The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
To display a list of primary
and secondary backup WLCs, use the
show advanced
backup-controller command.
show advanced
backup-controller
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the backup controller information:
> show advanced backup-controller
AP primary Backup Controller .................... controller 10.10.10.10
AP secondary Backup Controller .................. 0.0.0.0
show advanced
max-1x-sessions
To display the maximum number
of simultaneous 802.1X sessions allowed per access point, use the
show advanced
max-1x-sessions command.
show advanced
max-1x-sessions
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the maximum 802.1X sessions per access point:
> show advanced max-1x-sessions
Max 802.1x session per AP at a given time........ 0
show advanced probe
To display the number of
probes sent to the Cisco WLC per access point per client and the probe interval
in milliseconds, use the
show advanced
probe command.
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Examples
The following example shows
how to display the probe settings for the WLAN controller:
> show advanced probe
Probe request filtering.......................... Enabled
Probes fwd to controller per client per radio.... 12
Probe request rate-limiting interval............. 100 msec
show advanced rate
To display whether control
path rate limiting is enabled or disabled, use the
show advanced
rate command.
show advanced
rate
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the switch control path rate limiting mode:
> show advanced rate
Control Path Rate Limiting....................... Disabled
show advanced timers
To display the mobility
anchor, authentication response, and rogue access point entry timers, use the
show advanced
timers command.
show advanced
timers
Syntax Description
This command has no arguments
or keywords.
Command Default
The defaults are
shown in the “Examples” section.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the system timers setting:
> show advanced timers
Authentication Response Timeout (seconds)........ 10
Rogue Entry Timeout (seconds).................... 1200
AP Heart Beat Timeout (seconds).................. 30
AP Discovery Timeout (seconds)................... 10
AP Local mode Fast Heartbeat (seconds)........... disable
AP flexconnect mode Fast Heartbeat (seconds)........... disable
AP Primary Discovery Timeout (seconds)........... 120
show ap auto-rf
To display the auto-RF
settings for a Cisco lightweight access point, use the
show ap auto-rf
command.
show ap auto-rf
802.11{
a |
b}
cisco_ap
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display auto-RF information for an access point:
To display an access point’s
Cisco Client eXtensions (CCX) radio management status information, use the
show ap ccx rm
command.
show ap ccx rm
ap_name
status
Syntax Description
ap_name
Specified access point name.
status
Displays the CCX radio
management status information for an access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the status of the CCX radio management:
> show ap ccx rm AP1240-21ac status
A Radio
Channel Load Request ..................... Disabled
Noise Histogram Request .................. Disabled
Beacon Request ........................... Disabled
Frame Request ............................ Disabled
Interval ................................. 60
Iteration ................................ 10
G Radio
Channel Load Request ..................... Disabled
Noise Histogram Request .................. Disabled
Beacon Request ........................... Disabled
Frame Request ............................ Disabled
Interval ................................. 60
Iteration ................................ 10
show ap cdp
To display the Cisco
Discovery Protocol (CDP) information for an access point, use the
show ap cdp
command.
show ap
cdp {
all
|
ap-name
cisco_ap |
neighbors {
all
|
ap-name
cisco_ap |
detail
cisco_ap}}
Syntax Description
all
Displays the CDP status on
all access points.
ap-name
Displays the CDP status for a
specified access point.
cisco_ap
Specified access point name.
neighbors
Displays neighbors using CDP.
detail
Displays details about a
specific access point neighbor using CDP.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the CDP status of all access points:
> show ap cdp all
AP CDP State
AP Name AP CDP State
------------------ ----------
SB_RAP1 enable
SB_MAP1 enable
SB_MAP2 enable
SB_MAP3 enable
The following example shows how to display the CDP status of a
specified access point:
> show ap cdp ap-name SB_RAP1
AP CDP State
AP Name AP CDP State
------------------ ----------
AP CDP State.......................Enabled
AP Interface-Based CDP state
Ethernet 0.....................Enabled
Slot 0.........................Enabled
Slot 1.........................Enabled
The following example shows how to display details about all
neighbors using CDP:
> show ap cdp neighbor all
AP Name AP IP Neighbor Name Neighbor IP Neighbor Port
--------- --------------- ------------------ -------------- -------------
SB_RAP1 192.168.102.154 sjc14-41a-sw1 192.168.102.2 GigabitEthernet1/0/13
SB_RAP1 192.168.102.154 SB_MAP1 192.168.102.137 Virtual-Dot11Radio0
SB_MAP1 192.168.102.137 SB_RAP1 192.168.102.154 Virtual-Dot11Radio0
SB_MAP1 192.168.102.137 SB_MAP2 192.168.102.138 Virtual-Dot11Radio0
SB_MAP2 192.168.102.138 SB_MAP1 192.168.102.137 Virtual-Dot11Radio1
SB_MAP2 192.168.102.138 SB_MAP3 192.168.102.139 Virtual-Dot11Radio0
SB_MAP3 192.168.102.139 SB_MAP2 192.168.102.138 Virtual-Dot11Radio1
The following example shows how to display details about a
specific neighbor with a specified access point using CDP:
> show ap cdp neighbors ap-name SB_MAP2
AP Name AP IP Neighbor Name Neighbor IP Neighbor Port
----------- --------------- --------------- -------------- -------------
SB_MAP2 192.168.102.138 SB_MAP1 192.168.102.137 Virtual-Dot11Radio1
SB_MAP2 192.168.102.138 SB_MAP3 192.168.102.139 Virtual-Dot11Radio0
The following example shows how to display details about
neighbors using CDP:
> show ap cdp neighbors detail SB_MAP2
AP Name:SB_MAP2
AP IP address:192.168.102.138
-------------------------
Device ID: SB_MAP1
Entry address(es): 192.168.102.137
Platform: cisco AIR-LAP1522AG-A-K9 , Cap
Interface: Virtual-Dot11Radio0, Port ID (outgoing port): Virtual-Dot11Radio1
Holdtime : 180 sec
Version :
Cisco IOS Software, C1520 Software (C1520-K9W8-M), Experimental Version 12.4(200
81114:084420) [BLD-v124_18a_ja_throttle.20081114 208] Copyright (c) 1986-2008 by
Cisco Systems, Inc. Compiled Fri 14-Nov-08 23:08 by
advertisement version: 2
-------------------------
Device ID: SB_MAP3
Entry address(es): 192.168.102.139
Platform: cisco AIR-LAP1522AG-A-K9 , Capabilities: Trans-Bridge
Interface: Virtual-Dot11Radio1, Port ID (outgoing port): Virtual-Dot11Radio0
Holdtime : 180 sec
Version :
Cisco IOS Software, C1520 Software (C1520-K9W8-M), Experimental Version 12.4(200
81114:084420) [BLD-v124_18a_ja_throttle.20081114 208] Copyright (c) 1986-2008 by
Cisco Systems, Inc. Compiled Fri 14-Nov-08 23:08 by
advertisement version: 2
show ap channel
To display the available
channels for a specific mesh access point, use the
show ap channel
command.
show ap channel
ap_name
Syntax Description
ap_name
Name of the mesh access
point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the available channels for a particular access point:
> show ap channel AP47
802.11b/g Current Channel ...........1
Allowed Channel List.....................1,2,3,4,5,6,7,8,9,10,11
802.11a Current Channel .................161
Allowed Channel List.....................36,40,44,48,52,56,60,64,100,
.........................................104,108,112,116,132,136,140,
.........................................149,153,157,161
show ap config
To display the detailed
configuration for a lightweight access point, use the
show ap config
command.
show ap
config802.11{
a |
b} [
summary]
cisco_ap
Syntax Description
802.11a
Specifies the 802.11a or
802.11b/g network.
802.11b
Specifies the 802.11b/g
network.
summary
(Optional) Displays radio
summary of all APs
cisco_ap
Lightweight access point
name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the detailed configuration for an access point:
> show ap config 802.11a AP02
Cisco AP Identifier.............................. 0
Cisco AP Name.................................... AP02
Country code..................................... US - United States
Regulatory Domain allowed by Country............. 802.11bg:-A 802.11a:-A
AP Regulatory Domain............................. Unconfigured
Switch Port Number .............................. 1
MAC Address...................................... 00:0b:85:18:b6:50
IP Address Configuration......................... DHCP
IP Address....................................... 1.100.49.240
IP NetMask....................................... 255.255.255.0
Gateway IP Addr.................................. 1.100.49.1
CAPWAP Path MTU.................................. 1485
Telnet State..................................... Disabled
Ssh State........................................ Disabled
Cisco AP Location................................ default-location
Cisco AP Group Name.............................. default-group
Primary Cisco Switch............................. Cisco_32:ab:63
Primary Cisco Switch IP Address.................. Not Configured
Secondary Cisco Switch...........................
Secondary Cisco Switch IP Address................ Not Configured
Tertiary Cisco Switch............................
Tertiary Cisco Switch IP Address................. Not Configured
Administrative State ............................ ADMIN_ENABLED
Operation State ................................. REGISTERED
Mirroring Mode .................................. Disabled
AP Mode ........................................... Sniffer
Public Safety ..................................... Global: Disabled, Local: Disabled
AP SubMode ...................................... Not Configured
Remote AP Debug ................................. Disabled
Logging trap severity level ..................... informational
Logging syslog facility ......................... kern
S/W Version .................................... 7.0.110.6
Boot Version ................................... 12.4.18.0
Mini IOS Version ................................ 3.0.51.0
Stats Reporting Period .......................... 180
Stats Re--More-- or (q)uit
LED State........................................ Enabled
PoE Pre-Standard Switch.......................... Enabled
PoE Power Injector MAC Addr...................... Disabled
Power Type/Mode.................................. Power injector / Normal mode
Number Of Slots.................................. 2
AP Model......................................... AIR-LAP1142N-A-K9
AP Image......................................... C1140-K9W8-M
IOS Version...................................... 12.4(20100502:031212)
Reset Button..................................... Enabled
AP Serial Number................................. FTX1305S180
AP Certificate Type.............................. Manufacture Installed
AP User Mode..................................... AUTOMATIC
AP User Name..................................... Not Configured
AP Dot1x User Mode............................... Not Configured
AP Dot1x User Name............................... Not Configured
Cisco AP system logging host..................... 255.255.255.255
AP Up Time....................................... 47 days, 23 h 47 m 47 s
AP LWAPP Up Time................................. 47 days, 23 h 10 m 37 s
Join Date and Time............................... Tue May 4 16:05:00 2010
Join Taken Time.................................. 0 days, 00 h 01 m 37 s
Attributes for Slot 1
Radio Type................................... RADIO_TYPE_80211n-5
Radio Subband................................ RADIO_SUBBAND_ALL
Administrative State ........................ ADMIN_ENABLED
Operation State ............................. UP
Radio Role .................................. ACCESS
CellId ...................................... 0
Station Configuration
Configuration ............................. AUTOMATIC
Number Of WLANs ........................... 2
Medium Occupancy Limit .................... 100
CFP Period ................................ 4
CFP MaxDuration ........................... 60
BSSID ..................................... 00:24:97:88:99:60
Operation Rate Set
6000 Kilo Bits........................... MANDATORY
9000 Kilo Bits........................... SUPPORTED
12000 Kilo Bits.......................... MANDATORY
18000 Kilo Bits.......................... SUPPORTED
24000 Kilo Bits.......................... MANDATORY
36000 Kilo Bits.......................... SUPPORTED
48000 Kilo Bits.......................... SUPPORTED
54000 Kilo Bits.......................... SUPPORTED
MCS Set
MCS 0.................................... SUPPORTED
MCS 1.................................... SUPPORTED
MCS 2.................................... SUPPORTED
MCS 3.................................... SUPPORTED
MCS 4.................................... SUPPORTED
MCS 5.................................... SUPPORTED
MCS 6.................................... SUPPORTED
MCS 7.................................... SUPPORTED
MCS 8.................................... SUPPORTED
MCS 9.................................... SUPPORTED
MCS 10................................... SUPPORTED
MCS 11................................... SUPPORTED
MCS 12................................... SUPPORTED
MCS 13................................... SUPPORTED
MCS 14................................... SUPPORTED
MCS 15................................... SUPPORTED
Beacon Period ............................. 100
Fragmentation Threshold ................... 2346
Multi Domain Capability Implemented ....... TRUE
Multi Domain Capability Enabled ........... TRUE
Country String ............................ US
Multi Domain Capability
Configuration ............................. AUTOMATIC
First Chan Num ............................ 36
Number Of Channels ........................ 21
MAC Operation Parameters
Configuration ............................. AUTOMATIC
Fragmentation Threshold ................... 2346
Packet Retry Limit ........................ 64
Tx Power
Num Of Supported Power Levels ............. 6
Tx Power Level 1 .......................... 14 dBm
Tx Power Level 2 .......................... 11 dBm
Tx Power Level 3 .......................... 8 dBm
Tx Power Level 4 .......................... 5 dBm
Tx Power Level 5 .......................... 2 dBm
Tx Power Level 6 .......................... -1 dBm
Tx Power Configuration .................... AUTOMATIC
Current Tx Power Level .................... 0
Phy OFDM parameters
Configuration ............................. AUTOMATIC
Current Channel ........................... 36
Extension Channel ......................... NONE
Channel Width.............................. 20 Mhz
Allowed Channel List....................... 36,40,44,48,52,56,60,64,100,
......................................... 104,108,112,116,132,136,140,
......................................... 149,153,157,161,165
TI Threshold .............................. -50
Legacy Tx Beamforming Configuration ....... AUTOMATIC
Legacy Tx Beamforming ..................... DISABLED
Antenna Type............................... INTERNAL_ANTENNA
Internal Antenna Gain (in .5 dBi units).... 6
Diversity.................................. DIVERSITY_ENABLED
802.11n Antennas
Tx
A....................................... ENABLED
B....................................... ENABLED
Rx
A....................................... ENABLED
B....................................... ENABLED
C....................................... ENABLED
Performance Profile Parameters
Configuration ............................. AUTOMATIC
Interference threshold..................... 10 %
Noise threshold............................ -70 dBm
RF utilization threshold................... 80 %
Data-rate threshold........................ 1000000 bps
Client threshold........................... 12 clients
Coverage SNR threshold..................... 16 dB
Coverage exception level................... 25 %
Client minimum exception level............. 3 clients
Rogue Containment Information
Containment Count............................ 0
CleanAir Management Information
CleanAir Capable......................... No
Radio Extended Configurations:
Buffer size ……………………….30
Data-rate…………………………..0
Beacon strt ………………………..90 ms
Rx-Sensitivity SOP threshold ………….. -80 dB
CCA threshold ……………………. -60 dB
The following example shows how to display the detailed
configuration for another access point:
> show ap config 802.11b AP02
Cisco AP Identifier.............................. 0
Cisco AP Name.................................... AP02
AP Regulatory Domain............................. Unconfigured
Switch Port Number .............................. 1
MAC Address...................................... 00:0b:85:18:b6:50
IP Address Configuration......................... DHCP
IP Address....................................... 1.100.49.240
IP NetMask....................................... 255.255.255.0
Gateway IP Addr.................................. 1.100.49.1
Cisco AP Location................................ default-location
Cisco AP Group Name.............................. default-group
Primary Cisco Switch............................. Cisco_32:ab:63
Secondary Cisco Switch...........................
Tertiary Cisco Switch............................
Administrative State ............................ ADMIN_ENABLED
Operation State ................................. REGISTERED
Mirroring Mode .................................. Disabled
AP Mode ......................................... Local
Remote AP Debug ................................. Disabled
S/W Version .................................... 3.1.61.0
Boot Version ................................... 1.2.59.6
Stats Reporting Period .......................... 180
LED State........................................ Enabled
ILP Pre Standard Switch.......................... Disabled
ILP Power Injector............................... Disabled
Number Of Slots.................................. 2
AP Model......................................... AS-1200
AP Serial Number................................. 044110223A
AP Certificate Type.............................. Manufacture Installed
Attributes for Slot 1
Radio Type................................... RADIO_TYPE_80211g
Administrative State ........................ ADMIN_ENABLED
Operation State ............................. UP
CellId ...................................... 0
Station Configuration
Configuration ............................. AUTOMATIC
Number Of WLANs ........................... 1
Medium Occupancy Limit .................... 100
CFP Period ................................ 4
CFP MaxDuration ........................... 60
BSSID ..................................... 00:0b:85:18:b6:50
Operation Rate Set
1000 Kilo Bits........................... MANDATORY
2000 Kilo Bits........................... MANDATORY
5500 Kilo Bits........................... MANDATORY
11000 Kilo Bits.......................... MANDATORY
6000 Kilo Bits........................... SUPPORTED
9000 Kilo Bits........................... SUPPORTED
12000 Kilo Bits.......................... SUPPORTED
18000 Kilo Bits.......................... SUPPORTED
24000 Kilo Bits.......................... SUPPORTED
36000 Kilo Bits.......................... SUPPORTED
48000 Kilo Bits.......................... SUPPORTED
54000 Kilo Bits.......................... SUPPORTED
Beacon Period ............................. 100
DTIM Period ............................... 1
Fragmentation Threshold ................... 2346
Multi Domain Capability Implemented ....... TRUE
Multi Domain Capability Enabled ........... TRUE
Country String ............................ US
Multi Domain Capability
Configuration ............................. AUTOMATIC
First Chan Num ............................ 1
Number Of Channels ........................ 11
MAC Operation Parameters
Configuration ............................. AUTOMATIC
RTS Threshold ............................. 2347
Short Retry Limit ......................... 7
Long Retry Limit .......................... 4
Fragmentation Threshold ................... 2346
Maximum Tx MSDU Life Time ................. 512
Maximum Rx Life Time....................... 512
Tx Power
Num Of Supported Power Levels.............. 5
Tx Power Level 1 .......................... 17 dBm
Tx Power Level 2........................... 14 dBm
Tx Power Level 3........................... 11 dBm
Tx Power Level 4........................... 8 dBm
Tx Power Level 5........................... 5 dBm
Tx Power Configuration..................... CUSTOMIZED
Current Tx Power Level..................... 5
Phy OFDM parameters
Configuration.............................. CUSTOMIZED
Current Channel............................ 1
TI Threshold............................... -50
Legacy Tx Beamforming Configuration ....... CUSTOMIZED
Legacy Tx Beamforming ..................... ENABLED
Antenna Type............................... INTERNAL_ANTENNA
Internal Antenna Gain (in5 dBm units)...... 11
Diversity.................................. DIVERSITY_ENABLED
Performance Profile Parameters
Configuration.............................. AUTOMATIC
Interference threshold..................... 10%
Noise threshold............................ -70 dBm
RF utilization threshold................... 80%
Data-rate threshold........................ 1000000 bps
Client threshold........................... 12 clients
Coverage SNR threshold..................... 12 dB
Coverage exception level................... 25%
Client minimum exception level............. 3 clients
Rogue Containment Information
Containment Count............................ 0
The following example shows how to display the general
configuration of a Cisco access point:
> show ap config general cisco-ap
Cisco AP Identifier.............................. 9
Cisco AP Name.................................... cisco-ap
Country code..................................... US - United States
Regulatory Domain allowed by Country............. 802.11bg:-A 802.11a:-A
AP Country code.................................. US - United States
AP Regulatory Domain............................. 802.11bg:-A 802.11a:-A
Switch Port Number .............................. 1
MAC Address...................................... 12:12:12:12:12:12
IP Address Configuration......................... DHCP
IP Address....................................... 10.10.10.21
IP NetMask....................................... 255.255.255.0
CAPWAP Path MTU.................................. 1485
Domain...........................................
Name Server......................................
Telnet State..................................... Disabled
Ssh State........................................ Disabled
Cisco AP Location................................ default location
Cisco AP Group Name.............................. default-group
Primary Cisco Switch Name........................ 4404
Primary Cisco Switch IP Address.................. 10.10.10.32
Secondary Cisco Switch Name......................
Secondary Cisco Switch IP Address................ Not Configured
Tertiary Cisco Switch Name....................... 4404
Tertiary Cisco Switch IP Address................. 3.3.3.3
Administrative State ............................ ADMIN_ENABLED
Operation State ................................. REGISTERED
Mirroring Mode .................................. Disabled
AP Mode ......................................... Local
Public Safety ................................... Global: Disabled, Local: Disabled
AP subMode ...................................... WIPS
Remote AP Debug ................................. Disabled
S/W Version .................................... 5.1.0.0
Boot Version ................................... 12.4.10.0
Mini IOS Version ................................ 0.0.0.0
Stats Reporting Period .......................... 180
LED State........................................ Enabled
PoE Pre-Standard Switch.......................... Enabled
PoE Power Injector MAC Addr...................... Disabled
Power Type/Mode.................................. PoE/Low Power (degraded mode)
Number Of Slots.................................. 2
AP Model......................................... AIR-LAP1252AG-A-K9
IOS Version...................................... 12.4(10:0)
Reset Button..................................... Enabled
AP Serial Number................................. serial_number
AP Certificate Type.............................. Manufacture Installed
Management Frame Protection Validation........... Enabled (Global MFP Disabled)
AP User Mode..................................... CUSTOMIZED
AP username..................................... maria
AP Dot1x User Mode............................... Not Configured
AP Dot1x username............................... Not Configured
Cisco AP system logging host..................... 255.255.255.255
AP Up Time....................................... 4 days, 06 h 17 m 22 s
AP LWAPP Up Time................................. 4 days, 06 h 15 m 00 s
Join Date and Time............................... Mon Mar 3 06:19:47 2008
Ethernet Port Duplex............................. Auto
Ethernet Port Speed.............................. Auto
AP Link Latency.................................. Enabled
Current Delay................................... 0 ms
Maximum Delay................................... 240 ms
Minimum Delay................................... 0 ms
Last updated (based on AP Up Time).............. 4 days, 06 h 17 m 20 s
Rogue Detection.................................. Enabled
AP TCP MSS Adjust................................ Disabled
Mesh preferred parent............................ 00:24:13:0f:92:00
show ap config global
To display the global syslog
server settings for all access points that join the controller, use the
show ap config global
command.
show ap config
global
Syntax Description
This command has no arguments
and keywords.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display global syslog server settings:
> show ap config global
AP global system logging host.............................. 255.255.255.255
show ap core-dump
To display the memory core
dump information for a lightweight access point, use the
show ap
core-dump command.
show ap
core-dump cisco_ap
Syntax Description
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display memory core dump information:
> show ap core-dump AP02
Memory core dump is disabled.
show ap crash-file
To display the list of both
crash and radio core dump files generated by lightweight access points, use the
show ap
crash-file command.
show ap
crash-file
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the crash file generated by the access point:
> show ap crash-file
show ap data-plane
To display the data plane
status for all access points or a specific access point, use the
show ap data-plane
command.
show ap
data-plane
{
all
|
cisco_ap}
Syntax Description
all
Specifies all Cisco
lightweight access points.
cisco_ap
Name of a Cisco lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the data plane status of all access points:
> show ap data-plane all
Min Data Data Max Data Last
AP Name Round Trip Round Trip Round Trip Update
------------------ -------------- -------------- -------------- ------
1130 0.000s 0.000s 0.002s 18:51:23
1240 0.000s 0.000s 0.000s 18:50:45
show ap ethernet
tag
To display the VLAN
tagging information of an Ethernet interface, use the
show ap ethernet tag
command.
show ap ethernet tag
{
summary
|
cisco_ap}
Syntax Description
summary
Displays the
VLAN tagging information for all access points associated to the controller.
cisco_ap
Name of the
Cisco lightweight access point. Displays the VLAN tagging information for a
specific access point associated to the controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
If the access point
is unable to route traffic or reach the controller using the specified trunk
VLAN, it falls back to the untagged configuration. If the access point joins
the controller using this fallback configuration, the controller sends a trap
to a trap server such as the WCS, which indicates the failure of the trunk
VLAN. In this scenario, the "Failover to untagged" message appears in show
command output.
Examples
The following
example shows how to display the VLAN tagging information for all access points
associated to the controller:
> show ap ethernet tag summary
AP Name Vlan Tag Configuration
------------------ -------
AP2 7 (Failover to untagged)
charan.AP1140.II disabled
show ap eventlog
To display the contents of
the event log file for an access point that is joined to the controller, use
the
show ap
eventlog command.
show ap
eventlog ap_name
Syntax Description
ap_name
Event log for the specified
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the event log of an access point:
> show ap eventlog ciscoAP
AP event log download has been initiated
Waiting for download to complete
AP event log download completed.
======================= AP Event log Contents =====================
*Feb 13 11:54:17.146: %CAPWAP-3-CLIENTEVENTLOG: AP event log has been cleared from the contoller 'admin'
*Feb 13 11:54:32.874: *** Access point reloading. Reason: Reload Command ***
*Mar 1 00:00:39.134: %CDP_PD-4-POWER_OK: Full power - NEGOTIATED inline power source
*Mar 1 00:00:39.174: %LINK-3-UPDOWN: Interface Dot11Radio1, changed state to up
*Mar 1 00:00:39.211: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
*Mar 1 00:00:49.947: %CAPWAP-3-CLIENTEVENTLOG: Did not get vendor specific options from DHCP.
...
show ap image
To display the detailed
information about the predownloaded image for specified access points, use the
show ap image
command.
show ap image
{
cisco_ap
|
all}
Syntax Description
cisco_ap
Name of the lightweight
access point.
all
Specifies all access points.
Note
If you have an AP that has
the name
all, it conflicts with the keyword
all that specifies all access points. In this
scenario, the keyword
all takes precedence over the AP that is named
all.
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
show ap inventory
To display inventory information for an access point, use the
show ap inventory command.
show ap inventory
ap_name
Syntax Description
ap_name
Inventory for the specified
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the inventory of an access point:
> show ap inventory test101
NAME: "test101" , DESCR: "Cisco Wireless Access Point"
PID: AIR-LAP1131AG-A-K9 , VID: V01, SN: FTX1123T2XX
show ap join stats
detailed
To display all join-related
statistics collected for a specific access point, use the
show ap join stats detailed
command.
show ap join
stats detailed
ap_mac
Syntax Description
ap_mac
Access point Ethernet MAC
address or the MAC address of the 802.11 radio interface.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display join information for a specific access point trying to join the
controller:
> show ap join stats detailed 00:0b:85:02:0d:20
Discovery phase statistics
- Discovery requests received.......................... 2
- Successful discovery responses sent.................. 2
- Unsuccessful discovery request processing............ 0
- Reason for last unsuccessful discovery attempt....... Not applicable
- Time at last successful discovery attempt............ Aug 21 12:50:23:335
- Time at last unsuccessful discovery attempt.......... Not applicable
Join phase statistics
- Join requests received............................... 1
- Successful join responses sent....................... 1
- Unsuccessful join request processing................. 1
- Reason for last unsuccessful join attempt.............RADIUS authorization is pending for the AP
- Time at last successful join attempt................. Aug 21 12:50:34:481
- Time at last unsuccessful join attempt............... Aug 21 12:50:34:374
Configuration phase statistics
- Configuration requests received...................... 1
- Successful configuration responses sent.............. 1
- Unsuccessful configuration request processing........ 0
- Reason for last unsuccessful configuration attempt... Not applicable
- Time at last successful configuration attempt........ Aug 21 12:50:34:374
- Time at last unsuccessful configuration attempt...... Not applicable
Last AP message decryption failure details
- Reason for last message decryption failure........... Not applicable
Last AP disconnect details
- Reason for last AP connection failure................ Not applicable
Last join error summary
- Type of error that occurred last..................... Lwapp join request rejected
- Reason for error that occurred last.................. RADIUS authorization is pending for the AP
- Time at which the last join error occurred........... Aug 21 12:50:34:374
show ap join stats
summary
To display the last join
error detail for a specific access point, use the
show ap join stats summary
command.
show ap join
stats summary
ap_mac
Syntax Description
ap_mac
Access point Ethernet MAC
address or the MAC address of the 802.11 radio interface.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
To obtain the MAC address of
the 802.11 radio interface, enter the
show interface
command on the access point.
Examples
The following example shows
how to display specific join information for an access point:
> show ap join stats summary 00:0b:85:02:0d:20
Is the AP currently connected to controller.......................... No
Time at which the AP joined this controller last time................ Aug 21 12:50:36:061
Type of error that occurred last..................................... Lwapp join request rejected
Reason for error that occurred last.................................. RADIUS authorization is pending for the AP
Time at which the last join error occurred........................... Aug 21 12:50:34:374
show ap join stats summary
all
To display the MAC addresses
of all the access points that are joined to the controller or that have tried
to join, use the
show ap join stats summary
all
command.
show ap join
stats summary all
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display a summary of join information for all access points:
> show ap join stats summary all
Number of APs.............................................. 4
Base Mac AP EthernetMac AP Name IP Address Status
00:0b:85:57:bc:c0 00:0b:85:57:bc:c0 AP1130 10.10.163.217 Joined
00:1c:0f:81:db:80 00:1c:63:23:ac:a0 AP1140 10.10.163.216 Not joined
00:1c:0f:81:fc:20 00:1b:d5:9f:7d:b2 AP1 10.10.163.215 Joined
00:21:1b:ea:36:60 00:0c:d4:8a:6b:c1 AP2 10.10.163.214 Not joined
show ap led-state
To view the LED state of all
access points or a specific access point, use the
show ap led-state
command.
show ap led-state
{
all |
cisco_ap}
Syntax Description
all
Shows the LED state for all
access points.
cisco_ap
Name of the access point
whose LED state is to be shown.
Command Default
The AP LED state is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to get the LED state of all access points:
> show ap led-state all
Global LED State: Enabled (default)
show ap
led-flash
To display the LED
flash status of an access point, use the
show ap
led-flash command.
show ap led-flash
cisco_ap
Syntax Description
cisco_ap
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to display the LED flash status of an access point:
> show ap led-flash
show ap
link-encryption
To display the MAC addresses
of all the access points that are joined to the controller or that have tried
to join, use the
show ap link-encryption
command.
show ap
link-encryption
{
all
|
cisco_ap}
Syntax Description
all
Specifies all access points.
cisco_ap
Name of the lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the link encryption status of all access points:
> show ap link-encryption all
Encryption Dnstream Upstream Last
AP Name State Count Count Update
------------------ --- -------- -------- ------
1240 Dis 4406 237553 Never
1130 En 2484 276308 19:31
show ap max-count
summary
To display the
maximum number of access points supported by the Cisco WLC, use the
show ap max-count
summarycommand.
show ap max-count summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following is a
sample output of the
show ap max-count
summarycommand:
Device > show ap max-count
The max number of AP's supported................. 500
show ap monitor-mode
summary
To display the current
channel-optimized monitor mode settings, use the
show ap monitor-mode
summary command.
show ap monitor-mode summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display current channel-optimized monitor mode settings:
> show ap monitor-mode summary
AP Name Ethernet MAC Status Scanning Channel List
--- ----------------- ---------- ----------------------
AP_004 xx:xx:xx:xx:xx:xx Tracking 1, 6, 11, 4
show ap packet-dump
status
To display access
point Packet Capture configurations, use the
show ap packet-dump status
command.
show ap packet-dump status
Syntax Description
This command has no arguments
or keywords.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
Packet Capture does
not work during intercontroller roaming.
The controller does
not capture packets created in the radio firmware and sent out of the access
point, such as the beacon or probe response. Only packets that flow through the
Radio driver in the Tx path are captured.
Examples
The following
example shows how to display the access point Packet Capture configurations:
> show ap packet-dump status
Packet Capture Status............................ Stopped
FTP Server IP Address............................ 0.0.0.0
FTP Server Path..................................
FTP Server Username..............................
FTP Server Password.............................. ********
Buffer Size for Capture.......................... 2048 KB
Packet Capture Time.............................. 45 Minutes
Packet Truncate Length........................... Unspecified
Packet Capture Classifier........................ None
show ap retransmit
To display access point
control packet retransmission parameters, use theshow ap retransmit
command.
show ap retransmit
{
all
|
cisco_ap}
Syntax Description
all
Specifies all access points.
cisco_ap
Name of the access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the control packet retransmission parameters of all access
points on a network:
> show ap retransmit all
Global control packet retransmit interval: 3 (default)
Global control packet retransmit count: 5 (default)
AP Name Retransmit Interval Retransmit count
------------------ ------------------- -------------------
AP_004 3 (default) 5 (WLC default),5 (AP default)
show ap stats
To display the statistics for
a Cisco lightweight access point, use the
show ap stats
command.
show ap
stats {
802.11{
a |
b} |
wlan |
ethernet
summary}
cisco_ap
[
tsm
{
client_mac
|
all}]
Syntax Description
802.11a
Specifies the 802.11a network
802.11b
Specifies the 802.11b/g
network.
wlan
Specifies WLAN statistics.
ethernet
Specifies AP ethernet
interface statistics.
summary
Displays ethernet interface
summary of all the connected Cisco access points.
cisco_ap
Name of the lightweight
access point.
tsm
(Optional) Specifies the
traffic stream metrics.
client_mac
(Optional) MAC address of the
client.
all
(Optional) Specifies all
access points.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display statistics of an access point for the 802.11b network:
> show ap stats 802.11a Ibiza
Number Of Slots.................................. 2
AP Name.......................................... Ibiza
MAC Address...................................... 44:2b:03:9a:8a:73
Radio Type....................................... RADIO_TYPE_80211a
Stats Information
Number of Users................................ 0
TxFragmentCount................................ 84628
MulticastTxFrameCnt............................ 84628
FailedCount.................................... 0
RetryCount..................................... 0
MultipleRetryCount............................. 0
FrameDuplicateCount............................ 0
RtsSuccessCount................................ 1
RtsFailureCount................................ 0
AckFailureCount................................ 0
RxIncompleteFragment........................... 0
MulticastRxFrameCnt............................ 0
FcsErrorCount.................................. 20348857
TxFrameCount................................... 84628
WepUndecryptableCount.......................... 19907
TxFramesDropped................................ 0
Rate Limiting Stats:
Wlan 1:
Number of Data Packets Received.............. 592
Number of Data Rx Packets Dropped............ 160
Number of Data Bytes Received................ 160783
Number of Data Rx Bytes Dropped.............. 0
Number of Realtime Packets Received.......... 592
Number of Realtime Rx Packets Dropped........ 0
Number of Realtime Bytes Received............ 160783
Number of Realtime Rx Bytes Dropped.......... 0
Number of Data Packets Sent.................. 131
Number of Data Tx Packets Dropped............ 0
Number of Data Bytes Sent.................... 23436
Number of Data Tx Bytes Dropped.............. 0
Number of Realtime Packets Sent.............. 131
Number of Realtime Tx Packets Dropped........ 0
Number of Realtime Bytes Sent................ 23436
Number of Realtime Tx Bytes Dropped.......... 0
Call Admission Control (CAC) Stats
Voice Bandwidth in use(% of config bw)......... 0
Voice Roam Bandwidth in use(% of config bw).... 0
Total channel MT free........................ 0
Total voice MT free.......................... 0
Na Direct.................................... 0
Na Roam...................................... 0
Video Bandwidth in use(% of config bw)......... 0
Video Roam Bandwidth in use(% of config bw).... 0
Total BW in use for Voice(%)................... 0
Total BW in use for SIP Preferred call(%)...... 0
WMM TSPEC CAC Call Stats
Total num of voice calls in progress........... 0
Num of roaming voice calls in progress......... 0
Total Num of voice calls since AP joined....... 0
Total Num of roaming calls since AP joined..... 0
Total Num of exp bw requests received.......... 0
Total Num of exp bw requests admitted.......... 0
Num of voice calls rejected since AP joined.... 0
Num of roam calls rejected since AP joined..... 0
Num of calls rejected due to insufficent bw.... 0
Num of calls rejected due to invalid params.... 0
Num of calls rejected due to PHY rate.......... 0
Num of calls rejected due to QoS policy........ 0
SIP CAC Call Stats
Total Num of calls in progress................. 0
Num of roaming calls in progress............... 0
Total Num of calls since AP joined............. 0
Total Num of roaming calls since AP joined..... 0
Total Num of Preferred calls received.......... 0
Total Num of Preferred calls accepted.......... 0
Total Num of ongoing Preferred calls........... 0
Total Num of calls rejected(Insuff BW)......... 0
Total Num of roam calls rejected(Insuff BW).... 0
WMM Video TSPEC CAC Call Stats
Total num of video calls in progress........... 0
Num of roaming video calls in progress......... 0
Total Num of video calls since AP joined....... 0
Total Num of video roaming calls since AP j.... 0
Num of video calls rejected since AP joined.... 0
Num of video roam calls rejected since AP j.... 0
Num of video calls rejected due to insuffic.... 0
Num of video calls rejected due to invalid .... 0
Num of video calls rejected due to PHY rate.... 0
Num of video calls rejected due to QoS poli.... 0
SIP Video CAC Call Stats
Total Num of video calls in progress........... 0
Num of video roaming calls in progress......... 0
Total Num of video calls since AP joined....... 0
Total Num of video roaming calls since AP j.... 0
Total Num of video calls rejected(Insuff BW.... 0
Total Num of video roam calls rejected(Insu.... 0
Band Select Stats
Num of dual band client ....................... 0
Num of dual band client added.................. 0
Num of dual band client expired ............... 0
Num of dual band client replaced............... 0
Num of dual band client detected .............. 0
Num of suppressed client ...................... 0
Num of suppressed client expired............... 0
Num of suppressed client replaced.............. 0
show ap summary
To display a summary of all
lightweight access points attached to the controller, use the
show ap summary
command.
show ap summary
[
cisco_ap]
Syntax Description
cisco_ap
(Optional) Type sequence of
characters that make up the name of a specific AP or a group of APs, or enter a
wild character search pattern.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
A list that contains each
lightweight access point name, number of slots, manufacturer, MAC address,
location, and the controller port number appears. When you specify
Examples
The following example shows
how to display a summary of all connected access points:
> show ap summary
Number of APs.................................... 2
Global AP username.............................. user
Global AP Dot1x username........................ Not Configured
Number of APs.................................... 2
Global AP username.............................. user
Global AP Dot1x username........................ Not Configured
AP Name Slots AP Model Ethernet MAC Location Port Country Priority
-------- ----- ---------------- ----------------- ---------- ---- ------- --------
wolverine 2 AIR-LAP1252AG-A-K9 00:1b:d5:13:39:74 Reception 1 US 3
ap:1120 1 AIR-LAP1121G-A-K9 00:1b:d5:a9:ad:08 Hall 235 1 US 1
show ap
tcp-mss-adjust
To display the Basic Service
Set Identifier (BSSID) value for each WLAN defined on an access point, use the
show ap
tcp-mss-adjust command.
show ap
tcp-mss-adjust
{
cisco_ap |
all}
Syntax Description
cisco_ap
Specified lightweight access
point name.
all
Specifies all access points.
Note
If an AP itself is configured
with the keyword
all, the all
access points case takes precedence over the AP that is with the keyword
all.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display Transmission Control Protocol (TCP) maximum segment size (MSS)
information of all access points:
> show ap tcp-mss-adjust all
AP Name TCP State MSS Size
------------------ --------- -------
AP-1140 enabled 536
AP-1240 disabled -
AP-1130 disabled -
show ap wlan
To display the Basic Service
Set Identifier (BSSID) value for each WLAN defined on an access point, use the
show ap wlan
command.
show ap wlan
802.11{
a |
b}
cisco_ap
Syntax Description
802.11a
Specifies the 802.11a
network.
802.11b
Specifies the 802.11b/g
network.
ap_name
Lightweight access point
name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display BSSIDs of an access point for the 802.11b network:
> show ap wlan 802.11b AP01
Site Name........................................ MY_AP_GROUP1
Site Description................................. MY_AP_GROUP1
WLAN ID Interface BSSID
------- ----------- --------------------------
1 management 00:1c:0f:81:fc:20
2 dynamic 00:1c:0f:81:fc:21
show auth-list
To display the access point
authorization list, use the
show auth-list
command.
show
auth-list
Syntax Description
This command has no arguments
or keywords.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the access point authorization list:
> show auth-list
Authorize APs against AAA...................... disabled
Allow APs with Self-signed Certificate (SSC)... disabled
Mac Addr Cert Type Key Hash
----------------------- ---------- ------------------------------------------
xx:xx:xx:xx:xx:xx MIC
show client ap
To display the clients on a Cisco lightweight access point, use the show client ap command.
show client ap 802.11{
a |
b}
cisco_ap
Syntax Description
802.11a
Specifies the 802.11a network.
802.11b
Specifies the 802.11b/g network.
cisco_ap
Cisco lightweight access point name.
Command Default
None.
Usage Guidelines
The show client ap command may list the status of automatically disabled clients. Use the show exclusionlist command to view clients on the exclusion list (blacklisted).
Examples
This example shows how to display client information on an access point:
> show client ap 802.11b AP1
MAC Address AP Id Status WLAN Id Authenticated
----------------- ------ ------------- --------- -------------
xx:xx:xx:xx:xx:xx 1 Associated 1 No
Related Commands
show client detail
show client summary
show client username
show country
show exclusionlist
show boot
To display the primary and
backup software build numbers with an indication of which is active, use the
show boot
command.
show
boot
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Each Cisco wireless LAN
controller retains one primary and one backup operating system software load in
nonvolatile RAM to allow controllers to boot off the primary load (default) or
revert to the backup load when desired.
Examples
The following is a sample
output of the
show boot command:
The show call-control ap command is applicable only for SIP based calls.
To see the metrics for successful calls or the traps generated for failed calls, use the show call-control ap command.
show call-control ap {
802.11a |
802.11b}
cisco_ap {
metrics |
traps}
Syntax Description
802.11a
Specifies the 802.11a network
802.11b
Specifies the 802.11b/g network.
cisco_ap
Cisco access point name.
metrics
Specifies the call metrics information.
traps
Specifies the trap information for call control.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
To aid in troubleshooting, the output of this command shows an error code for any failed calls. This table explains the possible error codes for failed calls.
Table 1 Error Codes for Failed VoIP Calls
Error Code
Integer
Description
1
unknown
Unknown error.
400
badRequest
The request could not be understood because of malformed syntax.
401
unauthorized
The request requires user authentication.
402
paymentRequired
Reserved for future use.
403
forbidden
The server understood the request but refuses to fulfill it.
404
notFound
The server has information that the user does not exist at the domain specified in the Request-URI.
405
methodNotallowed
The method specified in the Request-Line is understood but not allowed for the address identified by the Request-URI.
406
notAcceptable
The resource identified by the request is only capable of generating response entities with content characteristics that are not acceptable according to the Accept header field sent in the request.
407
proxyAuthenticationRequired
The client must first authenticate with the proxy.
408
requestTimeout
The server could not produce a response within a suitable amount of time.
409
conflict
The request could not be completed due to a conflict with the current state of the resource.
410
gone
The requested resource is no longer available at the server, and no forwarding address is known.
411
lengthRequired
The server is refusing to process a request because the request entity-body is larger than the server is willing or able to process.
413
requestEntityTooLarge
The server is refusing to process a request because the request entity-body is larger than the server is willing or able to process.
414
requestURITooLarge
The server is refusing to service the request because the Request-URI is longer than the server is willing to interpret.
415
unsupportedMediaType
The server is refusing to service the request because the message body of the request is in a format not supported by the server for the requested method.
420
badExtension
The server did not understand the protocol extension specified in a Proxy-Require or Require header field.
480
temporarilyNotAvailable
The callee’s end system was contacted successfully, but the callee is currently unavailable.
481
callLegDoesNotExist
The UAS received a request that does not match any existing dialog or transaction.
482
loopDetected
The server has detected a loop.
483
tooManyHops
The server received a request that contains a Max-Forwards header field with the value zero.
484
addressIncomplete
The server received a request with a Request-URI that was incomplete.
485
ambiguous
The Request-URI was ambiguous.
486
busy
The callee’s end system was contacted successfully, but the callee is currently not willing or able to take additional calls at this end system.
500
internalServerError
The server encountered an unexpected condition that prevented it from fulfilling the request.
501
notImplemented
The server does not support the functionality required to fulfill the request.
502
badGateway
The server, while acting as a gateway or proxy, received an invalid response from the downstream server it accessed in attempting to fulfill the request.
503
serviceUnavailable
The server is temporarily unable to process the request because of a temporary overloading or maintenance of the server.
504
serverTimeout
The server did not receive a timely response from an external server it accessed in attempting to process the request.
505
versionNotSupported
The server does not support or refuses to support the SIP protocol version that was used in the request.
600
busyEverywhere
The callee’s end system was contacted successfully, but the callee is busy or does not want to take the call at this time.
603
decline
The callee’s machine was contacted successfully, but the user does not want to or cannot participate.
604
doesNotExistAnywhere
The server has information that the user indicated in the Request-URI does not exist anywhere.
606
notAcceptable
The user’s agent was contacted successfully, but some aspects of the session description (such as the requested media, bandwidth, or addressing style) were not acceptable.
Examples
The following is a sample output of the show call-controller ap command that displays successful calls generated for an access point:
(Cisco Controller) >show call-control ap 802.11a Cisco_AP metrics
Total Call Duration in Seconds................... 120
Number of Calls.................................. 10
Number of calls for given client is................. 1
The following is a sample output of the show call-control ap command that displays metrics of traps generated for an AP.
(Cisco Controller) >show call-control ap 802.11a Cisco_AP traps
Number of traps sent in one min.................. 2
Last SIP error code.............................. 404
Last sent trap timestamp...................... Jun 20 10:05:06
show country
To display the configured
country and the radio types that are supported, use the
show country
command.
show country
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the configured countries and supported radio types:
> show country
Configured Country............................. United States
Configured Country Codes
US - United States............................. 802.11a / 802.11b / 802.11g
show country channels
To display the radio channels
supported in the configured country, use the
show country
channels command.
show country channels
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display the auto-RF channels for the configured countries:
> show country channels
Configured Country............................. United States
KEY: * = Channel is legal in this country and may be configured manually.
Configured Country............................. United States
KEY: * = Channel is legal in this country and may be configured manually.
A = Channel is the Auto-RF default in this country.
. = Channel is not legal in this country.
C = Channel has been configured for use by Auto-RF.
x = Channel is available to be configured for use by Auto-RF.
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-
802.11BG :
Channels : 1 1 1 1 1
: 1 2 3 4 5 6 7 8 9 0 1 2 3 4
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-
US : A * * * * A * * * * A . . .
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
802.11A : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Channels : 3 3 3 4 4 4 4 4 5 5 6 6 0 0 0 1 1 2 2 2 3 3 4 4 5 5 6 6
: 4 6 8 0 2 4 6 8 2 6 0 4 0 4 8 2 6 0 4 8 2 6 0 9 3 7 1 5
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
US : . A . A . A . A A A A A * * * * * . . . * * * A A A A *
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
show country
supported
To display a list of the
supported country options, use the
show country
supported command.
show country
supported
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display a list of all the supported countries:
> show country supported
Configured Country............................. United States
Supported Country Codes
AR - Argentina................................. 802.11a / 802.11b / 802.11g
AT - Austria................................... 802.11a / 802.11b / 802.11g
AU - Australia................................. 802.11a / 802.11b / 802.11g
BR - Brazil.................................... 802.11a / 802.11b / 802.11g
BE - Belgium................................... 802.11a / 802.11b / 802.11g
BG - Bulgaria.................................. 802.11a / 802.11b / 802.11g
CA - Canada.................................... 802.11a / 802.11b / 802.11g
CH - Switzerland............................... 802.11a / 802.11b / 802.11g
CL - Chile..................................... 802.11b / 802.11g
CN - China..................................... 802.11a / 802.11b / 802.11g
CO - Colombia.................................. 802.11b / 802.11g
CY - Cyprus.................................... 802.11a / 802.11b / 802.11g
CZ - Czech Republic............................ 802.11a / 802.11b
DE - Germany................................... 802.11a / 802.11b / 802.11g
DK - Denmark................................... 802.11a / 802.11b / 802.11g
EE - Estonia................................... 802.11a / 802.11b / 802.11g
ES - Spain..................................... 802.11a / 802.11b / 802.11g
FI - Finland................................... 802.11a / 802.11b / 802.11g
FR - France.................................... 802.11a / 802.11b / 802.11g
GB - United Kingdom............................ 802.11a / 802.11b / 802.11g
GI - Gibraltar................................. 802.11a / 802.11b / 802.11g
GR - Greece.................................... 802.11a / 802.11b / 802.11g
HK - Hong Kong................................. 802.11a / 802.11b / 802.11g
HU - Hungary................................... 802.11a / 802.11b / 802.11g
ID - Indonesia................................. 802.11b / 802.11g
IE - Ireland................................... 802.11a / 802.11b / 802.11g
IN - India..................................... 802.11a / 802.11b / 802.11g
IL - Israel.................................... 802.11a / 802.11b / 802.11g
ILO - Israel (outdoor).......................... 802.11b / 802.11g
IS - Iceland................................... 802.11a / 802.11b / 802.11g
IT - Italy..................................... 802.11a / 802.11b / 802.11g
JP - Japan (J)................................. 802.11a / 802.11b / 802.11g
J2 - Japan 2(P)................................ 802.11a / 802.11b / 802.11g
J3 - Japan 3(U)................................ 802.11a / 802.11b / 802.11g
KR - Korea Republic (C)........................ 802.11a / 802.11b / 802.11g
KE - Korea Extended (K)........................ 802.11a / 802.11b / 802.11g
LI - Liechtenstein............................. 802.11a / 802.11b / 802.11g
LT - Lithuania................................. 802.11a / 802.11b / 802.11g
LU - Luxembourg................................ 802.11a / 802.11b / 802.11g
LV - Latvia.................................... 802.11a / 802.11b / 802.11g
MC - Monaco.................................... 802.11a / 802.11b / 802.11g
MT - Malta..................................... 802.11a / 802.11b / 802.11g
MX - Mexico.................................... 802.11a / 802.11b / 802.11g
MY - Malaysia.................................. 802.11a / 802.11b / 802.11g
NL - Netherlands............................... 802.11a / 802.11b / 802.11g
NZ - New Zealand............................... 802.11a / 802.11b / 802.11g
NO - Norway.................................... 802.11a / 802.11b / 802.11g
PA - Panama.................................... 802.11b / 802.11g
PE - Peru...................................... 802.11b / 802.11g
PH - Philippines............................... 802.11a / 802.11b / 802.11g
PL - Poland.................................... 802.11a / 802.11b / 802.11g
PT - Portugal.................................. 802.11a / 802.11b / 802.11g
RU - Russian Federation........................ 802.11a / 802.11b / 802.11g
RO - Romania................................... 802.11a / 802.11b / 802.11g
SA - Saudi Arabia.............................. 802.11a / 802.11b / 802.11g
SE - Sweden.................................... 802.11a / 802.11b / 802.11g
SG - Singapore................................. 802.11a / 802.11b / 802.11g
SI - Slovenia.................................. 802.11a / 802.11b / 802.11g
SK - Slovak Republic........................... 802.11a / 802.11b / 802.11g
TH - Thailand.................................. 802.11b / 802.11g
TR - Turkey.................................... 802.11b / 802.11g
TW - Taiwan.................................... 802.11a / 802.11b / 802.11g
UA - Ukraine................................... 802.11a / 802.11b / 802.11g
US - United States............................. 802.11a / 802.11b / 802.11g
USL - United States (Legacy).................... 802.11a / 802.11b / 802.11g
USX - United States (US + chan165).............. 802.11a / 802.11b / 802.11g
VE - Venezuela................................. 802.11b / 802.11g
ZA - South Africa.............................. 802.11a / 802.11b / 802.11g
show dtls connections
To display the Datagram
Transport Layer Security (DTLS) server status, use the
show dtls
connections command.
show dtls connections
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following is a sample
output of the
show dtls connections command.
Device > show dtls connections
AP Name Local Port Peer IP Peer Port Ciphersuite
--------------- ------------- --------------- ------------- -----------------------
1130 Capwap_Ctrl 1.100.163.210 23678 TLS_RSA _WITH_AES_128_CBC_SHA
1130 Capwap_Data 1.100.163.210 23678 TLS_RSA _WITH_AES_128_CBC_SHA
1240 Capwap_Ctrl 1.100.163.209 59674 TLS_RSA _WITH_AES_128_CBC_SHA
show known ap
To display known Cisco
lightweight access point information, use the
show known ap
command.
show known
ap {
summary |
detailed
MAC}
Syntax Description
summary
Displays a list of all known
access points.
detailed
Provides detailed information
for all known access points.
MAC
MAC address of the known AP.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to display a summary of all known access points:
> show known ap summary
MAC Address State # APs # Clients Last Heard
----------- ----------- ----- -------- -----------------
show ipv6 ra-guard
To display the RA guard statistics, use the show ipv6 ra-guard command.
show ipv6 ra-guard {
ap |
wlc}
summary
Syntax Description
ap
Displays Cisco access point details.
wlc
Displays Cisco controller details.
summary
Displays RA guard statistics.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example show the output of the show ipv6 ra-guard ap summary command:
(Cisco Controller) >show ipv6 ra-guard ap summary
IPv6 RA Guard on AP..................... Enabled
RA Dropped per client:
MAC Address AP Name WLAN/GLAN Number of RA Dropped
----------------- ----------------- -------------- ---------------------
00:40:96:b9:4b:89 Bhavik_1130_1_p13 2 19
----------------- ----------------- -------------- ---------------------
Total RA Dropped on AP...................... 19
The following example shows how to display the RA guard statistics for a controller:
(Cisco Controller) >show ipv6 ra-guard wlc summary
IPv6 RA Guard on WLC.................... Enabled
show msglog
To display the message logs
written to the Cisco WLC database, use the
show msglog
command.
show
msglog
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
If there are more that 15
entries, you are prompted to display the messages shown in the example.
Examples
The following example shows
how to display message logs:
> show msglog
Message Log Severity Level..................... ERROR
Thu Aug 4 14:30:08 2005 [ERROR] spam_lrad.c 1540: AP 00:0b:85:18:b6:50 associated. Last AP failure was due to Link Failure
Thu Aug 4 14:30:08 2005 [ERROR] spam_lrad.c 13840: Updating IP info for AP 00:
0b:85:18:b6:50 -- static 0, 1.100.49.240/255.255.255.0, gtw 1.100.49.1
Thu Aug 4 14:29:32 2005 [ERROR] dhcpd.c 78: dhcp server: binding to 0.0.0.0
Thu Aug 4 14:29:32 2005 [ERROR] rrmgroup.c 733: Airewave Director: 802.11a switch group reset
Thu Aug 4 14:29:32 2005 [ERROR] rrmgroup.c 733: Airewave Director: 802.11bg sw
itch group reset
Thu Aug 4 14:29:22 2005 [ERROR] sim.c 2841: Unable to get link state for primary port 0 of interface ap-manager
Thu Aug 4 14:29:22 2005 [ERROR] dtl_l2_dot1q.c 767: Unable to get USP
Thu Aug 4 14:29:22 2005 Previous message occurred 2 times
Thu Aug 4 14:29:14 2005 [CRITICAL] osapi_sem.c 794: Error! osapiMutexTake called with NULL pointer: osapi_bsntime.c:927
Thu Aug 4 14:29:14 2005 [CRITICAL] osapi_sem.c 794: Error! osapiMutexTake called with NULL pointer: osapi_bsntime.c:919
Thu Aug 4 14:29:14 2005 [CRITICAL] hwutils.c 1861: Security Module not found
Thu Aug 4 14:29:13 2005 [CRITICAL] bootos.c 791: Starting code...
show network summary
To display the network configuration of the Cisco wireless LAN controller, use the show network summary command.
show network summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a summary configuration:
> show network summary
RF-Network Name............................. RF
Web Mode.................................... Disable
Secure Web Mode............................. Enable
Secure Web Mode Cipher-Option High.......... Disable
Secure Web Mode Cipher-Option SSLv2......... Disable
Secure Web Mode RC4 Cipher Preference....... Disable
OCSP........................................ Disabled
OCSP responder URL..........................
Secure Shell (ssh).......................... Enable
Telnet...................................... Enable
Ethernet Multicast Mode..................... Disable Mode: Ucast
Ethernet Broadcast Mode..................... Disable
Ethernet Multicast Forwarding............... Disable
Ethernet Broadcast Forwarding............... Disable
AP Multicast/Broadcast Mode................. Unicast
IGMP snooping............................... Disabled
IGMP timeout................................ 60 seconds
IGMP Query Interval......................... 20 seconds
MLD snooping................................ Disabled
MLD timeout................................. 60 seconds
MLD query interval.......................... 20 seconds
User Idle Timeout........................... 300 seconds
AP Join Priority............................ Disable
ARP Idle Timeout............................ 300 seconds
ARP Unicast Mode............................ Disabled
Cisco AP Default Master..................... Disable
Mgmt Via Wireless Interface................. Disable
Mgmt Via Dynamic Interface.................. Disable
Bridge MAC filter Config.................... Enable
Bridge Security Mode........................ EAP
Over The Air Provisioning of AP's........... Enable
Apple Talk ................................. Disable
Mesh Full Sector DFS........................ Enable
AP Fallback ................................ Disable
Web Auth CMCC Support ...................... Disabled
Web Auth Redirect Ports .................... 80
Web Auth Proxy Redirect ................... Disable
Web Auth Captive-Bypass .................. Disable
Web Auth Secure Web ....................... Enable
Fast SSID Change ........................... Disabled
AP Discovery - NAT IP Only ................. Enabled
IP/MAC Addr Binding Check .................. Enabled
CCX-lite status ............................ Disable
oeap-600 dual-rlan-ports ................... Disable
oeap-600 local-network ..................... Enable
mDNS snooping............................... Disabled
mDNS Query Interval......................... 15 minutes
Related Commands
config network
show network multicast mgid summary
show network multicast mgid detail
show network
show redundancy
summary
To display the
redundancy summary information, use the
show
redundancy summary command.
show redundancy summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to display the redundancy summary information of the
controller:
> show redundancy summary
Redundancy Mode = SSO DISABLED
Local State = ACTIVE
Peer State = N/A
Unit = Primary
Unit ID = 88:43:E1:7E:03:80
Redundancy State = N/A
Mobility MAC = 88:43:E1:7E:03:80
Network Monitor = ENABLED
Link Encryption = DISABLED
Redundancy Management IP Address................. 9.4.92.12
Peer Redundancy Management IP Address............ 9.4.92.14
Redundancy Port IP Address....................... 169.254.92.12
Peer Redundancy Port IP Address.................. 169.254.92.14
show redundancy
latency
To display the
average latency to reach the management gateway and the peer redundancy
management IP address, use the
show
redundancy latency
command .
show redundancy latency
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to display the average latency to reach the management
gateway and the peer redundancy management IP address:
To display details of
redundancy and service port IP addresses, use the
show redundancy
interfaces
command.
show redundancy interfaces
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to display the redundancy and service port IP addresses
information:
> show redundancy interfaces
Redundancy Management IP Address................. 9.4.120.5
Peer Redundancy Management IP Address............ 9.4.120.3
Redundancy Port IP Address....................... 169.254.120.5
Peer Redundancy Port IP Address.................. 169.254.120.3
Peer Service Port IP Address..................... 10.104.175.189
show redundancy
mobilitymac
To display the High
Availability (HA) mobility MAC address that is used to communicate with the
peer, use theshow
redundancy mobilitymac command.
show redundancy mobilitymac
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to display the HA mobility MAC address used to communicate
with the peer:
> show redundancy mobilitymac
ff:ff:ff:ff:ff:ff
show redundancy
peer-route summary
To display the
routes assigned to the standby WLC, use the
show redundancy peer-route
summary command.
show redundancy peer-route summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Examples
The following
example shows how to display all the configured routes of the standby WLC:
> show redundancy peer-route summary
Number of Routes................................. 1
Destination Network Netmask Gateway
------------------- ------------------- -------------------
xxx.xxx.xxx.xxx 255.255.255.0 xxx.xxx.xxx.xxx
show redundancy
statistics
To display the statistics
information of the Redundancy Manager, use the
show redundancy
statistics
command.
show redundancy statistics
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
This command
displays the statistics of different redundancy counters.
Local Physical
Ports - Connectivity status of each physical port of the controller. 1
indicates that the port is up and 0 indicates that the port is down.
Peer Physical Ports
- Connectivity status of each physical port of the peer controller. 1 indicates
that the port is up and 0 indicates that the port is down.
Examples
The following
example shows how to display the statistics information of the Redundancy
Manager:
To configure the controller
IP address into the CAPWAP access point from the access point’s console port,
use the
capwap ap controller ip
address command.
capwap ap controller ip
address
controller_ip_address
Syntax Description
controller_ip_address
IP address of the controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco IOS Release 12.3(11)JX1 or later releases.
Examples
The following example shows
how to configure the controller IP address 10.23.90.81 into the CAPWAP access
point:
ap_console >capwap ap controller ip address 10.23.90.81
capwap ap dot1x
To configure the dot1x
username and password into the CAPWAP access point from the access point’s
console port, use the
capwap ap dot1x
command.
capwap ap dot1x username
user_name
password
password
Syntax Description
user_name
Dot1x username.
password
Dot1x password.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
configure the dot1x username ABC and password pass01:
ap_console >capwap ap dot1x username ABC password pass01
capwap ap hostname
To configure the access point
host name from the access point’s console port, use the
capwap ap
hostname command.
capwap ap hostname
host_name
Syntax Description
host_name
Hostname of the access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco IOS Release 12.3(11)JX1 or later releases. This command is
available only for the Cisco Lightweight AP IOS Software recovery image
(rcvk9w8) without any private-config. You can remove the private-config by
using the
clear capwap
private-config command.
Examples
This example shows how to
configure the hostname WLC into the capwap access point:
ap_console >capwap ap hostname WLC
capwap ap ip address
To configure the IP address
into the CAPWAP access point from the access point’s console port, use the
capwap ap ip
address command.
capwap ap ip address
ip_address
Syntax Description
ip_address
IP address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
configure the IP address 10.0.0.1 into CAPWAP access point:
ap_console >capwap ap ip address 10.0.0.1
capwap ap ip
default-gateway
To configure the default
gateway from the access point’s console port, use the
capwap ap ip
default-gateway command.
capwap ap ip default-gateway
default_gateway
Syntax Description
default_gateway
Default gateway address of
the capwap access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
configure the CAPWAP access point with the default gateway address 10.0.0.1:
ap_console >capwap ap ip default-gateway 10.0.0.1
capwap ap log-server
To configure the system log
server to log all the CAPWAP errors, use the
capwap ap
log-server command.
capwap ap log-server
ip_address
Syntax Description
ip_address
IP address of the syslog
server.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
configure the syslog server with the IP address 10.0.0.1:
ap_console >capwap ap log-server 10.0.0.1
capwap ap
primary-base
To configure the primary
controller name and IP address into the CAPWAP access point from the access
point’s console port, use the
capwap ap
primary-base command.
capwap ap primary-base
controller_name
controller_ip_address
Syntax Description
controller_name
Name of the primary
controller.
controller_ip_address
IP address of the primary
controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
configure the primary controller name WLC1 and primary controller IP address
209.165.200.225 into the CAPWAP access point:
ap_console >capwap ap primary-base WLC1 209.165.200.225
capwap ap
primed-timer
To configure the primed timer
into the CAPWAP access point, use the
capwap ap
primed-timer command.
capwap ap
primed-timer
{
enable
|
disable}
Syntax Description
enable
Enables the primed timer
settings
disable
Disables the primed timer
settings.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
enable the primed-timer settings:
ap_console >capwap ap primed-timer enable
capwap ap
secondary-base
To configure the name and IP
address of the secondary Cisco WLC into the CAPWAP access point from the access
point’s console port, use the
capwap ap
secondary-base command.
capwap ap secondary-base
controller_name
controller_ip_address
Syntax Description
controller_name
Name of the secondary Cisco
WLC.
controller_ip_address
IP address of the secondary
Cisco WLC.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
configure the secondary Cisco WLC name as WLC2 and secondary Cisco WLC IP
address 209.165.200.226 into the CAPWAP access point:
ap_console >capwap ap secondary-base WLC2 209.165.200.226
capwap ap
tertiary-base
To configure the name and IP
address of the tertiary Cisco WLC into the CAPWAP access point from the access
point’s console port, use the
capwap ap
tertiary-base command.
capwap ap tertiary-base
controller_name
controller_ip_address
Syntax Description
controller_name
Name of the tertiary Cisco
WLC.
controller_ip_address
IP address of the tertiary
Cisco WLC.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Note
The access point must be
running Cisco IOS Release 12.3(11)JX1 or later releases.
Examples
This example shows how to
configure the tertiary Cisco WLC with the name WLC3 and secondary Cisco WLC IP
address 209.165.200.227 into the CAPWAP access point:
ap_console >capwap ap tertiary-base WLC3 209.165.200.227
lwapp ap controller ip
address
To configure the Cisco WLC IP
address into the FlexConnect access point from the access point’s console port,
use the
lwapp ap controller ip
address command.
lwapp ap
controller ip address
ip_address
Syntax Description
ip_address
IP address of the controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
This command must be entered
from an access point’s console port.
Prior to changing the
FlexConnect configuration on an access point using the access point’s console
port, the access point must be in standalone mode (not connected to a
controller) and you must remove the current LWAPP private configuration by
using the
clear lwapp
private-config command.
Note
The access point must be
running Cisco IOS Release 12.3(11)JX1 or higher releases.
Examples
The following example shows
how to configure the controller IP address 10.92.109.1 into the FlexConnect
access point:
> lwapp ap controller ip address 10.92.109.1
config Commands
This section lists the config commands to configure access points.
To configure the external
antenna gain for the 4.9-GHz and 5.8-GHz public safety channels on an access
point, use the
config 802.11-a antenna
extAntGain commands.
To configure the channel
properties for the 4.9-GHz and 5.8-GHz public safety channels on an access
point, use the
config 802.11-a channel
ap command.
config {
802.11-a49 |
802.11-a58}
channel ap
cisco_ap
{
global |
channel_no}
Syntax Description
802.11-a49
Specifies the 4.9-GHz public
safety channel.
802.11-a58
Specifies the 5.8-GHz public
safety channel.
cisco_ap
Name of the access point to
which the command applies.
global
Enables the Dynamic Channel
Assignment (DCA) on all 4.9-GHz and 5.8-GHz subband radios.
channel_no
Custom channel for a specific
mesh access point. The range is 1 through 26, inclusive, for a 4.9-GHz band and
149 through 165, inclusive, for a 5.8-GHz band.
Command Default
Channel properties are
disabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set the channel properties:
(Cisco Controller) >config 802.11-a channel ap
config 802.11-a txpower
ap
To configure the transmission
power properties for the 4.9-GHz and 5.8-GHz public safety channels on an
access point, use the
config 802.11-a txpower
ap command.
config {
802.11-a49 |
802.11-a58}
txpower ap
cisco_ap
{
global |
power_level}
Syntax Description
802.11-a49
Specifies the 4.9-GHz public
safety channel.
802.11-a58
Specifies the 5.8-GHz public
safety channel.
txpower
Configures transmission power
properties.
ap
Configures access point
channel settings.
cisco_ap
Name of the access point to
which the command applies.
global
Applies the transmission
power value to all channels.
power_level
Transmission power value to
the designated mesh access point. The range is from 1 to 5.
Command Default
The default transmission
power properties for the 4.9-GHz and 5.8-GHz public safety channels on an
access point is disabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure an 802.11-a49 transmission power level of 4 for AP1:
(Cisco Controller) >config 802.11-a txpower ap 4 AP1
config 802.11 antenna
diversity
To configure the diversity
option for 802.11 antennas, use the
config 802.11 antenna
diversity command.
The following example shows
how to enable diversity for AP01 on an 802.11a network, using an external
antenna connected to the Cisco lightweight access point left port (sideA):
To configure the Cisco
lightweight access point to use one internal antenna for an 802.11 sectorized
180-degree coverage pattern or both internal antennas for an 802.11 360-degree
omnidirectional pattern, use the
config 802.11 antenna
mode command.
config
802.11{
a |
b}
antenna mode {
omni |
sectorA |
sectorB}
cisco_ap
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
omni
Specifies to use both
internal antennas.
sectorA
Specifies to use only the
side A internal antenna.
sectorB
Specifies to use only the
side B internal antenna.
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure access point AP01 antennas for a 360-degree omnidirectional
pattern on an 802.11b network:
(Cisco Controller) >config 802.11 antenna mode omni AP01
config 802.11 antenna
selection
To select the internal or
external antenna selection for a Cisco lightweight access point on an 802.11
network, use the
config 802.11 antenna
selection command.
To enable or disable
Beamforming (ClientLink) on the network or on individual radios, enter the
config 802.11
beamforming command.
config
802.11{
a |
b}
beamforming {
global |
ap ap_name} {
enable |
disable}
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
global
Specifies all lightweight
access points.
apap_name
Specifies the Cisco access
point name.
enable
Enables beamforming.
disable
Disables beamforming.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
When you enable Beamforming
on the network, it is automatically enabled for all the radios applicable to
that network type.
Follow these guidelines for
using Beamforming:
Beamforming is supported only
for legacy orthogonal frequency-division multiplexing (OFDM) data rates (6, 9,
12, 18, 24, 36, 48, and 54 mbps).
Note
Beamforming is not supported
for complementary-code keying (CCK) data rates (1, 2, 5.5, and 11 Mbps).
Beamforming is supported only
on access points that support 802.11n (AP1250 and AP1140).
Two or more antennas must be
enabled for transmission.
All three antennas must be
enabled for reception.
OFDM rates must be enabled.
If the antenna configuration
restricts operation to a single transmit antenna, or if OFDM rates are
disabled, Beamforming is not used.
Examples
The following example shows
how to enable Beamforming on the 802.11a network:
(Cisco Controller) >config 802.11 beamforming global enable
config 802.11 disable
To disable radio transmission
for an entire 802.11 network or for an individual Cisco radio, use the
config 802.11
disable command.
config
802.11{
a |
b}
disable
{
network |
cisco_ap}
Syntax Description
a
Configures the 802.11a
on slot 1 and 802.11ac radio
on slot 2. radio.
b
Specifies the 802.11b/g
network.
network
Disables transmission for the
entire 802.11a network.
cisco_ap
Individual Cisco lightweight
access point radio.
Command Default
The transmission is enabled
for the entire network by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You must use this command
to disable the network before using many config 802.11 commands.
This command can be used
any time that the CLI interface is active.
Examples
The following example shows
how to disable the entire 802.11a network:
To turn customizing on or off
for an 802.11a Cisco lightweight access point performance profile, use the
config advanced 802.11
profile customize command.
config advanced
802.11{
a |
b}
profile customize
cisco_ap
{
on |
off}
Syntax Description
a
Specifies the 802.11a/n
network.
b
Specifies the 802.11b/g/n
network.
cisco_ap
Cisco lightweight access
point.
on
Customizes performance
profiles for this Cisco lightweight access point.
off
Uses global default
performance profiles for this Cisco lightweight access point.
Command Default
The default state of
performance profile customization is Off.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to turn performance profile customization on for 802.11a Cisco lightweight
access point AP1:
(Cisco Controller) >config advanced 802.11 profile customize AP1 on
config advanced 802.11
profile foreign
To set the foreign 802.11a
transmitter interference threshold between 0 and 100 percent, use the
config advanced 802.11
profile foreign command.
config advanced
802.11{
a |
b}
profile foreign {
global |
cisco_ap}
percent
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
global
Configures all 802.11a Cisco
lightweight access points.
cisco_ap
Cisco lightweight access
point name.
percent
802.11a foreign 802.11a
interference threshold between 0 and 100 percent.
Command Default
The default foreign 802.11a
transmitter interference threshold value is 10.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set the foreign 802.11a transmitter interference threshold for all Cisco
lightweight access points to 50 percent:
(Cisco Controller) >config advanced 802.11a profile foreign global 50
The following example shows
how to set the foreign 802.11a transmitter interference threshold for AP1 to 0
percent:
To set the Cisco lightweight
access point data-rate throughput threshold between 1000 and 10000000 bytes per
second, use the
config advanced 802.11
profile throughput command.
config advanced
802.11{
a |
b}
profile throughput {
global |
cisco_ap}
value
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
global
Configures all 802.11a Cisco
lightweight access point specific profiles.
cisco_ap
Cisco lightweight access
point name.
value
802.11a Cisco lightweight
access point throughput threshold between 1000 and 10000000 bytes per second.
Command Default
The default Cisco lightweight
access point data-rate throughput threshold value is 1,000,000 bytes per
second.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set all Cisco lightweight access point data-rate thresholds to 1000
bytes per second:
(Cisco Controller) >config advanced 802.11 profile throughput global 1000
The following example shows
how to set the AP1 data-rate threshold to 10000000 bytes per second:
To set the RF utilization
threshold between 0 and 100 percent, use the
config advanced 802.11
profile utilization command. The operating system generates a
trap when this threshold is exceeded.
config advanced
802.11{
a |
b}
profile utilization {
global |
cisco_ap}
percent
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
global
Configures a global Cisco
lightweight access point specific profile.
cisco_ap
Cisco lightweight access
point name.
percent
802.11a RF utilization
threshold between 0 and 100 percent.
Command Default
The default RF utilization
threshold value is 80 percent.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set the RF utilization threshold for all Cisco lightweight access points
to 0 percent:
(Cisco Controller) >config advanced 802.11 profile utilization global 0
The following example shows
how to set the RF utilization threshold for AP1 to 100 percent:
To configure the rate at
which access point radios send association and authentication requests to the
controller, use the
config advanced
assoc-limit command.
config advanced
assoc-limit
{
enable [
number of associations per interval |
interval
] |
disable}
Syntax Description
enable
Enables the configuration of
the association requests per access point.
disable
Disables the configuration of
the association requests per access point.
number of
associations per interval
(Optional) Number of
association request per access point slot in a given interval. The range is
from 1 to 100.
interval
(Optional) Association
request limit interval. The range is from 100 to 10000 milliseconds.
Command Default
The default state of the
command is disabled state.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
When 200 or more wireless
clients try to associate to a controller at the same time, the clients no
longer become stuck in the DHCP_REQD state when you use the
config advanced
assoc-limit command to limit association requests from access
points.
Examples
The following example shows
how to configure the number of association requests per access point slot in a
given interval of 20 with the association request limit interval of 250:
To limit the number of probes
sent to the WLAN controller per access point per client in a given interval,
use the
config advanced probe
limit command.
config advanced
probe limit
num_probes
interval
Syntax Description
num_probes
Number of probe requests
(from 1 to 100) forwarded to the controller per client per access point radio
in a given interval.
interval
Probe limit interval (from
100 to 10000 milliseconds).
Command Default
The default number of probe
requests is 2. The default interval is 500 milliseconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
This example shows how to set
the number of probes per access point per client to 5 and the probe interval to
800 milliseconds:
Configures the Cisco
lightweight access point discovery timeout value.
discovery-timeout
Cisco lightweight access
point discovery timeout value, in seconds. The range is from 1 to 10.
ap-fast-heartbeat
Configures the fast heartbeat
timer, which reduces the amount of time it takes to detect a controller failure
in access points.
local
Configures the fast heartbeat
interval for access points in local mode.
flexconnect
Configures the fast heartbeat
interval for access points in FlexConnect mode.
all
Configures the fast heartbeat
interval for all the access points.
enable
Enables the fast heartbeat
interval.
disable
Disables the fast heartbeat
interval.
fast_heartbeat_seconds
Small heartbeat interval,
which reduces the amount of time it takes to detect a controller failure, in
seconds. The range is from 1 to 10.
ap-heartbeat-timeout
Configures Cisco
lightweight access point heartbeat timeout value.
heartbeat_seconds
Cisco the Cisco lightweight
access point heartbeat timeout value, in seconds. The range is from 1 to 30.
This value should be at least three times larger than the fast heartbeat timer.
ap-primary-discovery-timeout
Configures the access point
primary discovery request timer.
primary_discovery_timeout
Access point primary
discovery request time, in seconds. The range is from 30 to 3600.
ap-primed-join-timeout
Configures the access point
primed discovery timeout value.
primed_join_timeout
Access point primed
discovery timeout value, in seconds. The range is from 120 to 43200.
auth-timeout
Configures the
authentication timeout.
auth_timeout
Authentication response
timeout value, in seconds. The range is from 10 to 600.
pkt-fwd-watchdog
Configures the packet
forwarding watchdog timer to protect from fastpath deadlock.
watchdog_timer
Packet forwarding watchdog
timer, in seconds. The range is from 60 to 300.
default
Configures the watchdog
timer to the default value of 240 seconds.
eap-identity-request-delay
Configures the advanced
Extensible Authentication Protocol (EAP) identity request delay, in seconds.
eap_identity_request_delay
Advanced EAP identity
request delay, in seconds. The range is from 0 to 10.
eap-timeout
Configures the EAP
expiration timeout.
eap_timeout
EAP timeout value, in
seconds. The range is from 8 to 120.
Command Default
The default access
point discovery timeout is 10 seconds.
The default access point
heartbeat timeout is 30 seconds.
The default access point
primary discovery request timer is 120 seconds.
The default authentication
timeout is 10 seconds.
The default packet
forwarding watchdog timer is 240 seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access
point discovery timeout indicates how often a Cisco WLC attempts to discover
unconnected Cisco lightweight access points.
The Cisco
lightweight access point heartbeat timeout controls how often the Cisco
lightweight access point sends a heartbeat keepalive signal to the Cisco
Wireless LAN Controller.
Examples
The following example shows
how to configure an access point discovery timeout with a timeout value of 20:
To configure a Cisco
lightweight access point or to add or delete a third-party (foreign) access
point, use the
config ap
command.
config
ap {{
enable |
disable}
cisco_ap | {
add
|
delete}
MAC port
{
enable |
disable}
IP_address}
Syntax Description
enable
Enables the Cisco lightweight
access point.
disable
Disables the Cisco
lightweight access point.
cisco_ap
Name of the Cisco lightweight
access point.
add
Adds foreign access points.
delete
Deletes foreign access
points.
MAC
MAC address of a foreign
access point.
port
Port number through which the
foreign access point can be reached.
IP_address
IP address of the foreign
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to disable lightweight access point AP1:
(Cisco Controller) >config ap disable AP1
The following example shows
how to add a foreign access point with MAC address 12:12:12:12:12:12 and IP
address 192.12.12.1 from port 2033:
(Cisco Controller) >config ap add 12:12:12:12:12:12 2033 enable 192.12.12.1
config ap autoconvert
To automatically convert all
access points to FlexConnect mode or Monitor mode upon associating with the
Cisco WLC, use the
config ap
autoconvert command.
config ap
autoconvert
{
flexconnect
|
monitor |
disable}
Syntax Description
flexconnect
Configures all the access
points automatically to FlexConnect mode.
monitor
Configures all the access
points automatically to monitor mode.
disable
Disables the autoconvert
option on the access points.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
When access points in local
mode connect to a Cisco 7500 Series Wireless Controller, they do not serve
clients. The access point details are available in the controller. To enable
access points to serve clients or perform monitoring related tasks when
connected to the Cisco 7500 Series Wireless Controller, the access points must
be in FlexConnect mode or Monitor mode.
Examples
The following example shows
how to automatically convert all access points to the FlexConnect mode:
(Cisco Controller) >config ap autoconvert flexconnect
The following example shows
how to disable the autoconvert option on the APs:
(Cisco Controller) >config ap autoconvert disable
config ap bhrate
To configure the Cisco bridge
backhaul Tx rate, use the
config ap
bhrate command.
config ap
bhrate {
rate |
auto}
cisco_ap
Syntax Description
rate
Cisco bridge backhaul Tx rate
in kbps. The valid values are 6000, 12000, 18000, 24000, 36000, 48000, and
54000.
auto
Configures the auto data
rate.
cisco_ap
Name of a Cisco lightweight
access point.
Command Default
The default status of the
command is set to Auto.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
In previous software
releases, the default value for the bridge data rate was 24000 (24 Mbps).
In controller software release 6.0, the default value for the bridge data rate
is
auto. If you configured the default bridge data
rate value (24000) in a previous controller software release, the bridge data
rate is configured with the new default value (auto) when you upgrade to
controller software release 6.0. However, if you configured a non default value
(for example, 18000) in a previous controller software release, that
configuration setting is preserved when you upgrade to Cisco WLC Release 6.0.
When the bridge data rate is
set to
auto, the mesh backhaul chooses the highest rate
where the next higher rate cannot be used due to unsuitable conditions for that
specific rate (and not because of conditions that affect all rates).
Examples
The following example shows
how to configure the Cisco bridge backhaul Tx rate to 54000 kbps:
(Cisco Controller) >config ap bhrate 54000 AP01
config ap
bridgegroupname
To set or delete a bridge
group name on a Cisco lightweight access point, use the
config ap
bridgegroupname command.
config ap
bridgegroupname
{
set
groupname |
delete}
cisco_ap
Syntax Description
set
Sets a Cisco lightweight
access point’s bridge group name.
groupname
Bridge group name.
delete
Deletes a Cisco lightweight
access point’s bridge group name.
cisco_ap
Name of a Cisco lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Only access points with the
same bridge group name can connect to each other. Changing the AP
bridgegroupname may strand the bridge AP.
Examples
The following example shows
how to delete a bridge group name on Cisco access point’s bridge group name
AP02:
(Cisco Controller) >config ap bridgegroupname delete AP02
Changing the AP's bridgegroupname may strand the bridge AP. Please continue with caution.
Changing the AP's bridgegroupname will also cause the AP to reboot.
Are you sure you want to continue? (y/n)
config ap bridging
To configure
Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the
config ap
bridging command.
config ap
bridging
{
enable |
disable}
cisco_ap
Syntax Description
enable
Enables the
Ethernet-to-Ethernet bridging on a Cisco lightweight access point.
disable
Disables Ethernet-to-Ethernet
bridging.
cisco_ap
Name of a Cisco lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to enable bridging on an access point:
(Cisco Controller) >config ap bridging enable nyc04-44-1240
The following example shows
hot to disable bridging on an access point:
(Cisco Controller) >config ap bridging disable nyc04-44-1240
config ap cdp
To configure the Cisco
Discovery Protocol (CDP) on a Cisco lightweight access point, use the
config ap cdp
command.
If an AP itself is configured
with the keyword
all, the all
access points case takes precedence over the AP that is with the keyword
all.
Command Default
Enabled on radio interfaces of mesh APs and disabled on radio
interfaces of non-mesh APs. Enabled on Ethernet interfaces of all APs.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The
config ap cdp disable
all command disables CDP on all access points that are joined to
the controller and all access points that join in the future. CDP remains
disabled on both current and future access points even after the controller or
access point reboots. To enable CDP, enter the
config ap cdp enable all command.
Note
CDP over Ethernet/radio
interfaces is available only when CDP is enabled. After you enable CDP on all
access points joined to the controller, you may disable and then reenable CDP
on individual access points using the
config ap cdp
{enable |
disable}
cisco_ap
command. After you disable CDP on all access points joined to the
controller, you may not enable and then disable CDP on individual access
points.
Examples
The following example shows
how to enable CDP on all access points:
(Cisco Controller) >config ap cdp enable all
The following example shows
how to disable CDP on ap02 access point:
(Cisco Controller) >config ap cdp disable ap02
The following example shows
how to enable CDP for Ethernet interface number 2 on all access points:
(Cisco Controller) >config ap cdp ethernet 2 enable all
config ap core-dump
To configure a Cisco
lightweight access point’s memory core dump, use the
config ap
core-dump command.
Enables the Cisco lightweight
access point’s memory core dump setting.
disable
Disables the Cisco
lightweight access point’s memory core dump setting.
tftp_server_ipaddress
IP address of the TFTP server
to which the access point sends core dump files.
filename
Name that the access point
uses to label the core file.
compress
Compresses the core dump
file.
uncompress
Uncompresses the core dump
file.
cisco_ap
Name of a Cisco lightweight
access point.
all
Specifies all access points.
Note
If an AP itself is configured
with the name ‘all’, then the ‘all access points’ case takes precedence over
the AP that is named ‘all’.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The access point must be able
to reach the TFTP server.
Examples
The following example shows
how to configure and compress the core dump file:
(Cisco Controller) >config ap core-dump enable 209.165.200.225 log compress AP02
config ap crash-file
clear-all
To delete all crash and radio
core dump files, use the
config ap crash-file
clear-all command.
config ap
crash-file clear-all
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to delete all crash files:
(Cisco Controller) >config ap crash-file clear-all
config ap crash-file
delete
To delete a single crash or
radio core dump file, use the
config ap crash-file
delete command.
config ap
crash-file delete
filename
Syntax Description
filename
Name of the file to delete.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to delete crash file 1:
(Cisco Controller) >config ap crash-file delete crash_file_1
config ap crash-file
get-crash-file
To collect the latest crash
data for a Cisco lightweight access point, use the
config ap crash-file
get-crash-file command.
config ap
crash-file get-crash-file
cisco_ap
Syntax Description
cisco_ap
Name of the Cisco lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Use the
transfer upload
datatype command to transfer the collected data to the Cisco
wireless LAN controller.
Examples
The following example shows
how to collect the latest crash data for access point AP3:
(Cisco Controller) >config ap crash-file get-crash-file AP3
config ap crash-file
get-radio-core-dump
To get a Cisco lightweight
access point’s radio core dump, use the
config ap crash-fileget-radio-core-dump command.
config ap
crash-file get-radio-core-dump
slot_id
cisco_ap
Syntax Description
slot_id
Slot ID (either 0 or 1).
cisco_ap
Name of a Cisco lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to collect the radio core dump for access point AP02 and slot 0:
(Cisco Controller) >config ap crash-file get-radio-core-dump 0 AP02
config ap 802.1Xuser
To configure the global authentication username and password for
all access points currently associated with the controller as well as any
access points that associate with the controller in the future, use the
config ap
802.1Xuser command.
config ap
802.1Xuser
add usernameap-usernamepasswordap-password
{
all |
cisco_ap}
Syntax Description
add
username
Specifies to add a username.
ap-username
Username on the Cisco AP.
password
Specifies to add a password.
ap-password
Password.
cisco_ap
Specific access point.
all
Specifies all access points.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You must enter a strong
password. Strong passwords have the following
characteristics:
They are at least eight
characters long.
They contain a combination of
uppercase and lowercase letters, numbers, and symbols.
They are not a word in any
language.
You can set the values for a
specific access point.
Examples
This example shows how to
configure the global authentication username and password for all access
points:
(Cisco Controller) >config ap 802.1Xuser add username cisco123 password cisco2020 all
config ap 802.1Xuser
delete
To force a specific access
point to use the controller’s global authentication settings, use the
config ap 802.1Xuser
delete command.
config ap
802.1Xuser
delete
cisco_ap
Syntax Description
cisco_ap
Access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to delete access point AP01 to use the controller’s global authentication
settings:
(Cisco Controller) >config ap 802.1Xuser delete AP01
config ap 802.1Xuser
disable
To disable authentication for all access points or for a
specific access point, use the
config ap 802.1Xuser
disable command.
config ap 802.1Xuser disable
{
all
|
cisco_ap}
Syntax Description
disable
Disables authentication.
all
Specifies all access points.
cisco_ap
Access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You can disable 802.1X
authentication for a specific access point only if global 802.1X authentication
is not enabled. If global 802.1X authentication is enabled, you can disable
802.1X for all access points only.
Examples
The following example shows
how to disable the authentication for access point cisco_ap1:
(Cisco Controller) >config ap 802.1Xuser disable
config ap ethernet
duplex
To configure the Ethernet
port duplex and speed settings of the lightweight access points, use the
config ap ethernet
duplex command.
config ap ethernet duplex
[
auto
|
half
|
full]
speed
[
auto
|
10
|
100
|
1000] {
all
|
cisco_ap}
Syntax Description
auto
(Optional) Specifies the
Ethernet port duplex auto settings.
half
(Optional) Specifies the
Ethernet port duplex half settings.
full
(Optional) Specifies the
Ethernet port duplex full settings.
speed
Specifies the Ethernet port
speed settings.
auto
(Optional) Specifies the
Ethernet port speed to auto.
10
(Optional) Specifies the
Ethernet port speed to 10 Mbps.
100
(Optional) Specifies the
Ethernet port speed to 100 Mbps.
1000
(Optional) Specifies the
Ethernet port speed to 1000 Mbps.
all
Specifies the Ethernet port
setting for all connected access points.
cisco_ap
Cisco access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the Ethernet port duplex half settings as 10 Mbps for all
access points:
(Cisco Controller) >config ap ethernet duplex half speed 10 all
config ap ethernet
duplex
To configure the Ethernet
port duplex and speed settings of the lightweight access points, use the
config ap ethernet
duplex command.
config ap ethernet duplex
[
auto
|
half
|
full]
speed
[
auto
|
10
|
100
|
1000] {
all
|
cisco_ap}
Syntax Description
auto
(Optional) Specifies the
Ethernet port duplex auto settings.
half
(Optional) Specifies the
Ethernet port duplex half settings.
full
(Optional) Specifies the
Ethernet port duplex full settings.
speed
Specifies the Ethernet port
speed settings.
auto
(Optional) Specifies the
Ethernet port speed to auto.
10
(Optional) Specifies the
Ethernet port speed to 10 Mbps.
100
(Optional) Specifies the
Ethernet port speed to 100 Mbps.
1000
(Optional) Specifies the
Ethernet port speed to 1000 Mbps.
all
Specifies the Ethernet port
setting for all connected access points.
cisco_ap
Cisco access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the Ethernet port duplex half settings as 10 Mbps for all
access points:
(Cisco Controller) >config ap ethernet duplex half speed 10 all
config ap ethernet
tag
To configure VLAN
tagging of the Control and Provisioning of Wireless Access Points protocol
(CAPWAP) packets, use the
config ap ethernet tag
command.
config ap ethernet tag
{
id
vlan_id
|
disable}
{
cisco_ap
|
all}
Syntax Description
id
Specifies
the VLAN id.
vlan_id
ID of the
trunk VLAN.
disable
Disables
the VLAN tag feature. When you disable VLAN tagging, the access point untags
the CAPWAP packets.
cisco_ap
Name of the
Cisco AP.
all
Configures
VLAN tagging on all the Cisco access points.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
After you configure
VLAN tagging, the configuration comes into effect only after the access point
reboots.
You cannot configure
VLAN tagging on mesh access points.
If the access point
is unable to route traffic or reach the controller using the specified trunk
VLAN, it falls back to the untagged configuration. If the access point joins
the controller using this fallback configuration, the controller sends a trap
to a trap server such as the Cisco Prime Infrastructure, which indicates the
failure of the trunk VLAN. In this scenario, the "Failover to untagged" message
appears in show command output.
Examples
The following
example shows how to configure VLAN tagging on a trunk VLAN:
(Cisco Controller) >config ap ethernet tag 6 AP1
config ap group-name
To specify a descriptive
group name for a Cisco lightweight access point, use the
config ap
group-name command.
config ap
group-name
groupname
cisco_ap
Syntax Description
groupname
Descriptive name for the
access point group.
cisco_ap
Name of the Cisco lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access
point must be disabled before changing this parameter.
Examples
The following example shows
how to configure a descriptive name for access point AP01:
(Cisco Controller) >config ap group-name superusers AP01
config ap
hotspot
To configure HotSpot
parameters on an access point, use the
config ap hotspot
command.
config ap hotspot
venue
{
type
group_code
type_code
|
name
{
add
language_code
venue_name
|
delete}}
cisco_ap
Syntax Description
venue
Configures venue information
for given AP group.
type
Configures the type of venue
for given AP group.
group_code
Venue group
information for given AP group.
The
following options are available:
0—UNSPECIFIED
1—ASSEMBLY
2—BUSINESS
3—EDUCATIONAL
4—FACTORY-INDUSTRIAL
5—INSTITUTIONAL
6—MERCANTILE
7—RESIDENTIAL
8—STORAGE
9—UTILITY-MISC
10—VEHICULAR
11—OUTDOOR
type_code
Venue type information for
the AP group.
For venue group 1 (ASSEMBLY),
the following options are available:
0—UNSPECIFIED ASSEMBLY
1—ARENA
2—STADIUM
3—PASSENGER TERMINAL
4—AMPHITHEATER
5—AMUSEMENT PARK
6—PLACE
OF WORSHIP
7—CONVENTION CENTER
8—LIBRARY
9—MUSEUM
10—RESTAURANT
11—THEATER
12—BAR
13—COFFEE SHOP
14—ZOO
OR AQUARIUM
15—EMERGENCY COORDINATION CENTER
For venue
group 2 (BUSINESS), the following options are available:
0—UNSPECIFIED BUSINESS
1—DOCTOR OR DENTIST OFFICE
2—BANK
3—FIRE STATION
4—POLICE STATION
6—POST
OFFICE
7—PROFESSIONAL OFFICE
8—RESEARCH AND DEVELOPMENT FACILITY
9—ATTORNEY OFFICE
For venue
group 3 (EDUCATIONAL), the following options are available:
0—UNSPECIFIED EDUCATIONAL
1—PRIMARY SCHOOL
2—SECONDARY SCHOOL
3—UNIVERSITY OR COLLEGE
For venue
group 4 (FACTORY-INDUSTRIAL), the following options are available:
0—UNSPECIFIED FACTORY AND INDUSTRIAL
1—FACTORY
For venue
group 5 (INSTITUTIONAL), the following options are available:
0—UNSPECIFIED INSTITUTIONAL
1—HOSPITAL
2—LONG-TERM CARE FACILITY
3—ALCOHOL AND DRUG RE-HABILITATION CENTER
4—GROUP HOME
5
:PRISON OR JAIL
type_code
For venue
group 6 (MERCANTILE), the following options are available:
0—UNSPECIFIED MERCANTILE
1—RETAIL STORE
2—GROCERY MARKET
3—AUTOMOTIVE SERVICE STATION
4—SHOPPING MALL
5—GAS
STATION
For venue
group 7 (RESIDENTIAL), the following options are available:
0—UNSPECIFIED RESIDENTIAL
1—PRIVATE RESIDENCE
2—HOTEL OR MOTEL
3—DORMITORY
4—BOARDING HOUSE
For venue
group 8 (STORAGE), the option is:
0—UNSPECIFIED STORAGE
For venue
group 9 (UTILITY-MISC), the option is:
0—UNSPECIFIED UTILITY AND MISCELLANEOUS
For venue
group 10 (VEHICULAR), the following options are available:
0—UNSPECIFIED VEHICULAR
1—AUTOMOBILE OR TRUCK
2—AIRPLANE
3—BUS
4—FERRY
5—SHIP
OR BOAT
6—TRAIN
7—MOTOR BIKE
For venue
group 11 (OUTDOOR), the following options are available:
0—UNSPECIFIED OUTDOOR
1—MINI-MESH NETWORK
2—CITY PARK
3—REST AREA
4—TRAFFIC CONTROL
5—BUS
STOP
6—KIOSK
name
Configures the name of
venue for this access point.
language_code
ISO-639 encoded string
defining the language used at the venue. This string is a three-character
language code. For example, you can enter ENG for English.
venue_name
Venue name for this access
point. This name is associated with the basic service set (BSS) and is used in
cases where the SSID does not provide enough information about the venue. The
venue name is case sensitive and can be up to 252 alphanumeric characters.
add
Adds the HotSpot venue name
for this access point.
delete
Deletes the HotSpot venue
name for this access point.
cisco_ap
Name of the Cisco access
point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to configure the venue group as educational and venue type as
university:
(Cisco Controller) >config ap hotspot venue type 3 3
config ap image
predownload
To configure an image on a
specified access point, use the
config ap image predownload
command.
Configure the flashing of LEDs for an access point.
seconds
Duration that the LEDs have to flash. The range is from 1 to
3600 seconds.
indefinite
Configures indefinite flashing of the access point’s LED.
dual-band
Configures the LED state for all dual-band access points.
Usage Guidelines
Note
If an AP itself is configured
with the keyword
all, the all
access points case takes precedence over the AP that is with the keyword
all.
LEDs on access points with
dual-band radio module will flash green and blue when you execute the led state
flash command.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to enable the LED state for an access point:
(Cisco Controller) >config ap led-state enable AP02
The following example shows how to enable the flashing of LEDs
for dual-band access points:
(Cisco Controller) >config ap led-state flash 20 dual-band
config ap link-encryption
To configure the Datagram Transport Layer Security (DTLS) data encryption for access points on the 5500 series controller, use the config ap link-encryption command.
Note
If an AP itself is configured with the keyword all, the all access
points case takes precedence over the AP that is with the keyword
all.
Enables the DTLS data encryption for access points.
disable
Disables the DTLS data encryption for access points.
cisco_ap
Name of a Cisco lightweight access point.
all
Specifies all access points.
Command Default
DTLS data encryption is enabled automatically for OfficeExtend access points but disabled by default for all other access points.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Only Cisco 5500 Series Controllers support DTLS data encryption. This feature is not available on other controller platforms. If an access point with data encryption enabled tries to join any other controller, the access point joins the controller, but data packets are sent unencrypted.
Only Cisco 1130, 1140, 1240, and 1250 series access points support DTLS data encryption, and data-encrypted access points can join a Cisco 5500 Series Controller only if the wplus license is installed on the controller. If the wplus license is not installed, the access points cannot join the controller.
Examples
The following example shows how to enable the data encryption for an access point:
(Cisco Controller) >config ap link-encryption enable AP02
config ap link-latency
To configure link latency for a specific access point or for all access points currently associated to the controller, use the config ap link-latency command:
Note
If an AP itself is configured with the keyword all, the all access
points case takes precedence over the AP that is with the keyword
all.
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
This command enables or disables link latency only for access points that are currently joined to the controller. It does not apply to access points that join in the future.
Examples
The following example shows how to enable the link latency for all access points:
(Cisco Controller) >config ap link-latency enable all
config ap location
To modify the descriptive location of a Cisco lightweight access point, use the config ap location command.
config ap location location cisco_ap
Syntax Description
location
Location name of the access point (enclosed by double quotation marks).
cisco_ap
Name of the Cisco lightweight access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access point must be disabled before changing this parameter.
Examples
The following example shows how to configure the descriptive location for access point AP1:
(Cisco Controller) >config ap location “Building 1” AP1
config ap logging syslog level
To set the severity level for filtering syslog messages for a particular access point or for all access points, use the config ap logging syslog level command.
config ap logging syslog level severity_level {
cisco_ap |
all}
Syntax Description
severity_level
Severity levels are as follows:
emergencies—Severity level 0
alerts—Severity level 1
critical—Severity level 2
errors—Severity level 3
warnings—Severity level 4
notifications—Severity level 5
informational—Severity level 6
debugging—Severity level 7
cisco_ap
Cisco access point.
all
Specifies all access points.
Note
If an AP itself is configured with the keyword all, the all access
points case takes precedence over the AP that is with the keyword
all.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
If you set a syslog level, only those messages whose severity is equal to or less than that level are sent to the access point. For example, if you set the syslog level to Warnings (severity level 4), only those messages whose severity is between 0 and 4 are sent to the access point.
Examples
This example shows how to set the severity for filtering syslog messages to 3:
(Cisco Controller) >config ap logging syslog level 3
config ap
max-count
To configure the
maximum number of access points supported by the Cisco Wireless LAN Controller
(WLC), use the
config ap max-count
command.
config ap max-count number
Syntax Description
number
Number of
access points supported by the Cisco WLC.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The access point
count of the Cisco WLC license overrides this count if the configured value is
greater than the access point count of the license. A value of 0 indicates that
there is no restriction on the maximum number of access points. If high
availability is configured, you must reboot both the active and the standby
Cisco WLCs after you configure the maximum number of access points supported by
the Cisco WLC.
Examples
The following
example shows how to configure the number of access points supported by the
Cisco WLC:
(Cisco Controller) >config ap max-count 100
config ap mgmtuser
add
To configure
username, password, and secret password for AP management, use the config ap
mgmtuser add
command.
config ap
mgmtuser add
username
AP_username
password
AP_password
secret
secret {
all
|
cisco_ap}
Syntax Description
username
Configures the username for
AP management.
AP_username
Management username.
password
Configures the password for
AP management.
AP_password
AP management password.
secret
Configures the secret
password for privileged AP management.
secret
AP managemetn secret
password.
all
Applies configuration to
every AP that does not have a specific username.
cisco_ap
Cisco access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
The following requirements
are enforced on the password:
The password should contain
characters from at least three of the following classes: lowercase letters,
uppercase letters, digits, and special characters.
No character in the password
can be repeated more than three times consecutively.
The password sould not
contain management username or reverse of usename.
The password should not
contain words like Cisco, oscic, admin, nimda or any variant obtained by
changing the capitalization of letters by substituting 1, |, or ! or
substituting 0 for o or substituting $ for s.
The following requirement is
enforced on the secret password:
The secret password should
contain characters from at least three of the following classes: lowercase
letters, uppercase letters, digits, or special characters.
Examples
The following example shows
how to add a username, password, and secret password for AP management:
> config ap mgmtuser add username acd password Arc_1234 secret Mid_45 all
config ap mgmtuser
delete
To force a specific access
point to use the controller’s global credentials, use the
config ap mgmtuser
delete command.
config ap
mgmtuser delete
cisco_ap
Syntax Description
cisco_ap
Access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to delete the credentials of an access point:
> config ap mgmtuser delete cisco_ap1
config ap mode
To change a Cisco WLC
communication option for an individual Cisco lightweight access point, use the
config ap mode
command.
Converts from a lightweight
access point to a mesh access point (bridge mode).
flexconnect
Enables FlexConnect mode on
an access point.
local
Converts from an indoor mesh
access point (MAP or RAP) to a nonmesh lightweight access point (local mode).
reap
Enables remote edge access
point mode on an access point.
rogue
Enables wired rogue detector
mode on an access point.
sniffer
Enables wireless sniffer mode
on an access point.
se-connect
Enables spectrum expert mode
on an access point.
submode
(Optional) Configures wIPS
submode on an access point.
none
Disables the wIPS on an
access point.
wips
Enables the wIPS submode on
an access point.
cisco_ap
Name of the Cisco lightweight
access point.
Command Default
Local
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
The sniffer mode captures and
forwards all the packets from the clients on that channel to a remote machine
that runs AiroPeek or other supported packet analyzer software. It includes
information on the timestamp, signal strength, packet size and so on.
Examples
The following example shows
how to set the controller to communicate with access point AP91 in bridge mode:
> config ap mode bridge AP91
The following example shows
how to set the controller to communicate with access point AP01 in local mode:
> config ap mode local AP01
The following example shows
how to set the controller to communicate with access point AP91 in remote
office (REAP) mode:
> config ap mode flexconnect AP91
The following example shows
how to set the controller to communicate with access point AP91 in a wired
rogue access point detector mode:
> config ap mode rogue AP91
The following example shows
how to set the controller to communicate with access point AP02 in wireless
sniffer mode:
> config ap mode sniffer AP02
config ap
monitor-mode
To configure Cisco
lightweight access point channel optimization, use the
config ap
monitor-mode command.
config ap packet-dump
classifier
{{
arp
|
broadcast
|
control |
data
|
dot1x |
iapp
|
ip |
management |
multicast }
{
enable
|
disable} |
tcp
{
enable
|
disable
|
port
tcp_port
} |
udp
{
enable
|
disable
|
port
udp_port
}
}
Syntax Description
buffer-size
Configures
the buffer size for Packet Capture in the access point.
size
Size of the
buffer. The range is from 1024 to 4096 KB.
capture-time
Configures
the timer value for Packet Capture.
time
Timer
value for Packet Capture. The range is from 1 to 60 minutes.
ftp
Configures
FTP parameters for Packet Capture.
serveripserver_ip
Configures
the FTP server IP address.
path
path
Configures
FTP server path.
username
user_ID
Configures
the username for the FTP server.
password
password
Configures
the password for the FTP server.
start
Starts
Packet Capture from the access point.
mac_address
Client MAC
Address for Packet Capture.
cisco_ap
Name of
the Cisco access point.
stop
Stops
Packet Capture from the access point.
truncate
Truncates
the packet to the specified length during Packet Capture.
length
Length of
the packet after truncation. The range is from 20 to 1500.
classifier
Configures
the classifier information for Packet Capture. You can specify the type of
packets that needs to be captured.
arp
Captures
ARP packets.
enable
Enables
capture of ARP, broadcast, 802.11 control, 802.11 data, dot1x, Inter Access
Point Protocol (IAPP), IP, 802.11 management, or multicast packets.
disable
Disables
capture of ARP, broadcast, 802.11 control, 802.11 data, dot1x, IAPP, IP,
802.11management, or multicast packets.
broadcast
Captures
broadcast packets.
control
Captures
802.11 control packets.
data
Captures
802.11 data packets.
dot1x
Captures
dot1x packets.
iapp
Captures
IAPP packets.
ip
Captures
IP packets.
management
Captures
802.11 management packets.
multicast
Captures
multicast packets.
tcp
Captures
TCP packets.
tcp_port
TCP port
number. The range is from 1 to 65535.
udp
Captures
TCP packets.
udp_port
UDP port
number. The range is from 1 to 65535.
ftp
Configures
FTP parameters for Packet Capture.
server_ip
FTP server
IP address.
Command Default
The default buffer
size is 2 MB. The default capture time is 10 minutes.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
Packet Capture
does not work during intercontroller roaming.
The controller
does not capture packets created in the radio firmware and sent out of the
access point, such as a beacon or probe response. Only packets that flow
through the Radio driver in the Tx path will be captured.
Use the command
config ap packet-dump
start to start the Packet Capture from the access point. When you
start Packet Capture, the controller sends a Control and Provisioning of
Wireless Access Points protocol (CAPWAP) message to the access point to which
the client is associated and captures packets. You must configure the FTP
server and ensure that the client is associated to the access point before you
start Packet Capture. If the client is not associated to the access point, you
must specify the name of the access point.
Examples
The following
example shows how to start Packet Capture from an access point:
> config ap packet-dump start 00:0d:28:f4:c0:45 AP1
The following
example shows how to capture 802.11 control packets from an access point:
> config ap packet-dump classifier control enable
config ap port
To configure the port for a
foreign access point, use the
config ap port
command.
config ap port
MAC
port
Syntax Description
MAC
Foreign access point MAC
address.
port
Port number for accessing the
foreign access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure the port for a foreign access point MAC address:
> config ap port 12:12:12:12:12:12 20
config ap power
injector
To configure the power
injector state for an access point, use the
config ap power
injector command.
config ap power
injector
{
enable |
disable} {
cisco_ap |
all} {
installed |
override |
switch_MAC}
Syntax Description
enable
Enables the power injector
state for an access point.
disable
Disables the power injector
state for an access point.
cisco_ap
Name of the Cisco lightweight
access point.
all
Specifies all Cisco
lightweight access points connected to the controller.
installed
Detects the MAC address of
the current switch port that has a power injector.
override
Overrides the safety checks
and assumes a power injector is always installed.
switch_MAC
MAC address of the switch
port with an installed power injector.
Note
If an AP itself is configured
with the keyword
all, the all
access points case takes precedence over the AP that is with the keyword
all.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the power injector state for all access points:
> config ap power injector enable all 12:12:12:12:12:12
config ap power
pre-standard
To enable or disable the
inline power Cisco pre-standard switch state for an access point, use the
config ap power
pre-standard command.
config ap power
pre-standard
{
enable |
disable}
cisco_ap
Syntax Description
enable
Enables the inline power
Cisco pre-standard switch state for an access point.
disable
Disables the inline power
Cisco pre-standard switch state for an access point.
cisco_ap
Name of the Cisco lightweight
access point.
Command Default
Disabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the inline power Cisco pre-standard switch state for access point
AP02:
> config ap power pre-standard enable AP02
config ap
primary-base
To set the Cisco lightweight
access point primary Cisco WLC, use the
config ap
primary-base command.
config ap
primary-base
controller_name
cisco_ap
[
controller_ip_address]
Syntax Description
controller_name
Name of the Cisco WLC.
cisco_ap
Cisco lightweight access
point name.
controller_ip_address
(Optional) If the backup
controller is outside the mobility group to which the access point is
connected, then you need to provide the IP address of the primary, secondary,
or tertiary controller.
Note
For OfficeExtend access
points, you must enter both the name and IP address of the controller.
Otherwise, the access point cannot join this controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access
point associates with this Cisco WLC for all network operations and in the
event of a hardware reset.
OfficeExtend access points do
not use the generic broadcast or over-the air (OTAP) discovery process to find
a controller. You must configure one or more controllers because OfficeExtend
access points try to connect only to their configured controllers.
Examples
The following example shows
how to set an access point primary Cisco WLC:
> config ap primary-base SW_1 AP2
config ap priority
To assign a priority
designation to an access point that allows it to reauthenticate after a
controller failure by priority rather than on a first-come-until-full basis,
use the
config ap
priority command.
config ap
priority
{
1 |
2
|
3 |
4}
cisco_ap
Syntax Description
1
Specifies low priority.
2
Specifies medium priority.
3
Specifies high priority.
4
Specifies the highest
(critical) priority.
cisco_ap
Cisco lightweight access
point name.
Command Default
1 - Low priority.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
In a failover situation, if
the backup controller does not have enough ports to allow all the access points
in the affected area to reauthenticate, it gives priority to higher-priority
access points over lower-priority ones, even if it means replacing
lower-priority access points.
Examples
The following example shows
how to assign a priority designation to access point AP02 that allows it to
reauthenticate after a controller failure by assigning a reauthentication
priority 3:
> config ap priority 3 AP02
config ap
reporting-period
To reset a Cisco lightweight
access point, use the
config ap reporting-period
command.
config ap
reporting-period
period
Syntax Description
period
Time period in seconds
between 10 and 120.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to reset an access point reporting period to 120 seconds:
> config ap reporting-period 120
config ap reset
To reset a Cisco lightweight
access point, use the
config ap reset
command.
config ap reset
cisco_ap
Syntax Description
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to reset an access point:
> config ap reset AP2
config ap retransmit
interval
To configure the access point
control packet retransmission interval, use the
config ap retransmit
interval command.
config ap
retransmit interval
seconds
{
all
|
cisco_ap}
Syntax Description
seconds
AP control packet
retransmission timeout between 2 and 5 seconds.
all
Specifies all access points.
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure the retransmission interval for all access points globally:
> config ap retransmit interval 4 all
config ap retransmit
count
To configure the access point
control packet retransmission count, use the
config ap retransmit
count command.
config ap
retransmit count
count
{
all
|
cisco_ap}
Syntax Description
count
Number of times control
packet will be retransmitted. The range is from 3 to 8.
all
Specifies all access points.
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure the retransmission retry count for a specific access point:
> config ap retransmit count 6 cisco_ap
config ap role
To specify the role of an
access point in a mesh network, use the
config ap role
command.
config ap
role {
rootAP |
meshAP}
cisco_ap
Syntax Description
rootAP
Designates the mesh access
point as a root access point (RAP).
meshAP
Designates the mesh access
point as a mesh access point (MAP).
cisco_ap
Name of the Cisco lightweight
access point.
Command Default
meshAP.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
Use the
meshAP keyword if the access point has a wireless
connection to the controller, or use the
rootAP keyword if the access point has a wired
connection to the controller. If you change the role of the AP, the AP will be
rebooted.
Examples
The following example shows
how to designate mesh access point AP02 as a root access point:
> config ap role rootAP AP02
Changing the AP's role will cause the AP to reboot.
Are you sure you want to continue? (y/n)
config ap rst-button
To configure the Reset button
for an access point, use the
config ap
rst-button command.
config ap
rst-button
{
enable |
disable}
cisco_ap
Syntax Description
enable
Enables the Reset button for
an access point.
disable
Disables the Reset button for
an access point.
cisco_ap
Name of the Cisco lightweight
access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure the Reset button for access point AP03:
> config ap rst-button enable AP03
config ap
secondary-base
To set the Cisco lightweight
access point secondary Cisco WLC, use the
config ap
secondary-base command.
config ap
secondary-base
controller_name
cisco_ap
[
controller_ip_address]
Syntax Description
controller_name
Name of the Cisco WLC.
cisco_ap
Cisco lightweight access
point name.
controller_ip_address
(Optional). If the backup
Cisco WLC is outside the mobility group to which the access point is connected,
then you need to provide the IP address of the primary, secondary, or tertiary
Cisco WLC.
Note
For OfficeExtend access
points, you must enter both the name and IP address of the Cisco WLC.
Otherwise, the access point cannot join this Cisco WLC.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access
point associates with this Cisco WLC for all network operations and in the
event of a hardware reset.
OfficeExtend access points do
not use the generic broadcast or over-the air (OTAP) discovery process to find
a Cisco WLC. You must configure one or more Cisco WLCs because OfficeExtend
access points try to connect only to their configured Cisco WLCs.
Examples
The following example shows
how to set an access point secondary Cisco WLC:
> config ap secondary-base SW_1 AP2
config ap sniff
To enable or disable sniffing
on an access point, use the
config ap sniff
command.
IP address of
the remote machine running Omnipeek, Airopeek,AirMagnet, or Wireshark software.
disable
Disables sniffing on an
access point.
cisco_ap
Access point configured as
the sniffer.
Command Default
Channel 36.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
When the sniffer feature is
enabled on an access point, it starts sniffing the signal on the given channel.
It captures and forwards all the packets to the remote computer that runs
Omnipeek, Airopeek, AirMagnet, or Wireshark software. It includes information
on the timestamp, signal strength, packet size and so on.
Before an access point can
act as a sniffer, a remote computer that runs one of the listed packet
analyzers must be set up so that it can receive packets sent by the access
point. After the Airopeek installation, copy the following .dll files to the
location where airopeek is installed:
socket.dll file to the
Plug-ins folder (for example, C:\Program Files\WildPackets\AiroPeek\Plugins)
socketres.dll file to the
PluginRes folder (for example, C:\Program Files\WildPackets\AiroPeek\
1033\PluginRes)
Examples
The following example shows
how to enable the sniffing on the 802.11a an access point from the primary
Cisco WLC:
> config ap sniff 80211a enable 23 11.22.44.55 AP01
config ap ssh
To enable Secure Shell (SSH)
connectivity on an access point, use the
config ap ssh
command.
config ap ssh
{
enable |
disable}
cisco_ap
Syntax Description
enable
Enables the SSH connectivity
on an access point.
disable
Disables the SSH connectivity
on an access point.
cisco_ap
Cisco access point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access
point associates with this Cisco wireless LAN controller for all network
operation and in the event of a hardware reset.
Examples
The following example shows
how to enable SSH connectivity on access point Cisco_ap2:
> config ap ssh enable cisco_ap2
config ap static-ip
To configure Cisco
lightweight access point static IP address settings, use the
config ap
static-ip command.
Enables the Cisco lightweight
access point static IP address.
disable
Disables the Cisco
lightweight access point static IP address. The access point uses DHCP to get
the IP address.
cisco_ap
Cisco lightweight access
point name.
ip_address
Cisco lightweight access
point IP address
net_mask
Cisco lightweight access
point network mask.
gateway
IP address of the Cisco
lightweight access point gateway.
add
Adds a domain or DNS server.
domain
Specifies the domain to which
a specific access point or all access points belong.
all
Specifies all access points.
domain_name
Specifies a domain name.
nameserver
Specifies a DNS server so
that a specific access point or all access points can discover the controller
using DNS resolution.
dns_ip_address
DNS server IP address.
delete
Deletes a domain or DNS
server.
Note
If an AP itself is
configured with the keyword
all, the
all access points case takes precedence over the AP that is with the keyword
all.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
An access point cannot
discover the controller using Domain Name System (DNS) resolution if a static
IP address is configured for the access point, unless you specify a DNS server
and the domain to which the access point belongs.
After you enter the IP,
netmask, and gateway addresses, save your configuration to reboot the access
point. After the access point rejoins the controller, you can enter the domain
and DNS server information.
Examples
The following example shows
how to configure an access point static IP address:
> config ap static-ip enable AP2 1.1.1.1 255.255.255.0 209.165.200.254
config ap stats-timer
To set the time in seconds
that the Cisco lightweight access point sends its DOT11 statistics to the Cisco
wireless LAN controller, use the
config ap
stats-timer command.
config ap
stats-timer
period
cisco_ap
Syntax Description
period
Time in seconds from 0 to
65535. A zero value disables the timer.
cisco_ap
Cisco lightweight access
point name.
Command Default
The default value is 0
(disabled state).
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
A value of 0 (zero) means
that the Cisco lightweight access point does not send any DOT11 statistics. The
acceptable range for the timer is from 0 to 65535 seconds, and the Cisco
lightweight access point must be disabled to set this value.
Examples
The following example shows
how to set the stats timer to 600 seconds for access point AP2:
> config ap stats-timer 600 AP2
config ap syslog host
global
To configure a global syslog
server for all access points that join the controller, use the
config ap syslog host
global command.
config ap syslog
host global
syslog_server_IP_address
Syntax Description
syslog_server_IP_address
IP address of the syslog
server.
Command Default
The default value of the IP
address of the syslog server is 255.255.255.255.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
By default, the global syslog
server IP address for all access points is 255.255.255.255. Make sure that the
access points can reach the subnet on which the syslog server resides before
configuring the syslog server on the controller. If the access points cannot
reach this subnet, the access points are unable to send out syslog messages.
Examples
The following example shows
how to configure a global syslog server for all access points:
> config ap syslog host global 255.255.255.255
config ap syslog host
specific
To configure a syslog server
for a specific access point, use the
config ap syslog host
specific command.
config ap syslog
host specific
cisco_ap
syslog_server_IP_address
Syntax Description
cisco_ap
Cisco lightweight access
point.
syslog_server_IP_address
IP address of the syslog
server.
Command Default
The default value of the
syslog server IP address is 0.0.0.0.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
By default, the syslog server
IP address for each access point is 0.0.0.0, indicating that it is not yet set.
When the default value is used, the global access point syslog server IP
address is pushed to the access point.
Examples
The following example shows
how to configure a syslog server:
> config ap syslog host specific 0.0.0.0
config ap
tcp-mss-adjust
To enable or disable the TCP
maximum segment size (MSS) on a particular access point or on all access
points, use the
config ap
tcp-mss-adjust command.
Enables the TCP maximum
segment size on an access point.
disable
Disables the TCP maximum
segment size on an access point.
cisco_ap
Cisco access point name.
all
Specifies all access points.
size
Maximum segment size, from
536 to 1363 bytes.
Note
If an AP itself is configured
with the keyword
all, the all
access points case takes precedence over the AP that is with the keyword
all.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Usage Guidelines
When you enable this feature,
the access point checks for TCP packets to and from wireless clients in its
data path. If the MSS of these packets is greater than the value that you
configured or greater than the default value for the CAPWAP tunnel, the access
point changes the MSS to the new configured value.
Examples
This example shows how to
enable the TCP MSS on access point cisco_ap1 with a segment size of 1200 bytes:
> config ap tcp-mss-adjust enable cisco_ap1 1200
config ap telnet
To enable Telnet connectivity
on an access point, use the
config ap
telnet command.
config ap telnet
{
enable |
disable}
cisco_ap
Syntax Description
enable
Enables the Telnet
connectivity on an access point.
disable
Disables the Telnet
connectivity on an access point.
cisco_ap
Cisco access point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access
point associates with this Cisco wireless LAN controller for all network
operation and in the event of a hardware reset.
Examples
The following example shows
how to enable Telnet connectivity on access point cisco_ap1:
> config ap telnet enable cisco_ap1
The following example shows
how to disable Telnet connectivity on access point cisco_ap1:
> config ap telnet disable cisco_ap1
config ap
tertiary-base
To set the Cisco lightweight
access point tertiary Cisco WLC, use the
config ap
tertiary-base command.
config ap
tertiary-base
controller_name
cisco_ap
[
controller_ip_address]
Syntax Description
controller_name
Name of the Cisco WLC.
cisco_ap
Cisco lightweight access
point name.
controller_ip_address
(Optional) If the backup
controller is outside the mobility group to which the access point is
connected, then you need to provide the IP address of the primary, secondary,
or tertiary Cisco WLC.
Note
For OfficeExtend access
points, you must enter both the name and IP address of the Cisco WLC.
Otherwise, the access point cannot join this Cisco WLC.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
OfficeExtend access points do
not use the generic broadcast or over-the air (OTAP) discovery process to find
a Cisco WLC. You must configure one or more controllers because OfficeExtend
access points try to connect only to their configured Cisco WLCs.
The Cisco lightweight access
point associates with this Cisco WLC for all network operations and in the
event of a hardware reset.
Examples
This example shows how to set
the access point tertiary Cisco WLC:
> config ap tertiary-base SW_1 AP02
config ap
tftp-downgrade
To configure the settings
used for downgrading a lightweight access point to an autonomous access point,
use the
config ap
ftp-downgrade command.
config ap
tftp-downgrade
{
tftp_ip_address |
image_filename |
ap_name}
Syntax Description
tftp_ip_address
IP address of the TFTP
server.
image_filename
Filename of the access point
image file on the TFTP server.
ap_name
Access point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure the settings for downgrading access point ap1240_102301:
> config ap ftp-downgrade 209.165.200.224 1238.tar ap1240_102301
config ap username
To assign a username and
password to access either a specific access point or all access points, use the
config ap
username command.
config ap username
user_id
password
passwd
[
all |
ap_name]
Syntax Description
user_id
Administrator username.
passwd
Administrator password.
all
(Optional) Specifies all
access points.
ap_name
Name of a specific access
point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to assign a username and password to a specific access point:
> config ap username jack password blue la204
The following example shows
how to assign the same username and password to a all access points:
> config ap username jack password blue all
config ap venue
To configure the venue
information for 802.11u network on an access point, use the
config ap venue
command.
Venue group category. See the
table below for details on venue group mappings.
venue_type
Venue type. This value
depends on the venue-group specified. See the table below for venue group
mappings.
lang_code
Language used. An
ISO-14962-1997 encoded string that defines the language. This string is a three
character language code. Enter the first three letters of the language in
English (for example, eng for English).
cisco_ap
Name of the access point.
deletes
Deletes venue information.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to set the venue details for an access point named cisco-ap1:
> config ap venue add test 11 34 eng cisco-ap1
This table lists
the different venue types for each venue group.
Enables the wireless LAN
override on an access point.
disable
Disables the wireless LAN
override on an access point.
802.11a
Specifies the 802.11a
network.
802.11b
Specifies the 802.11b
network.
wlan_id
Cisco wireless LAN controller
ID assigned to a wireless LAN.
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable wireless LAN override on the AP03 802.11a radio:
> config ap wlan 802.11a AP03
config country
To configure the controller’s
country code, use the
config country
command.
config country
country_code
Syntax Description
country_code
Two-letter or three-letter
country code.
Command Default
us
(country code of the United States of America).
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Usage Guidelines
Cisco WLCs must be installed
by a network administrator or qualified IT professional and the installer must
select the proper country code. Following installation, access to the unit
should be password protected by the installer to maintain compliance with
regulatory requirements and to ensure proper unit functionality. See the
related product guide for the most recent country codes and regulatory domains.
You can use the
show country
command to display a list of supported countries.
Examples
The following example shows
how to configure the controller’s country code to DE:
(Cisco Controller) >config country DE
config ipv6 ra-guard
To configure the filter for Router Advertisement (RA) packets that originate from a client on an AP, use the config ipv6 ra-guard command.
config ipv6 ra-guard ap {
enable |
disable}
Syntax Description
enable
Enables RA guard on an AP.
disable
Disables RA guard on an AP.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows how to enable IPv6 RA guard:
(Cisco Controller) >config ipv6 ra-guard
config known ap
To configure a known Cisco
lightweight access point, use the
config known ap
command.
config known
ap {
add
|
alert |
delete}
MAC
Syntax Description
add
Adds a new known access point
entry.
alert
Generates a trap upon
detection of the access point.
delete
Deletes an existing known
access point entry.
MAC
MAC address of the known
Cisco lightweight access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Examples
The following example shows
how to add a new access point entry ac:10:02:72:2f:bf on a known access point:
(Cisco Controller) >config known ap add ac:10:02:72:2f:bf 12
config network
allow-old-bridge-aps
To configure an old bridge
access point’s ability to associate with a switch, use the
config network
allow-old-bridge-aps command.
Enables use of both NAT IP
and non NAT IP in discovery response.
Command Default
The use of NAT IP only in
discovery response is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
If the
config interface nat-address
management command is set, this command controls which
address(es) are sent in the CAPWAP discovery responses.
If all APs are on
the outside of the NAT gateway of the controller, enter the
config network ap-discovery
nat-ip-only enable command, and only the management NAT address
is sent.
If the controller
has both APs on the outside and the inside of its NAT gateway, enter the
config network ap-discovery
nat-ip-only disable command, and both the management NAT address
and the management inside address are sent. Ensure that you have entered the
config ap link-latency
disable all command to avoid stranding APs.
Examples
The following
example shows how to enable NAT IP in an AP discovery response:
> config network ap-discovery nat-ip-only enable
config network
ap-fallback
To configure Cisco
lightweight access point fallback, use the
config network
ap-fallback command.
config network
ap-fallback
{
enable |
disable}
Syntax Description
enable
Enables the Cisco lightweight
access point fallback.
disable
Disables the Cisco
lightweight access point fallback.
Command Default
The Cisco lightweight access
point fallback is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the Cisco lightweight access point fallback:
> config network ap-fallback enable
config network
ap-priority
To enable or disable the
option to prioritize lightweight access points so that after a controller
failure they reauthenticate by priority rather than on a first-come-until-full
basis, use the
config network
ap-priority command.
config network
ap-priority
{
enable |
disable}
Syntax Description
enable
Enables the lightweight
access point priority reauthentication.
disable
Disables the lightweight
access point priority reauthentication.
Command Default
The lightweight access point
priority reauthentication is disabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the lightweight access point priority reauthorization:
> config network ap-priority enable
config network
apple-talk
To configure AppleTalk
bridging, use the
config network
apple-talk command.
config network
apple-talk
{
enable |
disable}
Syntax Description
enable
Enables the AppleTalk
bridging.
disable
Disables the AppleTalk
bridging.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure AppleTalk bridging:
> config network apple-talk enable
config network
bridging-shared-secret
To configure the bridging
shared secret, use the
config network
bridging-shared-secret command.
To enable or disable the
Cisco wireless LAN controller as an access point default master, use the
config network
master-base command.
config network
master-base
{
enable |
disable}
Syntax Description
enable
Enables the Cisco wireless
LAN controller acting as a Cisco lightweight access point default master.
disable
Disables the Cisco wireless
LAN controller acting as a Cisco lightweight access point default master.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
This setting is only used
upon network installation and should be disabled after the initial network
configuration. Because the Master Cisco wireless LAN controller is normally not
used in a deployed network, the Master Cisco wireless LAN controller setting
can be saved from 6.0.199.0 or later releases.
Examples
The following example shows
how to enable the Cisco wireless LAN controller as a default master:
To configure the Ethernet
port 3 of Cisco OfficeExtend 600 Series access points to operate as a remote
LAN port in addition to port 4, use the
config network oeap-600 dual-rlan-ports command.
This command was introduced
in a release earlier than Release 7.6.
Usage Guidelines
You can configure this command only from the Active controller.
For the HA feature, the service port configurations are made per controller.
You will loose these configurations if you change the mode from HA to non-HA
and vice-versa.
Examples
The following
example shows how to configure the service port IP and netmask of the peer or
standby controller:
Deletes a
network route specific to standby controller.
network_ip_address
Network IP
address.
netmask
Subnet mask
of the network.
gateway
IP address
of the gateway for the route network.
Command Default
None
Command History
Release
Modification
7.6
This command was
introduced in a release earlier than Release 7.6.
Usage Guidelines
You can configure
this command only from the Active controller. For the HA feature, the service
port configurations are made per controller. You will lose these configurations
if you change the mode from HA to non-HA and vice-versa.
Examples
The following
example shows how to configure route configurations of a peer or standby
controller.
To configure a Cisco
WLC as a primary or secondary WLC, use the
config
redundancy unit command.
config redundancy unit
{
primary
|
secondary}
Syntax Description
primary
Configures
the Cisco WLC as the primary WLC.
secondary
Configures
the Cisco WLC as the secondary WLC.
Command Default
The default state is
as the primary WLC.
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Usage Guidelines
When you configure a
Cisco WLC as the secondary WLC, it becomes the HA Stakable Unit (SKU) without
any valid AP licenses.
Examples
The following
example shows how to configure a Cisco WLC as the primary WLC:
(Cisco Controller) >config redundancy unit primary
redundancy
force-switchover
To trigger a manual
switch over on the active Cisco WLC, use theredundancy
force-switchovercommand.
redundancy force-switchover
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Usage Guidelines
When a manual
switchover occurs, the active Cisco WLC reboots and the standby Cisco WLC takes
over the network. A stateful switchover of access points (AP SSO) is supported.
AP SSO ensures that the AP sessions are maintained after the standby Cisco WLC
takes over and the APs switch over to the standby Cisco WLC. The clients on the
active Cisco WLC deauthenticate and join the new active Cisco WLC.
Examples
The following
example shows how to trigger a forceful switchover on the Cisco WLC:
(Cisco Controller) >redundancy force-switchover
config slot
To configure various slot
parameters, use the
config slot
command.
Slot downlink radio to which
the channel is assigned.
Beginning in Release 7.5 and
later releases, you can configure 802.11a on slot 1 and 802.11ac on slot
2.
enable
Enables the slot.
disable
Disables the slot.
channel
Configures the channel for
the slot.
ap
Configures one 802.11a Cisco
access point.
chan_width
Configures channel width for
the slot.
txpower
Configures Tx power for the
slot.
antenna
Configures the 802.11a
antenna.
extAntGain
Configures the 802.11a
external antenna gain.
antenna_gain
External antenna gain value
in .5 dBi units (such as 2.5 dBi = 5).
rts
Configures RTS/CTS for an
access point.
cisco_ap
Name of the Cisco access
point on which the channel is configured.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to enable slot 3 for the access point abc:
(Cisco Controller) >config slot 3 enable abc
The following example shows
how to configure RTS for the access point abc:
(Cisco Controller) >config slot 2 rts abc
config wgb vlan
To configure the Workgroup
Bridge (WGB) VLAN client support, use the
config wgb vlan command.
config wgb
vlan {
enable |
disable}
Syntax Description
enable
Enables wired clients behind
a WGB to connect to an anchor controller in a Data Management Zone (DMZ).
disable
Disables wired clients behind
a WGB from connecting to an anchor controller in a DMZ.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Examples
The following example shows
how to enable WGB VLAN client support:
(Cisco Controller) >config wgb vlan enable
clear Commands
This section lists the clear commands to clear existing configurations, log files, and other functions for access points
.
To clear (reset to the
default values) a lightweight access point’s configuration settings, use the
clear ap config
command.
clear ap config
ap_name
Syntax Description
ap_name
Access point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Entering this
command does not clear the static IP address of the access point.
Examples
The following example shows
how to clear the access point’s configuration settings for the access point
named ap1240_322115:
(Cisco Controller) >clear ap config ap1240_322115
Clear ap-config will clear ap config and reboot the AP. Are you sure you want continue? (y/n)
clear ap eventlog
To delete the existing event
log and create an empty event log file for a specific access point or for all
access points joined to the controller, use the
clear ap
eventlog command.
clear ap eventlog
{
specific
ap_name |
all}
Syntax Description
specific
Specifies a specific access
point log file.
ap_name
Name of the access point for
which the event log file will be emptied.
all
Deletes the event log for all
access points joined to the controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to delete the event log for all access points:
(Cisco Controller) >clear ap eventlog all
This will clear event log contents for all APs. Do you want continue? (y/n) :y
Any AP event log contents have been successfully cleared.
clear ap join stats
To clear the join statistics
for all access points or for a specific access point, use the
clear ap join
stats command.
clear ap join
stats {
all
|
ap_mac}
Syntax Description
all
Specifies all access points.
ap_mac
Access point MAC address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the join statistics of all the access points:
(Cisco Controller) >clear ap join stats all
clear ap tsm
To clear the Traffic
Stream Metrics (TSM) statistics of clients associated to an access point, use
the
clear ap tsm
command.
clear ap tsm {
802.11a |
802.11b}
cisco_ap
all
Syntax Description
802.11a
Clears
802.11a TSM statistics of clients associated to an access point.
802.11b
Clears
802.11b TSM statistics of clients associated to an access point.
cisco_ap
Cisco
lightweight access point.
all
Clears TSM
statistics of clients associated to the access point.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to clear 802.11a TSM statistics for all clients of an access
point:
(Cisco Controller) >clear ap tsm 802.11a AP3600_1 all
clear lwapp
private-config
To clear (reset to default
values) an access point’s current Lightweight Access Point Protocol (LWAPP)
private configuration, which contains static IP addressing and controller IP
address configurations, use the
clear lwapp
private-config command.
clear lwapp private-config
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Enter the command on the
access point console port.
Prior to changing the
FlexConnect configuration on an access point using the access point’s console
port, the access point must be in standalone mode (not connected to a Cisco WLC
) and you must remove the current LWAPP private configuration by using the
clear lwapp
private-config command.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
The following example shows
how to clear an access point’s current LWAPP private configuration:
ap_console >clear lwapp private-config
removing the reap config file flash:/lwapp_reap.cfg
debug Commands
This section lists the debug commands to manage debugging of access points managed by the controller.
Caution
Debug commands are reserved for use only under the direction of Cisco personnel. Do not use these commands without direction from Cisco-certified staff.
To configure the remote
debugging of Cisco lightweight access points or to remotely execute a command
on a lightweight access point, use the
debug ap
command.
debug ap
{
enable |
disable |
command
cmd}
cisco_ap
Syntax Description
enable
Enables the debugging on a
lightweight access point.
Note
The debugging information is
displayed only to the controller console and does not send output to a
controller Telnet/SSH CLI session.
disable
Disables the debugging on a
lightweight access point.
Note
The debugging information is
displayed only to the controller console and does not send output to a
controller Telnet/SSH CLI session.
command
Specifies that a CLI command
is to be executed on the access point.
cmd
Command to be executed.
Note
The command to be executed
must be enclosed in double quotes, such as
debug ap command “led flash
30” AP03.
The output of the command
displays only to the controller console and does not send output to a
controller Telnet/SSH CLI session.
cisco_ap
Name of a Cisco lightweight
access point.
Command Default
The remote debugging of Cisco
lightweight access points is disabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the remote debugging on access point AP01:
> debug ap enable AP01
The following example shows
how to execute the
config ap
location command on access point AP02:
> debug ap command “config ap location "Building 1" AP02”
The following example shows
how to execute the flash LED command on access point AP03:
> debug ap command “led flash 30” AP03
debug ap enable
To configure the remote
debugging of Cisco lightweight access points or to remotely execute a command
on a lightweight access point, use the
debug ap enable
command.
debug ap
{
enable |
disable |
command
cmd}
cisco_ap
Syntax Description
enable
Enables the remote debugging.
Note
The debugging information is
displayed only to the controller console and does not send output to a
controller Telnet/SSH CLI session.
disable
Disables the remote
debugging.
command
Specifies that a CLI command
is to be executed on the access point.
cmd
Command to be executed.
Note
The command to be executed
must be enclosed in double quotes, such as
debug ap command “led flash
30” AP03.
The output of the command
displays only to the controller console and does not send output to a
controller Telnet/SSH CLI session.
cisco_ap
Cisco lightweight access
point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the remote debugging on access point AP01:
> debug ap enable AP01
The following example shows
how to disable the remote debugging on access point AP02:
> debug ap disable AP02
The following example shows
how to execute the flash LED command on access point AP03:
> debug ap command “led flash 30” AP03
debug ap
packet-dump
To configure the
debugging of Packet Capture, use the
debug ap
packet-dump command.
debug ap packet-dump
{
enable
|
disable}
Syntax Description
enable
Enables the
debugging of Packet Capture of an access point.
disable
Disables the
debugging of Packet Capture of an access point.
Command Default
Debugging of Packet
Capture is disabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
Packet Capture does
not work during inter-Cisco WLC roaming.
The Cisco WLC does
not capture packets created in the radio firmware and sent out of the access
point, such as beacon or probe response. Only packets that flow through the
radio driver in the Tx path will be captured.
Examples
The following
example shows how to enable the debugging of Packet Capture from an access
point:
> debug ap packet-dump enable
debug ap show stats
To debug video messages and
statistics of Cisco lightweight access points, use the
debug ap show
stats command.
debug ap show
stats
{
802.11a |
802.11b}
cisco_ap
{
tx-queue |
packet
|
load |
multicast |
client
{
client_MAC |
video |
all} |
video metrics}
debug ap show stats
video
cisco_ap
{
multicast mgid
mgid_database_number |
admission |
bandwidth}
Syntax Description
802.11a
Specifies the 802.11a
network.
802.11b
Specifies the 802.11b/g
network.
cisco_ap
Cisco lightweight access
point name.
tx-queue
Displays the transmit queue
traffic statistics of the AP.
packet
Displays the packet
statistics of the AP.
load
Displays the QoS Basic
Service Set (QBSS) and other statistics of the AP.
multicast
Displays the multicast
supported rate statistics of the AP.
client
Displays the specified client
metric statistics.
client_MAC
MAC address of the client.
video
Displays video statistics of
all clients on the AP.
all
Displays statistics of all
clients on the AP.
video metrics
Displays the video metric
statistics.
mgid
Displays detailed multicast
information for a single multicast group ID (MGID).
mgid_database_number
Layer 2 MGID database
number.
admission
Displays video admission
control on the AP.
bandwidth
Displays video bandwidth on
the AP.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to troubleshoot the access point AP01’s transmit queue traffic on an
802.11a network:
> debug ap show stats 802.11a AP01 tx-queue
The following example shows
how to troubleshoot the access point AP02’s multicast supported rates on an
802.11b/g network:
> debug ap show stats 802.11b AP02 multicast
The following example shows
how to troubleshoot the metrics of a client identified by its MAC address,
associated with the access point AP01 on an 802.11a network:
> debug ap show stats 802.11a AP01 client 00:40:96:a8:f7:98
The following example shows
how to troubleshoot the metrics of all clients associated with the access point
AP01 on an 802.11a network:
> debug ap show stats 802.11a AP01 client all
debug ap show stats
video
To configure the debugging of
video messages and statistics of Cisco lightweight access points, use the
debug ap show stats
video command.
debug ap show
stats video
cisco_ap
{
multicast mgid
mgid_value |
admission
|
bandwidth}
Syntax Description
cisco_ap
Cisco lightweight access
point name.
multicast mgid
Displays multicast database
related information for the specified MGID of an access point.
mgid_value
Layer 2 MGID database number
from 1 to 4095.
admission
Displays the video admission
control.
bandwidth
Displays the video bandwidth.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure the debugging of an access point AP01’s multicast group that
is identified by the group’s Layer 2 MGID database number:
> debug ap show stats video AP01 multicast mgid 50
This example shows how to
configure the debugging of an access point AP01’s video bandwidth:
> debug ap show stats video AP01 bandwidth
debug capwap
To configure the debugging of
Control and Provisioning of Wireless Access Points (CAPWAP) settings, use the
debug capwap
command.
Configures
the debugging of Redundancy Sync Manager packets.
events
Configures
the debugging of Redundancy Sync Manager events.
errors
Configures
the debugging of Redundancy Sync Manager errors.
detail
Configures
the debugging of Redundancy Sync Manager details.
enable
Enables the
debugging of Redundancy Sync Manager.
disable
Stops the
debugging Redundancy Sync Manager.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
Redundancy
Synchronization Manager synchronizes the configurations of the active and
standby Cisco WLCs.
Examples
The following
example shows how to enable the debugging of Redundancy Sync Manager packets:
> debug rsyncmgr packet enable
debug service
ap-monitor
To debug the access point
monitor service, use the
debug service
ap-monitor command.
debug service
ap-monitor
{
all |
error |
event |
nmsp |
packet} {
enable |
disable}
Syntax Description
all
Configures the debugging of
all access point status messages.
error
Configures the debugging of
access point monitor error events.
event
Configures the debugging of
access point monitor events.
nmsp
Configures the debugging of
access point monitor Network Mobility Services Protocol (NMSP) events.
packet
Configures the debugging of
access point monitor packets.
enable
Enables the debugging for
access point monitor service.
disable
Disables the debugging for
access point monitor service.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure the debugging of access point monitor NMSP events:
> debug service ap-monitor events
transfer download
peer-start
To download a file
to the peer WLC, use the
transfer download
peer-startcommand.
transfer download peer-start
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to start downloading a file to the peer controller:
> transfer download peer-start In commandTransferDownloadPeerStart
Mode............................................TFTP
Data Type.......................................Login Banner
TFTP Server IP..................................9.1.0.100
TFTP Packet Timeout.............................6
TFTP Max Retries................................10
TFTP Path.......................................dhk/
TFTP Filename...................................xyz
Are you sure you want to start download on standby? (y/N) y
In commandTransferDownloadPeerStart
In usmDbTransferDownStartSet.. dir: 2 ---> Indicates L7_TRANSFER_DIRECTION_DOWN_STANDBY
usmDbTransferDownStartSet: SUCCESS
In commandTransferDownloadPeerStart
TFTP Config transfer starting.
In commandTransferDownloadPeerStart
% Error: Config file transfer failed - Error from server: File not found
transfer upload
peer-start
To upload a file to
the peer WLC, use the
transfer upload peer-start
command.
transfer upload peer-start
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to start uploading a file to the peer controller:
> transfer upload peer-start
Mode............................................. FTP
FTP Server IP.................................... 209.165.201.1
FTP Server Port.................................. 21
FTP Path......................................... /builds/nimm/
FTP Filename..................................... AS_5500_7_4_1_20.aes
FTP Username..................................... wnbu
FTP Password..................................... *********
Data Type........................................ Error Log
Are you sure you want to start upload from standby? (y/N) n
Transfer Canceled
Resetting the System Reboot Time
Use the reset command to schedule a reboot of the controller and access points.
To enable or disable the Path Maximum Transmission Unit (PMTU) on the CAPWAP tunnel of a Cisco access point, use the test ap command.
test ap pmtu {
enable |
disable}
cisco_ap
Syntax Description
enable
Disables PMTU on the CAPWAP tunnel of a Cisco access point.
disable
Enables PMTU on the CAPWAP tunnel of a Cisco access point.
cisco_ap
Name of the Cisco lightweight access point.
Command Default
None.
Examples
This example shows how to enable PMTU on the CAPWAP tunnel of a Cisco access point:
> test ap pmtu enable AP1600_1
Related Commands
test ap
test capwap
test ccx
test cleanair
test ftpstatus
test lic-agent
test license
test log
test make-space
test media
test reader
test redundancy
test rrm
test sip-cac-fail
test token-bucket
test wlan
test capwap
To configure an access point to send broadcast radio measurement requests to clients, or to enable the encryption of control packets that are sent between the access point and the controller, use the test capwap
command.