The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
To display the configuration
settings for the AAA authentication server database, use the
show aaa auth
command.
show aaa auth
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the configuration settings for the AAA authentication server
database:
(Cisco Controller) >show aaa auth Management authentication server order:
1............................................ local
2............................................ tacacs
Related Commands
config aaa auth
config aaa auth mgmt
show acl
To display the access control
lists (ACLs) that are configured on the controller, use the
show acl command.
show acl {
cpu
|
detailed
acl_name |
summary |
layer2 {
summary
|
detailed
acl_name }
}
Syntax Description
cpu
Displays the ACLs configured
on the Cisco WLC's central processing unit (CPU).
detailed
Displays detailed information
about a specific ACL.
acl_name
ACL name. The name can be up
to 32 alphanumeric characters.
summary
Displays a summary of all
ACLs configured on the controller.
layer2
Displays the Layer 2 ACLs.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the access control lists on the CPU.
(Cisco Controller) >show acl cpu CPU Acl Name................................
Wireless Traffic............................ Disabled
Wired Traffic............................... Disabled
Applied to NPU.............................. No
The following example shows
how to display a summary of the access control lists.
(Cisco Controller) >show acl summaryACL Counter Status Disabled
----------------------------------------
IPv4 ACL Name Applied
-------------------------------- -------
acl1 Yes
acl2 Yes
acl3 Yes
----------------------------------------
IPv6 ACL Name Applied
-------------------------------- -------
acl6 No
The following example shows
how to display the detailed information of the access control lists.
(Cisco Controller) >show acl detailed acl_name Source Destination Source Port Dest Port
I Dir IP Address/Netmask IP Address/Netmask Prot Range Range DSCP Action Counter
- --- ------------------ ------------------ ---- --------- --------- ----- ------ -------
1 Any 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 Any 0-65535 0-65535 0 Deny 0
2 In 0.0.0.0/0.0.0.0 200.200.200.0/ 6 80-80 0-65535 Any Permit 0
255.255.255.0
DenyCounter : 0
Note
The Counter field increments
each time a packet matches an ACL rule, and the DenyCounter field increments
each time a packet does not match any of the rules.
Related Commands
clear acl counters
config acl apply
config acl counter
config acl cpu
config acl create
config acl delete
config interface acl
config acl rule
show advanced eap
To display Extensible
Authentication Protocol (EAP) settings, use the
show advanced
eap command.
show advanced
eap
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the EAP settings:
(Cisco Controller) >show advanced eapEAP-Identity-Request Timeout (seconds)........... 1
EAP-Identity-Request Max Retries................. 20
EAP Key-Index for Dynamic WEP.................... 0
EAP Max-Login Ignore Identity Response........... enable
EAP-Request Timeout (seconds).................... 1
EAP-Request Max Retries.......................... 20
EAPOL-Key Timeout (milliseconds)................. 1000
EAPOL-Key Max Retries............................ 2
Related Commands
config advanced eap
config advanced timers eap-identity-request-delay
config advanced timers eap-timeout
show database summary
To display the maximum number
of entries in the database, use the
show database
summary command.
show database summary
Syntax Description
This command has no arguments or keywords.
Command Default
None
Examples
The following is a sample
output of the
show database summary command:
(Cisco Controller) >show database summary
Maximum Database Entries......................... 2048
Maximum Database Entries On Next Reboot.......... 2048
Database Contents
MAC Filter Entries........................... 2
Exclusion List Entries....................... 0
AP Authorization List Entries................ 1
Management Users............................. 1
Local Network Users.......................... 1
Local Users.............................. 1
Guest Users.............................. 0
Total..................................... 5
Related Commands
config database size
show exclusionlist
To display a summary of all
clients on the manual exclusion list (blacklisted) from associating with this
Cisco wireless LAN controller, use the
show
exclusionlist command.
show
exclusionlist
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command displays all
manually excluded MAC addresses.
Examples
The following example shows
how to display the exclusion list:
(Cisco Controller) >show exclusionlistNo manually disabled clients.
Dynamically Disabled Clients
----------------------------
MAC Address Exclusion Reason Time Remaining (in secs)
----------- ---------------- ------------------------
00:40:96:b4:82:55 802.1X Failure 51
Related Commands
config exclusionlist
show ike
To display active Internet
Key Exchange (IKE) security associations (SAs), use the
show ike
command.
show
ike {
brief |
detailed}
IP_or_MAC_address
Syntax Description
brief
Displays a brief summary of
all active IKE SAs.
detailed
Displays a detailed summary
of all active IKE SAs.
IP_or_MAC_address
IP or MAC address of active
IKE SA.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the active Internet Key Exchange security associations:
(Cisco Controller) >show ike brief 209.165.200.254
show IPsec
To display active Internet
Protocol Security (IPsec) security associations (SAs), use the
show IPsec
command.
show
IPsec {
brief |
detailed}
IP_or_MAC_address
Syntax Description
brief
Displays a brief summary of
active IPsec SAs.
detailed
Displays a detailed summary
of active IPsec SAs.
IP_or_MAC_address
IP address or MAC address of
a device.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display brief information about the active Internet Protocol Security
(IPsec) security associations (SAs):
To display local
authentication certificate information, use the
show local-auth
certificates command:
show local-auth certificates
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the authentication certificate information stored locally:
(Cisco Controller) >show local-auth certificates
Related Commands
clear stats local-auth
config local-auth active-timeout
config local-auth eap-profile
config local-auth method fast
config local-auth user-credentials
debug aaa local-auth
show local-auth config
show local-auth statistics
show local-auth
config
To display local
authentication configuration information, use the
show local-auth
config command.
show local-auth config
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the local authentication configuration information:
(Cisco Controller) >show local-auth configUser credentials database search order:
Primary ................................... Local DB
Configured EAP profiles:
Name ...................................... fast-test
Certificate issuer .................... default
Enabled methods ....................... fast
Configured on WLANs ................... 2
EAP Method configuration:
EAP-TLS:
Certificate issuer .................... default
Peer verification options:
Check against CA certificates ..... Enabled
Verify certificate CN identity .... Disabled
Check certificate date validity ... Enabled
EAP-FAST:
TTL for the PAC ....................... 3 600
Initial client message ................ <none>
Local certificate required ............ No
Client certificate required ........... No
Vendor certificate required ........... No
Anonymous provision allowed ........... Yes
Authenticator ID ...................... 7b7fffffff0000000000000000000000
Authority Information ................. Test
EAP Profile.................................... tls-prof
Enabled methods for this profile .......... tls
Active on WLANs ........................... 1 3EAP Method configuration:
EAP-TLS:
Certificate issuer used ............... cisco
Peer verification options:
Check against CA certificates ..... disabled
Verify certificate CN identity .... disabled
Check certificate date validity ... disabled
Related Commands
clear stats local-auth
config local-auth active-timeout
config local-auth eap-profile
config local-auth method fast
config local-auth user-credentials
debug aaa local-auth
show local-auth certificates
show local-auth statistics
show local-auth
statistics
To display local Extensible
Authentication Protocol (EAP) authentication statistics, use the
show local-auth
statistics command:
show local-auth statistics
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the local authentication certificate statistics:
(Cisco Controller) >show local-auth statisticsLocal EAP authentication DB statistics:
Requests received ............................... 14
Responses returned .............................. 14
Requests dropped (no EAP AVP) ................... 0
Requests dropped (other reasons) ................ 0
Authentication timeouts ......................... 0
Authentication statistics:
Method Success Fail
------------------------------------
Unknown 0 0
LEAP 0 0
EAP-FAST 2 0
EAP-TLS 0 0
PEAP 0 0
Local EAP credential request statistics:
Requests sent to LDAP DB ........................ 0
Requests sent to File DB ........................ 2
Requests failed (unable to send) ................ 0
Authentication results received:
Success ....................................... 2
Fail .......................................... 0
Certificate operations:
Local device certificate load failures .......... 0
Total peer certificates checked ................. 0
Failures:
CA issuer check ............................... 0
CN name not equal to identity ................. 0
Dates not valid or expired .................... 0
Related Commands
clear stats local-auth
config local-auth active-timeout
config local-auth eap-profile
config local-auth method fast
config local-auth user-credentials
debug aaa local-auth
show local-auth config
show local-auth certificates
show nac statistics
To display detailed Network
Access Control (NAC) information about a Cisco wireless LAN controller, use the
show nac
statistics command.
show nac
statistics
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display detailed statistics of network access control settings:
(Cisco Controller) >show nac statisticsServer Index....................................................... 1
Server Address..................................................... xxx.xxx.xxx.xxx
Number of requests sent............................................ 0
Number of retransmissions.......................................... 0
Number of requests received........................................ 0
Number of malformed requests received.............................. 0
Number of bad auth requests received............................... 0
Number of pending requests......................................... 0
Number of timed out requests....................................... 0
Number of misc dropped request received............................ 0
Number of requests sent............................................ 0
Related Commands
show nac summary
config guest-lan nac
config wlan nac
debug nac
show nac summary
To display NAC summary
information for a Cisco wireless LAN controller, use the
show nac
summary command.
show nac
summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary information of network access control settings:
(Cisco Controller) >show nac summaryNAC ACL Name ...............................................
Index Server Address Port State
----- ---------------------------------------- ---- -----
1 xxx.xxx.xxx.xxx 13336 Enabled
Related Commands
show nac statistics
config guest-lan nac
config wlan nac
debug nac
show netuser
To display the configuration
of a particular user in the local user database, use the
show netuser
command.
show netuser
{
detail
user_name
|
guest-roles
|
summary}
Syntax Description
detail
Displays detailed information
about the specified network user.
user_name
Network user.
guest_roles
Displays configured roles for
guest users.
summary
Displays a summary of all
users in the local user database.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show netuser summary command:
(Cisco Controller) >show netuser summary
Maximum logins allowed for a given username ........Unlimited
The following is a sample
output of the
show netuser detail command:
(Cisco Controller) >show netuser detail john10
username........................................... abc
WLAN Id............................................. Any
Lifetime............................................ Permanent
Description......................................... test user
Related Commands
config netuser add
config netuser delete
config netuser description
config netuser guest-role apply
config netuser wlan-id
config netuser guest-roles
show netuser guest-roles
To display a list of the current quality of service (QoS) roles and their bandwidth parameters, use the show netuser guest-roles command.
show netuser guest-roles
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a QoS role for the guest network user:
> show netuser guest-roles
Role Name.............................. Contractor
Average Data Rate.................. 10
Burst Data Rate.................... 10
Average Realtime Rate.............. 100
Burst Realtime Rate................ 100
Role Name.............................. Vendor
Average Data Rate.................. unconfigured
Burst Data Rate.................... unconfigured
Average Realtime Rate.............. unconfigured
Burst Realtime Rate................ unconfigured
Related Commands
config netuser add
config netuser delete
config netuser description
config netuser guest-role apply
config netuser wlan-id
show netuser guest-roles
show netuser
show network
To display the current status of 802.3 bridging for all WLANs, use the show network command.
show network
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the network details:
> show network
Related Commands
config network
show network summary
show network multicast mgid detail
show network multicast mgid summary
show network summary
To display the network configuration of the Cisco wireless LAN controller, use the show network summary command.
show network summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a summary configuration:
> show network summary
RF-Network Name............................. RF
Web Mode.................................... Disable
Secure Web Mode............................. Enable
Secure Web Mode Cipher-Option High.......... Disable
Secure Web Mode Cipher-Option SSLv2......... Disable
Secure Web Mode RC4 Cipher Preference....... Disable
OCSP........................................ Disabled
OCSP responder URL..........................
Secure Shell (ssh).......................... Enable
Telnet...................................... Enable
Ethernet Multicast Mode..................... Disable Mode: Ucast
Ethernet Broadcast Mode..................... Disable
Ethernet Multicast Forwarding............... Disable
Ethernet Broadcast Forwarding............... Disable
AP Multicast/Broadcast Mode................. Unicast
IGMP snooping............................... Disabled
IGMP timeout................................ 60 seconds
IGMP Query Interval......................... 20 seconds
MLD snooping................................ Disabled
MLD timeout................................. 60 seconds
MLD query interval.......................... 20 seconds
User Idle Timeout........................... 300 seconds
AP Join Priority............................ Disable
ARP Idle Timeout............................ 300 seconds
ARP Unicast Mode............................ Disabled
Cisco AP Default Master..................... Disable
Mgmt Via Wireless Interface................. Disable
Mgmt Via Dynamic Interface.................. Disable
Bridge MAC filter Config.................... Enable
Bridge Security Mode........................ EAP
Over The Air Provisioning of AP's........... Enable
Apple Talk ................................. Disable
Mesh Full Sector DFS........................ Enable
AP Fallback ................................ Disable
Web Auth CMCC Support ...................... Disabled
Web Auth Redirect Ports .................... 80
Web Auth Proxy Redirect ................... Disable
Web Auth Captive-Bypass .................. Disable
Web Auth Secure Web ....................... Enable
Fast SSID Change ........................... Disabled
AP Discovery - NAT IP Only ................. Enabled
IP/MAC Addr Binding Check .................. Enabled
CCX-lite status ............................ Disable
oeap-600 dual-rlan-ports ................... Disable
oeap-600 local-network ..................... Enable
mDNS snooping............................... Disabled
mDNS Query Interval......................... 15 minutes
Related Commands
config network
show network multicast mgid summary
show network multicast mgid detail
show network
show ntp-keys
To display network time protocol authentication key details, use the show ntp-keys command.
show ntp-keys
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display NTP authentication key details:
> show ntp-keys
Ntp Authentication Key Details...................
Key Index
-----------
1
3
Related Commands
config time ntp
show policy
To display the
summary of the configured policies, and the details and statistics of a policy,
use the
show policy
command.
show policy {
summary
|
policy-name
[
statistics]}
Syntax Description
summary
Displays the
summary of configured policies.
policy-name
Name of the
policy.
statistics
(Optional)
Displays the statistics of a policy.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following is a
sample output of the
show policy summary command:
(Cisco Controller) >show policy summaryNumber of Policies............................. 2
Policy Index Policy Name
------------ ----------------
1 student-FullAccess
2 teacher-FullAccess
The following
example shows how to display the details of a policy:
(Cisco Controller) >show policy student-FullAccessPolicy Index..................................... 1
Match Role....................................... <none>
Match Eap Type................................... EAP-TLS
ACL.............................................. <none>
QOS.............................................. <none>
Average Data Rate................................ 0
Average Real Time Rate........................... 0
Burst Data Rate.................................. 0
Burst Real Time Rate............................. 0
Vlan Id.......................................... 155
Session Timeout.................................. 1800
Sleeping client timeout.......................... 12
Active Hours
------------
Start Time End Time Day
---------- -------- ---
Match Device Types
------------------
Android
The following
example shows how to display the statistics of a policy:
(Cisco Controller) >show policy student-FullAccess statisticsPolicy Index..................................... student-FullAccess
Matching Attributes None......................... 619
No Policy Match.................................. 224
Device Type Match................................ 0
EAP Type Match................................... 0
Role Type Match.................................. 0
Client Disconnected.............................. 4
Acl Applied...................................... 0
Vlan changed..................................... 614
Session Timeout Applied.......................... 4
QoS Applied...................................... 0
Avg Data Rate Applied............................ 0
Avg Real Time Rate Applied....................... 0
Burst Data Rate Applied.......................... 0
Burst Real Time Rate Applied..................... 0
Sleeping-Client-Timeout Applied.................. 0
show profiling
policy summary
To display local
device classification of the Cisco Wireless LAN Controller (WLC), use the
show profiling policy summary
command.
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following is a
sample output of the
show profiling policy summary
command:
To display the active
internal firewall rules, use the
show rules
command.
show
rules
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display active internal firewall rules:
(Cisco Controller) >show rules--------------------------------------------------------
Rule ID.............: 3
Ref count...........: 0
Precedence..........: 99999999
Flags...............: 00000001 ( PASS )
Source IP range:
(Local stack)
Destination IP range:
(Local stack)
--------------------------------------------------------
Rule ID.............: 25
Ref count...........: 0
Precedence..........: 99999999
Flags...............: 00000001 ( PASS )
Service Info
Service name........: GDB
Protocol............: 6
Source port low.....: 0
Source port high....: 0
Dest port low.......: 1000
Dest port high......: 1000
Source IP range:
IP High............: 0.0.0.0
Interface..........: ANY
Destination IP range:
(Local stack)
--------------------------------------------------------
show switchconfig
To display parameters that apply to the Cisco wireless LAN controller, use the show switchconfig command.
show switchconfig
Syntax Description
This command has no arguments or keywords.
Command Default
Enabled.
Examples
This example shows how to display parameters that apply to the Cisco wireless LAN controller:
> show switchconfig
802.3x Flow Control Mode......................... Disabled
FIPS prerequisite features....................... Enabled
Boot Break....................................... Enabled
secret obfuscation............................... Enabled
Strong Password Check Features:
case-check ...........Disabled
consecutive-check ....Disabled
default-check .......Disabled
username-check ......Disabled
Related Commands
config switchconfig mode
config switchconfig secret-obfuscation
config switchconfig strong-pwd
config switchconfig flowcontrol
config switchconfig fips-prerequisite
show stats switch
show rogue adhoc
custom summary
To display
information about custom rogue ad-hoc rogue access points, use the
show rogue adhoc custom
summary
command.
show rogue adhoc custom summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to display details of custom rogue ad-hoc rogue access
points:
(Cisco Controller) >show rogue adhoc custom summaryNumber of Adhocs............................0
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- -----------------------
Related Commands
show rogue adhoc
detailed
show rogue adhoc
summary
show rogue adhoc friendly
summary
show rogue adhoc malicious
summary
show rogue adhoc unclassified
summary
config rogue
adhoc
show rogue adhoc
detailed
To display details of an
ad-hoc rogue access point detected by the Cisco wireless LAN controller, use
the
show rogue adhoc client
detailed command.
show rogue adhoc
detailed
MAC_address
Syntax Description
MAC_address
Adhoc rogue MAC address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display detailed ad-hoc rogue MAC address information:
(Cisco Controller) >show rogue adhoc client detailed 02:61:ce:8e:a8:8cAdhoc Rogue MAC address.......................... 02:61:ce:8e:a8:8c
Adhoc Rogue BSSID................................ 02:61:ce:8e:a8:8c
State............................................ Alert
First Time Adhoc Rogue was Reported.............. Tue Dec 11 20:45:45 2007
Last Time Adhoc Rogue was Reported............... Tue Dec 11 20:45:45 2007
Reported By
AP 1
MAC Address.............................. 00:14:1b:58:4a:e0
Name..................................... AP0014.1ced.2a60
Radio Type............................... 802.11b
SSID..................................... rf4k3ap
Channel.................................. 3
RSSI..................................... -56 dBm
SNR...................................... 15 dB
Encryption............................... Disabled
ShortPreamble............................ Disabled
WPA Support.............................. Disabled
Last reported by this AP............... Tue Dec 11 20:45:45 2007
Related Commands
config rogue adhoc
show rogue ignore-list
show rogue rule summary
show rogue rule detailed
config rogue rule
show rogue adhoc summary
show rogue adhoc
friendly summary
To display
information about friendly rogue ad-hoc rogue access points, use the
show rogue adhoc friendly
summary
command.
show rogue adhoc friendly summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to display information about friendly rogue ad-hoc rogue
access points:
(Cisco Controller) >show rogue adhoc friendly summary
Number of Adhocs............................0
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- -----------------------
Related Commands
show rogue adhoc
custom summary
show rogue adhoc
detailed
show rogue adhoc
summary
show rogue adhoc malicious
summary
show rogue adhoc unclassified
summary
config rogue
adhoc
show rogue adhoc
malicious summary
To display
information about malicious rogue ad-hoc rogue access points, use the
show rogue adhoc malicious
summary command.
show rogue adhoc malicious summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to display details of malicious rogue ad-hoc rogue access
points:
(Cisco Controller) >show rogue adhoc malicious summaryNumber of Adhocs............................0
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- -----------------------
Related Commands
show rogue adhoc
custom summary
show rogue adhoc
detailed
show rogue adhoc
summary
show rogue adhoc friendly
summary
show rogue adhoc unclassified
summary
config rogue
adhoc
show rogue adhoc
unclassified summary
To display
information about unclassified rogue ad-hoc rogue access points, use the
show rogue adhoc unclassified
summary
command.
show rogue adhoc unclassified summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to display information about unclassified rogue ad-hoc rogue
access points:
(Cisco Controller) >show rogue adhoc unclassified summary
Number of Adhocs............................0
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- -----------------------
Related Commands
show rogue adhoc
custom summary
show rogue adhoc
detailed
show rogue adhoc
summary
show rogue adhoc friendly
summary
show rogue adhoc malicious
summary
config rogue
adhoc
show rogue adhoc
summary
To display a summary of the
ad-hoc rogue access points detected by the Cisco wireless LAN controller, use
the
show rogue adhoc
summary command.
show rogue adhoc
summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of all ad-hoc rogues:
(Cisco Controller) >show rogue adhoc summaryDetect and report Ad-Hoc Networks................ Enabled
Client MAC Address Adhoc BSSID State # APs Last Heard
------------------ ----------- ----- --- -------
xx:xx:xx:xx:xx:xx super Alert 1 Sat Aug 9 21:12:50 2004
xx:xx:xx:xx:xx:xx Alert 1 Aug 9 21:12:50 2003
xx:xx:xx:xx:xx:xx Alert 1 Sat Aug 9 21:10:50 2003
Related Commands
config rogue adhoc
show rogue ignore-list
show rogue rule summary
show rogue rule detailed
config rogue rule
show rogue adhoc detailed
show rogue ap custom
summary
To display
information about custom rogue ad-hoc rogue access points, use the
show rogue ap custom summary
command.
show rogue ap custom summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to display details of custom rogue ad-hoc rogue access
points:
(Cisco Controller) >show rogue ap custom summary
Number of APs............................0
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- -----------------------
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
show rogue ap clients
To display details of rogue
access point clients detected by the Cisco wireless LAN controller, use the
show rogue ap
clients command.
show rogue ap
clients
ap_mac_address
Syntax Description
ap_mac_address
Rogue access point MAC
address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display details of rogue access point clients:
(Cisco Controller) >show rogue ap clients xx:xx:xx:xx:xx:xxMAC Address State # APs Last Heard
----------------- ------------------ ----- -------------------------
00:bb:cd:12:ab:ff Alert 1 Fri Nov 30 11:26:23 2007
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
show rogue ap
detailed
To display details of a rogue
access point detected by the Cisco wireless LAN controller, use the
show rogue-ap
detailed command.
show rogue ap
detailed
ap_mac_address
Syntax Description
ap_mac_address
Rogue access point MAC
address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display detailed information of a rogue access point:
(Cisco Controller) >show rogue ap detailed xx:xx:xx:xx:xx:xxRogue BSSID...................................... 00:0b:85:63:d1:94
Is Rogue on Wired Network........................ No
Classification................................... Unclassified
State............................................ Alert
First Time Rogue was Reported.................... Fri Nov 30 11:24:56 2007
Last Time Rogue was Reported..................... Fri Nov 30 11:24:56 2007
Reported By
AP 1
MAC Address.............................. 00:12:44:bb:25:d0
Name..................................... flexconnect
Radio Type............................... 802.11g
SSID..................................... edu-eap
Channel.................................. 6
RSSI..................................... -61 dBm
SNR...................................... -1 dB
Encryption............................... Enabled
ShortPreamble............................ Enabled
WPA Support.............................. Disabled
Last reported by this AP.............. Fri Nov 30 11:24:56 2007
This example shows how to
display detailed information of a rogue access point with a customized
classification:
(Cisco Controller) >show rogue ap detailed xx:xx:xx:xx:xx:xxRogue BSSID...................................... 00:17:0f:34:48:a0
Is Rogue on Wired Network........................ No
Classification................................... custom
Severity Score .................................. 1
Class Name........................................VeryMalicious
Class Change by.................................. Rogue Rule
Classified at ................................... -60 dBm
Classified by.................................... c4:0a:cb:a1:18:80
State............................................ Contained
State change by.................................. Rogue Rule
First Time Rogue was Reported.................... Mon Jun 4 10:31:18 2012
Last Time Rogue was Reported..................... Mon Jun 4 10:31:18 2012
Reported By
AP 1
MAC Address.............................. c4:0a:cb:a1:18:80
Name..................................... SHIELD-3600-2027
Radio Type............................... 802.11g
SSID..................................... sri
Channel.................................. 11
RSSI..................................... -87 dBm
SNR...................................... 4 dB
Encryption............................... Enabled
ShortPreamble............................ Enabled
WPA Support.............................. Enabled
Last reported by this AP................. Mon Jun 4 10:31:18 2012
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
show rogue ap summary
To display a summary of the
rogue access points detected by the Cisco wireless LAN controller, use the
show rogue-ap
summary command.
show rogue ap
summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of all rogue access points:
(Cisco Controller) >show rogue ap summary
Rogue Location Discovery Protocol................ Disabled
Rogue ap timeout................................. 1200
Rogue on wire Auto-Contain....................... Disabled
Rogue using our SSID Auto-Contain................ Disabled
Valid client on rogue AP Auto-Contain............ Disabled
Rogue AP timeout................................. 1200
Rogue Detection Report Interval.................. 10
Rogue Detection Min Rssi......................... -128
Rogue Detection Transient Interval............... 0
Rogue Detection Client Num Thershold............. 0
Total Rogues(AP+Ad-hoc) supported................ 2000
Total Rogues classified.......................... 729
MAC Address Classification # APs # Clients Last Heard
----------------- ------------------ ----- --------- -----------------------
xx:xx:xx:xx:xx:xx friendly 1 0 Thu Aug 4 18:57:11 2005
xx:xx:xx:xx:xx:xx malicious 1 0 Thu Aug 4 19:00:11 2005
xx:xx:xx:xx:xx:xx malicious 1 0 Thu Aug 4 18:57:11 2005
xx:xx:xx:xx:xx:xx malicious 1 0 Thu Aug 4 18:57:11 2005
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
show rogue ap friendly
summary
To display a list of the
friendly rogue access points detected by the controller, use the
show rogue ap friendly
summary command.
show rogue ap
friendly summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of all friendly rogue access points:
(Cisco Controller) >show rogue ap friendly summaryNumber of APs.................................... 1
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- ---------------------------
XX:XX:XX:XX:XX:XX Internal 1 0 Tue Nov 27 13:52:04 2007
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
show rogue ap malicious
summary
To display a list of the
malicious rogue access points detected by the controller, use the
show rogue ap malicious
summary command.
show rogue ap
malicious summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of all malicious rogue access points:
(Cisco Controller) >show rogue ap malicious summaryNumber of APs.................................... 2
MAC Address State # APs # Clients Last Heard
----------------- ------------------ ----- --------- ---------------------------
XX:XX:XX:XX:XX:XX Alert 1 0 Tue Nov 27 13:52:04 2007
XX:XX:XX:XX:XX:XX Alert 1 0 Tue Nov 27 13:52:04 2007
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
show rogue ap unclassified
summary
To display a list of the
unclassified rogue access points detected by the controller, use the
show rogue ap unclassified
summary command.
show rogue ap
unclassified summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a list of all unclassified rogue access points:
(Cisco Controller) >show rogue ap unclassified summary
Number of APs.................................... 164
MAC Address State # APs # Clients Last Heard
----------------- ------------- ----- --------- ---------------
XX:XX:XX:XX:XX:XX Alert 1 0 Fri Nov 30 11:12:52 2007
XX:XX:XX:XX:XX:XX Alert 1 0 Fri Nov 30 11:29:01 2007
XX:XX:XX:XX:XX:XX Alert 1 0 Fri Nov 30 11:26:23 2007
XX:XX:XX:XX:XX:XX Alert 1 0 Fri Nov 30 11:26:23 2007
show rogue
auto-contain
To display information about
rogue auto-containment, use the
show rogue auto-contain
command.
show rogue
auto-contain
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display information about rogue auto-containment:
To display details of a rogue
client detected by a Cisco wireless LAN controller, use the
show rogue client
detailed command.
show rogue
client detailed
MAC_address
Syntax Description
MAC_address
Rogue client MAC address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display detailed information for a rogue client:
(Cisco Controller) >show rogue client detailed xx:xx:xx:xx:xx:xx
Rogue BSSID...................................... 00:0b:85:23:ea:d1
State............................................ Alert
First Time Rogue was Reported.................... Mon Dec 3 21:50:36 2007
Last Time Rogue was Reported..................... Mon Dec 3 21:50:36 2007
Rogue Client IP address.......................... Not known
Reported By
AP 1
MAC Address.............................. 00:15:c7:82:b6:b0
Name..................................... AP0016.47b2.31ea
Radio Type............................... 802.11a
RSSI..................................... -71 dBm
SNR...................................... 23 dB
Channel.................................. 149
Last reported by this AP.............. Mon Dec 3 21:50:36 2007
Related Commands
show rogue client summary
show rogue ignore-list
config rogue rule client
config rogue rule
show rogue client
summary
To display a summary of the
rogue clients detected by the Cisco wireless LAN controller, use the
show rogue client
summary command.
show rogue
client summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a list of all rogue clients:
(Cisco Controller) >show rogue client summaryValidate rogue clients against AAA............... Disabled
Total Rogue Clients supported.................... 2500
Total Rogue Clients present...................... 3
MAC Address State # APs Last Heard
----------------- ------------------ ----- -----------------------
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:09:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:03:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:03:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:09:11 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 18:57:08 2005
xx:xx:xx:xx:xx:xx Alert 1 Thu Aug 4 19:12:08 2005
Related Commands
show rogue client detailed
show rogue ignore-list
config rogue client
config rogue rule
show rogue
ignore-list
To display a list of rogue
access points that are configured to be ignored, use the
show rogue
ignore-list command.
show rogue
ignore-list
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a list of all rogue access points that are configured to be
ignored.
To display detailed
information for a specific rogue classification rule, use the
show rogue rule
detailed command.
show rogue rule
detailed
rule_name
Syntax Description
rule_name
Rogue rule name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display detailed information on a specific rogue classification rule:
(Cisco Controller) >show rogue rule detailed Rule2
Priority......................................... 2
Rule Name........................................ Rule2
State............................................ Enabled
Type............................................. Malicious
Severity Score................................... 1
Class Name....................................... Very_Malicious
Notify........................................... All
State ........................................... Contain
Match Operation.................................. Any
Hit Count........................................ 352
Total Conditions................................. 2
Condition 1
type......................................... Client-count
value........................................ 10
Condition 2
type......................................... Duration
value (seconds).............................. 2000
Condition 3
type......................................... Managed-ssid
value........................................ Enabled
Condition 4
type......................................... No-encryption
value........................................ Enabled
Condition 5
type......................................... Rssi
value (dBm).................................. -50
Condition 6
type......................................... Ssid
SSID Count................................... 1
SSID 1.................................... test
Related Commands
config rogue rule
show rogue ignore-list
show rogue rule summary
show rogue rule
summary
To display the rogue
classification rules that are configured on the controller, use the
show rogue rule
summary command.
show rogue rule
summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a list of all rogue rules that are configured on the controller:
(Cisco Controller) >show rogue rule summaryPriority Rule Name State Type Match Hit Count
-------- ----------------------- -------- ------------- ----- ---------
1 mtest Enabled Malicious All 0
2 asdfasdf Enabled Malicious All 0
The following example shows
how to display a list of all rogue rules that are configured on the controller:
(Cisco Controller) >show rogue rule summaryPriority Rule Name Rule state Class Type Notify State Match Hit Count
-------- -------------------------------- ----------- ----------- -------- -------- ------ ---------
1 rule2 Enabled Friendly Global Alert All 234
2 rule1 Enabled Custom Global Alert All 0
Related Commands
config rogue rule
show rogue ignore-list
show rogue rule detailed
show tacacs acct
statistics
To display detailed radio
frequency identification (RFID) information for a specified tag, use the
show tacacs acct
statistics command.
show tacacs acct statistics
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display detailed RFID information:
To display TACACS+ server
summary information, use the
show tacacs
summary command.
show tacacs summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display TACACS server summary information:
(Cisco Controller) >show tacacs summaryAuthentication Servers
Idx Server Address Port State Tout
--- ---------------- ------ -------- ----
2 10.0.0.2 6 Enabled 30
Accounting Servers
Idx Server Address Port State Tout
--- ---------------- ------ -------- ----
1 10.0.0.0 10 Enabled 2
Authorization Servers
Idx Server Address Port State Tout
--- ---------------- ------ -------- ----
3 10.0.0.3 4 Enabled 2
...
Related Commands
config tacacs acct
config tacacs athr
config tacacs auth
show tacacs summary
show tacacs athr statistics
show tacacs auth statistics
show wps ap-authentication
summary
To display the access point
neighbor authentication configuration on the controller, use the
show wpsap-authentication
summary command.
show wps ap-authentication summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of the Wireless Protection System (WPS) access point
neighbor authentication:
(Cisco Controller) >show wps ap-authentication summaryAP neighbor authentication is <disabled>.
Authentication alarm threshold is 1.
RF-Network Name: <B1>
Related Commands
config wps ap-authentication
show wps cids-sensor
To display Intrusion
Detection System (IDS) sensor summary information or detailed information on a
specified Wireless Protection System (WPS) IDS sensor, use the
show wps
cids-sensor command.
show wps
cids-sensor
{
summary |
detail
index}
Syntax Description
summary
Displays a summary of sensor
settings.
detail
Displays all settings for the
selected sensor.
index
IDS sensor identifier.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display all settings for the selected sensor:
To display Management Frame
Protection (MFP) information, use the
show wps mfp
command.
show wps
mfp {
summary |
statistics}
Syntax Description
summary
Displays the MFP
configuration and status.
statistics
Displays MFP statistics.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of the MFP configuration and status:
(Cisco Controller) >show wps mfp summaryGlobal Infrastructure MFP state.................. DISABLED (*all infrastructure
settings are overridden)
Controller Time Source Valid..................... False
WLAN Infra. Client
WLAN ID WLAN Name Status Protection Protection
------- ------------------------- --------- ---------- ----------
1 homeap Disabled *Enabled Optional but inactive
(WPA2 not configured)
2 7921 Enabled *Enabled Optional but inactive
(WPA2 not configured)
3 open1 Enabled *Enabled Optional but inactive
(WPA2 not configured)
4 7920 Enabled *Enabled Optional but inactive
(WPA2 not configured)
Infra. Operational --Infra. Capability--
AP Name Validation Radio State Protection Validation
-------------------- ---------- ----- -------------- ---------- ----------
AP1252AG-EW *Enabled b/g Down Full Full
a Down Full Full
The following example shows
how to display the MFP statistics:
(Cisco Controller) >show wps mfp statisticsBSSID Radio Validator AP Last Source Addr Found Error Type
Count Frame Types
----------------- ----- -------------------- ----------------- ------ ----------
---- ---------- -----------
no errors
Related Commands
config wps mfp
show wps shun-list
To display the Intrusion
Detection System (IDS) sensor shun list, use the
show wps
shun-list command.
show wps shun-list
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the IDS system sensor shun list:
(Cisco Controller) >show wps shun-list
Related Commands
config wps shun-list re-sync
show wps signature
detail
To display installed
signatures, use the
show wps signature detail
command.
show wps
signature detail
sig-id
Syntax Description
sig-id
Signature ID of an installed
signature.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
This example shows how to
display information on the attacks detected by standard signature 1:
To display more information
about the attacks detected by a particular standard or custom signature, use
the
show wps signature events
command.
show wps
signature events
{
summary | {
standard |
custom}
precedenceID {
summary |
detailed}
Syntax Description
summary
Displays all tracking
signature summary information.
standard
Displays Standard Intrusion
Detection System (IDS) signature settings.
custom
Displays custom IDS signature
settings.
precedenceID
Signature precedence
identification value.
detailed
Displays tracking source MAC
address details.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the number of attacks detected by all enabled signatures:
(Cisco Controller) >show wps signature events summaryPrecedence Signature Name Type # Events
---------- -------------------- -------- --------
1 Bcast deauth Standard 2
2 NULL probe resp 1 Standard 1
This example shows how to
display a summary of information on the attacks detected by standard signature
1:
(Cisco Controller) >show wps signature events standard 1 summaryPrecedence....................................... 1
Signature Name................................... Bcast deauth
Type............................................. Standard
Number of active events.......................... 2
Source MAC Addr Track Method Frequency # APs Last Heard
----------------- -------------- --------- ----- ------------------------
00:a0:f8:58:60:dd Per Signature 50 1 Wed Oct 25 15:03:05 2006
00:a0:f8:58:60:dd Per Mac 30 1 Wed Oct 25 15:02:53 2006
Related Commands
config wps signature frequency
config wps signature mac-frequency
config wps signature interval
config wps signature quiet-time
config wps signature reset
config wps signature
show wps signature summary
show wps summary
show wps signature
summary
To see individual summaries
of all of the standard and custom signatures installed on the controller, use
the
show wps signature
summary command.
show wps signature summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of all of the standard and custom signatures:
(Cisco Controller) >show wps signature summarySignature-ID..................................... 1
Precedence....................................... 1
Signature Name................................... Bcast deauth
Type............................................. standard
FrameType........................................ management
State............................................ enabled
Action........................................... report
Tracking......................................... per Signature and Mac
Signature Frequency.............................. 50 pkts/interval
Signature Mac Frequency.......................... 30 pkts/interval
Interval......................................... 1 sec
Quiet Time....................................... 300 sec
Description...................................... Broadcast Deauthentication Frame
Patterns:
0(Header):0x00c0:0x00ff
4(Header):0x01:0x01
...
Related Commands
config wps signature frequency
config wps signature interval
config wps signature quiet-time
config wps signature reset
show wps signature events
show wps summary
config wps signature mac-frequency
config wps signature
show wps summary
To display Wireless
Protection System (WPS) summary information, use the
show wps
summary command.
show wps summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display WPS summary information:
(Cisco Controller) >show wps summaryAuto-Immune
Auto-Immune.................................... Disabled
Client Exclusion Policy
Excessive 802.11-association failures.......... Enabled
Excessive 802.11-authentication failures....... Enabled
Excessive 802.1x-authentication................ Enabled
IP-theft....................................... Enabled
Excessive Web authentication failure........... Enabled
Trusted AP Policy
Management Frame Protection.................... Disabled
Mis-configured AP Action....................... Alarm Only
Enforced encryption policy................... none
Enforced preamble policy..................... none
Enforced radio type policy................... none
Validate SSID................................ Disabled
Alert if Trusted AP is missing................. Disabled
Trusted AP timeout............................. 120
Untrusted AP Policy
Rogue Location Discovery Protocol.............. Disabled
RLDP Action.................................. Alarm Only
Rogue APs
Rogues AP advertising my SSID................ Alarm Only
Detect and report Ad-Hoc Networks............ Enabled
Rogue Clients
Validate rogue clients against AAA........... Enabled
Detect trusted clients on rogue APs.......... Alarm Only
Rogue AP timeout............................... 1300
Signature Policy
Signature Processing........................... Enabled
...
Related Commands
config wps signature frequency
config wps signature interval
config wps signature quiet-time
config wps signature reset
show wps signature events
show wps signature mac-frequency
show wps summary
config wps signature
config wps signature interval
show wps wips
statistics
To display the current state
of the Cisco Wireless Intrusion Prevention System (wIPS) operation on the
controller, use the
show wps wips
statistics command.
show wps wips statistics
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the statistics of the wIPS operation:
To display the adaptive Cisco
Wireless Intrusion Prevention System (wIPS) configuration that the Wireless
Control System (WCS) forwards to the controller, use the
show wps wips
summary command.
show wps wips summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display a summary of the wIPS configuration:
To change the 802.11b
preamble as defined in subclause 18.2.2.2 to
long (slower, but more reliable) or
short (faster, but less reliable), use the
config 802.11b
preamble command.
config 802.11b
preamble
{
long |
short}
Syntax Description
long
Specifies the long 802.11b
preamble.
short
Specifies the short 802.11b
preamble.
Command Default
The default 802.11b preamble
value is short.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Note
You must reboot the Cisco
Wireless LAN Controller (reset system) with save to implement this command.
This parameter must be set to
long to optimize this Cisco wireless LAN
controller for some clients, including SpectraLink NetLink telephones.
This command can be used any
time that the CLI interface is active.
Examples
The following example shows
how to change the 802.11b preamble to short:
(Cisco Controller) >config 802.11b preamble short(Cisco Controller) > (reset system with save)
Related Commands
show
802.11b
config aaa auth
To configure the AAA
authentication search order for management users, use the
config aaa auth
command.
Configures the AAA
authentication search order for controller management users by specifying up to
three AAA authentication server types. The order that the server types are
entered specifies the AAA authentication search order.
aaa_server_type
(Optional) AAA authentication
server type (local,
radius, or
tacacs). The
local setting specifies the local database, the
radius setting specifies the RADIUS server, and
the
tacacs setting specifies the TACACS+ server.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You can enter two AAA server
types as long as one of the server types is
local. You cannot enter
radius and
tacacs together.
Examples
The following example shows
how to configure the AAA authentication search order for controller management
users by the authentication server type local:
(Cisco Controller) >config aaa auth radius local
Related Commands
show aaa auth
config aaa auth mgmt
To configure the order of
authentication when multiple databases are configured, use the
config aaa auth mgmt
command.
config aaa auth
mgmt
[
radius
|
tacacs]
Syntax Description
radius
(Optional) Configures the
order of authentication for RADIUS servers.
tacacs
(Optional) Configures the
order of authentication for TACACS servers.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the order of authentication for the RADIUS server:
(Cisco Controller) >config aaa auth mgmt radius
The following example shows
how to configure the order of authentication for the TACACS server:
(Cisco Controller) >config aaa auth mgmt tacacs
Related Commands
show aaa auth order
config acl apply
To apply an access control
list (ACL) to the data path, use the
config acl
apply command.
config acl
apply
rule_name
Syntax Description
rule_name
ACL name that contains up to
32 alphanumeric characters.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
For a Cisco 2100 Series
Wireless LAN Controller, you must configure a preauthentication ACL on the
wireless LAN for the external web server. This ACL should then be set as a
wireless LAN preauthentication ACL under Web Policy. However, you do not need
to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN
Controllers.
Examples
The following example shows
how to apply an ACL to the data path:
(Cisco Controller) >config acl apply acl01
Related Commands
show
acl
config acl counter
To see if packets are hitting
any of the access control lists (ACLs) configured on your controller, use the
config acl
counter command.
config acl
counter
{
start
|
stop}
Syntax Description
start
Enables ACL counters on your
controller.
stop
Disables ACL counters on your
controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
ACL counters are available
only on the following controllers: 4400 series, Cisco WiSM, and Catalyst 3750G
Integrated Wireless LAN Controller Switch.
Examples
The following example shows
how to enable ACL counters on your controller:
(Cisco Controller) >config acl counter start
Related Commands
clear acl
counters
show acl detailed
config acl create
To create a new access
control list (ACL), use the
config acl create
command.
config acl
create
rule_name
Syntax Description
rule_name
ACL name that contains up to
32 alphanumeric characters.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
For a Cisco 2100 Series
Wireless LAN Controller, you must configure a preauthentication ACL on the
wireless LAN for the external web server. This ACL should then be set as a
wireless LAN preauthentication ACL under Web Policy. However, you do not need
to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN
Controllers.
Examples
The following example shows
how to create a new ACL:
(Cisco Controller) >config acl create acl01
Related Commands
show
acl
config acl cpu
To create a new access
control list (ACL) rule that restricts the traffic reaching the CPU, use the
config acl cpu
command.
config acl cpu
rule_name {
wired |
wireless |
both}
Syntax Description
rule_name
Specifies the ACL name.
wired
Specifies an ACL on wired
traffic.
wireless
Specifies an ACL on wireless
traffic.
both
Specifies an ACL on both
wired and wireless traffic.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command allows you to
control the type of packets reaching the CPU.
Examples
The following example shows
how to create an ACL named acl101 on the CPU and apply it to wired traffic:
(Cisco Controller) >config acl cpu acl01 wired
Related Commands
show acl cpu
config acl delete
To delete an access control
list (ACL), use the
config acl
delete command.
config acl
delete
rule_name
Syntax Description
rule_name
ACL name that contains up to
32 alphanumeric characters.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
For a Cisco 2100 Series
Wireless LAN Controller, you must configure a preauthentication ACL on the
wireless LAN for the external web server. This ACL should then be set as a
wireless LAN preauthentication ACL under Web Policy. However, you do not need
to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN
Controllers.
Examples
The following example shows
how to delete an ACL named acl101 on the CPU:
(Cisco Controller) >config acl delete acl01
Related Commands
show acl
config acl
layer2
To configure a Layer
2 access control list (ACL), use the
config acl layer2
command.
config acl layer2 {
apply
acl_name |
create
acl_name |
delete
acl_name |
rule
{
action
acl_name index {
permit
|
deny} |
add
acl_name index
|
change index
acl_name old_index new_index
|
delete acl_name index
|
etherType
acl_name index etherType etherTypeMask
|
swap
index acl_name
index1 index2}}
Syntax Description
apply
Applies a
Layer 2 ACL to the data path.
acl_name
Layer 2 ACL
name. The name can be up to 32 alphanumeric characters.
create
Creates a
Layer 2 ACL.
delete
Deletes a
Layer 2 ACL.
rule
Configures a
Layer 2 ACL rule.
action
Configures
the action for the Layer 2 ACL rule.
index
Index of the
Layer 2 ACL rule.
permit
Permits
rule action.
deny
Denies
rule action.
add
Creates a
Layer 2 ACL rule.
change
index
Changes
the index of the Layer 2 ACL rule.
old_index
Old index
of the Layer 2 ACL rule.
new_index
New index
of the Layer 2 ACL rule.
delete
Deletes a
Layer 2 ACL rule.
etherType
Configures
the EtherType of a Layer 2 ACL rule.
etherType
EtherType
of a Layer 2 ACL rule. EtherType is used to indicate the protocol that is
encapsulated in the payload of an Ethernet frame. The range is a hexadecimal
value from 0x0 to 0xffff.
etherTypeMask
Netmask of
the EtherType. The range is a hexadecimal value from 0x0 to 0xffff.
swap
index
Swaps the
index values of two rules.
index1
index2
Index
values of two Layer 2 ACL rules.
Command Default
The Cisco WLC does
not have any Layer2 ACLs.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Command History
Release
Modification
7.5
This
command was introduced.
Usage Guidelines
You can create a
maximum of 16 rules for a Layer 2 ACL.
You can create a
maximum of 64 Layer 2 ACLs on a Cisco WLC.
A maximum of 16
Layer 2 ACLs are supported per access point because an access point supports a
maximum of 16 WLANs.
Ensure that the
Layer 2 ACL names do not conflict with the FlexConnect ACL names because an
access point does not support the same Layer 2 and Layer 3 ACL names.
Examples
The following
example shows how to apply a Layer 2 ACL:
To configure ACL rules, use
the
config acl rule
command.
config acl
rule {
action
rule_name rule_index {
permit |
deny} |
add rule_name rule_index |
change index
rule_name old_index
new_index |
delete
rule_name rule_index |
destination address
rule_name
rule_index ip_address netmask |
destination port range
rule_name rule_index
start_port end_port
|
direction rule_name
rule_index
{
in |
out |
any} |
dscp
rule_name
rule_index dscp
|
protocol
rule_name
rule_index protocol |
source address
rule_name rule_index
ip_address netmask |
source port range
rule_name
rule_index start_port
end_port
|
swap index
rule_name index_1
index_2}
Syntax Description
action
Configures whether to permit
or deny access.
rule_name
ACL name that contains up to
32 alphanumeric characters.
rule_index
Rule index between 1 and 32.
permit
Permits the rule action.
deny
Denies the rule action.
add
Adds a new rule.
change
Changes a rule’s index.
index
Specifies a rule index.
delete
Deletes a rule.
destination
address
Configures a rule’s
destination IP address and netmask.
destination port
range
Configure a rule's
destination port range.
ip_address
IP address of the rule.
netmask
Netmask of the rule.
start_port
Start port number (between
0 and 65535).
end_port
End port number (between 0
and 65535).
direction
Configures a rule’s
direction to in, out, or any.
in
Configures a rule’s
direction to in.
out
Configures a rule’s
direction to out.
any
Configures a rule’s
direction to any.
dscp
Configures a rule’s DSCP.
dscp
Number between 0 and 63, or
any.
protocol
Configures a rule’s DSCP.
protocol
Number between 0 and 255,
or
any.
source
address
Configures a rule’s source
IP address and netmask.
source port
range
Configures a rule’s source
port range.
swap
Swaps two rules’ indices.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
For a Cisco 2100 Series
Wireless LAN Controller, you must configure a preauthentication ACL on the
wireless LAN for the external web server. This ACL should then be set as a
wireless LAN pre-authentication ACL under Web Policy. However, you do not need
to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN
Controllers.
Examples
The following example shows
how to configure an ACL to permit access:
Specifies the EAP-broadcast
key renew interval time in seconds.
The range is from 120 to
86400 seconds.
eapol-key-timeout
timeout
Specifies the amount of time
(200 to 5000 milliseconds) that the controller waits before retransmitting an
EAPOL (WPA) key message to a wireless client using EAP or WPA/WPA-2 PSK.
The default value is 1000
milliseconds.
eapol-key-retries
retries
Specifies
the maximum number of times (0 to 4 retries) that the controller retransmits an
EAPOL (WPA) key message to a wireless client.
The default
value is 2.
identity-request- timeouttimeout
Specifies
the amount of time (1 to 120 seconds) that the controller waits before
retransmitting an EAP Identity Request message to a wireless client.
The default
value is 30 seconds.
identity-request- retries
Specifies
the maximum number of times (0 to 4 retries) that the controller retransmits an
EAPOL (WPA) key message to a wireless client.
The default
value is 2.
key-indexindex
Specifies the key index (0 or
3) used for dynamic wired equivalent privacy (WEP).
max-login-ignore- identity-response
Specifies that the maximum
EAP identity response login count for a user is ignored. When enabled, this
command limits the number of devices that can be connected to the controller
with the same username.
enable
Ignores the same username
reaching the maximum EAP identity response.
disable
Checks the same username
reaching the maximum EAP identity response.
request-timeout
For EAP
messages other than Identity Requests or EAPOL (WPA) key messages, specifies
the amount of time (1 to 120 seconds) that the controller waits before
retransmitting the message to a wireless client.
The default
value is 30 seconds.
request-retries
(Optional)
For EAP messages other than Identity Requests or EAPOL (WPA) key messages,
specifies the maximum number of times (0 to 20 retries) that the controller
retransmits the message to a wireless client.
The default
value is 2.
Command Default
The default value for
eapol-key-timeout: 1 second.
The default value for
eapol-key-retries: 2 retries.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the key index used for dynamic wired equivalent privacy (WEP):
To configure the advanced
Extensible Authentication Protocol (EAP) identity request delay in seconds, use
the
config advanced timers
eap-identity-request-delay command.
To configure the Lightweight
Directory Access Protocol (LDAP) server settings, use the
config ldap
command.
config ldap
{
add
|
delete |
enable |
disable |
retransmit-timeout
|
retry |
user |
simple-bind}
index
config ldap add
index
server_ip_address
port
user_base
user_attr
user_type[
]
config ldap retransmit-timeout
index retransmit-timeout
config ldap retry
attempts
config ldap user
{attr
index user-attr |
base
index user-base
|
typeindex user-type}
config ldap simple-bind {
anonymous index |
authenticated index
username
password}
Syntax Description
add
Specifies that an LDAP server
is being added.
delete
Specifies that an LDAP server
is being deleted.
enable
Specifies that an LDAP serve
is enabled.
disable
Specifies that an LDAP server
is disabled.
retransmit-timeout
Changes the default
retransmit timeout for an LDAP server.
retry
Configures the retry attempts
for an LDAP server.
user
Configures the user search
parameters.
simple-bind
Configures the local
authentication bind method.
anonymous
Allows anonymous
access to the LDAP server.
authenticated
Specifies that a
username and password be entered to secure access to the LDAP server.
index
LDAP server index. The range
is from 1 to 17.
server_ip_address
IP address of the
LDAP server.
port
Port number.
user_base
Distinguished
name for the subtree that contains all of the users.
user_attr
Attribute that
contains the username.
user_type
ObjectType that
identifies the user.
retransmit-timeout
Retransmit timeout for an LDAP
server. The range is from 2 to 30.
attempts
Number of attempts that each
LDAP server is retried.
attr
Configures the attribute that
contains the username.
base
Configures the distinguished
name of the subtree that contains all the users.
type
Configures the user type.
username
Username for the
authenticated bind method.
password
Password for the
authenticated bind method.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to enable LDAP server index 10:
(Cisco Controller) >config ldap enable 10
Related Commands
config ldap add
config ldap simple-bind
show ldap summary
config local-auth
active-timeout
To specify the amount of time
in which the controller attempts to authenticate wireless clients using local
Extensible Authentication Protocol (EAP) after any pair of configured RADIUS
servers fails, use the
config local-auth
active-timeout command.
config local-auth active-timeout
timeout
Syntax Description
timeout
Timeout measured in seconds.
The range is from 1 to 3600.
Command Default
The default timeout value is 100 seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to specify the active timeout to authenticate wireless clients using EAP to
500 seconds:
(Optional) Specifies that
an EAP profile or method is being added.
delete
(Optional) Specifies that
an EAP profile or method is being deleted.
profile_name
EAP profile name (up to 63
alphanumeric characters). Do not include spaces within a profile name.
cert-issuer
(For use with EAP-TLS,
PEAP, or EAP-FAST with certificates) Specifies the issuer of the certificates
that will be sent to the client. The supported certificate issuers are Cisco or
a third-party vendor.
cisco
Specifies the Cisco
certificate issuer.
vendor
Specifies the third-party
vendor.
method
Configures an EAP profile
method.
method
EAP profile method name.
The supported methods are leap, fast, tls, and peap.
local-cert
(For use with EAP-FAST)
Specifies whether the device certificate on the controller is required for
authentication.
enable
Specifies that the
parameter is enabled.
disable
Specifies that the
parameter is disabled.
client-cert
(For use with EAP-FAST)
Specifies whether wireless clients are required to send their device
certificates to the controller in order to authenticate.
peer-verify
Configures the peer
certificate verification options.
ca-issuer
(For use with EAP-TLS or
EAP-FAST with certificates) Specifies whether the incoming certificate from the
client is to be validated against the Certificate Authority (CA) certificates
on the controller.
cn-verify
(For use with EAP-TLS or
EAP-FAST with certificates) Specifies whether the common name (CN) in the
incoming certificate is to be validated against the CA certificates’ CN on the
controller.
date-valid
(For use with EAP-TLS or
EAP-FAST with certificates) Specifies whether the controller is to verify that
the incoming device certificate is still valid and has not expired.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to create a local EAP profile named FAST01:
The following example shows
how to add the EAP-FAST method to a local EAP profile:
(Cisco Controller) >config local-auth eap-profile method add fast FAST01
The following example shows
how to specify Cisco as the issuer of the certificates that will be sent to the
client for an EAP-FAST profile:
(Cisco Controller) >config local-auth eap-profile method fast cert-issuer cisco
The following example shows
how to specify that the incoming certificate from the client be validated
against the CA certificates on the controller:
(Cisco Controller) >config local-auth eap-profile method fast peer-verify ca-issuer enable
Related Commands
config local-auth active-timeout
config local-auth method fast
config local-auth user-credentials
debug aaa local-auth
show local-auth certificates
show local-auth config
show local-auth statistics
config local-auth method
fast
To configure an EAP-FAST
profile, use the
config local-auth method
fast command.
config local-auth method fast
{
anon-prov [
enable |
disable] |
authority-id auth_id pac-ttl days |
server-key
key_value}
Syntax Description
anon-prov
Configures the controller to
allow anonymous provisioning, which allows PACs to be sent automatically to
clients that do not have one during Protected Access Credentials (PAC)
provisioning.
enable
(Optional) Specifies that the
parameter is enabled.
disable
(Optional) Specifies that the
parameter is disabled.
authority-id
Configures the authority
identifier of the local EAP-FAST server.
auth_id
Authority identifier of the
local EAP-FAST server (2 to 32 hexadecimal digits).
pac-ttl
Configures the number of days
for the Protected Access Credentials (PAC) to remain viable (also known as the
time-to-live [TTL] value).
days
Time-to-live value (TTL)
value (1 to 1000 days).
server-key
Configures the server key
to encrypt or decrypt PACs.
key_value
Encryption key value (2 to
32 hexadecimal digits).
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to disable the controller to allows anonymous provisioning:
(Cisco Controller) >config local-auth method fast anon-prov disable
The following example shows
how to configure the authority identifier 0125631177 of the local EAP-FAST
server:
(Cisco Controller) >config local-auth method fast authority-id 0125631177
The following example shows
how to configure the number of days to 10 for the PAC to remain viable:
(Cisco Controller) >config local-auth method fast pac-ttl 10
Related Commands
clear stats local-auth
config local-auth eap-profile
config local-auth active-timeout
config local-auth user-credentials
debug aaa local-auth
show local-auth certificates
show local-auth config
show local-auth statistics
config local-auth
user-credentials
To configure the local
Extensible Authentication Protocol (EAP) authentication database search order
for user credentials, use the
config local-auth user
credentials command.
IPv6 ACL name that contains up to 32 alphanumeric characters.
create
Creates an IPv6 ACL.
delete
Deletes an IPv6 ACL.
rule
Configures the IPv6 ACL.
action
Configures whether to permit or deny access.
rule_name
ACL name that contains up to 32 alphanumeric characters.
rule_index
Rule index between 1 and 32.
permit
Permits the rule action.
deny
Denies the rule action.
add
Adds a new rule.
change
Changes a rule’s index.
index
Specifies a rule index.
delete
Deletes a rule.
destination address
Configures a rule’s destination IP address and netmask.
ip_address
IP address of the rule.
netmask
Netmask of the rule.
start_port
Start port number (between 0 and 65535).
end_port
End port number (between 0 and 65535).
direction
Configures a rule’s direction to in, out, or any.
in
Configures a rule’s direction to in.
out
Configures a rule’s direction to out.
any
Configures a rule’s direction to any.
dscp
Configures a rule’s DSCP.
dscp
Number between 0 and 63, or any.
protocol
Configures a rule’s DSCP.
protocol
Number between 0 and 255, or any.
source address
Configures a rule’s source IP address and netmask.
source port range
Configures a rule’s source port range.
swap
Swap’s two rules’ indices.
destination port range
Configure a rule's destination port range.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN Controllers.
Examples
The following example shows how to configure an IPv6 ACL to permit access:
Allows secure web (https)
authentication for clients.
disable
Disallows secure web (https)
authentication for clients. Enables http web authentication for clients.
Command Default
The default secure web
(https) authentication for clients is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Note
If you configure the
secure web (https) authentication for clients using the
config network web-auth
secureweb disable command, then you must reboot the Cisco WLC to
implement the change.
Examples
The following example shows
how to enable the secure web (https) authentication for clients:
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure an IKE lifetime of 23 seconds for RADIUS server index 1:
(Cisco Controller) >config radius acct ipsec ike lifetime 23 1
Related Commands
show radius acct
statistics
config radius acct
mac-delimiter
To specify the delimiter to
be used in the MAC addresses that are sent to the RADIUS accounting server, use
the
config radius acct
mac-delimiter command.
Sets the delimiter to a colon
(for example, xx:xx:xx:xx:xx:xx).
hyphen
Sets the delimiter to a
hyphen (for example, xx-xx-xx-xx-xx-xx).
single-hyphen
Sets the delimiter to a
single hyphen (for example, xxxxxx-xxxxxx).
none
Disables the delimiter (for
example, xxxxxxxxxxxx).
Command Default
The default delimiter is a
hyphen.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set the delimiter hyphen to be used in the MAC addresses that are sent
to the RADIUS accounting server for the network users:
To change the default
transmission timeout for a RADIUS accounting server for the Cisco wireless LAN
controller, use the
config radius acct
retransmit-timeout command.
config radius
acct retransmit-timeout
index
timeout
Syntax Description
index
RADIUS server index.
timeout
Number of seconds (from 2 to
30) between retransmissions.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure retransmission timeout value 5 seconds between the
retransmission:
To configure IPsec support
for an authentication server for the Cisco wireless LAN controller, use the
config radius auth IPsec
authentication command.
config radius
auth IPsec authentication {
hmac-md5 |
hmac-sha1}
index
Syntax Description
hmac-md5
Enables IPsec HMAC-MD5
authentication.
hmac-shal
Enables IPsec HMAC-SHA1
authentication.
index
RADIUS server index.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the IPsec hmac-md5 support for RADIUS authentication server
index 1:
To configure IPsec encryption
support for an authentication server for the Cisco wireless LAN controller, use
the
config radius auth IPsec
encryption command.
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure IKE lifetime of 23 seconds for RADIUS authentication server
index 1:
(Cisco Controller) >config radius auth IPsec ike lifetime 23 1
Related Commands
show radius acct
statistics
config radius auth
keywrap
To enable and configure
Advanced Encryption Standard (AES) key wrap, which makes the shared secret
between the controller and the RADIUS server more secure, use the
config radius auth
keywrap command.
To specify a delimiter to be
used in the MAC addresses that are sent to the RADIUS authentication server,
use the
config radius auth
mac-delimiter command.
To change a default
transmission timeout for a RADIUS authentication server for the Cisco wireless
LAN controller, use the
config radius auth
retransmit-timeout command.
config radius
auth retransmit-timeout
index
timeout
Syntax Description
index
RADIUS server index.
timeout
Number of seconds (from 2 to
30) between retransmissions.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure a retransmission timeout of 5 seconds for a RADIUS
authentication server:
To configure RADIUS RFC-3576
support for the authentication server for the Cisco wireless LAN controller,
use the
config radius auth
rfc3576 command.
config radius
auth rfc3576
{
enable |
disable}
index
Syntax Description
enable
Enables RFC-3576 support for
an authentication server.
disable
Disables RFC-3576 support for
an authentication server.
index
RADIUS server index.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
RFC 3576, which is an
extension to the RADIUS protocol, allows dynamic changes to a user session. RFC
3576 includes support for disconnecting users and changing authorizations
applicable to a user session. Disconnect messages cause a user session to be
terminated immediately; CoA messages modify session authorization attributes
such as data filters.
Examples
The following example shows
how to enable the RADIUS RFC-3576 support for a RADIUS authentication server:
To configure the controller
to mark a RADIUS server as down (not responding) after the server does not
reply to three consecutive clients, use the
config radius
aggressive-failover disabled command.
config radius
aggressive-failover disabled
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the controller to mark a RADIUS server as down:
To configure the Called
Station ID type information sent in RADIUS messages for the Cisco wireless LAN
controller, use the
config radius
callStationIdType command.
Configures the Call Station
ID type to use the IP address (only Layer 3).
macaddr
Configures the Call Station
ID type to use the system’s MAC address (Layers 2 and 3).
ap-macaddr-only
Configures the Call Station
ID type to use the access point’s MAC address (Layers 2 and 3).
ap-macaddr-ssid
Configures the Call Station
ID type to use the access point’s MAC address (Layers 2 and 3) in the format
AP MAC
address:SSID.
ap-group-name
Configures the Call Station
ID type to use the AP group name. If the AP is not part of any AP group,
default-group is taken as the AP group name.
flex-group-name
Configures the Call Station
ID type to use the FlexConnect group name. If the FlexConnect AP is not part of
any FlexConnect group, the system MAC address is taken as the Call Station ID.
ap-name
Configures the Call Station
ID type to use the access point’s name.
ap-name-ssid
Configures the Call Station
ID type to use the access point’s name in the format
AP
name:SSID
ap-location
Configures the Call Station
ID type to use the access point’s location.
vlan-id
Configures the Call Station
ID type to use the system’s VLAN-ID.
Command Default
The MAC address of
the system.
Usage Guidelines
The controller sends the
Called Station ID attribute to the RADIUS server in all authentication and
accounting packets. The Called Station ID attribute can be used to classify
users to different groups based on the attribute value. The command is
applicable only for the Called Station and not for the Calling Station.
You cannot send
only the SSID as the Called-Station-ID, you can only combine the SSID with
either the access point MAC address or the access point name.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
7.6
The
ap-ethmac-only and
ap-ethmac-ssid keywords were added to support the
access point’s Ethernet MAC address.
The
ap-label-address and
ap-label-address-ssid keywords were
added.
Examples
The following example shows
how to configure the call station ID type to use the IP address:
Causes the controller to
revert to a preferable server (with a lower server index) from the available
backup servers without using extraneous probe messages. The controller ignores
all inactive servers for a time period and retries later when a RADIUS message
needs to be sent.
active
Causes the controller to
revert to a preferable server (with a lower server index) from the available
backup servers by using RADIUS probe messages to proactively determine whether
a server that has been marked inactive is back online. The controller ignores
all inactive servers for all active RADIUS requests.
username
Specifies the username.
username
Username. The username can be
up to 16 alphanumeric characters.
interval
Specifies the probe interval
value.
interval
Probe interval. The range is
180 to 3600.
Command Default
The default probe interval is
300.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to disable the RADIUS accounting server fallback behavior:
(Cisco Controller) >config radius fallback-test mode off
The following example shows
how to configure the controller to revert to a preferable server from the
available backup servers without using the extraneous probe messages:
The following example shows
how to configure the controller to revert to a preferable server from the
available backup servers by using RADIUS probe messages:
(Cisco Controller) >config radius fallback-test mode active
Related Commands
config advanced probe filter
config advanced probe limit
show advanced probe
show radius acct statistics
config rogue adhoc
To globally or individually
configure the status of an Independent Basic Service Set (IBSS or
ad-hoc) rogue access point, use the
config rogue
adhoc command.
config rogue adhoc {
delete
{
all |
mac-address
mac-address} |
classify
{
friendly state
{
external
|
internal}
mac-address |
malicious state {
alert |
contain}
mac-address |
unclassified
state
{
alert |
contain
}
mac-address}
Syntax Description
enable
Globally enables detection
and reporting of ad-hoc rogues.
disable
Globally disables detection
and reporting of ad-hoc rogues.
external
Configure
external state on the rogue access point that is outside the network and poses
no threat to WLAN security. The controller acknowledges the presence of this
rogue access point.
rogue_MAC
MAC address of the ad-hoc
rogue access point.
alert
Generates an SMNP trap upon
detection of the ad-hoc rogue, and generates an immediate alert to the system
administrator for further action.
all
Enables alerts for all ad-hoc
rogue access points.
auto-contain
Contains all wired ad-hoc
rogues detected by the controller.
monitor_ap
(Optional) IP address of the
ad-hoc rogue access point.
contain
Contains the offending device
so that its signals no longer interfere with authorized clients.
1234_aps
Maximum number of Cisco
access points assigned to actively contain the ad-hoc rogue access point (1
through 4, inclusive).
delete
Deletes ad-hoc rogue access
points.
all
Deletes all ad-hoc rogue
access points.
mac-address
Deletes ad-hoc rogue access
point with the specified MAC address.
mac-address
MAC address of the ad-hoc
rogue access point.
classify
Configures ad-hoc rogue
access point classification.
friendly state
Classifies ad-hoc rogue
access points as friendly.
internal
Configures alert state on
rogue access point that is inside the network and poses no threat to WLAN
security. The controller trusts this rogue access point.
malicious state
Classifies ad-hoc rogue
access points as malicious.
alert
Configures alert state on
the rogue access point that is not in the neighbor list or in the user
configured friendly MAC list. The controller forwards an immediate alert to the
system administrator for further action.
contain
Configures contain state
on the rogue access point. Controller contains the offending device so that its
signals no longer interfere with authorized clients.
unclassified state
Classifies ad-hoc rogue
access points as unclassified.
Command Default
The default for this command
is
enabled and is set to
alert. The default for auto-containment is
disabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The controller continuously
monitors all nearby access points and automatically discovers and collects
information on rogue access points and clients. When the controller discovers a
rogue access point, it uses RLDP to determine if the rogue is attached to your
wired network.
Note
RLDP is not supported for use
with Cisco autonomous rogue access points. These access points drop the DHCP
Discover request sent by the RLDP client. Also, RLDP is not supported if the
rogue access point channel requires dynamic frequency selection (DFS).
When you enter any of the
containment commands, the following warning appears:
Using this feature may have legal consequences. Do you want to continue? (y/n) :
The 2.4- and 5-GHz
frequencies in the Industrial, Scientific, and Medical (ISM) band are open to
the public and can be used without a license. As such, containing devices on
another party’s network could have legal consequences.
Enter the
auto-contain command with the
monitor_ap argument to monitor the rogue access
point without containing it. Enter the
auto-contain command without the optional
monitor_ap to automatically contain all wired
ad-hoc rogues detected by the controller.
Examples
The following example shows
how to enable the detection and reporting of ad-hoc rogues:
(Cisco Controller) >config rogue adhoc enable
The following example shows
how to enable alerts for all ad-hoc rogue access points:
(Cisco Controller) >config rogue adhoc alert all
The following example shows
how to classify an ad-hoc rogue access point as friendly and configure external
state on it:
(Cisco Controller) >config rogue adhoc classify friendly state internal 11:11:11:11:11:11
Related Commands
config rogue auto-contain level
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config rogue ap
classify
To classify the status of a
rogue access point, use the
config rogue ap classify
command.
config rogue
ap classify
{
friendly state {
internal |
external}
ap_mac }
config rogue ap
classify
{
malicious |
unclassified}
state
{
alert |
contain}
ap_mac
Syntax Description
friendly
Classifies a rogue access
point as friendly.
state
Specifies a response to
classification.
internal
Configures the controller
to trust this rogue access point.
external
Configures the controller
to acknowledge the presence of this access point.
ap_mac
MAC address of the rogue
access point.
malicious
Classifies a rogue access
point as potentially malicious.
unclassified
Classifies a rogue access
point as unknown.
alert
Configures the controller
to forward an immediate alert to the system administrator for further action.
contain
Configures the controller
to contain the offending device so that its signals no longer interfere with
authorized clients.
Command Default
These commands are disabled
by default. Therefore, all unknown access points are categorized as
unclassified by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
A rogue access point cannot
be moved to the unclassified class if its current state is contain.
When you enter any of the
containment commands, the following warning appears: “Using this feature may
have legal consequences. Do you want to continue?” The 2.4- and 5-GHz
frequencies in the Industrial, Scientific, and Medical (ISM) band are open to
the public and can be used without a license. As such, containing devices on
another party’s network could have legal consequences.
Examples
The following example shows
how to classify a rogue access point as friendly and can be trusted:
(Cisco Controller) >config rogue ap classify friendly state internal 11:11:11:11:11:11
The following example shows
how to classify a rogue access point as malicious and to send an alert:
(Cisco Controller) >config rogue ap classify malicious state alert 11:11:11:11:11:11
The following example shows
how to classify a rogue access point as unclassified and to contain it:
(Cisco Controller) >config rogue ap classify unclassified state contain 11:11:11:11:11:11
Related Commands
config rogue adhoc
config rogue ap friendly
config rogue ap rldp
config rogue ap ssid
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config rogue ap
friendly
To add a new friendly access
point entry to the friendly MAC address list, or delete an existing friendly
access point entry from the list, use the
config rogue ap friendly
command.
config rogue ap
friendly
{
add |
delete}
ap_mac
Syntax Description
add
Adds this rogue access point
from the friendly MAC address list.
delete
Deletes this rogue access
point from the friendly MAC address list.
ap_mac
MAC address of the rogue
access point that you want to add or delete.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to add a new friendly access point with MAC address 11:11:11:11:11:11 to
the friendly MAC address list.
(Cisco Controller) >config rogue ap friendly add 11:11:11:11:11:11
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap rldp
config rogue ap ssid
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config rogue ap rldp
To enable, disable, or
initiate the Rogue Location Discovery Protocol (RLDP), use the
config rogue ap
rldp command.
When entered without the
optional argument
monitor_ap_only, enables RLDP on all access
points.
auto-contain
When entered without the
optional argument
monitor_ap_only, automatically contains all rogue
access points.
monitor_ap_only
(Optional) RLDP is enabled
(when used with
alarm-only
keyword), or automatically contained (when used with
auto-contain
keyword) is enabled only on the designated monitor access point.
initiate
Initiates RLDP on a
specific rogue access point.
rogue_mac_address
MAC address of specific
rogue access point.
disable
Disables RLDP on all access
points.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
When you enter any of the
containment commands, the following warning appears: “Using this feature may
have legal consequences. Do you want to continue?” The 2.4- and 5-GHz
frequencies in the Industrial, Scientific, and Medical (ISM) band are open to
the public and can be used without a license. As such, containing devices on
another party’s network could have legal consequences.
Examples
The following example shows
how to enable RLDP on all access points:
(Cisco Controller) >config rogue ap rldp enable alarm-only
The following example shows
how to enable RLDP on monitor-mode access point ap_1:
(Cisco Controller) >config rogue ap rldp enable alarm-only ap_1
The following example shows
how to start RLDP on the rogue access point with MAC address 123.456.789.000:
(Cisco Controller) >config rogue ap rldp initiate 123.456.789.000
The following example shows
how to disable RLDP on all access points:
(Cisco Controller) >config rogue ap rldp disable
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap ssid
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config rogue ap ssid
To generate an alarm only, or
to automatically contain a rogue access point that is advertising your
network’s service set identifier (SSID), use the
config rogue ap ssid
command.
config rogue ap
ssid {
alarm |
auto-contain}
Syntax Description
alarm
Generates only an alarm when
a rogue access point is discovered to be advertising your network’s SSID.
auto-contain
Automatically contains the
rogue access point that is advertising your network’s SSID.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
When you enter any of the
containment commands, the following warning appears: “Using this feature may
have legal consequences. Do you want to continue?” The 2.4- and 5-GHz
frequencies in the Industrial, Scientific, and Medical (ISM) band are open to
the public and can be used without a license. As such, containing devices on
another party’s network could have legal consequences.
Examples
The following example shows
how to automatically contain a rogue access point that is advertising your
network’s SSID:
(Cisco Controller) >config rogue ap ssid auto-contain
Related Commands
config rogue adhoc
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap valid-client
config rogue client
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue client detailed
show rogue client summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config rogue ap
timeout
To specify the number of
seconds after which the rogue access point and client entries expire and are
removed from the list, use the
config rogue ap timeout
command.
config rogue ap timeout
seconds
Syntax Description
seconds
Value of 240 to 3600 seconds
(inclusive), with a default value of 1200 seconds.
Command Default
The default number
of seconds after which the rogue access point and client entries expire is 1200
seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set an expiration time for entries in the rogue access point and client
list to 2400 seconds:
(Cisco Controller) >config rogue ap timeout 2400
Related Commands
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap ssid
config rogue rule
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config rogue auto-contain
level
To configure rogue the
auto-containment level, use the
config rogue auto-contain
level
command.
Rogue auto-containment level
in the range of 1 to 4. You can enter a value of 0
to enable the Cisco WLC to automatically select the number of APs used for auto
containment. The controller chooses the required number of APs based on the
RSSI for effective containment.
Note
Up to four APs can be used to
auto-contain when a rogue AP is moved to contained state through any of the
auto-containment policies.
monitor_ap_only
(Optional) Configures
auto-containment using only monitor AP mode.
Command Default
The default auto-containment
level is 1.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The controller continuously
monitors all nearby access points and automatically discovers and collects
information on rogue access points and clients. When the controller discovers a
rogue access point, it uses any of the configured auto-containment policies to
start autocontainment. The policies for initiating autocontainment are rogue on
wire (detected through RLDP or rogue detector AP), rogue using managed SSID,
Valid client on Rogue AP, and AdHoc Rogue.
This table lists the RSSI value associated with each containment
level.
Table 1 RSSI Associated
with Each Containment Level
Auto-containment Level
RSSI
1
0 to –55 dBm
2
–75 to –55 dBm
3
–85 to –75 dBm
4
Less than –85 dBm
Note
RLDP is not supported for use
with Cisco autonomous rogue access points. These access points drop the DHCP
Discover request sent by the RLDP client. Also, RLDP is not supported if the
rogue access point channel requires dynamic frequency selection (DFS).
When you enter any of the
containment commands, the following warning appears:
Using this feature may have legal consequences. Do you want to continue? (y/n) :
The 2.4-GHz and 5-GHz
frequencies in the Industrial, Scientific, and Medical (ISM) band are open to
the public and can be used without a license. As such, containing devices on
another party’s network could have legal consequences.
Examples
The following example shows
how to configure the auto-contain level to 3:
To generate an alarm only, or
to automatically contain a rogue access point to which a trusted client is
associated, use the
config rogue ap valid-client
command.
config rogue ap
valid-client
{
alarm |
auto-contain}
Syntax Description
alarm
Generates only an alarm when
a rogue access point is discovered to be associated with a valid client.
auto-contain
Automatically contains a
rogue access point to which a trusted client is associated.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
When you enter any of the
containment commands, the following warning appears: “Using this feature may
have legal consequences. Do you want to continue?” The 2.4- and 5-GHz
frequencies in the Industrial, Scientific, and Medical (ISM) band are open to
the public and can be used without a license. As such, containing devices on
another party’s network could have legal consequences.
Examples
The following example shows
how to automatically contain a rogue access point that is associated with a
valid client:
(Cisco Controller) >config rogue ap valid-client auto-contain
Related Commands
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap timeout
config rogue ap ssid
config rogue rule
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config rogue client
To configure rogue clients,
use the
config rogue
client command.
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Rogue detection is enabled by
default for all access points joined to the controller except for OfficeExtend
access points. OfficeExtend access points are deployed in a home environment
and are likely to detect a large number of rogue devices.
Examples
The following example shows
how to enable rogue detection on the access point Cisco_AP:
To configure the
rogue client threshold for access points, use the
config rogue detection
client-threshold command.
config rogue detection client-threshold value
Syntax Description
value
Threshold
rogue client count on an access point after which a trap is sent from the Cisco
Wireless LAN Controller (WLC). The range is from 1 to 256. Enter 0 to disable
the feature.
Command Default
The default rogue
client threshold is 0.
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following
example shows how to configure the rogue client threshold:
To configure the minimum
Received Signal Strength Indicator (RSSI) value at which APs can detect rogues
and create a rogue entry in the controller, use the
config rogue detection
min-rssi command.
config rogue detection
min-rssi
rssi-in-dBm
Syntax Description
rssi-in-dBm
Minimum RSSI value. The valid
range is from –70 dBm to –128 dBm, and the default value is –128 dBm.
Command Default
The default RSSI value to detect rogues in APs is -128 dBm.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This feature is applicable to
all the AP modes.
There can be many rogues with
very weak RSSI values that do not provide any valuable information in rogue
analysis. Therefore, you can use this option to filter rogues by specifying the
minimum RSSI value at which APs should detect rogues.
Examples
The following example shows
how to configure the minimum RSSI value:
Specifies the interval at
which rogue reports are sent.
transient-rogue-interval
Specifies the interval at
which rogues are consistently scanned for by APs after the first time the
rogues are scanned.
time-in-seconds
Time in seconds. The valid
range is as follows:
10 to 300 for
report-interval
120 to 1800 for
transient-rogue-interval
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This feature is applicable to
APs that are in monitor mode only.
Using the transient interval
values, you can control the time interval at which APs should scan for rogues.
APs can also filter the rogues based on their transient interval values.
This feature has the
following advantages:
Rogue reports from APs to the
controller are shorter.
Transient rogue entries are
avoided in the controller.
Unnecessary memory allocation
for transient rogues are avoided.
Examples
The following example shows
how to configure the rogue report interval to 60 seconds:
Configures
the rogue detection security level to critical.
custom
Configures
the rogue detection security level to custom, and allows you to configure the
rogue policy parameters.
high
Configures
the rogue detection security level to high. This security level configures
basic rogue detection and auto containment for medium-scale or less critical
deployments. The Rogue Location Discovery Protocol (RLDP) is disabled for this
security level.
low
Configures
the rogue detection security level to low. This security level configures basic
rogue detection for small-scale deployments. Auto containment is not supported
for this security level.
Command Default
The default rogue
detection security level is custom.
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following
example shows how to configure the rogue detection security level to high:
(Cisco Controller) >config rogue detection security-level high
config rogue
detection transient-rogue-interval
To configure the
rogue-detection transient interval, use the
config rogue detection
transient-rogue-interval command.
config rogue detection transient-rogue-interval time
Syntax Description
time
Time
interval, in seconds, at which a rogue should be consistently scanned by the
access point after the rogue is scanned for the first time. The range is from
120 to 1800.
Command Default
The default
rogue-detection transient interval for each security level is as follows:
Low—120 seconds
High—300 seconds
Critical—600
seconds
Command History
Release
Modification
7.5
This command
was introduced.
Usage Guidelines
This feature applies
only to the access points that are in the monitor mode.
After the rogue is
scanned consistently, updates are sent periodically to the Cisco Wireless LAN
Controller (WLC). The access points filter the active transient rogues for a
very short period and are then silent.
Examples
The following
example shows how to configure the rogue detection transient interval:
To add and configure rogue
classification rules, use the
config rogue
rule command.
config rogue
rule {
add ap priority
priority classify {
custom
severity-score
classification-name
|
friendly
|
malicious}
notify
{
all
|
global
|
none
|
local}
state
{
alert
|
contain
|
delete
|
internal
|
external}
rule_name
|
classify {
custom
severity-score
classification-name
|
friendly |
malicious}
rule_name |
condition ap {
set |
delete}
condition_type
condition_value rule_name | {
enable |
delete |
disable} {
all
|
rule_name} |
match {
all |
any} |
priority
priority|
notify
{
all
|
global
|
none
|
local}
rule_name
|
state
{
alert
|
contain
|
internal
|
external}
rule_name}
Syntax Description
add ap
priority
Adds a rule with match any
criteria and the priority that you specify.
priority
Priority of this rule within
the list of rules.
classify
Specifies the classification
of a rule.
custom
Classifies devices matching
the rule as custom.
severity-score
Custom classification
severity score of the rule. The range is from 1 to 100.
classification-name
Custom classification name.
The name can be up to 32 case-sensitive, alphanumeric characters.
friendly
Classifies a rule as
friendly.
malicious
Classifies a rule as
malicious.
notify
Configures type of
notification upon rule match.
all
Notifies the controller and
a trap receiver such as Cisco Prime Infrastructure.
global
Notifies only a trap
receiver such as Cisco Prime Infrastructure.
local
Notifies only the
controller.
none
Notifies neither the
controller nor a trap receiver such as Cisco Prime Infrastructure.
state
Configures state of the
rogue access point after a rule match.
alert
Configures alert state on
the rogue access point that is not in the neighbor list or in the user
configured friendly MAC list. The controller forwards an immediate alert to the
system administrator for further action.
contain
Configures contain state
on the rogue access point. Controller contains the offending device so that its
signals no longer interfere with authorized clients.
delete
Configures delete state on
the rogue access point.
external
Configures external state
on the rogue access point that is outside the network and poses no threat to
WLAN security. The controller acknowledges the presence of this rogue access
point.
internal
Configures alert state on
rogue access point that is inside the network and poses no threat to WLAN
security. The controller trusts this rogue access point.
rule_name
Rule to which the command
applies, or the name of a new rule.
condition
ap
Specifies the conditions for
a rule that the rogue access point must meet.
set
Adds conditions to a rule
that the rogue access point must meet.
delete
Removes conditions to a rule
that the rogue access point must meet.
condition_type
Type of the condition to be
configured. The condition types are listed below:
client-count—Requires that a
minimum number of clients be associated to a rogue access point. The valid
range is 1 to 10 (inclusive).
duration—Requires that a
rogue access point be detected for a minimum period of time. The valid range is
0 to 3600 seconds (inclusive).
managed-ssid—Requires that a
rogue access point’s SSID be known to the controller.
no-encryption—Requires that a
rogue access point’s advertised WLAN does not have encryption enabled.
rssi—Requires that a rogue
access point have a minimum RSSI value. The range is from –95 to –50 dBm
(inclusive).
ssid—Requires that a rogue
access point have a specific SSID.
substring-ssid—Requires
that a rogue access point have a substring of a user-configured SSID.
condition_value
Value of the condition. This
value is dependent upon the condition_type. For instance, if the condition type
is ssid, then the condition value is either the SSID name or all.
enable
Enables all rules or a single
specific rule.
delete
Deletes all rules or a single
specific rule.
disable
Deletes all rules or a
single specific rule.
match
Specifies whether a
detected rogue access point must meet all or any of the conditions specified by
the rule in order for the rule to be matched and the rogue access point to
adopt the classification type of the rule.
all
Specifies all rules
defined.
any
Specifies any rule meeting
certain criteria.
priority
Changes the priority of a
specific rule and shifts others in the list accordingly.
Command Default
No rogue rules are
configured.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
For your changes to be
effective, you must enable the rule. You can configure up to 64 rules.
Reclassification of rogue
APs according to the RSSI condition of the rogue rule occurs only when the RSSI
changes more than +/- 2 dBm of the configured RSSI value. Manual and automatic
classification override custom rogue rules. Rules are applied to manually
changed rogues if their class type changes to unclassified and state changes to
alert. Adhoc rogues are classified and do not go to the pending state. You can
have up to 50 classification types.
Examples
The following example shows
how to create a rule called rule_1 with a priority of 1 and a classification as
friendly.
Configures
conditions to a rule that the rogue access point must meet.
client-count
Enables a
minimum number of clients to be associated to the rogue access point.
count
Minimum
number of clients to be associated to the rogue access point. The range is from
1 to 10 (inclusive). For example, if the number of clients associated to a
rogue access point is greater than or equal to the configured value, the access
point is classified as malicious.
duration
Enables a
rogue access point to be detected for a minimum period of time.
time
Minimum time
period, in seconds, to detect the rogue access point. The range is from 0 to
3600.
managed-ssid
Enables a
rogue access point’s SSID to be known to the controller.
no-encryption
Enables a
rogue access point’s advertised WLAN to not have encryption enabled. If a rogue
access point has encryption disabled, it is likely that more clients will try
to associate to it.
rssi
Enables a
rogue access point to have a minimum Received Signal Strength Indicator (RSSI)
value.
rssi
Minimum
RSSI value, in dBm, required for the access point. The range is from –95 to –50
(inclusive). For example, if the rogue access point has an RSSI that is greater
than the configured value, the access point is classified as malicious.
ssid
Enables a
rogue access point have a specific SSID.
ssid
SSID of
the rogue access point.
substring-ssid
Enables a rogue access
point to have a substring of a user-configured SSID.
substring-ssid
Substring of a
user-configured SSID. For example, if you have an SSID as ABCDE, you can
specify the substring as ABCD or ABC. You can classify multiple SSIDs with
matching patterns.
delete
Removes
the conditions to a rule that a rogue access point must comply with.
all
Deletes
all the rogue rule conditions.
rule_name
Rogue rule
to which the command applies.
Command Default
The default value
for RSSI is 0 dBm.
The default value
for duration is 0 seconds.
The default value
for client count is 0.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You can configure up
to 25 SSIDs per rogue rule.
You can configure up to 25 SSID substrings per rogue rule.
Examples
The following
example shows how to configure the RSSI rogue rule condition:
(Cisco Controller) >config rogue rule condition ap set rssi –50
config tacacs acct
To configure TACACS+
accounting server settings, use the
config tacacs
acct command.
Controller port used for the
TACACS+ accounting server.
type
Type of secret key being used
(ASCII or HEX).
secret_key
Secret key in ASCII or
hexadecimal characters.
delete
Deletes a TACACS+ server.
disable
Disables a TACACS+ server.
enable
Enables a TACACS+ server.
retransmit-timeout
Changes the default
retransmit timeout for the TACACS+ server.
seconds
Retransmit timeout (2 to 30
seconds).
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to add a new TACACS+ accounting server index 3 with the IP address
10.0.0.0, port number 10, and secret key 12345678 in ASCII:
Controller port used for the
TACACS+ accounting server.
type
Type of secret key being used
(ASCII or HEX).
secret_key
Secret key in ASCII or
hexadecimal characters.
delete
Deletes a TACACS+ server.
disable
Disables a TACACS+ server.
enable
Enables a TACACS+ server.
retransmit-timeout
Changes the default
retransmit timeout for the TACACS+ server.
seconds
Retransmit timeout (2 to 30
seconds).
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to add a new TACACS+ authorization server index 3 with the IP address
10.0.0.0, port number 4, and secret key 12345678 in ASCII:
Controller port used for the
TACACS+ accounting server.
type
Type of secret key being used
(ASCII or HEX).
secret_key
Secret key in ASCII or
hexadecimal characters.
delete
Deletes a TACACS+ server.
disable
Disables a TACACS+ server.
enable
Enables a TACACS+ server.
retransmit-timeout
Changes the default
retransmit timeout for the TACACS+ server.
seconds
Retransmit timeout (2 to 30
seconds).
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to add a new TACACS+ authentication server index 2 with the IP address
10.0.0.3, port number 6, and secret key 12345678 in ASCII:
To retrieve the
TACACS IP information from a DNS server, use the
config radius dns
command.
config radius dns {
global port
{
ascii |
hex}
secret |
query url timeout
|
serverip
ip_address |
disable
|
enable}
Syntax Description
global
Configures
the global port and secret to retrieve the TACACS IP information from a DNS
server.
port
Port number
for authentication. The range is from 1 to 65535. All the DNS servers should
use the same authentication port.
ascii
Format of
the shared secret that you should set to ASCII.
hex
Format of
the shared secret that you should set to hexadecimal.
secret
TACACS
server login secret.
query
Configures
the fully qualified domain name (FQDN) of the TACACS server and DNS timeout.
url
FQDN of
the TACACS server. The FQDN can be up to 63 case-sensitive, alphanumeric
characters.
timeout
Maximum
time that the Cisco Wireless LAN Controller (WLC) waits for, in days, before
timing out a request and resending it. The range is from 1 to 180.
serverip
Configures
the DNS server IP address.
ip_address
DNS server
IP address.
disable
Disables
the TACACS DNS feature. The default is disabled.
enable
Enables
the Cisco WLC to retrieve the TACACS IP information from a DNS server.
Command Default
You cannot
retrieve the TACACS IP information from a DNS server.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The accounting
port is derived from the authentication port. All the DNS servers should use
the same secret. When you enable a DNS query, the static configurations will be
overridden. The DNS list overrides the static AAA list.
Examples
The following
example shows how to enable the TACACS DNS feature on the Cisco WLC:
(Cisco Controller) >config tacacs dns enable
config wps
ap-authentication
To configure access point
neighbor authentication, use the
config wps
ap-authentication command.
To enable or disable
protection from Denial of Service (DoS) attacks, use the
config wps
auto-immune command.
config wps
auto-immune
{
enable |
disable |
stop}
Syntax Description
enable
Enables the auto-immune
feature.
disable
Disables the auto-immune
feature.
stop
Stops dynamic auto-immune
feature.
Command Default
Disabled
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
A potential attacker can use
specially crafted packets to mislead the Intrusion Detection System (IDS) into
treating a legitimate client as an attacker. It causes the controller to
disconnect this legitimate client and launch a DoS attack. The auto-immune
feature, when enabled, is designed to protect against such attacks. However,
conversations using Cisco 792x phones might be interrupted intermittently when
the auto-immune feature is enabled. If you experience frequent disruptions when
using 792x phones, you might want to disable this feature.
Examples
The following example shows
how to configure the auto-immune mode:
(Cisco Controller) >config wps auto-immune enable
The following example shows how to stop the auto-immune mode:
(Cisco Controller) >config wps auto-immune stop
Dynamic Auto Immune by WIPS is stopped
Related Commands
show wps summary
config wps
cids-sensor
To configure Intrusion
Detection System (IDS) sensors for the Wireless Protection System (WPS), use
the
config wps
cids-sensor command.
config wps
cids-sensor {
[
add
index ip_address
username password] | [
delete
index] | [
enable
index] | [
disable
index] | [
port
index
port] | [
interval
index query_interval] | [
fingerprint
sha1
fingerprint] }
Syntax Description
add
(Optional) Configures a new
IDS sensor.
index
IDS sensor internal index.
ip_address
IDS sensor IP address.
username
IDS sensor username.
password
IDS sensor password.
delete
(Optional) Deletes an IDS
sensor.
enable
(Optional) Enables an IDS
sensor.
disable
(Optional) Disables an IDS
sensor.
port
(Optional) Configures the
IDS sensor’s port number.
port
Port number.
interval
(Optional) Specifies the
IDS sensor’s query interval.
query_interval
Query interval setting.
fingerprint
(Optional) Specifies the
IDS sensor’s TLS fingerprint.
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the intrusion detection system with the IDS index 1, IDS
sensor IP address 10.0.0.51, IDS username Sensor_user0doc1, and IDS password
passowrd01:
To force the controller to
synchronization with other controllers in the mobility group for the shun list,
use the
config wps shun-list
re-sync command.
config wps
shun-list re-sync
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the controller to synchronize with other controllers for the
shun list:
(Cisco Controller) >config wps shun-list re-sync
Related Commands
show wps shun-list
config wps signature
To enable or disable
Intrusion Detection System (IDS) signature processing, or to enable or disable
a specific IDS signature, use the
config wps
signature command.
config wps
signature
{
standard |
custom}
state
signature_id {
enable |
disable}
Syntax Description
standard
Configures a standard IDS
signature.
custom
Configures a standard IDS
signature.
state
Specifies the state of the
IDS signature.
signature_id
Identifier for the signature
to be enabled or disabled.
enable
Enables the IDS signature
processing or a specific IDS signature.
disable
Disables IDS signature
processing or a specific IDS signature.
Command Default
IDS signature processing is
enabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
If IDS signature processing
is disabled, all signatures are disabled, regardless of the state configured
for individual signatures.
Examples
The following example shows
how to enable IDS signature processing, which enables the processing of all IDS
signatures:
(Cisco Controller) >config wps signature enable
The following example shows
how to disable a standard individual IDS signature:
(Cisco Controller) >config wps signature standard state 15 disable
Related Commands
config wps signature frequency
config wps signature interval
config wps signature mac-frequency
config wps signature quiet-time
config wps signature reset
show wps signature events
show wps signature summary
show wps summary
config wps signature
frequency
To specify the number of
matching packets per interval that must be identified at the individual access
point level before an attack is detected, use the
config wps signature
frequency command.
config wps
signature frequency
signature_id
frequency
Syntax Description
signature_id
Identifier for the signature
to be configured.
frequency
Number of matching packets
per interval that must be at the individual access point level before an attack
is detected. The range is 1 to 32,000 packets per interval.
Command Default
The
frequency default value varies per signature.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
If IDS signature processing
is disabled, all signatures are disabled, regardless of the state configured
for individual signatures.
Examples
The following example shows
how to set the number of matching packets per interval per access point before
an attack is detected to 1800 for signature ID 4:
(Cisco Controller) >config wps signature frequency 4 1800
Related Commands
config wps signature frequency
config wps signature interval
config wps signature quiet-time
config wps signature reset
show wps signature events
show wps signature summary
show wps summary
config wps signature
interval
To specify the number of
seconds that must elapse before the signature frequency threshold is reached
within the configured interval, use the
config wps signature
interval command.
To specify the number of
matching packets per interval that must be identified per client per access
point before an attack is detected, use the
config wps signature
mac-frequency command.
Number of matching packets
per interval that must be identified per client per access point before an
attack is detected. The range is 1 to 32,000 packets per interval.
Command Default
The
mac_frequency
default value varies per signature.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
If IDS signature processing
is disabled, all signatures are disabled, regardless of the state configured
for individual signatures.
Examples
The following example shows
how to set the number of matching packets per interval per client before an
attack is detected to 50 for signature ID 3:
To specify the length of time
after which no attacks have been detected at the individual access point level
and the alarm can stop, use the
config wps signature
quiet-time command.
Length of time after which no
attacks have been detected at the individual access point level and the alarm
can stop. The range is 60 to 32,000 seconds.
Command Default
The default value of
quiet_time varies per signature.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
If IDS signature processing
is disabled, all signatures are disabled, regardless of the state configured
for individual signatures.
Examples
The following example shows
how to set the number of seconds after which no attacks have been detected per
access point to 60 for signature ID 1:
To clear the current counters
for an access control list (ACL), use the
clear acl
counters command.
clear acl
counters
acl_name
Syntax Description
acl_name
ACL name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Note
ACL counters are available
only on the following controllers: Cisco 4400 Series Controller, Cisco WiSM,
and Catalyst 3750G Integrated Wireless LAN Controller Switch.
Examples
The following example shows
how to clear the current counters for acl1:
(Cisco Controller) >clear acl counters acl1
Related Commands
config acl counter
show acl
clear radius acct
statistics
To clear the RADIUS
accounting statistics on the controller, use the
clear radius acc
statistics command.
clear radius acct statistics
[
index
|
all]
Syntax Description
index
(Optional) Specifies the
index of the RADIUS accounting server.
all
(Optional) Specifies all
RADIUS accounting servers.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the RADIUS accounting statistics:
(Cisco Controller) >clear radius acc statistics
Related Commands
show radius acct statistics
clear tacacs auth
statistics
To clear the RADIUS
authentication server statistics in the controller, use the
clear tacacs auth
statistics command.
clear tacacs auth statistics
[
index
|
all]
Syntax Description
index
(Optional) Specifies the
index of the RADIUS authentication server.
all
(Optional) Specifies all
RADIUS authentication servers.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the RADIUS authentication server statistics:
(Cisco Controller) >clear tacacs auth statistics
Related Commands
show tacacs auth statistics
show tacacs summary
config tacacs auth
clear stats
local-auth
To clear the local Extensible
Authentication Protocol (EAP) statistics, use the
clear stats
local-auth command.
clear stats
local-auth
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the local EAP statistics:
(Cisco Controller) >clear stats local-auth
Local EAP Authentication Stats Cleared.
Related Commands
config local-auth active-timeout
config local-auth eap-profile
config local-auth method fast
config local-auth user-credentials
debug aaa local-auth
show local-auth certificates
show local-auth config
show local-auth statistics
clear stats radius
To clear the statistics for
one or more RADIUS servers, use the
clear stats
radius command.
clear stats
radius
{
auth
|
acct} {
index
|
all}
Syntax Description
auth
Clears statistics regarding
authentication.
acct
Clears statistics regarding
accounting.
index
Specifies the index number of
the RADIUS server to be cleared.
all
Clears statistics for all
RADIUS servers.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the statistics for all RADIUS authentication servers:
(Cisco Controller) >clear stats radius auth all
Related Commands
clear
transfer
clear download
datatype
clear download
filename
clear download
mode
clear download
serverip
clear download
start
clear upload
datatype
clear upload
filename
clear upload
mode
clear upload
path
clear upload
serverip
clear upload
start
clear stats
port
clear stats tacacs
To clear the TACACS+ server
statistics on the controller, use the
clear stats
tacacs command.
(Optional) Clears the TACACS+
authentication server statistics.
athr
(Optional) Clears the TACACS+
authorization server statistics.
acct
(Optional) Clears the TACACS+
accounting server statistics.
index
(Optional) Specifies index of
the TACACS+ server.
all
(Optional) Specifies all
TACACS+ servers.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the TACACS+ accounting server statistics for index 1:
(Cisco Controller) >clear stats tacacs acct 1
Related Commands
show tacacs summary
debug Commands
This section lists the debug commands to manage debugging of security settings of the controller.
Caution
Debug commands are reserved for use only under the direction of Cisco personnel. Do not use these commands without direction from Cisco-certified staff.