Enter enable to enable mobility debug setting.
• Enter disable to disable mobility debug setting.
|
Defaults
None.
Examples
> debug pm ssh-pmgr enable
> debug pm ssh-pmgr disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11,
debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem,
debug poe, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug poe
To configure debug of Power over ethernet debug options, use the debug poe command.
debug poe {detail | error | message} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
poe
|
Power over ethernet debug options parameters.
|
{detail | error | message}
|
• Enter detail to configure debug of POE detail logs.
• Enter error to configure debug of POE error logs.
• Enter message to configure debug of POE messages.
|
{enable | disable}
|
• Enter enable to enable POE debug setting.
• Enter disable to disable POE debug setting.
|
Defaults
None.
Examples
> debug poe message enable
> debug poe message disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11,
debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem,
debug pm, debug rbcp, debug snmp, debug transfer, debug wcp, debug wps
debug rbcp
To configure Router Blade Control (RBCP) debug options, use the debug rbcp command.
debug rbcp {all | detail | errors | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
rbcp
|
RBCP parameters.
|
{all | detail | errors | packet}
|
• Enter all to configure debug of RBCP.
• Enter detail to configure debug of RBCP detail.
• Enter errors to configure debug of RBCP errors.
• Enter packet to configure debug of RBCP packet trace.
|
{enable | disable}
|
• Enter enable to enable RBCP debug setting.
• Enter disable to disable RBCP debug setting.
|
Defaults
None.
Examples
> debug rbcp packet enable
> debug rbcp packet disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug snmp, debug transfer, debug wcp, debug wps
debug snmp
To configure SNMP debug options, use the debug snmp command.
debug snmp {agent | all | mib | trap} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
snmp
|
lwapp parameters.
|
{agent | all | mib | trap}
|
• Enter agent to configure debug of SNMP agent.
• Enter all to configure debug of all SNMP messages.
• Enter mib to configure debug of SNMP MIB.
• Enter trap to configure debug of SNMP traps.
|
{enable | disable}
|
• Enter enable to enable SNMP debug setting.
• Enter disable to disable SNMP debug setting.
|
Defaults
None.
Examples
> debug snmp trap disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe, debug rbcp, debug transfer, debug wcp, debug wps
debug transfer
To configure transfer debug options, use the debug transfer command.
debug transfer {all | tftp | trace} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
transfer
|
transfer parameters.
|
{all | tftp | trace}
|
• Enter all to configure debug of all transfer messages.
• Enter tftp to configure debug of tftp transfers.
• Enter trace to configure debug of transfer/upgrade.
|
{enable | disable}
|
• Enter enable to enable transfer debug setting.
• Enter disable to disable transfer debug setting.
|
Defaults
None.
Examples
> debug transfer trace enable
> debug transfer trace disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe , debug rbcp, debug snmp, debug wcp, debug wps
debug wcp
To configure wcp debug options, use the debug wcp command.
debug wcp {events | packet} {enable | disable}
Syntax Description
debug
|
Debug parameters.
|
wcp
|
wcp parameters.
|
{events | packet}
|
• Enter events to configure debug of WLAN Control Protocol (WCP) Events.
• Enter packet to configure debug of WLAN Control Protocol (WCP) Packets.
|
{enable | disable}
|
• Enter enable to enable wcp debug setting.
• Enter disable to disable wcp debug setting.
|
Defaults
None.
Examples
> debug wcp packet enable
> debug wcp packet disable
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe , debug rbcp, debug snmp, debug transfer, debug wps
debug wps
To configure wps debug options, use the debug wps command.
config wps sig {enable | disable}
Syntax Description
debug
|
debug parameters.
|
wps
|
WPS parameters.
|
sig
|
Signature parameters.
|
{enable | disable}
|
• Enter enable to enable wps debug setting.
• Enter disable to disable wps debug setting.
|
Defaults
None.
Examples
Related Commands
debug aaa, debug airewave-director, debug arp, debug bcast, debug dhcp, debug disable-all, debug dot11, debug dot1x, debug l2age, debug lwapp, debug mac, debug mobility, debug nac, debug ntp, debug pem, debug pm, debug poe , debug rbcp, debug snmp, debug transfer, debug wcp