The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII console to the Cisco wireless LAN controller and configure the controller and its associated access points.
To display the Cisco wireless
LAN controller MAC addresses, IP addresses, and port types, use the
show arp switch
command.
show arp
switch
Syntax Description
This command has no arguments
or keywords.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show arp switch command:
(Cisco Controller) >show arp switch
MAC Address IP Address Port VLAN Type
------------------- ---------------- ------------ ---- -------------------
xx:xx:xx:xx:xx:xx xxx.xxx.xxx.xxx service port 1
xx:xx:xx:xx:xx:xx xxx.xxx.xxx.xxx service port
xx:xx:xx:xx:xx:xx xxx.xxx.xxx.xxx service port
show avc
applications
To display all the
supported Application Visibility and Control (AVC) applications, use the
show avc
applications command.
show avc applications
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.4
This command
was introduced.
Usage Guidelines
AVC uses the
Network-Based Application Recognition (NBAR) deep packet inspection technology
to classify applications based on the protocol they use. Using AVC, the
controller can detect more than 1500 Layer 4 to Layer 7 protocols.
Examples
The following is a
sample output of the
show avc
applications command:
To display
information about the Network-Based Application Recognition 2 (NBAR2) engine,
use the
show avc engine
command.
show avc engine version
Syntax Description
version
Displays the
version of the NBAR2 engine.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Usage Guidelines
The Application
Visibility and Control (AVC) protocol pack is not supported in the Cisco 2500
Series Wireless Controllers.
Examples
The following is a
sample output of the
show avc engine
command:
(Cisco Controller) >show avc engine version
AVC Engine Version: 13
show avc
profile
To display
Application Visibility and Control (AVC) profiles, use the
show avc
profile command.
show avc profile
{
summary
|
detailed
profile_name
}
Syntax Description
summary
Displays a
summary of AVC profiles.
detailed
Displays
the details of an AVC profile.
profile_name
Name of the
AVC profile. The profile name can be up to 32 case-sensitive, alphanumeric
characters.
Command Default
None
Command History
Release
Modification
7.4
This command
was introduced.
Examples
The following is a
sample output of the
show avc profile
summary command.
(Cisco Controller) >show avc profile summary
Profile-Name Number of Rules
============ ==============
profile 1 3
avc_profile2 1
The following is a
sample output of the
show avc profile
detailed command.
(Cisco Controller) >show avc profile detailed
Application-Name Application-Group-Name Action DSCP
================ ======================= ====== ====
ftp file-sharing Drop -
flash-video browsing Mark 10
facebook browsing Mark 10
Associated WLAN IDs :
Associated Remote LAN IDs :
Associated Guest LAN IDs :
show avc
protocol-pack
To display
information about the Application Visibility and Control (AVC) protocol pack in
the Cisco Wireless LAN Controller (WLC), use the
show avc protocol-pack
command.
show avc protocol-pack version
Syntax Description
version
Displays the
version of the AVC protocol pack.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Usage Guidelines
The AVC protocol
pack is not supported in the Cisco 2500 Series Wireless Controllers.
Examples
The following is a
sample output of the
show avc protocol-pack
command:
Name of the
application. The application name can be up to 32 case-sensitive, alphanumeric
characters.
top-apps
Displays
AVC statistics for top applications.
upstream
(Optional)
Displays statistics of top upstream applications.
downstream
(Optional)
Displays statistics of top downstream applications.
Command Default
None
Command History
Release
Modification
7.4
This
command was introduced.
Examples
The following is a
sample output of the
show avc statistics
client command:
(Cisco Controller) >show avc statistics client 00:0a:ab:15:00:01 application http
Description Upstream Downstream
=========== ======== ==========
Number of Packtes(n secs) 5059 6369
Number of Bytes(n secs) 170144 8655115
Average Packet size(n secs) 33 1358
Total Number of Packtes 131878 150169
Total Number of Bytes 6054464 205239972
DSCP Incoming packet 16 0
DSCP Outgoing Packet 16 0
The following is a
sample output of the
show avc statistics
client command.
The following is a
sample output of the
show avc statistics wlan
command.
(Cisco Controller) >show avc statistics wlan 1 application ftp
Description Upstream Downstream
=========== ======== ==========
Number of Packtes(n secs) 0 0
Number of Bytes(n secs) 0 0
Average Packet size(n secs) 0 0
Total Number of Packtes 32459 64888
Total Number of Bytes 274 94673983
show boot
To display the primary and
backup software build numbers with an indication of which is active, use the
show boot
command.
show
boot
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Each Cisco wireless LAN
controller retains one primary and one backup operating system software load in
nonvolatile RAM to allow controllers to boot off the primary load (default) or
revert to the backup load when desired.
Examples
The following is a sample
output of the
show boot command:
To display band
selection information, use the
show
band-select command.
show band-select
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a
sample output of the
show
band-select command:
(Cisco Controller) >show band-select
Band Select Probe Response....................... per WLAN enabling
Cycle Count................................... 3 cycles
Cycle Threshold............................... 200 milliseconds
Age Out Suppression........................... 20 seconds
Age Out Dual Band............................. 60 seconds
Client RSSI................................... -80 dBm
Related Commands
config
band-select
config wlan
band-select
show buffers
To display buffer
information of the controller, use the
show buffers
command.
show buffers
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a
sample output of the
show buffers
command:
(Cisco Controller) >show buffers
Pool[00]: 16 byte chunks
chunks in pool: 50000
chunks in use: 9196
bytes in use: 147136
bytes requested: 73218 (73918 overhead bytes)
Pool[01]: 64 byte chunks
chunks in pool: 50100
chunks in use: 19222
bytes in use: 1230208
bytes requested: 729199 (501009 overhead bytes)
Pool[02]: 128 byte chunks
chunks in pool: 26200
chunks in use: 9861
bytes in use: 1262208
bytes requested: 848732 (413476 overhead bytes)
Pool[03]: 256 byte chunks
chunks in pool: 3000
chunks in use: 596
bytes in use: 152576
bytes requested: 93145 (59431 overhead bytes)
Pool[04]: 384 byte chunks
chunks in pool: 6000
chunks in use: 258
bytes in use: 99072
bytes requested: 68235 (30837 overhead bytes)
Pool[05]: 512 byte chunks
chunks in pool: 18700
chunks in use: 18667
bytes in use: 9557504
bytes requested: 7933814 (1623690 overhead bytes)
Pool[06]: 1024 byte chunks
chunks in pool: 3500
chunks in use: 94
bytes in use: 96256
bytes requested: 75598 (20658 overhead bytes)
Pool[07]: 2048 byte chunks
chunks in pool: 1000
chunks in use: 54
bytes in use: 110592
bytes requested: 76153 (34439 overhead bytes)
Pool[08]: 4096 byte chunks
chunks in pool: 1000
chunks in use: 47
bytes in use: 192512
bytes requested: 128258 (64254 overhead bytes)
Raw Pool:
chunks in use: 256
bytes requested: 289575125
show cac voice
stats
To view the detailed
voice CAC statistics of the 802.11a or 802.11b radio, use the
show cac voice stats
command.
show cac voice stats
{
802.11a
|
802.11b}
Syntax Description
802.11a
Displays
detailed voice CAC statistics for 802.11a.
802.11b
Displays
detailed voice CAC statistics for 802.11b/g.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a
sample output of the
show cac voice stats
802.11b command:
(Cisco Controller) >show cac voice stats 802.11b
WLC Voice Call Statistics for 802.11b Radio
WMM TSPEC CAC Call Stats
Total num of Calls in progress................. 0
Num of Roam Calls in progress.................. 0
Total Num of Calls Admitted.................... 0
Total Num of Roam Calls Admitted............... 0
Total Num of exp bw requests received.......... 0
Total Num of exp bw requests Admitted.......... 0
Total Num of Calls Rejected.................... 0
Total Num of Roam Calls Rejected............... 0
Num of Calls Rejected due to insufficent bw.... 0
Num of Calls Rejected due to invalid params.... 0
Num of Calls Rejected due to PHY rate.......... 0
Num of Calls Rejected due to QoS policy........ 0
SIP CAC Call Stats
Total Num of Calls in progress................. 0
Num of Roam Calls in progress.................. 0
Total Num of Calls Admitted.................... 0
Total Num of Roam Calls Admitted............... 0
Total Num of Preferred Calls Received.......... 0
Total Num of Preferred Calls Admitted.......... 0
Total Num of Ongoing Preferred Calls........... 0
Total Num of Calls Rejected(Insuff BW)......... 0
Total Num of Roam Calls Rejected(Insuff BW).... 0
KTS based CAC Call Stats
Total Num of Calls in progress................. 0
Num of Roam Calls in progress.................. 0
Total Num of Calls Admitted.................... 0
Total Num of Roam Calls Admitted............... 0
Total Num of Calls Rejected(Insuff BW)......... 0
Total Num of Roam Calls Rejected(Insuff BW).... 0
show cac voice
summary
To view the list of all APs
with brief voice statistics (includes bandwidth used, maximum bandwidth
available, and the number of calls information), use the
show cac voice
summary command.
show cac voice
summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show cac voice
summary command:
(Cisco Controller) >show cac voice summary
AP Name Slot# Radio BW Used/Max Calls
----------------- ------- ----- ----------- -----
APc47d.4f3a.3547 0 11b/g 0/23437 0
1 11a 1072/23437 1
show cac video
stats
To view the detailed
video CAC statistics of the 802.11a or 802.11b radio, use the
show cac video stats
command.
show cac video stats
{
802.11a
|
802.11b}
Syntax Description
802.11a
Displays
detailed video CAC statistics for 802.11a.
802.11b
Displays
detailed video CAC statistics for 802.11b/g.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a
sample output of the
show cac video stats
802.11b command:
(Cisco Controller) >show cac video stats 802.11b
WLC Video Call Statistics for 802.11b Radio
WMM TSPEC CAC Call Stats
Total num of Calls in progress................. 0
Num of Roam Calls in progress.................. 0
Total Num of Calls Admitted.................... 0
Total Num of Roam Calls Admitted............... 0
Total Num of Calls Rejected.................... 0
Total Num of Roam Calls Rejected............... 0
Num of Calls Rejected due to insufficent bw.... 0
Num of Calls Rejected due to invalid params.... 0
Num of Calls Rejected due to PHY rate.......... 0
Num of Calls Rejected due to QoS policy........ 0
SIP CAC Call Stats
Total Num of Calls in progress................. 0
Num of Roam Calls in progress.................. 0
Total Num of Calls Admitted.................... 0
Total Num of Roam Calls Admitted............... 0
Total Num of Calls Rejected(Insuff BW)......... 0
Total Num of Roam Calls Rejected(Insuff BW).... 0
Related Commands
config 802.11
cac voice
config 802.11 cac
defaults
config 802.11 cac
video
config 802.11 cac
multimedia
show cac voice
stats
show cac voice
summary
show cac video
stats
show cac video
summary
config 802.11 cac video
load-based
config 802.11 cac video
cac-method
config 802.11 cac video
sip
show cac video
summary
To view the list of all
access points with brief video statistics (includes bandwidth used, maximum
bandwidth available, and the number of calls information), use the
show cac video summary
command.
show cac video summary
Syntax Description
This command has no arguments
or keywords.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following is a
sample output of the
show cac video summary command:
(Cisco Controller) >show cac video summary
AP Name Slot# Radio BW Used/Max Calls
----------------- ------- ----- ----------- -----
AP001b.d571.88e0 0 11b/g 0/10937 0
1 11a 0/18750 0
AP5_1250 0 11b/g 0/10937 0
1 11a 0/18750 0
Related Commands
config 802.11
cac voice
config 802.11 cac
defaults
config 802.11 cac
video
config 802.11 cac
multimedia
show cac voice
stats
show cac voice
summary
show cac video
stats
show cac video
summary
config 802.11 cac video
load-based
config 802.11 cac video
cac-method
config 802.11 cac video
sip
show cdp
To display the
status and details of the Cisco Discovery Protocol (CDP), use the
show cdp
command.
show
cdp {
neighbors
[
detail] |
entry all |
traffic}
Syntax Description
neighbors
Displays a
list of all CDP neighbors on all interfaces.
detail
(Optional)
Displays detailed information of the controller’s CDP neighbors. This command
shows only the CDP neighbors of the controller; it does not show the CDP
neighbors of the controller’s associated access points.
entry all
Displays all
CDP entries in the database.
traffic
Displays CDP
traffic information.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a
sample output of the
show cdp
command:
To display whether or not
certificates are verified as compatible in the Cisco wireless LAN controller,
use the
show certificate
compatibility command.
show certificate
compatibility
Syntax Description
This command has no arguments
or keywords.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show certificate
compatibility command:
(Cisco Controller) >show certificate compatibility
Certificate compatibility mode:................ off
show certificate lsc
To verify that the controller
has generated a Locally Significant Certificate (LSC), use the
show certificate lsc
summary command.
show certificate
lsc {
summary |
ap-provision}
Syntax Description
summary
Displays a summary of LSC
certificate settings and certificates.
ap-provision
Displays details about the
access points that are provisioned using the LSC.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show certificate lsc
summary command:
(Cisco Controller) >show certificate lsc summary
LSC Enabled...................................... Yes
LSC CA-Server.................................... http://10.0.0.1:8080/caserver
LSC AP-Provisioning.............................. Yes
Provision-List............................... Not Configured
LSC Revert Count in AP reboots............... 3
LSC Params:
Country...................................... 4
State........................................ ca
City......................................... ss
Orgn......................................... org
Dept......................................... dep
Email........................................ dep@co.com
KeySize...................................... 390
LSC Certs:
CA Cert...................................... Not Configured
RA Cert...................................... Not Configured
This example shows how to
display the details about the access points that are provisioned using the LSC:
To display a summary of clients associated with a Cisco lightweight access point, use the show client summary command.
show client summary [
devicetype device]
Syntax Description
This command has no arguments or keywords up to Release 7.4.
Syntax Description
devicetype
(Optional) Displays all clients with the specified device type.
device
Device type such as Samsung-Device, or WindowsXP-Workstation.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Use show client ap command to list the status of automatically disabled clients. Use the show exclusionlist command to display clients on the exclusion list (blacklisted).
Examples
The following example shows how to display a summary of the active clients:
(Cisco Controller) >show client summary
Number of Clients................................ 24
Number of PMIPV6 Clients......................... 200
MAC Address AP Name Status WLAN/GLAN/RLAN Auth Protocol Port Wired PMIPV6
----------------- ----------------- ------------- -------------- ---- ---------------- ---- ----- ------
00:00:15:01:00:01 NMSP-TalwarSIM1-2 Associated 1 Yes 802.11a 13 No Yes
00:00:15:01:00:02 NMSP-TalwarSIM1-2 Associated 1 Yes 802.11a 13 No No
00:00:15:01:00:03 NMSP-TalwarSIM1-2 Associated 1 Yes 802.11a 13 No Yes
00:00:15:01:00:04 NMSP-TalwarSIM1-2 Associated 1 Yes 802.11a 13 No No
Examples
The following example shows how to display all clients that are WindowsXP-Workstation device types:
(Cisco Controller) >show client devicetype WindowsXP-Workstation
Number of Clients in WLAN........................ 0
MAC Address AP Name Status Auth Protocol Port Wired Mobility Role
----------------- -------- ------------- ---------------- ---------- --------------
Number of Clients with requested device type..... 0
show client summary
guest-lan
To display the active wired
guest LAN clients, use the
show client summary guest-lan
command.
show client
summary guest-lan
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show client summary guest-lan command:
(Cisco Controller) >show client summary guest-lan
Number of Clients................................ 1
MAC Address AP Name Status WLAN Auth Protocol Port Wired
----------- --------- ---------- ---- ---- -------- ---- -----
00:16:36:40:ac:58 N/A Associated 1 No 802.3 1 Yes
Related Commands
show client summary
show client tsm
To display the client traffic
stream metrics (TSM) statistics, use the
show client tsm
command.
show client tsm
802.11{
a |
b}
client_mac {
ap_mac |
all}
Syntax Description
802.11a
Specifies the 802.11a
network.
802.11b
Specifies the 802.11 b/g
network.
client_mac
MAC address of the client.
ap_mac
MAC address of the tsm access
point.
all
Specifies the list of all
access points to which the client has associations.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show client tsm 802.11a command:
(Cisco Controller) >show client tsm 802.11a xx:xx:xx:xx:xx:xx all
AP Interface MAC: 00:0b:85:01:02:03
Client Interface Mac: 00:01:02:03:04:05
Measurement Duration: 90 seconds
Timestamp 1st Jan 2006, 06:35:80
UpLink Stats
================
Average Delay (5sec intervals)............................35
Delay less than 10 ms.....................................20
Delay bet 10 - 20 ms......................................20
Delay bet 20 - 40 ms......................................20
Delay greater than 40 ms..................................20
Total packet Count.........................................80
Total packet lost count (5sec).............................10
Maximum Lost Packet count(5sec)............................5
Average Lost Packet count(5secs)...........................2
DownLink Stats
================
Average Delay (5sec intervals)............................35
Delay less than 10 ms.....................................20
Delay bet 10 - 20 ms......................................20
Delay bet 20 - 40 ms......................................20
Delay greater than 40 ms..................................20
Total packet Count.........................................80
Total packet lost count (5sec).............................10
Maximum Lost Packet count(5sec)............................5
Average Lost Packet count(5secs)...........................2
Related Commands
show client ap
show client detail
show client summary
show client username
To display the client data by
the username, use the
show client
username command.
show client
username
username
Syntax Description
username
Client’s username.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show client username command:
(Cisco Controller) >show client username IT_007
MAC Address AP ID Status WLAN Id Authenticated
----------------- ------ ------------- --------- -------------
xx:xx:xx:xx:xx:xx 1 Associated 1 No
Related Commands
show client ap
show client detail
show client summary
show client
voice-diag
To display voice diagnostics
statistics, use the
show client
voice-diag command.
show client
voice-diag
{
quos-map
|
roam-history
|
rssi |
status
|
tspec}
Syntax Description
quos-map
Displays information about
the QoS/DSCP mapping and packet statistics in each of the four queues: VO, VI,
BE, BK. The different DSCP values are also displayed.
roam-history
Displays information about
history of the last three roamings. The output contains the timestamp, access
point associated with the roaming, the roaming reason, and if there is a
roaming failure, the reason for the roaming failure.
rssi
Displays the client’s RSSI
values in the last 5 seconds when voice diagnostics are enabled.
status
Displays the status of voice
diagnostics for clients.
tspec
Displays TSPEC for the voice
diagnostic for clients.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show client voice-diag status command:
(Cisco Controller) >show client voice-diag status
Voice Diagnostics Status: FALSE
Related Commands
show client ap
show client detail
show client summary
debug voice-diag
show coredump summary
To display a summary of the
controller’s core dump file, use the
show coredump summary
command.
show coredump
summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show coredump summary command:
To display the maximum number
of entries in the database, use the
show database
summary command.
show database summary
Syntax Description
This command has no arguments or keywords.
Command Default
None
Examples
The following is a sample
output of the
show database summary command:
(Cisco Controller) >show database summary
Maximum Database Entries......................... 2048
Maximum Database Entries On Next Reboot.......... 2048
Database Contents
MAC Filter Entries........................... 2
Exclusion List Entries....................... 0
AP Authorization List Entries................ 1
Management Users............................. 1
Local Network Users.......................... 1
Local Users.............................. 1
Guest Users.............................. 0
Total..................................... 5
Related Commands
config database size
show dhcp
To display the internal Dynamic Host Configuration Protocol (DHCP) server configuration, use the show dhcp command.
show dhcp {
leases |
summary |
scope}
Syntax Description
leases
Displays allocated DHCP leases.
summary
Displays DHCP summary information.
scope
Name of a scope to display the DHCP information for that scope.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows how to display the allocated DHCP leases:
(Cisco Controller) >show dhcp leases
No leases allocated.
The following example shows how to display the DHCP summary information:
(Cisco Controller) >show dhcp summary
Scope Name Enabled Address Range
003 No 0.0.0.0 -> 0.0.0.0
The following example shows how to display the DHCP information for the scope 003:
(Cisco Controller) >show dhcp 003
Enabled....................................... No
Lease Time.................................... 0
Pool Start.................................... 0.0.0.0
Pool End...................................... 0.0.0.0
Network....................................... 0.0.0.0
Netmask....................................... 0.0.0.0
Default Routers............................... 0.0.0.0 0.0.0.0 0.0.0.0
DNS Domain....................................
DNS........................................... 0.0.0.0 0.0.0.0 0.0.0.0
Netbios Name Servers.......................... 0.0.0.0 0.0.0.0 0.0.0.0
show dtls connections
To display the Datagram
Transport Layer Security (DTLS) server status, use the
show dtls
connections command.
show dtls connections
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following is a sample
output of the
show dtls connections command.
Device > show dtls connections
AP Name Local Port Peer IP Peer Port Ciphersuite
--------------- ------------- --------------- ------------- -----------------------
1130 Capwap_Ctrl 1.100.163.210 23678 TLS_RSA _WITH_AES_128_CBC_SHA
1130 Capwap_Data 1.100.163.210 23678 TLS_RSA _WITH_AES_128_CBC_SHA
1240 Capwap_Ctrl 1.100.163.209 59674 TLS_RSA _WITH_AES_128_CBC_SHA
show dhcp proxy
To display the status of DHCP proxy handling, use the show dhcp proxy command.
show dhcp proxy
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows how to display the status of DHCP proxy information:
To display a physical
inventory of the Cisco wireless LAN controller, use the
show inventory
command.
show
inventory
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Some wireless LAN controllers
may have no crypto accelerator (VPN termination module) or power supplies
listed because they have no provisions for VPN termination modules or power
supplies.
Examples
The following is a sample
output of the
show inventory
command:
(Cisco Controller) >show inventory
Burned-in MAC Address............................ 50:3D:E5:1A:31:A0
Power Supply 1................................... Present, OK
Power Supply 2................................... Absent
Maximum number of APs supported.................. 500
NAME: "Chassis" , DESCR: "Cisco 5500 Series Wireless LAN Controller"
PID: AIR-CT5508-K9, VID: V01, SN: XXXXXXXXXXX
show license all
To display information for all licenses on the Cisco 5500 Series Controller, use the show license all command.
show license all
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display all the licenses:
> show license all
License Store: Primary License Storage
StoreIndex: 0 Feature: wplus-ap-count Version: 1.0
License Type: Permanent
License State: Inactive
License Count: 12/0/0
License Priority: Medium
StoreIndex: 1 Feature: base Version: 1.0
License Type: Permanent
License State: Active, Not in Use
License Count: Non-Counted
License Priority: Medium
StoreIndex: 2 Feature: wplus Version: 1.0
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
License Store: Evaluation License Storage
StoreIndex: 0 Feature: wplus Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 6 weeks 6 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 1 Feature: wplus-ap-count Version: 1.0
License Type: Evaluation
License State: Active, In Use
Evaluation total period: 8 weeks 4 days
Evaluation period left: 2 weeks 3 days
Expiry date: Thu Jun 25 18:09:43 2009
License Count: 250/250/0
License Priority: High
StoreIndex: 2 Feature: base Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 4 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 3 Feature: base-ap-count Version: 1.0
License Type: Evaluation
License State: Active, Not in Use, EULA accepted
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 3 days
License Count: 250/0/0
License Priority: Low
Related Commands
license install
show license agent
show license detail
show license feature
show license image-level
show license summary
license modify priority
show license capacity
To display the maximum number of access points allowed for this license on the Cisco 5500 Series Controller, the number of access points currently joined to the controller, and the number of access points that can still join the controller, use the show license capacity command.
show license capacity
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the license capacity:
> show license capacity
Licensed Feature Max Count Current Count Remaining Count
-----------------------------------------------------------------------
AP Count 250 47 203
Related Commands
license install
show license all
show license detail
show license feature
show license image-level
show license summary
license modify priority
show license evaluation
show license detail
To display details of a specific license on the Cisco 5500 Series Controller, use the show license detail command.
show license detail license-name
Syntax Description
license-name
Name of a specific license.
Command Default
None.
Examples
This example shows how to display the license details:
> show license detail wplus
Feature: wplus Period left: Life time
Index: 1 Feature: wplus Version: 1.0
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
Store Index: 2
Store Name: Primary License Storage
Index: 2 Feature: wplus Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 6 weeks 6 days
License Count: Non-Counted
License Priority: Low
Store Index: 0
Related Commands
license install
show license agent
show license all
show license feature
show license image-level
show license summary
license modify priority
show license expiring
To display details of expiring licenses on the Cisco 5500 Series Controller, use the show license expiring command.
show license expiring
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the details of the expiring licenses:
> show license expiring
StoreIndex: 0 Feature: wplus Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 6 weeks 6 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 1 Feature: wplus-ap-count Version: 1.0
License Type: Evaluation
License State: Active, In Use
Evaluation total period: 8 weeks 4 days
Evaluation period left: 2 weeks 3 days
Expiry date: Thu Jun 25 18:09:43 2009
License Count: 250/250/0
License Priority: High
StoreIndex: 2 Feature: base Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 4 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 3 Feature: base-ap-count Version: 1.0
License Type: Evaluation
License State: Active, Not in Use, EULA accepted
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 3 days
License Count: 250/0/0
License Priority: Low
Related Commands
license install
show license all
show license detail
show license in-use
show license summary
license modify priority
show license evaluation
show license evaluation
To display details of evaluation licenses on the Cisco 5500 Series Controller, use the show license evaluation command.
show license evaluation
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the details of the evaluation licenses:
> show license evaluation
StoreIndex: 0 Feature: wplus Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 6 weeks 6 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 1 Feature: wplus-ap-count Version: 1.0
License Type: Evaluation
License State: Active, In Use
Evaluation total period: 8 weeks 4 days
Evaluation period left: 2 weeks 3 days
Expiry date: Thu Jun 25 18:09:43 2009
License Count: 250/250/0
License Priority: High
StoreIndex: 2 Feature: base Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 4 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 3 Feature: base-ap-count Version: 1.0
License Type: Evaluation
License State: Active, Not in Use, EULA accepted
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 3 days
License Count: 250/0/0
License Priority: Low
Related Commands
license install
show license all
show license detail
show license expiring
show license in-use
show license summary
license modify priority
show license feature
To display a summary of license-enabled features on the Cisco 5500 Series Controller, use the show license feature command.
show license feature
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the license-enabled features:
> show license feature
Feature name Enforcement Evaluation Clear Allowed Enabled
wplus yes yes yes yes
wplus-ap-count yes yes yes yes
base no yes yes no
base-ap-count yes yes yes no
Related Commands
license install
show license all
show license detail
show license expiring
show license image-level
show license in-use
show license summary
show license modify priority
show license evaluation
show license file
To display a summary of license-enabled features on the Cisco 5500 Series Controller, use the show license file command.
show license file
Syntax Description
This command has no arguments or keywords.
Examples
This example shows how to display the license files:
> show license file
License Store: Primary License Storage
Store Index: 0
License: 11 wplus-ap-count 1.0 LONG NORMAL STANDALONE EXCL 12_KEYS INFINIT
E_KEYS NEVER NEVER NiL SLM_CODE CL_ND_LCK NiL *1AR5NS7M5AD8PPU400
NiL NiL NiL 5_MINS <UDI><PID>AIR-CT5508-K9</PID><SN>RFD000P2D27<
/SN></UDI> Pe0L7tv8KDUqo:zlPe423S5wasgM8G,tTs0i,7zLyA3VfxhnIe5aJa
m63lR5l8JM3DPkr4O2DI43iLlKn7jomo3RFl1LjMRqLkKhiLJ2tOyuftQSq2bCAO6
nR3wIb38xKi3t$<WLC>AQEBIQAB//++mCzRUbOhw28vz0czAY0iAm7ocDLUMb9ER0
+BD3w2PhNEYwsBN/T3xXBqJqfC+oKRqwInXo3s+nsLU7rOtdOxoIxYZAo3LYmUJ+M
FzsqlhKoJVlPyEvQ8H21MNUjVbhoN0gyIWsyiJaM8AQIkVBQFzhr10GYolVzdzfJf
EPQIx6tZ++/Vtc/q3SF/5Ko8XCY=</WLC>
Comment:
Hash: iOGjuLlXgLhcTB113ohIzxVioHA=
. . .
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
show license evaluation
show license handle
To display the license handles on the Cisco 5500 Series Controller, use the show license handle command.
show license handle
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the license handles:
To display the license image level that is in use on the Cisco 5500 Series Controller, use the show license image-level command.
show license image-level
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the image level license settings:
> show license image-level
Module name Image level Priority Configured Valid license
wnbu wplus 1 YES wplus
base 2 NO
NOTE: wplus includes two additional features: Office Extend AP, Mesh AP.
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
license modify priority
show license in-use
show license summary
show license in-use
To display the licenses that are in use on the Cisco 5500 Series Controller, use the show license in-use command.
show license in-use
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the licenses that are in use:
> show license in-use
StoreIndex: 2 Feature: wplus Version: 1.0
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
StoreIndex: 1 Feature: wplus-ap-count Version: 1.0
License Type: Evaluation
License State: Active, In Use
Evaluation total period: 8 weeks 4 days
Evaluation period left: 2 weeks 3 days
Expiry date: Thu Jun 25 18:09:43 2009
License Count: 250/250/0
License Priority: High
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license modify priority
show license summary
show license permanent
show license evaluation
show license permanent
To display the permanent licenses on the Cisco 5500 Series Controller, use the show license permanent command.
show license permanent
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the permanent license’s information:
> show license permanent
StoreIndex: 0 Feature: wplus-ap-count Version: 1.0
License Type: Permanent
License State: Inactive
License Count: 12/0/0
License Priority: Medium
StoreIndex: 1 Feature: base Version: 1.0
License Type: Permanent
License State: Active, Not in Use
License Count: Non-Counted
License Priority: Medium
StoreIndex: 2 Feature: wplus Version: 1.0
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
show license status
To display the license status on the Cisco 5500 Series Controller, use the show license status command.
show license status
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the license status:
> show license status
License Type Supported
permanent Non-expiring node locked license
extension Expiring node locked license
evaluation Expiring non node locked license
License Operation Supported
install Install license
clear Clear license
annotate Comment license
save Save license
revoke Revoke license
Device status
Device Credential type: DEVICE
Device Credential Verification: PASS
Rehost Type: DC_OR_IC
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
show license statistics
To display license statistics on the Cisco 5500 Series Controller, use the show license statistics command.
show license statistics
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the license statistics:
> show license statistics
Administrative statistics
Install success count: 0
Install failure count: 0
Install duplicate count: 0
Comment add count: 0
Comment delete count: 0
Clear count: 0
c Save count: 0
Save cred count: 0
Client status
Request success count 2
Request failure count 0
Release count 0
Global Notify count 0
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
show license summary
To display a brief summary of all licenses on the Cisco 5500 Series Controller, use the show license summary command.
show license summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a brief summary of all licenses:
> show license summary
Index 1 Feature: wplus
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
Index 2 Feature: wplus-ap-count
Period left: 2 weeks 3 days
License Type: Evaluation
License State: Active, In Use
License Count: 250/250/0
License Priority: High
Index 3 Feature: base
Period left: Life time
License Type: Permanent
License State: Active, Not in Use
License Count: Non-Counted
License Priority: Medium
Index 4 Feature: base-ap-count
Period left: 8 weeks 3 days
License Type: Evaluation
License State: Active, Not in Use, EULA accepted
License Count: 250/0/0
License Priority: Low
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license permanent
license modify priority
show license evaluation
show license udi
To display unique device identifier (UDI) values for licenses on the Cisco 5500 Series Controller, use the show license udi command.
show license udi
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the UDI values for licenses:
> show license udi
Device# PID SN UDI
-------------------------------------------------------------------------------------
*0 AIR-CT5508-K9 RFD000P2D27 AIR-CT5508-K9:RFD000P2D27
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
show load-balancing
To display the status of the load-balancing feature, use the show load-balancing command.
show load-balancing
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the load-balancing status:
> show load-balancing
Aggressive Load Balancing........................ Enabled
Aggressive Load Balancing Window................. 0 clients
Aggressive Load Balancing Denial Count........... 3
Statistics
Total Denied Count............................... 10 clients
Total Denial Sent................................ 20 messages
Exceeded Denial Max Limit Count.................. 0 times
None 5G Candidate Count.......................... 0 times
None 2.4G Candidate Count..................... 0 times
Related Commands
config load-balancing
show local-auth
certificates
To display local
authentication certificate information, use the
show local-auth
certificates command:
show local-auth certificates
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to display the authentication certificate information stored locally:
(Cisco Controller) >show local-auth certificates
Related Commands
clear stats local-auth
config local-auth active-timeout
config local-auth eap-profile
config local-auth method fast
config local-auth user-credentials
debug aaa local-auth
show local-auth config
show local-auth statistics
show logging
To display the syslog
facility logging parameters and buffer contents, use the
show logging
command.
show
logging
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Examples
The following example shows
how to display the current settings and buffer content details:
(Cisco Controller) >show logging
Logging to buffer :
- Logging of system messages to buffer :
- Logging filter level.......................... errors
- Number of system messages logged.............. 67227
- Number of system messages dropped............. 21136
- Logging of debug messages to buffer ........... Disabled
- Number of debug messages logged............... 0
- Number of debug messages dropped.............. 0
Logging to console :
- Logging of system messages to console :
- Logging filter level.......................... errors
- Number of system messages logged.............. 0
- Number of system messages dropped............. 88363
- Logging of debug messages to console .......... Enabled
- Number of debug messages logged............... 0
- Number of debug messages dropped.............. 0
Logging to syslog :
- Syslog facility................................ local0
- Logging of system messages to syslog :
- Logging filter level.......................... errors
- Number of system messages logged.............. 67227
- Number of system messages dropped............. 21136
- Logging of debug messages to syslog ........... Disabled
- Number of debug messages logged............... 0
- Number of debug messages dropped.............. 0
- Number of remote syslog hosts.................. 0
- Host 0....................................... Not Configured
- Host 1....................................... Not Configured
- Host 2....................................... Not Configured
Logging of traceback............................. Disabled
Logging of process information................... Disabled
Logging of source file informational............. Enabled
Timestamping of messages.........................
- Timestamping of system messages................ Enabled
- Timestamp format.............................. Date and Time
- Timestamping of debug messages................. Enabled
- Timestamp format.............................. Date and Time
Logging buffer (67227 logged, 21136 dropped)
*Apr 03 09:48:01.728: %MM-3-INVALID_PKT_RECVD: mm_listen.c:5508 Received an invalid
packet from 1.100.163.51. Source member:0.0.0.0. source member unknown.
*Apr 03 09:47:34.194: %LWAPP-3-DECODE_ERR: spam_lrad.c:1271 Error decoding discovery
request from AP 00:13:5f:0e:d4:20
*Apr 03 09:47:34.194: %LWAPP-3-DISC_OTAP_ERR: spam_lrad.c:5554 Ignoring OTAP discovery
request from AP 00:13:5f:0e:d4:20, OTAP is disabled
Previous message occurred 2 times.
show loginsession
To display the existing sessions, use the show loginsession command.
show loginsession
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the current session details:
> show loginsession
ID username Connection From Idle Time Session Time
-- --------------- --------------- ------------ ------------
00 admin EIA-232 00:00:00 00:19:04
Related Commands
config loginsession close
show mesh cac
To display call admission
control (CAC) topology and the bandwidth used or available in a mesh network,
use the
show mesh cac
command.
To display all the
access points for which multicast Domain Name System (mDNS) forwarding is
enabled, use the
show mnds ap summary
command.
show mdns ap summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following is a
sample output of the
show mnds ap summary
command:
(Cisco Controller) >show mdns ap summary
Number of mDNS APs............................. 2
AP Name Ethernet MAC Number of Vlans VlanIdentifiers
--------- ---------------- ----------------- ------------------
ap-3500 cc:ef:48:72:0d:d9 0 Not applicable
ap-3600 00:22:bd:df:04:68 2 124,122
The following table
describes the significant fields shown in the display.
Table 1 show mdns ap
summary Field Descriptions
Field
Description
AP Name
Name of the
mDNS access point (access point for which mDNS forwarding is enabled).
Ethernet
MAC
MAC
address of the mDNS access point.
Number of
VLANs
Number of
VLANs from which the access point snoops the mDNS advertisements from the wired
side. An access point can snoop on a maximum of 10 VLANs.
VLAN
Identifiers
Identifiers of the VLANs the access point snoops on.
show mdns
domain-name-ip summary
To display the
summary of the multicast Domain Name System (mDNS) domain names, use the
show mdns domain-name-ip
summary command.
show mdns domain-name-ip summary
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.5
This
command was introduced.
Usage Guidelines
Each service
advertisement contains a record that maps the domain name of the service
provider to the IP address. The mapping also contains details such as the
client MAC address, VLAN ID, Time to Live (TTL), and IPv4 address.
Examples
The following is a
sample output of the
show mdns domain-name-ip
summary command:
(Cisco Controller) >show mdns domain-name-ip summary
Number of Domain Name-IP Entries................. 1
DomainName MAC Address IP Address Vlan Id Type TTL Time left
(in seconds) (in seconds)
------------- ------------- ----------- -------------------- ------
tixp77.local. 00:50:b6:4f:69:70 209.165. 202.128 999 mDNSAP 4725 906
The following table
describes the significant fields shown in the display.
Table 2 show mdns
domain-name-ip summary Field Descriptions
Field
Description
Domain Name
Domain name
of the service provider.
MAC Address
MAC address
of the service provider.
IP Address
IP address
of the service provider.
VLAN ID
VLAN ID of
the service provider.
Type
Origin of
service that can be one of the following:
Wired
Wireless
Wired
guest
mDNS
AP
TTL
TTL value,
in seconds, that determines the validity of the service offered by the service
provider. The service provider is removed from the Cisco Wireless LAN
Controller when the TTL expires.
Time Left
Time
remaining, in seconds, before the service provider is removed from the Cisco
WLC.
show mdns profile
To display mDNS profile information, use the show mdns profile command.
show mdns profile {
summary |
detailed profile-name}
Syntax Description
summary
Displays the summary of the mDNS profiles.
detailed
Displays details of an mDNS profile.
profile-name
Name of the mDNS profile.
Command Default
None
Command History
Release
Modification
7.4
This command was introduced.
Examples
This example shows how to display a summary of all the mDNS profiles:
> show mdns profile summary
Number of Profiles............................... 2
ProfileName No. Of Services
-------------------------------- ---------------
default-mdns-profile 5
profile1 2
This example shows how to display the detailed information of an mDNS profile:
> show mdns profile detailed default-mdns-profile
Profile Name..................................... default-mdns-profile
Profile Id....................................... 1
No of Services................................... 5
Services......................................... AirPrint
AppleTV
HP_Photosmart_Printer_1
HP_Photosmart_Printer_2
Printer
No. Interfaces Attached.......................... 0
No. Interface Groups Attached.................... 0
No. Wlans Attached............................... 1
Wlan Ids......................................... 1
Related Commands
config mdns query interval
config mdns service
config mdns snooping
config interface mdns-profile
config interface group mdns-profile
config wlan mdns
config mdns profile
show mdns ap
config mdns ap
show mnds service
clear mdns service-database
debug mdns all
debug mdns error
debug mdns detail
debug mdns message
show mdns service
To display multicast
Domain Name System (mDNS) service information, use the
show mnds service
command.
show mdns service {
summary
|
detailed
service-name
|
not-learnt}
Syntax Description
summary
Displays the
summary of all mDNS services.
detailed
Displays the
details of an mDNS service.
service-name
Name of the
mDNS service.
not-learnt
Displays the summary of all
the service advertisements that were received by the controller but were not
discovered because the service query status was disabled.
Service advertisements for
all VLANs and origin types that are not learned are displayed in the output.
The top 500 services appear in the summary list.
Command Default
None
Command History
Release
Modification
7.4
This
command was introduced.
7.5
The
not-learnt
keyword was added.
Examples
The following is a
sample output of the
show mnds summary
command:
Device > show mdns service summary
Number of Services............................... 5
Service-Name LSS Origin No SP Service-string
------------------------ -------------- ------ --------
AirPrint Yes Wireless 1 _ipp._tcp.local.
AppleTV Yes Wireless 1 _airplay._tcp.local.
HP_Photosmart_Printer_1 Yes Wireless 1 _universal._sub._ipp._tcp.local.
HP_Photosmart_Printer_2 No Wired 0 _cups._sub._ipp._tcp.local.
Printer No Wired 0 _printer._tcp.local.
The following is a
sample output of the
show mnds service detailed
command:
Device > show mdns service detailed AirPrint
Service Name..................................... AirPrint
Service Id....................................... 1
Service query status............................. Enabled
Service LSS status............................... Disabled
Service learn origin............................. Wired
Number of Profiles............................... 2
Profile.......................................... student-profile, guest-profile
Number of Service Providers ..................... 2
Service Provider MAC-Address AP Radio MAC VLAN ID Type TTL Time left
---------------- ----------- ------------ ------- ---- ----------------
user1 60:33:4b:2b:a6:9a ----- 104 Wired 4500 4484
laptopa 00:21:1b:ea:36:60 3c:ce:73:1e:69:20 105 Wireless 4500 4484Number of priority MAC addresses ................ 1
Sl.No MAC Address AP group name
----- ------------------- --------------
1 44:03:a7:a3:04:45 AP_floor1
The following is a
sample output of the
show mnds service
not-learntcommand:
Device > show mdns service not-learnt
Number of Services............................... 4
Origin VLAN TTL TTL left Client MAC AP-MAC Service-string
(sec) (sec)
---------- ------ ------ ------ ------------------ ------------------ ----------------------
Wireless 106 120 105 00:21:6a:76:88:04 04:da:d2:b3:11:00 100.106.11.9.in-addr.arpa.
Wireless 106 120 112 00:21:6a:78:ff:82 04:da:d2:b3:11:00 102.106.11.9.in-addr.arpa.
Wireless 106 120 75 00:21:6a:78:ff:82 04:da:d2:b3:11:00 108.104.11.9.in-addr.arpa.
Wireless 106 120 119 00:21:6a:78:ff:82 04:da:d2:b3:11:00 _airplayit._tcp.local.
show mgmtuser
To display the local management user accounts on the Cisco wireless LAN controller, use the show mgmtuser command.
show mgmtuser
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a list of management users:
> show mgmtuser
User Name Permissions Description Password Strength
----------------------- ------------ -------------- ------------------
admin read-write Weak
Related Commands
config mgmtuser add
config mgmtuser delete
config mgmtuser description
config mgmtuser password
show mobility group
member
To display the
details of the mobility group members in the same domain, use the
show mobility group member
command.
show mobility group member
hash
Syntax Description
hash
Displays the
hash keys of the mobility group members in the same domain.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced
in a release earlier than Release 7.6.
Examples
The following
example shows how to display the hash keys of the mobility group members:
(Cisco Controller) >show mobility group member hash
Default Mobility Domain.......................... new-mob
IP Address Hash Key
---------------------------------------------------------
9.2.115.68 a819d479dcfeb3e0974421b6e8335582263d9169
9.6.99.10 0974421b6e8335582263d9169a819d479dcfeb3e
9.7.7.7 feb3e0974421b6e8335582263d9169a819d479dc
show netuser
To display the configuration
of a particular user in the local user database, use the
show netuser
command.
show netuser
{
detail
user_name
|
guest-roles
|
summary}
Syntax Description
detail
Displays detailed information
about the specified network user.
user_name
Network user.
guest_roles
Displays configured roles for
guest users.
summary
Displays a summary of all
users in the local user database.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show netuser summary command:
(Cisco Controller) >show netuser summary
Maximum logins allowed for a given username ........Unlimited
The following is a sample
output of the
show netuser detail command:
(Cisco Controller) >show netuser detail john10
username........................................... abc
WLAN Id............................................. Any
Lifetime............................................ Permanent
Description......................................... test user
Related Commands
config netuser add
config netuser delete
config netuser description
config netuser guest-role apply
config netuser wlan-id
config netuser guest-roles
show netuser guest-roles
To display a list of the current quality of service (QoS) roles and their bandwidth parameters, use the show netuser guest-roles command.
show netuser guest-roles
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a QoS role for the guest network user:
> show netuser guest-roles
Role Name.............................. Contractor
Average Data Rate.................. 10
Burst Data Rate.................... 10
Average Realtime Rate.............. 100
Burst Realtime Rate................ 100
Role Name.............................. Vendor
Average Data Rate.................. unconfigured
Burst Data Rate.................... unconfigured
Average Realtime Rate.............. unconfigured
Burst Realtime Rate................ unconfigured
Related Commands
config netuser add
config netuser delete
config netuser description
config netuser guest-role apply
config netuser wlan-id
show netuser guest-roles
show netuser
show network
To display the current status of 802.3 bridging for all WLANs, use the show network command.
show network
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the network details:
> show network
Related Commands
config network
show network summary
show network multicast mgid detail
show network multicast mgid summary
show network summary
To display the network configuration of the Cisco wireless LAN controller, use the show network summary command.
show network summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a summary configuration:
> show network summary
RF-Network Name............................. RF
Web Mode.................................... Disable
Secure Web Mode............................. Enable
Secure Web Mode Cipher-Option High.......... Disable
Secure Web Mode Cipher-Option SSLv2......... Disable
OCSP........................................ Disabled
OCSP responder URL..........................
Secure Shell (ssh).......................... Enable
Telnet...................................... Enable
Ethernet Multicast Mode..................... Disable Mode: Ucast
Ethernet Broadcast Mode..................... Disable
Ethernet Multicast Forwarding............... Disable
Ethernet Broadcast Forwarding............... Disable
AP Multicast/Broadcast Mode................. Unicast
IGMP snooping............................... Disabled
IGMP timeout................................ 60 seconds
IGMP Query Interval......................... 20 seconds
MLD snooping................................ Disabled
MLD timeout................................. 60 seconds
MLD query interval.......................... 20 seconds
User Idle Timeout........................... 300 seconds
AP Join Priority............................ Disable
ARP Idle Timeout............................ 300 seconds
ARP Unicast Mode............................ Disabled
Cisco AP Default Master..................... Disable
Mgmt Via Wireless Interface................. Disable
Mgmt Via Dynamic Interface.................. Disable
Bridge MAC filter Config.................... Enable
Bridge Security Mode........................ EAP
Over The Air Provisioning of AP's........... Enable
Apple Talk ................................. Disable
Mesh Full Sector DFS........................ Enable
AP Fallback ................................ Disable
Web Auth CMCC Support ...................... Disabled
Web Auth Redirect Ports .................... 80
Web Auth Proxy Redirect ................... Disable
Web Auth Captive-Bypass .................. Disable
Web Auth Secure Web ....................... Enable
Fast SSID Change ........................... Disabled
AP Discovery - NAT IP Only ................. Enabled
IP/MAC Addr Binding Check .................. Enabled
CCX-lite status ............................ Disable
oeap-600 dual-rlan-ports ................... Disable
oeap-600 local-network ..................... Enable
mDNS snooping............................... Disabled
mDNS Query Interval......................... 15 minutes
Related Commands
config network
show network multicast mgid summary
show network multicast mgid detail
show network
show network multicast mgid detail
To display all the clients joined to the multicast group in a specific multicast group identification (MGID), use the show network multicast mgid detail command.
show network multicast mgid detail mgid_value
Syntax Description
mgid_value
Number between 550 and 4095.
Command Default
None.
Examples
This example shows how to display details of the multicast database:
> show network multicast mgid detail
Mgid ............................... 550
Multicast Group Address ............ 239.255.255.250
Vlan ............................... 0
Rx Packet Count .................... 807399588
No of clients ...................... 1
Client List ........................
Client MAC Expire TIme (mm:ss)
00:13:02:23:82:ad 0:20
Related Commands
show network summary
show network multicast mgid detail
show network
show network multicast mgid summary
To display all the multicast groups and their corresponding multicast group identifications (MGIDs), use the show network multicast mgid summary command.
show network multicast mgid summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a summary of multicast groups and their MGIDs:
> show network multicast mgid summary
Layer2 MGID Mapping:
-------------------
InterfaceName vlanId MGID
----------------------------- ------ -----
management 0 0
test 0 9
wired 20 8
Layer3 MGID Mapping:
-------------------
Number of Layer3 MGIDs ................ 1
Group address Vlan MGID
------------------ ----- ------
239.255.255.250 0 550
Related Commands
show network summary
show network multicast mgid detail
show network
show nmsp notify-interval summary
To display the Network Mobility Services Protocol (NMSP) configuration settings, use the show nmsp notify-interval summary command.
show nmsp notify-interval summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display NMSP configuration settings:
To display Network Mobility Services Protocol (NMSP) counters, use the show nmsp statistics command.
show nmsp statistics {
summary |
connection all}
Syntax Description
summary
Displays common NMSP counters.
connection all
Displays all connection-specific counters.
Command Default
None.
Examples
This example shows how to display a summary of common NMSP counters:
> show nmsp statistics summary
Send RSSI with no entry: 0
Send too big msg: 0
Failed SSL write: 0
Partial SSL write: 0
SSL write attempts to want write:
Transmit Q full:0
Max Measure Notify Msg: 0
Max Info Notify Msg: 0
Max Tx Q Size: 2
Max Rx Size: 1
Max Info Notify Q Size: 0
Max Client Info Notify Delay: 0
Max Rogue AP Info Notify Delay: 0
Max Rogue Client Info Notify Delay: 0
Max Client Measure Notify Delay: 0
Max Tag Measure Notify Delay: 0
Max Rogue AP Measure Notify Delay: 0
Max Rogue Client Measure Notify Delay: 0
Max Client Stats Notify Delay: 0
Max Tag Stats Notify Delay: 0
RFID Measurement Periodic : 0
RFID Measurement Immediate : 0
Reconnect Before Conn Timeout: 0
This example shows how to display all the connection-specific NMSP counters:
> show nmsp statistics connection all
NMSP Connection Counters
Connection 1 :
Connection status: UP
Freed Connection: 0
Nmsp Subscr Req: 0 NMSP Subscr Resp: 0
Info Req: 1 Info Resp: 1
Measure Req: 2 Measure Resp: 2
Stats Req: 2 Stats Resp: 2
Info Notify: 0 Measure Notify: 0
Loc Capability: 2
Location Req: 0 Location Rsp: 0
Loc Subscr Req: 0 Loc Subscr Rsp: 0
Loc Notif: 0
Loc Unsubscr Req: 0 Loc Unsubscr Rsp: 0
IDS Get Req: 0 IDS Get Resp: 0
IDS Notif: 0
IDS Set Req: 0 IDS Set Resp: 0
Related Commands
show nmsp notify-interval summary
clear nmsp statistics
config nmsp notify-interval measurement
show nmsp status
show nmsp status
To display the status of active Network Mobility Services Protocol (NMSP) connections, use the show nmsp status command.
show nmsp status
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the status of the active NMSP connections:
> show nmsp status
LocServer IP TxEchoResp RxEchoReq TxData RxData
-------------- ----------- --------- ------- -------
171.71.132.158 21642 21642 51278 21253
Related Commands
show nmsp notify-interval summary
clear nmsp statistics
config nmsp notify-interval measurement
show nmsp status
clear locp statistics
show nmsp statistics
show nmsp subscription
To display the Network Mobility Services Protocol (NMSP) services that are active on the controller, use the show nmsp subscription command.
show nmsp subscription {
summary |
detail ip_addr}
Syntax Description
summary
Displays all of the NMSP services to which the controller is subscribed.
detail
Displays details for all of the NMSP services to which the controller is subscribed.
ip_addr
Details only for the NMSP services subscribed to by a specific IP address.
Command Default
None.
Examples
This example shows how to display a summary of all the NMSP services to which the controller is subscribed:
> show nmsp subscription summary
Mobility Services Subscribed:
Server IP Services
--------- --------
10.10.10.31 RSSI, Info, Statistics
This example shows how to display details of all the NMSP services:
> show nmsp subscription detail 10.10.10.31
Mobility Services Subscribed by 10.10.10.31
Services Sub-services
-------- ------------
RSSI Mobile Station, Tags,
Info Mobile Station,
Statistics Mobile Station, Tags,
Related Commands
show nmsp notify-interval summary
show nmsp statistics
config nmsp notify-interval measurement
clear nmsp statistics
clear locp statistics
show ntp-keys
To display network time protocol authentication key details, use the show ntp-keys command.
show ntp-keys
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display NTP authentication key details:
> show ntp-keys
Ntp Authentication Key Details...................
Key Index
-----------
1
3
Related Commands
config time ntp
show qos
To display quality of service (QoS) information, use the show qos command.
show qos {
bronze |
gold |
platinum |
silver}
Syntax Description
bronze
Displays QoS information for the bronze profile of the WLAN.
gold
Displays QoS information for the gold profile of the WLAN.
platinum
Displays QoS information for the platinum profile of the WLAN.
silver
Displays QoS information for the silver profile of the WLAN.
Command Default
None.
Examples
This example shows how to display QoS information for the silver profile:
> show qos
Description...................................... For Best Effort
Maximum Priority................................. besteffort
Unicast Default Priority......................... besteffort
Multicast Default Priority....................... besteffort
Per-SSID Rate Limits............................. Upstream Downstream
Average Data Rate................................ 0 0
Average Realtime Data Rate....................... 0 0
Burst Data Rate.................................. 0 0
Burst Realtime Data Rate......................... 0 0Per-Client Rate Limits........................... Upstream Downstream
Average Data Rate................................ 0 0
Average Realtime Data Rate....................... 0 0
Burst Data Rate.................................. 0 0
Burst Realtime Data Rate......................... 0 0
protocol......................................... none
Related Commands
config qos protocol-type
show
queue-info
To display all the
message queue information pertaining to the system, use the
show queue-info
command.
show queue-info
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following is a
sample output of the
show queue-info
command.
The following table
describes the significant fields shown in the display.
Table 3 show queue-info
Field Descriptions
Field
Description
Queue Name
Name of the
task message queue.
Allocated
Memory size,
in bytes, of the message queue.
InUse
Queue that
is currently used. A value of 0 indicates that there are no messages that have
to be processed by the task.
MaxUsed
Maximum
number of messages processed by the task after the controller is up.
show reset
To display the scheduled system reset parameters, use the show reset command.
show reset
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the scheduled system reset parameters:
> show reset
System reset is scheduled for Mar 27 01 :01 :01 2010
Current local time and date is Mar 24 02:57:44 2010
A trap will be generated 10 minutes before each scheduled system reset.
Use ‘reset system cancel’ to cancel the reset.
Configuration will be saved before the system reset.
Related Commands
reset system at
reset system in
reset system cancel
reset system notify-time
show route kernel
To display the kernel route cache information, use the show route kernel command.
show route kernel
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the kernel route cache information:
To display the routes assigned to the Cisco wireless LAN controller service port, use the show route summary command.
show route summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display all the configured routes:
> show route summary
Number of Routes............................... 1
Destination Network Genmask Gateway
------------------- ------------------- -------------------
xxx.xxx.xxx.xxx 255.255.255.0 xxx.xxx.xxx.xxx
Related Commands
config route
show run-config
To display a comprehensive
view of the current Cisco wireless LAN controller configuration, use the
show run-config
command.
show
run-config
[
no-ap |
commands]
Syntax Description
no-ap
(Optional) Excludes access
point configuration settings.
commands
(Optional) Displays a list of
user-configured commands on the controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
These commands have replaced
the
show
running-config command.
Some WLAN controllers may
have no Crypto Accelerator (VPN termination module) or power supplies listed
because they have no provisions for VPN termination modules or power supplies.
The
show run-config
command shows only values configured by the user. It does not show
system-configured default values.
Examples
The following is a sample
output of the
show run-config
command:
(Cisco Controller) >show run-config
Press Enter to continue...
System Inventory
Switch Description............................... Cisco Controller
Machine Model....................................
Serial Number.................................... FLS0923003B
Burned-in MAC Address............................ xx:xx:xx:xx:xx:xx
Crypto Accelerator 1............................. Absent
Crypto Accelerator 2............................. Absent
Power Supply 1................................... Absent
Power Supply 2................................... Present, OK
Press Enter to continue Or <Ctl Z> to abort...
show sessions
To display the console port login timeout and maximum number of simultaneous command-line interface (CLI) sessions, use the show sessions command.
show sessions
Syntax Description
This command has no arguments or keywords.
Command Default
5 minutes, 5 sessions.
Examples
This example shows how to display the CLI session configuration setting:
> show sessions
CLI Login Timeout (minutes)............ 0
Maximum Number of CLI Sessions......... 5
The response indicates that the CLI sessions never time out and that the Cisco wireless LAN controller can host up to five simultaneous CLI sessions.
Related Commands
config sessions maxsessions
config sessions timeout
show snmpcommunity
To display Simple Network Management Protocol (SNMP) community entries, use the show snmpcommunity command.
show snmpcommunity
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display SNMP community entries:
> show snmpcommunity
SNMP Community Name Client IP Address Client IP Mask Access Mode Status
------------------- ----------------- ----------------- ----------- --------
public 0.0.0.0 0.0.0.0 Read Only Enable
********** 0.0.0.0 0.0.0.0 Read/Write Enable
Related Commands
config snmp community accessmode
config snmp community create
config snmp community delete
config snmp community ipaddr
config snmp community mode
config snmp syscontact
show snmpengineID
To display the SNMP engine ID, use the show snmpengineID command.
show snmpengineID
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the SNMP engine ID:
> show snmpengineID
SNMP EngineId... ffffffffffff
Related Commands
config snmp engineID
show snmptrap
To display Cisco wireless LAN controller Simple Network Management Protocol (SNMP) trap receivers and their status, use the show snmptrap command.
show snmptrap
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display SNMP trap receivers and their status:
> show snmptrap
SNMP Trap Receiver Name IP Address Status
------------------------ ----------------- --------
xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx Enable
Related Commands
config snmp trapreceiver create
config snmp trapreceiver delete
show snmpv3user
To display Simple Network Management Protocol (SNMP) version 3 configuration, use the show snmpv3user command.
show snmpv3user
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display SNMP version 3 configuration information:
To display parameters that apply to the Cisco wireless LAN controller, use the show switchconfig command.
show switchconfig
Syntax Description
This command has no arguments or keywords.
Command Default
Enabled.
Examples
This example shows how to display parameters that apply to the Cisco wireless LAN controller:
> show switchconfig
802.3x Flow Control Mode......................... Disabled
FIPS prerequisite features....................... Enabled
Boot Break....................................... Enabled
secret obfuscation............................... Enabled
Strong Password Check Features:
case-check ...........Disabled
consecutive-check ....Disabled
default-check .......Disabled
username-check ......Disabled
Related Commands
config switchconfig mode
config switchconfig secret-obfuscation
config switchconfig strong-pwd
config switchconfig flowcontrol
config switchconfig fips-prerequisite
show stats switch
show sysinfo
To display high-level Cisco wireless LAN controller information, use the show sysinfo command.
show sysinfo
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display wireless LAN controller information:
> show sysinfo
Manufacturer's Name.............................. Cisco Systems Inc.
Product Name..................................... Cisco Controller
Product Version.................................. 6.0.133.0
Build Information................................ Tue Mar 31 11:44:12 PDT 2009
Bootloader Version............................... 0.14.0
Field Recovery Image Version..................... 5.3.38.0-BL-9-16
Firmware Version................................. FPGA 1.0, Env 0.8, USB console 1.27
Build Type....................................... DATA + WPS
System Name...................................... 5500
System Location..................................
System Contact...................................
System ObjectID.................................. 1.3.6.1.4.1.9.1.1
IP Address....................................... 10.10.10.7
Last Reset....................................... Software reset
System Up Time................................... 1 days 15 hrs 17 mins 48 secs
System Timezone Location....................
Current Boot License Level....................... wplus
Current Boot License Type........................ Permanent
Next Boot License Level.......................... wplus
Next Boot License Type........................... Permanent
Configured Country............................... US - United States
Operating Environment............................ Commercial (0 to 40 C)
Internal Temp Alarm Limits....................... 0 to 65 C
Internal Temperature............................. +45 C
External Temperature............................. +29 C
Fan Status....................................... OK
State of 802.11b Network......................... Enabled
State of 802.11a Network......................... Disabled
Number of WLANs.................................. 18
3rd Party Access Point Support................... Disabled
Number of Active Clients......................... 1
Burned-in MAC Address............................ 00:00:1B:EE:12:E0
Power Supply 1................................... Not Available
Power Supply 2................................... Not Available
Maximum number of APs supported.................. 250
Related Commands
config sysname
show tech-support
To display Cisco wireless LAN controller variables frequently requested by Cisco Technical Assistance Center (TAC), use the show tech-support command.
show tech-support
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display system resource information:
> show tech-support
Current CPU Load................................. 0%
System Buffers
Max Free Buffers.............................. 4608
Free Buffers.................................. 4604
Buffers In Use................................ 4
Web Server Resources
Descriptors Allocated......................... 152
Descriptors Used.............................. 3
Segments Allocated............................ 152
Segments Used................................. 3
System Resources
Uptime........................................ 747040 Secs
Total Ram..................................... 127552 Kbytes
Free Ram...................................... 19540 Kbytes
Shared Ram.................................... 0 Kbytes
Buffer Ram.................................... 460 Kbytes
show time
To display the Cisco wireless LAN controller time and date, use the show time command.
show time
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the controller time and date when authentication is not enabled:
> show time
Time............................................. Wed Apr 13 09:29:15 2011
Timezone delta................................... 0:0
Timezone location........................ (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata
NTP Servers
NTP Polling Interval......................... 3600
Index NTP Key Index NTP Server NTP Msg Auth Status
------- ---------------------------------------------------------------
1 0 9.2.60.60 AUTH DISABLED
This example shows successful authentication of NTP Message results in the AUTH Success:
> show time
Time............................................. Thu Apr 7 13:56:37 2011
Timezone delta................................... 0:0
Timezone location........................ (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata
NTP Servers
NTP Polling Interval......................... 3600
Index NTP Key Index NTP Server NTP Msg Auth Status
------- ---------------------------------------------------------------
1 1 9.2.60.60 AUTH SUCCESS
This example shows that if the packet received has errors, then the NTP Msg Auth status will show AUTH Failure:
> show time
Time............................................. Thu Apr 7 13:56:37 2011
Timezone delta................................... 0:0
Timezone location........................ (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata
NTP Servers
NTP Polling Interval......................... 3600
Index NTP Key Index NTP Server NTP Msg Auth Status
------- ---------------------------------------------------------------
1 10 9.2.60.60 AUTH FAILURE
This example shows that if there is no response from NTP server for the packets, the NTP Msg Auth status will be blank:
> show time
Time............................................. Thu Apr 7 13:56:37 2011
Timezone delta................................... 0:0
Timezone location................................ (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata
NTP Servers
NTP Polling Interval......................... 3600
Index NTP Key Index NTP Server NTP Msg Auth Status
------- ---------------------------------------------------------------
1 11 9.2.60.60
Related Commands
config time manual
config time ntp
config time timezone
config time timezone location
show trapflags
To display the Cisco wireless LAN controller Simple Network Management Protocol (SNMP) trap flags, use the show trapflags command.
show trapflags
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display controller SNMP trap flags:
To display the Cisco wireless
LAN controller Simple Network Management Protocol (SNMP) trap log, use the
show traplog
command.
show
traplog
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following is a sample
output of the
show traplog command:
(Cisco Controller) >show traplog
Number of Traps Since Last Reset........... 2447
Number of Traps Since Log Last Displayed... 2447
Log System Time Trap
--- ------------------------ -------------------------------------------------
0 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:52:62:fe detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -78 and SNR: 10
1 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:52:19:d8 detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -72 and SNR: 16
2 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:26:a1:8d detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -82 and SNR: 6
3 Thu Aug 4 19:54:14 2005 Rogue AP : 00:0b:85:14:b3:4f detected on Base Rad
io MAC : 00:0b:85:18:b6:50 Interface no:1(802.11
b/g) with RSSI: -56 and SNR: 30
Would you like to display more entries? (y/n)
show
queue-info
To display all the
message queue information pertaining to the system, use the
show queue-info
command.
show queue-info
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.5
This command
was introduced.
Examples
The following is a
sample output of the
show queue-info
command.
The following table
describes the significant fields shown in the display.
Table 4 show queue-info
Field Descriptions
Field
Description
Queue Name
Name of the
task message queue.
Allocated
Memory size,
in bytes, of the message queue.
InUse
Queue that
is currently used. A value of 0 indicates that there are no messages that have
to be processed by the task.
MaxUsed
Maximum
number of messages processed by the task after the controller is up.
show rfid client
To display the radio frequency identification (RFID) tags that are associated to the controller as clients, use the show rfid client command.
show rfid client
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Usage Guidelines
When the RFID tag is not in client mode, the above fields are blank.
Examples
This example shows how to display the RFID tag that is associated to the controller as clients:
> show rfid client
------------------ -------- --------- ----------------- ------ ----------------
Heard
RFID Mac VENDOR Sec Ago Associated AP Chnl Client State
------------------ -------- --------- ----------------- ------ ----------------
00:14:7e:00:0b:b1 Pango 35 AP0019.e75c.fef4 1 Probing
Related Commands
config rfid status
config rfid timeout
show rfid config
show rfid detail
show rfid summary
show rfid config
To display the current radio frequency identification (RFID) configuration settings, use the show rfid config command.
show rfid config
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display the current RFID configuration settings:
> show rfid config
RFID Tag Data Collection ............................... Enabled
RFID Tag Auto-Timeout .................................. Enabled
RFID Client Data Collection ............................ Disabled
RFID Data Timeout ...................................... 200 seconds
Related Commands
config rfid status
config rfid timeout
show rfid client
show rfid detail
show rfid summary
show rfid detail
To display detailed radio frequency identification (RFID) information for a specified tag, use the show rfid detail command.
show rfid detail mac_address
Syntax Description
mac_address
MAC address of an RFID tag.
Command Default
None.
Examples
This example shows how to display detailed RFID information:
To display a summary of the radio frequency identification (RFID) information for a specified tag, use the show rfid summary command.
show rfid summary
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display a summary of RFID information:
> show rfid summary
Total Number of RFID : 5
----------------- -------- ------------------ ------ ---------------------
RFID ID VENDOR Closest AP RSSI Time Since Last Heard
----------------- -------- ------------------ ------ ---------------------
00:04:f1:00:00:04 Wherenet ap:1120 -51 858 seconds ago
00:0c:cc:5c:06:d3 Aerosct ap:1120 -51 68 seconds ago
00:0c:cc:5c:08:45 Aerosct AP_1130 -54 477 seconds ago
00:0c:cc:5c:08:4b Aerosct wolverine -54 332 seconds ago
00:0c:cc:5c:08:52 Aerosct ap:1120 -51 699 seconds ago
Related Commands
config rfid status
config rfid timeout
show rfid client
show rfid detail
show rfid config
config Commands
This section lists the config commands that you can use to configure the controller settings, and manage user accounts.
Enables the 802.11h channel switch announcement in the loud
mode. The 802.11h-enabled clients can send packets while switching channel.
quiet
Enables 802.11h-enabled clients to stop transmitting packets
immediately because the AP has detected radar and client devices should also
quit transmitting to reduce interference.
disable
Disables the 802.11h channel
switch announcement.
Command Default
None
Command History
Release
Modification
7.6
This command was
introduced in a release earlier than Release 7.6.
The
loud and
quiet parameters were introduced in
Release 7.6.
Examples
The following example shows
how to disable an 802.11h switch announcement:
Specifies the aggregated MAC
protocol data unit priority level between 0 through 7.
all
Configures all of the
priority levels at once.
enable
Specifies the traffic
associated with the priority level uses A-MPDU transmission.
disable
Specifies the traffic
associated with the priority level uses A-MSDU transmission.
Command Default
By default, Priority 0 is
enabled.
Usage Guidelines
Aggregation is the process of
grouping packet data frames together rather than transmitting them separately.
Two aggregation methods are available: Aggregated MAC Protocol Data Unit
(A-MPDU) and Aggregated MAC Service Data Unit (A-MSDU). A-MPDU is performed in
the software whereas A-MSDU is performed in the hardware.
Aggregated MAC Protocol Data
Unit priority levels assigned per traffic type are as follows:
1—Background
2—Spare
0—Best effort
3—Excellent effort
4—Controlled load
5—Video, less than 100-ms
latency and jitter
6—Voice, less than 10-ms
latency and jitter
7—Network control
all—Configure all of the
priority levels at once.
Note
Configure the priority levels
to match the aggregation method used by the clients.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure all the priority levels at once so that the traffic associated
with the priority level uses A-MSDU transmission:
To configure an access point
to use a specific antenna, use the
config 802.11 11nsupport
antenna command.
config
802.11{
a |
b}
11nsupport antenna cisco_ap {
A |
B |
C |
D}
{
enable |
disable}
Syntax Description
a
Specifies the 802.11a/n
network.
b
Specifies the 802.11b/g/n
network.
cisco_ap
Access point.
A/B/C/D
Specifies an antenna port.
enable
Enables the configuration.
disable
Disables the configuration.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure transmission to a single antenna for legacy orthogonal
frequency-division multiplexing:
(Cisco Controller) > config 802.11 11nsupport antenna AP1 C enable
Related Commands
config 802.11
11nsupport mcs tx
config 802.11a disable
network
config 802.11a
disable
config 802.11a channel
ap
config 802.11a txpower
ap
config 802.11a
chan_width
config 802.11 11nsupport
guard-interval
To configure the guard
interval, use the
config 802.11 11nsupport guard-interval command.
config 802.11
{
a |
b}
11nsupport guard-interval
{
any |
long}
Syntax Description
any
Enables either a short or a
long guard interval.
long
Enables only a long guard
interval.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure a long guard interval:
(Cisco Controller) > config 802.11 11nsupport guard-interval long
Related Commands
config 802.11
11nsupport mcs tx
config 802.11a
disable network
config 802.11a
channel ap
config 802.11a txpower
ap
config 802.11a
chan_width
config 802.11 11nsupport mcs
tx
To specify the modulation and
coding scheme (MCS) rates at which data can be transmitted between the access
point and the client, use the
config 802.11 11nsupport mcs
tx
command.
To change the beacon period
globally for an 802.11a, 802.11b, or other supported 802.11 network, use the
config 802.11 beacon
period command.
config
802.11{
a |
b}
beacon period time_units
Note
Disable the 802.11 network
before using this command. See the “Usage Guidelines” section.
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
time_units
Beacon interval in time units
(TU). One TU is 1024 microseconds.
Command Default
None
Usage Guidelines
In Cisco wireless LAN
solution 802.11 networks, all Cisco lightweight access point wireless LANs
broadcast a beacon at regular intervals. This beacon notifies clients that the
802.11a service is available and allows the clients to synchronize with the
lightweight access point.
Before you change the beacon
period, make sure that you have disabled the 802.11 network by using the
config 802.11
disable command. After changing the beacon period, enable the
802.11 network by using the
config 802.11
enable command.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
This example shows how to
configure an 802.11a network for a beacon period of 120 time units:
(Cisco Controller) > config 802.11 beacon period 120
Related Commands
show
802.11a
config 802.11b
beaconperiod
config 802.11a
disable
config 802.11a
enable
config 802.11 cac
defaults
To configure the
default Call Admission Control (CAC) parameters for the 802.11a and 802.11b/g
network, use the
config 802.11 cac
defaults command.
config 802.11
{
a |
b}
cac
defaults
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
Usage Guidelines
CAC commands for video
applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and
the quality of service (QoS) level be set to Gold.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable command.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
This example shows
how to configure the default CAC parameters for the 802.11a network:
(Cisco Controller) > config 802.11 cac defaults
Related Commands
show cac voice
stats
show cac voice
summary
show cac video
stats
show cac video
summary
config 802.11 cac video
tspec-inactivity-timeout
config 802.11 cac video
max-bandwidth
config 802.11 cac video
acm
config 802.11 cac video
sip
config 802.11 cac video
roam-bandwidth
config 802.11 cac
load-based
config 802.11 cac
media-stream
config 802.11 cac
multimedia
config 802.11 cac video cac-method
debug cac
config 802.11 cac video
acm
To enable or disable video
Call Admission Control (CAC) for the 802.11a or 802.11b/g network, use the
config 802.11 cac video
acm command.
config
802.11{
a |
b}
cac video acm {
enable |
disable}
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
enable
Enables video CAC settings.
disable
Disables video CAC settings.
Command Default
The default video CAC
settings for the 802.11a or 802.11b/g network is disabled.
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the
config 802.11{a |
b}cac voice acm enable, or
config 802.11{a |
b}cac video acm enable commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the video CAC for the 802.11a network:
(Cisco Controller) > config 802.11 cac video acm enable
The following example shows
how to disable the video CAC for the 802.11b network:
(Cisco Controller) > config 802.11 cac video acm disable
Related Commands
config 802.11
cac video max-bandwidth
config 802.11 cac video
roam-bandwidth
config 802.11 cac video
tspec-inactivity-timeout
config 802.11 cac
video cac-method
To configure the
Call Admission Control (CAC) method for video applications on the 802.11a or
802.11b/g network, use the
config 802.11 cac video
cac-method command.
config 802.11
{
a |
b}
cac
video cac-method
{
static
|
load-based}
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
static
Enables the
static CAC method for video applications on the 802.11a or 802.11b/g network.
Static or
bandwidth-based CAC enables the client to specify how much bandwidth or shared
medium time is required to accept a new video request and in turn enables the
access point to determine whether it is capable of accommodating the request.
load-based
Enables the
load-based CAC method for video applications on the 802.11a or 802.11b/g
network.
Load-based
or dynamic CAC incorporates a measurement scheme that takes into account the
bandwidth consumed by all traffic types from itself, from co-channel access
points, and by collocated channel interference. Load-based CAC also covers the
additional bandwidth consumption results from PHY and channel impairment. The
access point admits a new call only if the channel has enough unused bandwidth
to support that call.
Load-based
CAC is not supported if SIP-CAC is enabled.
Command Default
Static.
Usage Guidelines
CAC commands for video
applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and
the quality of service (QoS) level be set to Gold.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable command.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide for your release.
Video CAC consists
of two parts: Unicast Video-CAC and MC2UC CAC. If you need only Unicast
Video-CAC, you must configure only static mode. If you need only MC2UC CAC, you
must configure Static or Load-based CAC. Load-based CAC is not supported if
SIP-CAC is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
This example shows
how to enable the static CAC method for video applications on the 802.11a
network:
(Cisco Controller) > config 802.11 cac video cac-method static
Related Commands
show cac voice
stats
show cac voice
summary
show cac video
stats
show cac video
summary
config 802.11 cac video
tspec-inactivity-timeout
config 802.11 cac video
max-bandwidth
config 802.11 cac video
acm
config 802.11 cac video
sip
config 802.11 cac video
roam-bandwidth
config 802.11 cac
load-based
config 802.11 cac
defaults
config 802.11 cac
media-stream
config 802.11 cac
multimedia
debug cac
config 802.11 cac
video load-based
To enable or disable
load-based Call Admission Control (CAC) for video applications on the 802.11a
or 802.11b/g network, use the
config 802.11 cac video
load-based command.
config 802.11
{
a |
b}
cac
video load-based
{
enable
|
disable}
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
enable
Enables
load-based CAC for video applications on the 802.11a or 802.11b/g network.
Load-based
or dynamic CAC incorporates a measurement scheme that takes into account the
bandwidth consumed by all traffic types from itself, from co-channel access
points, and by collocated channel interference. Load-based CAC also covers the
additional bandwidth consumption results from PHY and channel impairment. The
access point admits a new call only if the channel has enough unused bandwidth
to support that call.
disable
Disables
load-based CAC method for video applications on the 802.11a or 802.11b/g
network.
Command Default
Disabled.
Usage Guidelines
CAC commands for video
applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and
the quality of service (QoS) level be set to Gold.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable command.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide
for your release.
Video CAC consists
of two parts: Unicast Video-CAC and MC2UC CAC. If you need only Unicast
Video-CAC, you must configure only static mode. If you need only MC2UC CAC, you
must configure Static or Load-based CAC. Load-based CAC is not supported if
SIP-CAC is enabled.
Note
Load-based CAC
is not supported if SIP-CAC is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
This example shows
how to enable load-based CAC method for video applications on the 802.11a
network:
(Cisco Controller) > config 802.11 cac video load-based enable
Related Commands
show cac voice
stats
show cac voice
summary
show cac video
stats
show cac video
summary
config 802.11 cac video
tspec-inactivity-timeout
config 802.11 cac video
max-bandwidth
config 802.11 cac video
acm
config 802.11 cac video
sip
config 802.11 cac video
roam-bandwidth
config 802.11 cac
load-based
config 802.11 cac
defaults
config 802.11 cac
media-stream
config 802.11 cac
multimedia
config 802.11 cac video cac-method
debug cac
config 802.11 cac video
max-bandwidth
To set the percentage of the
maximum bandwidth allocated to clients for video applications on the 802.11a or
802.11b/g network, use the
config 802.11 cac video
max-bandwidth command.
config
802.11{
a |
b}
cac video max-bandwidth
bandwidth
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
bandwidth
Bandwidth percentage value
from 5 to 85%.
Command Default
The default maximum bandwidth
allocated to clients for video applications on the 802.11a or 802.11b/g network
is 0%.
Usage Guidelines
The maximum radio frequency
(RF) bandwidth cannot exceed 85% for voice and video. Once the client reaches
the value specified, the access point rejects new calls on this network.
Note
If this parameter is set to
zero (0), the controller assumes that you do not want to allocate any bandwidth
and allows all bandwidth requests.
Call Admission Control (CAC)
commands require that the WLAN you are planning to modify is configured for the
Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set
to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the
config 802.11{a |
b}cac voice acm enable, or
config 802.11{a |
b}cac video acm enable commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to specify the percentage of the maximum allocated bandwidth for video
applications on the selected radio band:
(Cisco Controller) > config 802.11 cac video max-bandwidth 50
Related Commands
config 802.11
cac video acm
config 802.11 cac video
roam-bandwidth
config 802.11 cac voice
stream-size
config 802.11 cac voice roam-bandwidth
config 802.11 cac
media-stream
To configure media
stream Call Admission Control (CAC) voice and video quality parameters for
802.11a and 802.11b networks, use the
config 802.11 cac
media-stream command.
Configures
CAC parameters for multicast-direct media streams.
max-retry-percent
Configures
the percentage of maximum retries that are allowed for multicast-direct media
streams.
retry-percentage
Percentage
of maximum retries that are allowed for multicast-direct media streams.
min-client-rate
Configures
the minimum transmission data rate to the client for multicast-direct media
streams.
dot11-rate
Minimum
transmission data rate to the client for multicast-direct media streams. Rate
in kbps at which the client can operate.
If the
transmission data rate is below this rate, either the video will not start or
the client may be classified as a bad client. The bad client video can be
demoted for better effort QoS or subject to denial. The available data rates
are 6000, 9000, 12000, 18000, 24000, 36000, 48000, 54000, and 11n rates.
Command Default
The default value
for the maximum retry percent is 80. If it exceeds 80, either the video will
not start or the client might be classified as a bad client. The bad client
video will be demoted for better effort QoS or is subject to denial.
Usage Guidelines
CAC commands for video
applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for Wi-Fi Multimedia (WMM) protocol and the
quality of service (QoS) level be set to Gold.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network
you want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration
by entering the
save config
command.
Enable voice or video CAC
for the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable command.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following
example shows how to configure the maximum retry percent for multicast-direct
media streams as 90 on a 802.11a network:
To configure the CAC
media voice and video quality parameters for 802.11a and 802.11b networks, use
the
config 802.11 cac
multimedia command.
config 802.11
{
a |
b}
cac
multimedia
max-bandwidth
bandwidth
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
max-bandwidth
Configures
the percentage of maximum bandwidth allocated to Wi-Fi Multimedia (WMM) clients
for voice and video applications on the 802.11a or 802.11b/g network.
bandwidth
Percentage
of the maximum bandwidth allocated to WMM clients for voice and video
applications on the 802.11a or 802.11b/g network. Once the client reaches the
specified value, the access point rejects new calls on this radio band. The
range is from 5 to 85%.
Command Default
The default maximum
bandwidth allocated to Wi-Fi Multimedia (WMM) clients for voice and video
applications on the 802.11a or 802.11b/g network is 85%.
Usage Guidelines
Call Admission Control (CAC)
commands for video applications on the 802.11a or 802.11b/g network require
that the WLAN you are planning to modify is configured for Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Gold.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable command.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following
example shows how to configure the percentage of the maximum bandwidth
allocated to WMM clients for voice and video applications on the 802.11a
network:
To configure the percentage
of the maximum allocated bandwidth reserved for roaming video clients on the
802.11a or 802.11b/g network, use the
config 802.11 cac video
roam-bandwidth command.
config
802.11{
a |
b}
cac video roam-bandwidth
bandwidth
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
bandwidth
Bandwidth percentage value
from 5 to 85%.
Command Default
The maximum allocated
bandwidth reserved for roaming video clients on the 802.11a or 802.11b/g
network is 0%.
Usage Guidelines
The controller reserves the
specified bandwidth from the maximum allocated bandwidth for roaming video
clients.
Note
If this parameter is set to
zero (0), the controller assumes that you do not want to do any bandwidth
allocation and, therefore, allows all bandwidth requests.
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disable
wlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11
{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11
{a |
b}cac voice acm enable or
config 802.11
{a |
b}cac video acm enable command.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide
for your release.
Examples
The following example shows
how to specify the percentage of the maximum allocated bandwidth reserved for
roaming video clients on the selected radio band:
(Cisco Controller) > config 802.11 cac video roam-bandwidth 10
Related Commands
config 802.11 cac video
tspec-inactivity-timeout
config 802.11
cac video max-bandwidth
config 802.11 cac video
acm
config 802.11 cac video
cac-method
config 802.11 cac video
sip
config 802.11 cac video
load-based
config 802.11 cac
video sip
To enable or disable
video Call Admission Control (CAC) for nontraffic specifications (TSPEC) SIP
clients using video applications on the 802.11a or 802.11b/g network, use the
config 802.11 cac video
sip command.
config 802.11
{
a |
b}
cac
video sip
{
enable
|
disable}
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
enable
Enables
video CAC for non-TSPEC SIP clients using video applications on the 802.11a or
802.11b/g network.
When you
enable video CAC for non-TSPEC SIP clients, you can use applications like
Facetime and CIUS video calls.
disable
Disables
video CAC for non-TSPEC SIP clients using video applications on the 802.11a or
802.11b/g network.
Command Default
None
Usage Guidelines
CAC commands for video
applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and
the quality of service (QoS) level be set to Gold.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11
{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable command.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide
for your release.
Enable call
snooping on the WLAN on which the SIP client is present by entering the
config wlan call-snoop
enable
wlan_id command.
Examples
The following
example shows how to enable video CAC for non-TSPEC SIP clients using video
applications on the 802.11a network:
(Cisco Controller) > config 802.11 cac video sip enable
Related Commands
config 802.11
cac video tspec-inactivity-timeout
config 802.11
cac video max-bandwidth
config 802.11 cac video
acm
config 802.11 cac video
cac-method
config 802.11 cac video
load-based
config 802.11 cac video
roam-bandwidth
config 802.11 cac video
tspec-inactivity-timeout
To process or ignore the Call
Admission Control (CAC) Wi-Fi Multimedia (WMM) traffic specifications (TSPEC)
inactivity timeout received from an access point, use the
config 802.11 cac video
tspec-inactivity-timeout command.
config
802.11{
a |
b}
cac video
tspec-inactivity-timeout {
enable |
ignore}
Syntax Description
a
Specifies the 802.11a
network.
ab
Specifies the 802.11b/g
network.
enable
Processes the TSPEC
inactivity timeout messages.
ignore
Ignores the TSPEC inactivity
timeout messages.
Command Default
The default CAC WMM TSPEC
inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide for your release.
Examples
This example shows how to
process the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout enable
This example shows how to
ignore the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout ignore
Related Commands
config 802.11
cac video acm
config 802.11 cac video
max-bandwidth
config 802.11
cac video roam-bandwidth
config 802.11 cac voice
acm
To enable or disable
bandwidth-based voice Call Admission Control (CAC) for the 802.11a or 802.11b/g
network, use the
config 802.11 cac voice
acm command.
The default bandwidth-based
voice CAC for the 802.11a or 802.11b/g network id disabled.
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide for your release.
Examples
This example shows how to
enable the bandwidth-based CAC:
To set the percentage of the
maximum bandwidth allocated to clients for voice applications on the 802.11a or
802.11b/g network, use the
config 802.11 cac voice
max-bandwidth command.
config
802.11{
a |
b}
cac voice max-bandwidth
bandwidth
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
bandwidth
Bandwidth percentage value
from 5 to 85%.
Command Default
The default maximum bandwidth
allocated to clients for voice applications on the 802.11a or 802.11b/g network
is 0%.
Usage Guidelines
The maximum radio frequency
(RF) bandwidth cannot exceed 85% for voice and video. Once the client reaches
the value specified, the access point rejects new calls on this network.
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to specify the percentage of the maximum allocated bandwidth for voice
applications on the selected radio band:
To configure the percentage
of the Call Admission Control (CAC) maximum allocated bandwidth reserved for
roaming voice clients on the 802.11a or 802.11b/g network, use the
config 802.11 cac voice
roam-bandwidth command.
config
802.11{
a |
b}
cac voice roam-bandwidth
bandwidth
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
bandwidth
Bandwidth percentage value
from 0 to 85%.
Command Default
The default CAC maximum
allocated bandwidth reserved for roaming voice clients on the 802.11a or
802.11b/g network is 85%.
Usage Guidelines
The maximum radio frequency
(RF) bandwidth cannot exceed 85% for voice and video. The controller reserves
the specified bandwidth from the maximum allocated bandwidth for roaming voice
clients.
Note
If this parameter is set to
zero (0), the controller assumes you do not want to allocate any bandwidth and
therefore allows all bandwidth requests.
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the percentage of the maximum allocated bandwidth reserved for
roaming voice clients on the selected radio band:
To process or ignore the
Wi-Fi Multimedia (WMM) traffic specifications (TSPEC) inactivity timeout
received from an access point, use the
config 802.11 cac voice
tspec-inactivity-timeout command.
The default WMM TSPEC
inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
Call Admission Control (CAC)
commands require that the WLAN you are planning to modify is configured for
Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set
to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acmenable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This
command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to enable the voice TSPEC inactivity timeout messages
received from an access point:
The default load-based CAC
for the 802.11a or 802.11b/g network is disabled.
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acmenable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the voice load-based CAC parameters:
Do not use the
config 802.11 cac voice
max-calls command if the SIP call snooping feature is disabled
and if the SIP based Call Admission Control (CAC) requirements are not met.
To configure the maximum
number of voice call supported by the radio, use the
config 802.11 cac voice
max-calls command.
config
802.11{
a |
b}
cac
voice max-calls
number
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
number
Number of calls to be allowed
per radio.
Command Default
The default maximum number
of voice call supported by the radio is 0, which means that there is no maximum
limit check for the number of calls.
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acmenable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the maximum number of voice calls supported by radio:
Specifies the packetization
interval for SIP codec.
number_msecs
Packetization sample interval
in msecs. The sample interval for SIP codec is 20 seconds.
Command Default
None
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acmenable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the bandwidth and voice packetization interval for a SIP
codec:
To configure the Call
Admission Control (CAC) codec name and sample interval as parameters and to
calculate the required bandwidth per call for the 802.11a or 802.11b/g network,
use the
config 802.11 cac voice sip
codec command.
Specifies the packetization
interval for SIP codec.
number_msecs
Packetization interval in
msecs. The sample interval for SIP codec value is 20 seconds.
Command Default
The default CAC codec
parameter is g711.
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acmenable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the codec name and sample interval as parameters for SIP G711
codec:
To configure the number of
aggregated voice Wi-Fi Multimedia (WMM) traffic specification (TSPEC) streams
at a specified data rate for the 802.11a or 802.11b/g network, use the
config 802.11 cac voice
stream-size command.
config
802.11{
a |
b}
cac
voice stream-size
stream_size
number
mean_datarate
max-streams
mean_datarate
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
stream-size
Configures the maximum data
rate for the stream.
stream_size
Range of stream size is
between 84000 and 92100.
number
Number (1 to 5) of voice
streams.
mean_datarate
Configures the mean data
rate.
max-streams
Configures the mean data
rate of a voice stream.
mean_datarate
Mean data rate (84 to 91.2
kbps) of a voice stream.
Command Default
The default number of streams is 2 and the mean data rate of a
stream is 84 kbps.
Usage Guidelines
Call Admission Control (CAC)
commands require that the WLAN you are planning to modify is configured for the
Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set
to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acmenable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco
Wireless LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the number of aggregated voice traffic specifications stream
with the stream size 5 and the mean data rate of 85000 kbps:
The following example shows
how to enable radio transmission for AP1 on an 802.11b network:
(Cisco Controller) > config 802.11b enable AP1
Related Commands
show
sysinfo show 802.11a
config wlan
radio
config 802.11a
disable
config 802.11b
disable
config 802.11b
enable
config 802.11b 11gSupport
enable
config 802.11b 11gSupport
disable
config 802.11
exp-bwreq
To enable or disable the
Cisco Client eXtension (CCX) version 5 expedited bandwidth request feature for
an 802.11 radio, use the
config 802.11
exp-bwreq command.
config
802.11{
a |
b}
exp-bwreq {
enable |
disable}
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
enable
Enables the expedited
bandwidth request feature.
disable
Disables the expedited
bandwidth request feature.
Command Default
The expedited bandwidth
request feature is disabled by default.
Usage Guidelines
When this command is enabled,
the controller configures all joining access points for this feature.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the CCX expedited bandwidth settings:
(Cisco Controller) > config 802.11a exp-bwreq enable
Cannot change Exp Bw Req mode while 802.11a network is operational.
The following example shows
how to disable the CCX expedited bandwidth settings:
Minimum received signal
strength indicator (RSSI) that is required for the client to associate to the
access point. If the client’s average received signal power dips below this
threshold, reliable communication is usually impossible. Clients must already
have found and roamed to another access point with a stronger signal before the
minimum RSSI value is reached. The valid range is –80 to –90 dBm, and the
default value is –85 dBm.
roam_hyst
How much greater the signal
strength of a neighboring access point must be in order for the client to roam
to it. This parameter is intended to reduce the amount of roaming between
access points if the client is physically located on or near the border between
the two access points. The valid range is 2 to 4 dB, and the default value is 2
dB.
scan_thresh
Minimum RSSI that is allowed
before the client should roam to a better access point. When the RSSI drops
below the specified value, the client must be able to roam to a better access
point within the specified transition time. This parameter also provides a
power-save method to minimize the time that the client spends in active or
passive scanning. For example, the client can scan slowly when the RSSI is
above the threshold and scan more rapidly when the RSSI is below the threshold.
The valid range is –70 to –77 dBm, and the default value is –72 dBm.
trans_time
Maximum time allowed for the
client to detect a suitable neighboring access point to roam to and to complete
the roam, whenever the RSSI from the client’s associated access point is below
the scan threshold. The valid range is 1 to 10 seconds, and the default value
is 5 seconds.
Note
For high-speed client roaming
applications in outdoor mesh environments, we recommend that you set the
transition time to 1 second.
Command Default
The default minimum RSSI is -85 dBm. The
default signal strength of a neighboring access point is 2 dB. The default scan
threshold value is -72 dBm. The default time allowed for the client to detect a
suitable neighboring access point to roam to and to complete the roam is 5
seconds.
Usage Guidelines
For high-speed client roaming
applications in outdoor mesh environments, we recommend that you set the
trans_time to 1 second.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure custom Layer 2 client roaming parameters on an 802.11a
network:
To configure the maximum
number of clients per access point, use the
config 802.11
max-clients command.
config
802.11{
a |
b}
max-clients
max-clients
Syntax Description
a
Specifies the 802.11a
network.
b
Specifies the 802.11b/g
network.
max-clients
Configures the maximum number
of client connections per access point.
max-clients
Maximum number of client
connections per access point. The range is from 1 to 200.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to set the maximum number of clients at 22:
(Cisco Controller) > config 802.11 max-clients 22
Related Commands
show ap config
802.11a
config 802.11b
rate
config 802.11 multicast
data-rate
To configure the minimum
multicast data rate, use the
config 802.11 multicast
data-rate command.
config
802.11{
a |
b}
multicast data-rate
data_rate
[
ap
ap_name
|
default]
Syntax Description
data_rate
Minimum multicast data rates.
The options are 6, 9, 12, 18, 24, 36, 48, 54. Enter 0 to specify that APs will
dynamically adjust the number of the buffer allocated for multicast.
ap_name
Specific AP radio in this
data rate.
default
Configures all APs radio in
this data rate.
Command Default
The default is 0 where the
configuration is disabled and the multicast rate is the lowest mandatory data
rate and unicast client data rate.
Usage Guidelines
When you configure the data
rate without the AP name or
default
keyword, you globally reset all the APs to the new value and update the
controller global default with this new data rate value. If you configure the
data rate with
default
keyword, you only update the controller global default value and do not reset
the value of the APs that are already joined to the controller. The APs that
join the controller after the new data rate value is set receives the new data
rate value.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure minimum multicast data rate settings:
Specifies that a client
supports the data rate in order to use the network.
supported
Specifies to allow any
associated client that supports the data rate to use the network.
rate
Rate value of 6, 9, 12, 18,
24, 36, 48, or 54 Mbps.
Command Default
None
Usage Guidelines
The data rates set with this
command are negotiated between the client and the Cisco wireless LAN
controller. If the data rate is set to
mandatory, the client must support it in order to
use the network. If a data rate is set as
supported by the Cisco wireless LAN controller,
any associated client that also supports that rate may communicate with the
Cisco lightweight access point using that rate. It is not required that a
client is able to use all the rates marked
supported in order to associate.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to set the 802.11b transmission at a mandatory rate at 12 Mbps:
Configures the call admission
limit for the 7920s.
G711-CU-Quantum
Configures the value supplied
by the infrastructure indicating the current number of channel utilization
units that would be used by a single G.711-20ms call.
limit
Call admission limit (from 0
to 255). The default value is 105.
quantum
G711 quantum value. The
default value is 15.
Command Default
None.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
This example shows how to
configure the call admission limit for 7920 VISE parameters:
To enable a specific enhanced
distributed channel access (EDCA) profile on the 802.11a network, use the
config advanced 802.11
edca-parameters command.
Enables the Wi-Fi Multimedia
(WMM) default parameters. Choose this option when voice or video services are
not deployed on your network.
svp-voice
Enables Spectralink voice
priority parameters. Choose this option if Spectralink phones are deployed on
your network to improve the quality of calls.
optimized-voice
Enables EDCA voice-optimized
profile parameters. Choose this option when voice services other than
Spectralink are deployed on your network.
optimized-video-voice
Enables EDCA voice- and
video-optimized profile parameters. Choose this option when both voice and
video services are deployed on your network.
Note
If you deploy video services,
admission control (ACM) must be disabled.
custom-voice
Enables custom voice EDCA
parameters for 802.11a. The EDCA parameters under this option also match the
6.0 WMM EDCA parameters when this profile is applied.
Command Default
The default EDCA parameter is
wmm-default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
This example shows how to
enable Spectralink voice priority parameters:
Preferred call number that
can contain up to 27 characters.
none
Deletes the preferred call
set for the specified index.
Command Default
None
Usage Guidelines
Before you configure voice
prioritization, you must complete the following prerequisites:
Set the voice to the platinum
QoS level by entering the
config wlan qoswlan-idplatinum
command.
Enable the admission control
(ACM) to this radio by entering the
config 802.11 {a |
b}
cac {voice |
video}
acm enable
command.
Enable the call-snooping
feature for a particular WLAN by entering the
config wlan call-snoop
enablewlan-id
command.
To view statistics about
preferred calls, enter the
show ap stats {802.11{a |
b} |
wlan}
cisco_ap
command.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to add a new preferred call for index 2:
To create a new
Application Visibility and Control (AVC) profile, use the
config avc profile
create command.
config avc profile
profile_name
create
Syntax Description
profile_name
Name of the
AVC profile. The profile name can be up to 32 case-sensitive, alphanumeric
characters.
create
Creates a
new AVC profile.
Command Default
None
Command History
Release
Modification
7.4
This command
was introduced.
Usage Guidelines
You can configure up
to 16 AVC profiles on a controller and associate an AVC profile with multiple
WLANs. You can configure only one AVC profile per WLAN and each AVC profile can
have up to 32 rules. Each rule states a Mark or Drop action for an application,
which allows you to configure up to 32 application actions per WLAN.
Examples
The following
example shows how to create a new AVC profile:
To configure a rule
for an Application Visibility and Control (AVC) profile, use the
config avc profile
rule command.
config avc profile
profile_name
rule
{
add
|
remove}
application
application_name
{
drop
|
mark
dscp}
Syntax Description
profile_name
Name of the
AVC profile.
rule
Configures a
rule for the AVC profile.
add
Creates a
rule for the AVC profile.
remove
Deletes a
rule for the AVC profile.
application
Specifies
the application that has to be dropped or marked.
application_name
Name of the
application. The application name can be up to 32 case-sensitive, alphanumeric
characters.
drop
Drops the
upstream and downstream packets that correspond to the chosen application.
mark
Marks the
upstream and downstream packets that correspond to the chosen application with
the Differentiated Services Code Point (DSCP) value that you specify in the
drop-down list. The DSCP value helps you provide differentiated services based
on the QoS levels.
dscp
Packet
header code that is used to define the QoS across the Internet. The range is
from 0 to 63.
Command Default
None
Command History
Release
Modification
7.4
This
command was introduced.
Examples
The following
example shows how to configure a rule for an AVC profile:
Specifies the Certificate
Authority (CA) server settings.
http://url:port/path
Domain name or IP address of
the CA server.
ca-cert
Specifies CA certificate
database settings.
add
Obtains a CA certificate from
the CA server and adds it to the controller’s certificate database.
delete
Deletes a CA certificate from
the controller’s certificate database.
subject-params
Specifies the device
certificate settings.
country state
city orgn dept email
Country, state, city,
organization, department, and email of the certificate authority.
Note
The common name (CN) is
generated automatically on the access point using the current MIC/SSC format
Cxxxx-MacAddr, where
xxxx is the product number.
other-params
Specifies the device
certificate key size settings.
keysize
Value from 384 to 2048 (in
bits); the default value is 2048.
ap-provision
Specifies the access point
provision list settings.
auth-list
Specifies the provision list
authorization settings.
ap_mac
MAC address of access point
to be added or deleted from the provision list.
revert-cert
Specifies the number of times
the access point attempts to join the controller using an LSC before reverting
to the default certificate.
retries
Value from 0 to 255; the
default value is 3.
Note
If you set the number of
retries to 0 and the access point fails to join the controller using an LSC,
the access point does not attempt to join the controller using the default
certificate. If you are configuring LSC for the first time, we recommend that
you configure a nonzero value.
Command Default
The default value of
keysize is 2048 bits. The default value of
retries is 3.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You can configure only one
CA server. To configure a different CA server, delete the configured CA server
by using the
config certificate lsc
ca-server delete command, and then configure a different CA
server.
If you configure an access
point provision list, only the access points in the provision list are
provisioned when you enable AP provisioning (in Step 8). If you do not
configure an access point provision list, all access points with an MIC or SSC
certificate that join the controller are LSC provisioned.
Examples
The following example shows
how to enable the LSC settings:
(Cisco Controller) >config certificate lsc enable
This example shows how to
enable the LSC settings for Certificate Authority (CA) server settings:
Configures
hash validation of the SSC certificate.
enable
Enables
hash validation of the SSC certificate.
disable
Disables
hash validation of the SSC certificate.
Command Default
The SSC certificate
is enabled by default..
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
When you enable the
SSC hash validation, an AP validates the SSC certificate of the virtual
controller. When an AP validates the SSC certificate, it checks if the hash key
of the virtual controller matches the hash key stored in its flash. If a match
is found, the validation passes and the AP moves to the Run state. If a match
is not found, the validation fails and the AP disconnects from the controller
and restarts the discovery process. By default, hash validation is enabled.
Hence, an AP must have the virtual controller hash key in its flash before
associating with the virtual controller. If you disable hash validation of the
SSC certificate, the AP bypasses the hash validation and directly moves to the
Run state.
APs can associate
with a physical controller, download the hash keys and then associate with a
virtual controller. If the AP is associated to a physical controller and if
hash validation is disabled, it joins any virtual controller without hash
validation.
Examples
The following
example shows how to enable hash validation of the SSC certificate:
This command was introduced in a release earlier than Release
7.6.
Examples
The following
example shows how to use a device certificate for web administration:
(Cisco Controller) >config certificate use-device-certificate webadmin
Use device certificate for web administration. Do you wish to continue? (y/n) y
Using device certificate for web administration.
Save configuration and restart controller to use new certificate.
Related Commands
config certificate
show certificate compatibility
show certificate lsc
show certificate ssc
show certificate summary
show local-auth certificates
config coredump
To enable or disable the
controller to generate a core dump file following a crash, use the
config cordump
command.
config coredump
{
enable |
disable}
Syntax Description
enable
Enables the controller to
generate a core dump file.
disable
Disables the controller to
generate a core dump file.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the controller to generate a core dump file following a crash:
(Cisco Controller) >config coredump enable
Related Commands
config coredump ftp
config coredump username
show coredump summary
config coredump ftp
To automatically upload a
controller core dump file to an FTP server after experiencing a crash, use the
config coredump
ftp command.
config coredump
ftp
server_ip_address
filename
Syntax Description
server_ip_address
IP address of the FTP server
to which the controller sends its core dump file.
filename
Name given to the controller
core dump file.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The controller must be able
to reach the FTP server to use this command.
Examples
The following example shows
how to configure the controller to upload a core dump file named
core_dump_controller to an FTP server at network
address
192.168.0.13:
To specify the FTP server
username and password when uploading a controller core dump file after
experiencing a crash, use the
config coredump
username command.
To configure the complete
external web authentication URL for the custom-web authentication page, use the
config custom-web
ext-webauth-url command.
config
custom-web ext-webauth-url
URL
Syntax Description
URL
URL used for web-based client
authorization.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the complete external web authentication URL
http://www.AuthorizationURL.com/ for the web-based client authorization:
Configures an address range to allocate. You must specify the scope name and the first and last addresses of the address range.
create-scopename
Creates a new DHCP scope. You must specify the scope name.
default-routerscoperouter_1 [router_2] [router_3]
Configures the default routers for the specified scope and specify the IP address of a router. Optionally, you can specify the IP addresses of secondary and tertiary routers.
delete-scopescope
Deletes the specified DHCP scope.
disablescope
Disables the specified DHCP scope.
dns-serversscopedns1 [dns2] [dns3]
Configures the name servers for the given scope. You must also specify at least one name server. Optionally, you can specify secondary and tertiary name servers.
domainscopedomain
Configures the DNS domain name. You must specify the scope and domain names.
enablescope
Enables the specified dhcp scope.
leasescopelease_duration
Configures the lease duration (in seconds) for the specified scope.
netbios-name-serverscope wins1 [wins2] [wins3]
Configures the netbios name servers. You must specify the scope name and the IP address of a name server. Optionally, you can specify the IP addresses of secondary and tertiary name servers.
networkscopenetwork netmask
Configures the network and netmask. You must specify the scope name, the network address, and the network mask.
opt-82 remote-id
Configures the DHCP option 82 remote ID field format.
DHCP option 82 provides additional security when DHCP is used to allocate network addresses. The controller acts as a DHCP relay agent to prevent DHCP client requests from untrusted sources. The controller adds option 82 information to DHCP requests from clients before forwarding the requests to the DHCP server.
ap_mac
MAC address of the access point to the DHCP option 82 payload.
ap_mac:ssid
MAC address and SSID of the access point to the DHCP option 82 payload.
ap-ethmac
Remote ID format as AP Ethernet MAC address.
apname:ssid
Remote ID format as AP name:SSID.
ap-group-name
Remote ID format as AP group name.
flex-group-name
Remote ID format as FlexConnect group name .
ap-location
Remote ID format as AP location.
apmac-vlan_id
Remote ID format as AP radio MAC address:VLAN_ID.
apname-vlan_id
Remote ID format as AP Name:VLAN_ID.
ap-ethmac-ssid
Remote ID format as AP Ethernet MAC:SSID address.
Command Default
The default value for ap-group-name is default-group, and for ap-location, the default value is default location.
If ap-group-name and flex-group-name are null, the system MAC is sent as the remote ID field.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Use the show dhcp command to display the internal DHCP configuration.
Examples
The following example shows how to configure the DHCP lease for the scope 003:
(Cisco Controller) >config dhcp lease 003
config dhcp proxy
To specify the level at which DHCP packets are modified, use the config dhcp proxy command.
Allows the controller to modify the DHCP packets without a limit.
disable
Reduces the DHCP packet modification to the level of a relay.
bootp-broadcast
Configures DHCP BootP broadcast option.
Command Default
DHCP is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Use the show dhcp proxy command to display the status of DHCP proxy handling.
To enable third-party WGB support, you must enable the passive-client feature on the wirless LAN by entering the config wlan passive-client enable command.
Examples
The following example shows how to disable the DHCP packet modification:
(Cisco Controller) >config dhcp proxy disable
The following example shows how to enable the DHCP BootP broadcast option:
Associates a
NetFlow monitor with an exporter, or a NetFlow record with a NetFlow monitor.
delete
Dissociates
a NetFlow monitor from an exporter, or a NetFlow record from a NetFlow monitor.
monitor
Configures a
NetFlow monitor.
monitor_name
Name of the
NetFlow monitor. The monitor name can be up to 32 case-sensitive, alphanumeric
characters. You cannot include spaces for a monitor name.
exporter
Configures a
NetFlow exporter.
exporter_name
Name of the
NetFlow exporter. The exporter name can be up to 32 case-sensitive,
alphanumeric characters. You cannot include spaces for an exporter name.
record
Associates a
NetFlow record to the NetFlow monitor.
record_name
Name of the
IPv4 NetFlow record of the client application.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
An exporter is a
network entity that exports the template with the IP traffic information. The
controller acts as an exporter. A NetFlow record in the controller contains the
information about the traffic in a given flow such as client MAC address,
client source IP address, WLAN ID, incoming and outgoing bytes of data,
incoming and outgoing packets, incoming and outgoing DSCP.
Examples
The following
example shows how to configure the flow monitor and exporter:
To use a guest-LAN specific
custom web configuration rather than a global custom web configuration, use the
config guest-lan custom-web
global disable
command.
config guest-lan
custom-web global disable
guest_lan_id
Syntax Description
guest_lan_id
Guest LAN identifier between
1 and 5 (inclusive).
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
If you enter the
config guest-lan custom-web
global enableguest_lan_id
command, the custom web authentication configuration at the global level is
used.
Examples
The following example shows
how to disable the global web configuration for guest LAN ID 1:
(Cisco Controller) >config guest-lan custom-web global disable 1
Related Commands
config
guest-lan
config guest-lan
create
config guest-lan custom-web
ext-webauth-url
config guest-lan custom-web
login_page
config guest-lan custom-web
webauth-type
config guest-lan custom-web
login_page
To enable wired guest users
to log into a customized web login page, use the
config guest-lan custom-web
login_page
command.
To configure the wired guest
VLAN’s ingress interface that provides a path between the wired guest client
and the controller through the Layer 2 access switch, use the
config guest-lan
ingress-interface
command.
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to provide a path between the wired guest client and the controller with
guest LAN ID 1 and the interface name guest01:
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure an egress interface to transmit guest traffic out of the
controller for guest LAN ID 1 and interface name guest01:
To specify the license level
to be used on the next reboot of the Cisco 5500 Series Controller, use the
config license
boot command.
config license boot
{
base |
wplus |
auto}
Syntax Description
base
Specifies the base boot
level.
wplus
Specifies the wplus boot
level.
auto
Specifies the auto boot
level.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
If you enter
auto, the licensing software automatically chooses
the license level to use on the next reboot. It generally chooses permanent
licenses over evaluation licenses and wplus licenses over base licenses.
Note
If you are considering
upgrading from a base license to a wplus license, you can try an evaluation
wplus license before upgrading to a permanent wplus license. To activate the
evaluation license, you need to set the image level to wplus in order for the
controller to use the wplus evaluation license instead of the base permanent
license.
Note
To prevent disruptions in
operation, the controller does not switch licenses when an evaluation license
expires. You must reboot the controller in order to return to a permanent
license. Following a reboot, the controller defaults to the same feature set
level as the expired evaluation license. If no permanent license at the same
feature set level is installed, the controller uses a permanent license at
another level or an unexpired evaluation license.
Examples
The following example shows
how to set the license boot settings to wplus:
(Cisco Controller) >config license boot wplus
Related Commands
license install
show license in-use
license modify priority
config load-balancing
To globally configure
aggressive load balancing on the controller, use the
config
load-balancing command.
Specifies the aggressive load
balancing client window.
client_count
Aggressive load balancing
client window with the number of clients from 1 to 20.
status
Sets the load balancing
status.
enable
Enables load balancing
feature.
disable
Disables load balancing
feature.
denial
Specifies the number of
association denials during load balancing.
denial_count
Maximum number of association
denials during load balancing. from 0 to 10.
uplink-threshold
Specifies the threshold
traffic for an access point to deny new associations.
traffic_threshold
Threshold traffic for an
access point to deny new associations. This value is a percentage of the WAN
utilization measured over a 90 second interval. For example, the default
threshold value of 50 triggers the load balancing upon detecting an utilization
of 50% or more on an access point WAN interface.
Command Default
By default, the aggressive
load balancing is disabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Load-balancing-enabled WLANs
do not support time-sensitive applications like voice and video because of
roaming delays.
When you use Cisco 7921 and
7920 Wireless IP Phones with controllers, make sure that aggressive load
balancing is disabled on the voice WLANs for each controller. Otherwise, the
initial roam attempt by the phone might fail, causing a disruption in the audio
path.
Clients can only be load
balanced across access points joined to the same controller. The WAN
utilization is calculated as a percentage using the following formula:
(Transmitted Data Rate (per second) + Received Data Rate (per
second))/(1000Mbps TX + 1000Mbps RX) * 100
Examples
The following example shows
how to enable the aggressive load-balancing settings:
To cause the controller to
include information about the source file in the message logs or to prevent the
controller from displaying this information, use the
config logging
fileinfo command.
config logging fileinfo
{
enable |
disable}
Syntax Description
enable
Includes information about
the source file in the message logs.
disable
Prevents the controller from
displaying information about the source file in the message logs.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the controller to include information about the source file in
the message logs:
To cause the controller to
include process information in the message logs or to prevent the controller
from displaying this information, use the
config logging
procinfo command.
config logging procinfo
{
enable |
disable}
Syntax Description
enable
Includes process information
in the message logs.
disable
Prevents the controller from
displaying process information in the message logs.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the controller to include the process information in the message
logs:
To cause the controller to
include traceback information in the message logs or to prevent the controller
from displaying this information, use the
config logging
traceinfo command.
config logging traceinfo {
enable |
disable}
Syntax Description
enable
Includes traceback
information in the message logs.
disable
Prevents the controller from
displaying traceback information in the message logs.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to disable the controller to include the traceback information in the
message logs:
Name of the
access point on which mDNS snooping has to be configured.
all
Configures
mDNS snooping on all access points.
vlan
(Optional)
Configures the VLAN on which the access point snoops and forwards the mDNS
packets.
vlan_id
VLAN
identifier.
disable
Disables
mDNS snooping on an access point.
add
Adds a
VLAN from which the access point snoops and forwards the mDNS packets to the
Cisco Wireless LAN Controller (WLC). You can configure up to 10 VLANs for an
mDNS access point.
delete
Deletes a
VLAN from which the access point snoops and forwards the mDNS packets to the
Cisco WLC.
Command Default
The mDNS-enabled
access point snoops the access or native VLANs by default.
Command History
Release
Modification
7.5
This
command was introduced.
Usage Guidelines
Enabling mDNS
snooping on access points allows the access points to snoop the wired services
on VLANs that are invisible to the Cisco WLC. mDNS snooping is supported only
on local-mode and monitor-mode access points. The access point must be in the
access mode or trunk mode. If the access point is in the trunk mode, you must
configure the VLAN on the Cisco WLC on which the access point snoops and
forwards the mDNS packets. You must also configure the native VLAN from the
Cisco WLC for the access point to snoop and send mDNS queries on. The access
point also tags the packets with the native VLAN.
Global mDNS
snooping overrides mDNS access point snooping.
Examples
The following
example shows how to enable mDNS snooping on an access point and the VLAN on
which it must snoop for mDNS packets:
(Cisco Controller) >config mdns ap enable vlan 1
config mdns
profile
To configure a
multicast DNS (mDNS) profile and associate a service with the profile, use the
config mdns profile
command.
config mdns profile {
create
|
delete
|
service
{
add |
delete}
service _name
profile_name
Syntax Description
create
Creates an
mDNS profile.
delete
Deletes an
mDNS profile. If the profile is associated to an interface group, an interface,
or a WLAN, an error appears.
service
Configures
an mDNS service.
add
Adds an mDNS
service to an mDNS profile.
delete
Deletes an
mDNS service from an mDNS profile.
service
-name
Name of the
mDNS service.
profile_name
Name of the
mDNS profile. You can create a maximum of 16 profiles.
Command Default
By default, the
controller has an mDNS profile, default-mdns-profile. You cannot delete this
default profile.
Command History
Release
Modification
7.4
This
command was introduced.
Usage Guidelines
After creating a new
profile, you must map the profile to an interface group, an interface, or a
WLAN. Clients receive service advertisements only for the services associated
with the profile. The controller gives the highest priority to the profiles
associated to interface groups, followed by the interface profiles, and then
the WLAN profiles. Each client is mapped to a profile based on the order of
priority.
By default, the
controller has an mDNS profile, default-mdns-profile. You cannot delete this
default profile.
Examples
The following
example shows how to add the Apple TV mDNS service to the mDNS profile1.
(Cisco Controller) >config mdns profile create profile1 Apple TV
Related Commands
config mdns
query interval
config mdns
service
config mdns
snooping
config interface
mdns-profile
config interface group
mdns-profile
config wlan
mdns
show mdns
profile
show mnds
service
clear mdns
service-database
debug mdns all
debug mdns error
debug mdns detail
debug mdns message
config mdns query
interval
To configure the
query interval for multicast DNS (mDNS) services, use the
config mdns query interval
command.
config mdns query interval
interval_value
Syntax Description
interval_value
mDNS query
interval, in minutes, that you can set. The query interval is the frequency at
which the controller sends periodic queries to all the services defined in the
Master Services database. The range is from 10 to 120.
Command Default
The default query
interval for an mDNS service is 15 minutes.
Command History
Release
Modification
7.4
This command
was introduced.
Usage Guidelines
The controller
snoops and learns about the mDNS service advertisements only if the service is
available in the Master Services database. mDNS uses the multicast IP address
224.0.0.251 as the destination address and 5353 as UDP destination port.
Examples
The following
example shows how to configure the query interval for mDNS services as 20
minutes.
(Cisco Controller) >config mdns query interval 20
Related Commands
config mdns
profile
config mdns
service
config mdns
snooping
config interface
mdns-profile
config interface group
mdns-profile
config wlan
mdns
show mdns
profile
show mnds
service
clear mdns
service-database
debug mdns all
debug mdns error
debug mdns detail
debug mdns message
config mdns service
To configure
multicast DNS (mDNS) services in the master services database, use the
config mdns service
command.
The following
command is valid in Release 7.5 and later releases:
Adds a new
mDNS service to the Master Services database.
service_name
Name of the
mDNS service, for example, Air Tunes, iTunes Music Sharing, FTP, Apple File
Sharing Protocol (AFP).
service_string
Unique
string associated to an mDNS service, for example, _airplay._tcp.local. is the
service string associated with Apple TV.
delete
Deletes an
mDNS service from the Master Services database. Before deleting the service,
the controller checks if any profile is using the service.
Note
You
must delete the service from all profiles before deleting it.
query
Configures
the query status for the mDNS service.
enable
Enables
periodic query for an mDNS service by the controller.
disable
Disables
periodic query for an mDNS service by the controller.
origin
Configures the origin of
the mDNS service. You can restrict the origin of the service as wired or
wireless.
Wireless
Configures the origin of
the mDNS service as wireless.
Wired
Configures the origin of
the mDNS service as wired.
All
Configures the origin of
the mDNS service as wireless or wired.
lss
Configures Location
Specific Services (LSS) for a service or all mDNS services. LSS is not
applicable for registered service providers. The registered service providers
are always included if the querying client corresponds to the user. You cannot
configure LSS on the services configured as only wired.
all
Configures LSS for all
mDNS services.
priority-mac
Configures the MAC address
of a service provider device. This device gets a priority even if the service
provider database is full.
add
Adds the MAC address of a
service provider device for priority.
You can configure up to 50
MAC addresses for a service.
delete
Deletes the MAC address of
a service provider device from the priority list.
priority-mac
MAC address of a service
provider device that needs priority. The MAC address must be unique for each
service.
ap-group
Configures the access point
group for wired service providers. These service providers get priority over
others. When a client mNDS query originates from this AP group, the wired
entries with priority MAC addresses and access point groups are listed first in
the aggregated response.
ap-group-name
Name of the access point
group to which the service provider belongs.
Command Default
By default, LSS is
disabled, but it is enabled for all the discovered services.
Command History
Release
Modification
7.4
This
command was introduced.
7.5
This command was modified.
The
origin,
Wireless,
Wired,
All,
lss,
priority-mac,
add,
delete,
ap-group
keywords and
priority-macap-group-name
arguments were added.
Usage Guidelines
In Release 7.5 and later
releases, the maximum number of service providers for different controller
models are as follows:
Cisco 5500 Series
Controller and Cisco 2500 Series Controller—6400
Cisco Wireless
Services Module 2—6400
Cisco 8500
Series Controller and Cisco 7500 Series Controller—16000
You cannot change the
services with the origin set to Wireless to Wired if LSS is enabled for the
service.
Examples
The following
example shows how to add the HTTP mDNS service to the Master Services database,
configure the origin as wireless, and enable LSS for the service:
The following
example shows how to add a priority MAC address of a HTTP service provider
device:
(Cisco Controller) >config mdns service priority-mac add 44:03:a7:a3:04:45 http
config mdns snooping
To enable or disable
global multicast DNS (mDNS) snooping on the Cisco WLC, use the
config mdns snooping
command.
config mdns snooping
{
enable |
disable}
Syntax Description
enable
Enables mDNS
snooping on the Cisco WLC.
disable
Disables
mDNS snooping on the Cisco WLC.
Command Default
By default, mDNS
snooping is enabled on the Cisco WLC.
Command History
Release
Modification
7.4
This command
was introduced.
Usage Guidelines
mDNS service
discovery provides a way to announce and discover services on the local
network. mDNS perform DNS queries over IP multicast. mDNS supports zero
configuration IP networking.
Examples
The following
example shows how to enable mDNS snooping:
(Cisco Controller) >config mdns snooping enable
Related Commands
config mdns
query interval
config mdns
service
config mdns
profile
config interface
mdns-profile
config interface group
mdns-profile
config wlan
mdns
show mdns
profile
show mnds
service
clear mdns
service-database
debug mdns all
debug mdns error
debug mdns detail
debug mdns message
config memory monitor
errors
To enable or disable
monitoring for memory errors and leaks, use the
config memory monitor
errors command.
config memory
monitor errors
{
enable |
disable}
Caution
The
config memory monitor commands can be disruptive
to your system and should be run only when you are advised to do so by the
Cisco TAC.
Syntax Description
enable
Enables the monitoring for
memory settings.
disable
Disables the monitoring for
memory settings.
Command Default
Monitoring for
memory errors and leaks is disabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Be cautious about changing
the defaults for the
config memory
monitor command unless you know what you are doing, you have
detected a problem, or you are collecting troubleshooting information.
Examples
The following example shows
how to enable monitoring for memory errors and leaks for a controller:
The
config memory
monitor commands can be disruptive to your system and should be
run only when you are advised to do so by the Cisco TAC.
Syntax Description
low_thresh
Value below which free memory
cannot fall without crashing. This value cannot be set lower than 10000 KB.
high_thresh
Value below which the
controller enters auto-leak-analysis mode. See the “Usage Guidelines” section.
Command Default
The default value for
low_thresh is 10000 KB; the default value for
high_thresh is 30000 KB.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Note
Be cautious about changing
the defaults for the
config memory
monitor command unless you know what you are doing, you have
detected a problem, or you are collecting troubleshooting information.
Use this command if you
suspect that a memory leak has occurred.
If the free memory is lower
than the
low_thresh threshold, the system crashes,
generating a crash file. The default value for this parameter is 10000 KB, and
you cannot set it below this value.
Set the
high_thresh threshold to the current free memory
level or higher so that the system enters auto-leak-analysis mode. After the
free memory reaches a level lower than the specified
high_thresh threshold, the process of tracking and
freeing memory allocation begins. As a result, the
debug memory events
enable command shows all allocations and frees, and the
show memory monitor
detail command starts to detect any suspected memory leaks.
Examples
The following example shows
how to set the threshold values for auto-leak-analysis mode to 12000 KB for the
low threshold and 35000 KB for the high threshold:
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
If you do not assign a QoS
role to a guest user, the Role field in the User Details shows the role as
default. The bandwidth contracts for this user are defined in the QoS profile
for the WLAN.
If you want to unassign a QoS
role from a guest user, use the
config netuser guest-role
applyusernamedefault. This
user now uses the bandwidth contracts defined in the QoS profile for the WLAN.
Examples
The following example shows
how to apply a QoS role to a guest user jsmith with the QoS guest role named
Contractor:
For the
role_name parameter in each of these commands,
enter a name for the new QoS role. The name uniquely identifies the role of the
QoS user (such as contractor, vendor, and so on.). For the
rate parameter, you can enter a value between 0
and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction on
the QoS role.
Examples
The following example shows
how to configure an average rate for the QoS guest named guestuser1:
For the
role_name parameter in each of these commands,
enter a name for the new QoS role. The name uniquely identifies the role of the
QoS user (such as contractor, vendor, and so on.). For the
rate parameter, you can enter a value between 0
and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction on
the QoS role.
Examples
The following example shows
how to configure an average data rate for the QoS guest user named guestuser1
with the rate for TCP traffic of 0 Kbps:
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The burst data rate should be
greater than or equal to the average data rate. Otherwise, the QoS policy may
block traffic to and from the wireless client.
For the
role_name parameter in each of these commands,
enter a name for the new QoS role. The name uniquely identifies the role of the
QoS user (such as contractor, vendor, and so on.). For the
rate parameter, you can enter a value between 0
and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction on
the QoS role.
Examples
The following example shows
how to configure the peak data rate for the QoS guest named guestuser1 with the
rate for TCP traffic of 0 Kbps:
To configure the burst
real-time data rate for UDP traffic on a per user basis, use the
config netuser guest-role qos
data-rate burst-realtime-rate
command.
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The burst real-time rate
should be greater than or equal to the average real-time rate. Otherwise, the
quality of service (QoS) policy may block traffic to and from the wireless
client.
For the
role_name parameter in each of these commands,
enter a name for the new QoS role. The name uniquely identifies the role of the
QoS user (such as contractor, vendor, and so on.). For the
rate parameter, you can enter a value between 0
and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction on
the QoS role.
Examples
The following example shows
how to configure a burst real-time rate for the QoS guest user named guestuser1
with the rate for TCP traffic of 0 Kbps:
To enable or disable 802.3
bridging on a controller, use the
config network
802.3-bridging command.
config network
802.3-bridging
{
enable |
disable}
Syntax Description
enable
Enables the 802.3 bridging.
disable
Disables the 802.3 bridging.
Command Default
By default, 802.3
bridging on the controller is disabled.
Command History
Release
Modification
7.6
This command
was introduced in a release earlier than Release 7.6.
Usage Guidelines
In controller software
release 5.2, the software-based forwarding architecture for Cisco 2100 Series
Controllers is being replaced with a new forwarding plane architecture. As a
result, Cisco 2100 Series Controllers and the Cisco wireless LAN controller
Network Module for Cisco Integrated Services Routers bridge 802.3 packets by
default. Therefore, 802.3 bridging can now be disabled only on Cisco 4400
Series Controllers, the Cisco WiSM, and the Catalyst 3750G Wireless LAN
Controller Switch.
To determine the status of
802.3 bridging, enter the
show netuser guest-roles
command.
Examples
The following example shows
how to enable the 802.3 bridging:
Enables use of both NAT IP
and non NAT IP in discovery response.
Command Default
The use of NAT IP only in
discovery response is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Usage Guidelines
If the
config interface nat-address
management command is set, this command controls which
address(es) are sent in the CAPWAP discovery responses.
If all APs are on
the outside of the NAT gateway of the controller, enter the
config network ap-discovery
nat-ip-only enable command, and only the management NAT address
is sent.
If the controller
has both APs on the outside and the inside of its NAT gateway, enter the
config network ap-discovery
nat-ip-only disable command, and both the management NAT address
and the management inside address are sent. Ensure that you have entered the
config ap link-latency
disable all command to avoid stranding APs.
Examples
The following
example shows how to enable NAT IP in an AP discovery response:
> config network ap-discovery nat-ip-only enable
config network
ap-fallback
To configure Cisco
lightweight access point fallback, use the
config network
ap-fallback command.
config network
ap-fallback
{
enable |
disable}
Syntax Description
enable
Enables the Cisco lightweight
access point fallback.
disable
Disables the Cisco
lightweight access point fallback.
Command Default
The Cisco lightweight access
point fallback is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the Cisco lightweight access point fallback:
> config network ap-fallback enable
config network
ap-priority
To enable or disable the
option to prioritize lightweight access points so that after a controller
failure they reauthenticate by priority rather than on a first-come-until-full
basis, use the
config network
ap-priority command.
config network
ap-priority
{
enable |
disable}
Syntax Description
enable
Enables the lightweight
access point priority reauthentication.
disable
Disables the lightweight
access point priority reauthentication.
Command Default
The lightweight access point
priority reauthentication is disabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the lightweight access point priority reauthorization:
> config network ap-priority enable
config network
apple-talk
To configure AppleTalk
bridging, use the
config network
apple-talk command.
config network
apple-talk
{
enable |
disable}
Syntax Description
enable
Enables the AppleTalk
bridging.
disable
Disables the AppleTalk
bridging.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to configure AppleTalk bridging:
> config network apple-talk enable
config network
arptimeout
To set the Address Resolution
Protocol (ARP) entry timeout value, use the
config network
arptimeout command.
config network
arptimeout
seconds
Syntax Description
seconds
Timeout in seconds. The
minimum value is 10 seconds. The default value is 300 seconds.
Command Default
The default ARP entry timeout
value is 300 seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
This example shows how to set
the ARP entry timeout value to 240 seconds:
(Cisco Controller) >config network arptimeout 240
Related Commands
show network
summary
config network
bridging-shared-secret
To configure the bridging
shared secret, use the
config network
bridging-shared-secret command.
To enable or disable
broadcast packet forwarding, use the
config network
broadcast command.
config network
broadcast
{
enable |
disable}
Syntax Description
enable
Enables the broadcast packet
forwarding.
disable
Disables the broadcast packet
forwarding.
Command Default
The broadcast packet
forwarding is disabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
This command allows you to
enable or disable broadcasting. You must enable multicast mode before enabling
broadcast forwarding. Use the
config network multicast mode
command
to configure multicast mode on the controller.
Note
The default multicast mode is
unicast in case of all controllers except for Cisco 2106 Controllers. The
broadcast packets and multicast packets can be independently controlled. If
multicast is off and broadcast is on, broadcast packets still reach the access
points, based on the configured multicast mode.
Examples
The following example shows
how to enable broadcast packet forwarding:
Enables the fast SSID
changing for mobile stations
disable
Disables the fast SSID
changing for mobile stations.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
When you enable the Fast SSID
Change feature, the controller allows clients to move between SSIDs. When the
client sends a new association for a different SSID, the client entry in the
controller connection table is cleared before the client is added to the new
SSID.
When you disable the FastSSID
Change feature, the controller enforces a delay before clients are allowed to
move to a new SSID.
Examples
The following example shows
how to enable the fast SSID changing for mobile stations:
Enables the validation of the
source IP address to MAC address binding in clients packets.
disable
Disables the validation of
the source IP address to MAC address binding in clients packets.
Command Default
The validation of the source
IP address to MAC address binding in clients packets is enabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
In controller software
release 5.2, the controller enforces strict IP address-to-MAC address binding
in client packets. The controller checks the IP address and MAC address in a
packet, compares them to the addresses that are registered with the controller,
and forwards the packet only if they both match. In previous releases, the
controller checks only the MAC address of the client and ignores the IP
address.
Note
You might want to disable
this binding check if you have a routed network behind a workgroup bridge
(WGB).
Examples
The following example shows
how to validate the source IP and MAC address within client packets:
To enable or disable the
Cisco wireless LAN controller as an access point default master, use the
config network
master-base command.
config network
master-base
{
enable |
disable}
Syntax Description
enable
Enables the Cisco wireless
LAN controller acting as a Cisco lightweight access point default master.
disable
Disables the Cisco wireless
LAN controller acting as a Cisco lightweight access point default master.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
This setting is only used
upon network installation and should be disabled after the initial network
configuration. Because the Master Cisco wireless LAN controller is normally not
used in a deployed network, the Master Cisco wireless LAN controller setting
can be saved from 6.0.199.0 or later releases.
Examples
The following example shows
how to enable the Cisco wireless LAN controller as a default master:
Enables the switch management
from a wireless interface.
disable
Disables the switch
management from a wireless interface.
Command Default
The switch management from a
wireless interface is disabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
This feature allows wireless
clients to manage only the Cisco wireless LAN controller associated with the
client and the associated Cisco lightweight access point. That is, clients
cannot manage another Cisco wireless LAN controller with which they are not
associated.
Examples
This example shows how to
configure switch management from a wireless interface:
To enable or disable
multicasting on the controller, use the
config network multicast
global
command.
config network
multicast global
{
enable |
disable}
Syntax Description
enable
Enables the multicast global
support.
disable
Disables the multicast global
support.
Command Default
Multicasting on the
controller is disabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The
config network
broadcast {enable |
disable}
command allows you to enable or disable broadcasting without enabling or
disabling multicasting as well. This command uses the multicast mode configured
on the controller (by using the
config network multicast mode
command)
to operate.
Examples
The following example shows
how to enable the global multicast support:
(Cisco Controller) >config network multicast global enable
Related Commands
show network
summary
config network
broadcast
config network
multicast mode
config network multicast igmp
query interval
To configure the IGMP query
interval, use the
config network multicast igmp
query interval
command.
config network
multicast igmp query interval
value
Syntax Description
value
Frequency at which controller
sends IGMP query messages. The range is from 15 to 2400 seconds.
Command Default
The default IGMP query
interval is 20 seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
To configure IGMP query
interval, ensure that you do the following:
Enable the global multicast
by entering the
config network multicast global enable command.
Enable IGMP snooping by
entering the
config network multicast igmp snooping enable
command.
Examples
The following example shows
how to configure the IGMP query interval at 20 seconds:
To set the IGMP timeout
value, use the
config network multicast igmp
timeout
command.
config network
multicast igmp timeout
value
Syntax Description
value
Timeout range from 30 to 7200
seconds.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
You can enter a timeout value
between 30 and 7200 seconds. The controller sends three queries in one timeout
value at an interval of timeout/3 to see if any clients exist for a particular
multicast group. If the controller does not receive a response through an IGMP
report from the client, the controller times out the client entry from the MGID
table. When no clients are left for a particular multicast group, the
controller waits for the IGMP timeout value to expire and then deletes the MGID
entry from the controller. The controller always generates a general IGMP query
(to destination address 224.0.0.1) and sends it on all WLANs with an MGID value
of 1.
Examples
The following example shows
how to configure the timeout value 50 for IGMP network settings:
To configure the controller
to use the multicast method to send broadcast or multicast packets to an access
point, use the
config network multicast mode
multicast
command.
config network
multicast mode multicast
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the multicast mode to send a single copy of data to multiple
receivers:
To configure the controller
to use the unicast method to send broadcast or multicast packets to an access
point, use the
config network multicast mode
unicast
command.
config network
multicast mode unicast
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the controller to use the unicast mode:
To configure the Ethernet
port 3 of Cisco OfficeExtend 600 Series access points to operate as a remote
LAN port in addition to port 4, use the
config network oeap-600 dual-rlan-ports command.
To change the state of the
secure web (https is http and SSL) interface for management users, use the
config network
secureweb command.
config network
secureweb
{
enable |
disable}
Syntax Description
enable
Enables the secure web
interface for management users.
disable
Disables the secure web
interface for management users.
Command Default
The secure web interface for
management users is enabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
This command allows
management users to access the controller GUI using an http://ip-address. Web
mode is not a secure connection.
Examples
The following example shows
how to enable the secure web interface settings for management users:
(Cisco Controller) >config network secureweb enable
You must reboot for the change to take effect.
Related Commands
config network secureweb cipher-option
show network summary
config network secureweb
cipher-option
To enable or disable secure
web mode with increased security, or to enable or disable Secure Sockets Layer
(SSL v2) for web administration and web authentication, use the
config network secureweb
cipher-option command.
Configures whether or not
128-bit ciphers are required for web administration and web authentication.
sslv2
Configures SSLv2 for both web
administration and web authentication.
rc4-preference
Configures preference for
RC4-SHA (Rivest Cipher 4-Secure Hash Algorithm) cipher suites (over CBC cipher
suites) for web authentication and web administration.
enable
Enables the secure web
interface.
disable
Disables the secure web
interface.
Command Default
The default is
disable for secure web mode with increased
security and
enable for SSL v2.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Note
The
config network secureweb
cipher-option
command allows users to access the controller GUI
using an http://ip-address but only from browsers that support 128-bit (or
larger) ciphers.
When cipher-option sslv2 is
disabled, users cannot connect using a browser configured with SSLv2 only. They
must use a browser that is configured to use a more secure protocol such as
SSLv3 or later.
In RC4-SHA based
cipher suites, RC4 is used for encryption and SHA is used for message
authentication.
Examples
The following example shows
how to enable secure web mode with increased security:
Allows secure web (https)
authentication for clients.
disable
Disallows secure web (https)
authentication for clients. Enables http web authentication for clients.
Command Default
The default secure web
(https) authentication for clients is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Note
If you configure the
secure web (https) authentication for clients using the
config network web-auth
secureweb disable command, then you must reboot the Cisco WLC to
implement the change.
Examples
The following example shows
how to enable the secure web (https) authentication for clients:
To configure bridge access
point ZeroConfig support, use the
config network
zero-config command.
config network
zero-config
{
enable |
disable}
Syntax Description
enable
Enables the bridge access
point ZeroConfig support.
disable
Disables the bridge access
point ZeroConfig support.
Command Default
The bridge access point
ZeroConfig support is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following example shows
how to enable the bridge access point ZeroConfig support:
> config network zero-config enable
config nmsp notify-interval
measurement
To modify the Network
Mobility Services Protocol (NMSP) notification interval value on the controller
to address latency in the network, use the
config nmsp notify-interval
measurement command.
Modifies the interval for
active radio frequency identification (RFID) tags.
rogue
Modifies the interval for
rogue access points and rogue clients.
interval
Time interval. The range is
from 1 to 30 seconds.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The TCP port (16113) that the
controller and location appliance communicate over must be open (not blocked)
on any firewall that exists between the controller and the location appliance
for NMSP to function.
Examples
The following example shows
how to modify the NMSP notification interval for the active RFID tags to 25
seconds:
(Cisco Controller) >config nmsp notify-interval measurement rfid 25
Related Commands
clear locp statistics
clear nmsp statistics
show nmsp notify-interval summary
show nmsp statistics
show nmsp status
config paging
To enable or disable
scrolling of the page, use the
config paging
command.
config
paging {
enable |
disable}
Syntax Description
enable
Enables the scrolling of the
page.
disable
Disables the scrolling of the
page.
Command Default
By default, scrolling of the
page is enabled.
Examples
The following
example shows how to enable scrolling of the page:
(Cisco Controller) >config paging enable
Related Commands
show run-config
config
passwd-cleartext
To enable or disable
temporary display of passwords in plain text, use the
config
passwd-cleartext command.
config
passwd-cleartext
{
enable |
disable}
Syntax Description
enable
Enables the display of
passwords in plain text.
disable
Disables the display of
passwords in plain text.
Command Default
By default, temporary display
of passwords in plain text is disabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
This command must be enabled
if you want to see user-assigned passwords displayed in clear text when using
the
show run-config
command.
To execute this command, you
must enter an admin password. This command is valid only for this particular
session. It is not saved following a reboot.
Examples
The following example shows
how to enable display of passwords in plain text:
(Cisco Controller) >config passwd-cleartext enable
The way you see your passwds will be changed
You are being warned.
Enter admin password:
Related Commands
show run-config
config prompt
To change the CLI system
prompt, use the
config prompt
command.
config prompt
prompt
Syntax Description
prompt
New CLI system prompt
enclosed in double quotes. The prompt can be up to 31 alphanumeric characters
and is case sensitive.
Command Default
The system prompt is
configured using the startup wizard.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Because the system prompt is
a user-defined variable, it is omitted from the rest of this documentation.
Examples
The following example shows
how to change the CLI system prompt to Cisco 4400:
(Cisco Controller) >config prompt “Cisco 4400”
config qos
average-data-rate
To define the average data
rate in Kbps for TCP traffic per user
or per service
set identifier (SSID), use the
config qos average-data-rate
command.
Specifies the average data
rate for the queue bronze.
silver
Specifies the average data
rate for the queue silver.
gold
Specifies the average data
rate for the queue gold.
platinum
Specifies the average data
rate for the queue platinum.
per-ssid
Configures
the rate limit for an SSID per radio. The combined traffic of all clients will
not exceed this limit.
per-client
Configures
the rate limit for each client associated with the SSID.
downstream
Configures
the rate limit for downstream traffic.
upstream
Configures
the rate limit for upstream traffic.
rate
Average data rate for TCP
traffic per user. A value between 0 and 51,2000 Kbps (inclusive). A value of 0
imposes no bandwidth restriction on the QoS profile.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the average data rate 0 Kbps for the queue gold
per SSID:
(Cisco Controller) >config qos average-data-rate gold per ssid downstream 0
Related Commands
config qos
burst-data-rate
config qos
average-realtime-rate
config qos
burst-realtime-rate
config wlan
override-rate-limit
config qos
average-realtime-rate
To define the average
real-time data rate in Kbps for UDP traffic per user
or per service
set identifier (SSID), use the
config qos
average-realtime-rate
command.
Specifies the average
real-time data rate for the queue bronze.
silver
Specifies the average
real-time data rate for the queue silver.
gold
Specifies the average
real-time data rate for the queue gold.
platinum
Specifies the average
real-time data rate for the queue platinum.
per-ssid
Configures
the rate limit for an SSID per radio. The combined traffic of all clients will
not exceed this limit.
per-client
Configures
the rate limit for each client associated with the SSID.
downstream
Configures
the rate limit for downstream traffic.
upstream
Configures
the rate limit for upstream traffic.
rate
Average real-time data rate
for UDP traffic per user. A value between 0 and 51,2000 Kbps (inclusive). A
value of 0 imposes no bandwidth restriction on the QoS profile.
Command Default
None
Command History
Release
Modification
7.6
This
command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure the average real-time actual rate for queue gold:
(Cisco Controller) >config qos average-realtime-rate gold per ssid downstream 10
Related Commands
config qos
average-data-rate
config qos
burst-data-rate
config qos
burst-realtime-rate
config wlan
override-rate-limit
config qos
burst-data-rate
To define the peak data rate
in Kbps for TCP traffic per user
or per service
set identifier (SSID), use the
config qos burst-data-rate
command.
Specifies the peak data rate
for the queue bronze.
silver
Specifies the peak data rate
for the queue silver.
gold
Specifies the peak data rate
for the queue gold.
platinum
Specifies the peak data rate
for the queue platinum.
per-ssid
Configures
the rate limit for an SSID per radio. The combined traffic of all clients will
not exceed this limit.
per-client
Configures
the rate limit for each client associated with the SSID.
downstream
Configures
the rate limit for downstream traffic.
upstream
Configures
the rate limit for upstream traffic.
rate
Peak data rate for TCP
traffic per user. A value between 0 and 51,2000 Kbps (inclusive). A value of 0
imposes no bandwidth restriction on the QoS profile.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the peak rate 30000 Kbps for the queue gold:
(Cisco Controller) >config qos burst-data-rate gold per ssid downstream 30000
Related Commands
config qos
average-data-rate
config qos
average-realtime-rate
config qos
burst-realtime-rate
config wlan
override-rate-limit
config qos
burst-realtime-rate
To define the burst real-time
data rate in Kbps for UDP traffic per user
or per service
set identifier (SSID), use the
config qos
burst-realtime-rate
command.
Specifies the burst real-time
data rate for the queue bronze.
silver
Specifies the burst real-time
data rate for the queue silver.
gold
Specifies the burst real-time
data rate for the queue gold.
platinum
Specifies the burst real-time
data rate for the queue platinum.
per-ssid
Configures
the rate limit for an SSID per radio. The combined traffic of all clients will
not exceed this limit.
per-client
Configures
the rate limit for each client associated with the SSID.
downstream
Configures
the rate limit for downstream traffic.
upstream
Configures
the rate limit for upstream traffic.
rate
Burst real-time data rate for
UDP traffic per user. A value between 0 and 51,2000 Kbps (inclusive). A value
of 0 imposes no bandwidth restriction on the QoS profile.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the burst real-time actual rate 2000 Kbps for the queue gold:
(Cisco Controller) >config qos burst-realtime-rate gold per ssid downstream 2000
Related Commands
config qos
average-data-rate
config qos
burst-data-rate
config qos
average-realtime-rate
config wlan
override-rate-limit
config qos
description
To change the profile
description, use the
config qos description
command.
Specifies the QoS 802.1p tag
for the queue bronze.
silver
Specifies the QoS 802.1p tag
for the queue silver.
gold
Specifies the QoS 802.1p tag
for the queue gold.
platinum
Specifies the QoS 802.1p tag
for the queue platinum.
dot1p_tag
Dot1p tag value between 1 and
7.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the a QoS 802.1p tag for the queue gold with the dot1p tag
value of 5:
(Cisco Controller) >config qos dot1p-tag gold 5
Related Commands
show qos
queue_length all
config qos
protocol-type
config qos priority
To define the maximum and
default QoS levels for unicast and multicast traffic when you assign a QoS
profile to a WLAN, use the
config qos
priority command.
Default multicast priority as
one of the following:
besteffort
background
video
voice
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The maximum priority level
should not be lower than the default unicast and multicast priority levels.
Examples
The following example shows
how to configure the QoS priority for a gold profile of the WLAN with voice as
the maximum priority, video as the default unicast priority, and besteffort as
the default multicast priority.
(Cisco Controller) >config qos priority gold voice video besteffort
Related Commands
config qos protocol-type
config qos
protocol-type
To define the maximum value
(0 to 7) for the priority tag associated with packets that fall within the
profile, use the
config qos protocol-type
command.
Enables the breaking into
boot prompt by pressing the Esc key at system startup.
disable
Disables the breaking into
boot prompt by pressing the Esc key at system startup.
Command Default
By default, the breaking into
boot prompt by pressing the Esc key at system startup is disabled.
Usage Guidelines
You must enable the features
that are prerequisites for the Federal Information Processing Standard (FIPS)
mode before enabling or disabling the breaking into boot prompt.
Examples
The following example shows
how to enable the breaking into boot prompt by pressing the Esc key at system
startup:
To enable or disable the
features that are prerequisites for the Federal Information Processing Standard
(FIPS) mode, use the
config switchconfig
fips-prerequisite command.
Secrets and user passwords
are obfuscated in the exported XML configuration file.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
To keep the secret contents
of your configuration file secure, do not disable secret obfuscation. To
further enhance the security of the configuration file, enable configuration
file encryption.
Examples
The following example shows
how to enable secret obfuscation:
To set the Cisco wireless LAN
controller system name, use the
config sysname
command.
config sysname
name
Syntax Description
name
System name. The name can
contain up to 31 alphanumeric characters.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure the system named Ent_01:
(Cisco Controller) >config sysname Ent_01
Related Commands
show
sysinfo
config snmp community
accessmode
To modify the access mode
(read only or read/write) of an SNMP community, use the
config snmp community
accessmode command.
config snmp
community accessmode {
ro |
rw}
name
Syntax Description
ro
Specifies a read-only mode.
rw
Specifies a read/write mode.
name
SNMP community name.
Command Default
Two communities are provided
by default with the following settings:
SNMP Community Name Client IP Address Client IP Mask Access Mode Status
------------------- ----------------- ---------------- ----------- ------
public 0.0.0.0 0.0.0.0 Read Only Enable
private 0.0.0.0 0.0.0.0 Read/Write Enable
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure read/write access mode for SNMP community:
(Cisco Controller) >config snmp community accessmode rw private
Related Commands
show snmp
community
config snmp community
mode
config snmp community
create
config snmp community
delete
config snmp community
ipaddr
config snmp community
create
To create a new SNMP
community, use the
config snmp community
create command.
config snmp
community create
name
Syntax Description
name
SNMP community name of up to
16 characters.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Use this command to create a
new community with the default configuration.
Examples
The following example shows
how to create a new SNMP community named test:
(Cisco Controller) >config snmp community create test
Related Commands
show snmp
community
config snmp community
mode
config snmp community
accessmode
config snmp community
delete
config snmp community
ipaddr
config snmp community
delete
To delete an SNMP community,
use the
config snmp community
delete command.
config snmp
community delete
name
Syntax Description
name
SNMP community name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to delete an SNMP community named test:
(Cisco Controller) >config snmp community delete test
Related Commands
show snmp
community
config snmp community
mode
config snmp community
accessmode
config snmp community
create
config snmp community
ipaddr
config snmp community
ipaddr
To configure the IP address
of an SNMP community, use the
config snmp community
ipaddr command.
config snmp
community ipaddr
ip_address
ip_mask
name
Syntax Description
ip_address
SNMP community IP address.
ip_mask
SNMP community subnet mask.
name
SNMP community name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to configure an SNMP community with the IP address 10.10.10.10, IP mask
255.255.255.0, and SNMP community named public:
(Cisco Controller) >config snmp community ipaddr 10.10.10.10 255.255.255.0 public
Related Commands
show snmp
community
config snmp community
mode
config snmp community
accessmode
config snmp community
create
config snmp community
delete
config snmp community
mode
To enable or disable an SNMP
community, use the
config snmp community
mode command.
config snmp
community mode
{
enable |
disable}
name
Syntax Description
enable
Enables the community.
disable
Disables the community.
name
SNMP community name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the SNMP community named public:
(Cisco Controller) >config snmp community mode disable public
Related Commands
show snmp
community
config snmp community
delete
config snmp community
accessmode
config snmp community
create
config snmp community
ipaddr
config snmp engineID
To configure the SNMP engine
ID, use the
config snmp
engineID command.
config snmp
engineID
{
engine_id
|
default}
Syntax Description
engine_id
Engine ID in hexadecimal
characters (a minimum of 10 and a maximum of 24 characters are allowed).
default
Restores the default engine
ID.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The SNMP engine ID is a
unique string used to identify the device for administration purposes. You do
need to specify an engine ID for the device because a default string is
automatically generated using Cisco’s enterprise number and the MAC address of
the first interface on the device.
If you change the engine ID,
then a reboot is required for the change to take effect.
Caution If you change the
value of the SNMP engine ID, then the password of the user entered on the
command line is converted to an MD5 (Message-Digest algorithm 5) or SHA (Secure
Hash Algorithm) security digest. This digest is based on both the password and
the local engine ID. The command line password is then deleted. Because of this
deletion, if the local value of the engine ID changes, the security digests of
the SNMP users will become invalid, and the users will have to be reconfigured.
Examples
The following example shows
how to configure the SNMP engine ID with the value fffffffffff:
To configure the system time
zone, use the
config time
timezone command.
config time
timezone
{
enable |
disable}
delta_hours delta_mins
Syntax Description
enable
Enables daylight saving time.
disable
Disables daylight saving
time.
delta_hours
Local hour difference from
the Universal Coordinated Time (UCT).
delta_mins
Local minute difference from
UCT.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to enable the daylight saving time:
(Cisco Controller) >config time timezone enable 2 0
Related Commands
show
time
config time timezone
location
To set the location of the
time zone in order to have daylight saving time set automatically when it
occurs, use the
config time timezone location
command.
config time
timezone location
location_index
Syntax Description
location_index
Number representing the time
zone required. The time zones are as follows:
To configure the
threshold value of the number of clients that associate with the controller,
after which an SNMP trap and a syslog message is sent to the controller, use
the
config trapflags client
max-warning-threshold command.
Configures
the threshold percentage value of the number of clients that associate with the
controller, after which an SNMP trap and a syslog message is sent to the
controller. The range is from 80 to 100.
The minimum
interval between two warnings is 10 mins You cannot configure this interval.
enable
Enables the
generation of the traps and syslog messages.
disable
Disables the
generation of the traps and syslog messages.
Command Default
The default
threshold value of the number of clients that associate with the controller is
90 %.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
This table lists the
maximum number of clients for different controllers.
Table 5 Maximum Number
of Clients Supported on Different Controllers
Controller
Maximum
Number of Supported Clients
Cisco 5500
Series Controllers
7000
Cisco 2500
Series Controllers
500
Cisco
Wireless Services Module 2
15000
Cisco Flex
7500 Series Controllers
64000
Cisco 8500
Series Controllers
64000
Cisco
Virtual Wireless LAN Controllers
30000
Examples
The following
example shows how to configure the threshold value of the number of clients
that associate with the controller:
To configure the
threshold value of the maximum number of radio frequency identification (RFID)
tags, after which an SNMP trap and a syslog message is sent to the controller,
use the
config trapflags
rfid command.
config trapflags rfid
{
threshold
|
enable |
disable}
Syntax Description
threshold
Configures
the threshold percentage value of the maximum number of RFID tags, after which
an SNMP trap and a syslog message is sent to the controller. The range is from
80 to 100.
The traps
and syslog messages are generated every 10 minutes. You cannot configure this
interval.
enable
Enables the
generation of the traps and syslog messages.
disable
Disables the
generation of the traps and syslog messages.
Command Default
The default
threshold value of the maximum number of RFID tags is 90 %.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The following table
shows the maximum number of RFID tags supported on different controllers:
Table 6 Maximum Number
of RFID Tags Supported on Different Controllers
Controller
Maximum
Number of Supported Clients
Cisco 5500
Series Controllers
5000
Cisco 2500
Series Controllers
500
Cisco
Wireless Services Module 2
10000
Cisco Flex
7500 Series Controllers
50000
Cisco 8500
Series Controllers
50000
Cisco
Virtual Wireless LAN Controllers
3000
Examples
The following
example shows how to configure the threshold value of the maximum number of
RFID tags:
(Cisco Controller) >config trapflags rfid 80
Related Commands
config trapflags
802.11-Security
config trapflags
aaa
config trapflags
ap
config trapflags
adjchannel-rogueap
config trapflags
authentication
config trapflags
client
config trapflags
configsave
config trapflags
IPsec
config trapflags
linkmode
config trapflags
multiusers
config trapflags
mesh
config trapflags
strong-pwdcheck
config trapflags
rogueap
config trapflags
mesh
show trapflags
config trapflags
rogueap
To enable or disable sending
rogue access point detection traps, use the
config trapflags
rogueap command.
config trapflags
rogueap
{
enable |
disable}
Syntax Description
enable
Enables the sending of rogue
access point detection traps.
disable
Disables the sending of rogue
access point detection traps.
Command Default
By default, the sending of
rogue access point detection traps is enabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to disable the sending of rogue access point detection traps:
To process or ignore the Call
Admission Control (CAC) Wi-Fi Multimedia (WMM) traffic specifications (TSPEC)
inactivity timeout received from an access point, use the
config 802.11 cac video
tspec-inactivity-timeout command.
config
802.11{
a |
b}
cac video
tspec-inactivity-timeout {
enable |
ignore}
Syntax Description
a
Specifies the 802.11a
network.
ab
Specifies the 802.11b/g
network.
enable
Processes the TSPEC
inactivity timeout messages.
ignore
Ignores the TSPEC inactivity
timeout messages.
Command Default
The default CAC WMM TSPEC
inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
CAC commands require that the
WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM)
protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acm enable or
config 802.11{a |
b}cac video acm enable commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide for your release.
Examples
This example shows how to
process the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout enable
This example shows how to
ignore the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout ignore
Related Commands
config 802.11
cac video acm
config 802.11 cac video
max-bandwidth
config 802.11
cac video roam-bandwidth
config 802.11 cac voice
tspec-inactivity-timeout
To process or ignore the
Wi-Fi Multimedia (WMM) traffic specifications (TSPEC) inactivity timeout
received from an access point, use the
config 802.11 cac voice
tspec-inactivity-timeout command.
The default WMM TSPEC
inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
Call Admission Control (CAC)
commands require that the WLAN you are planning to modify is configured for
Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set
to Platinum.
Before you can configure CAC
parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM
enabled by entering the
config wlan disablewlan_id
command.
Disable the radio network you
want to configure by entering the
config 802.11{a |
b}disable
network command.
Save the new configuration by
entering the
save config
command.
Enable voice or video CAC for
the network you want to configure by entering the config 802.11{a |
b}cac voice acmenable or
config 802.11{a |
b}cac video acmenable
commands.
For complete instructions,
see the “Configuring Voice and Video Parameters” section in the “Configuring
Controller Settings” chapter of the
Cisco Wireless
LAN Controller Configuration Guide
for your release.
Command History
Release
Modification
7.6
This
command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to enable the voice TSPEC inactivity timeout messages
received from an access point:
Configures the Cisco
lightweight access point discovery timeout value.
discovery-timeout
Cisco lightweight access
point discovery timeout value, in seconds. The range is from 1 to 10.
ap-fast-heartbeat
Configures the fast heartbeat
timer, which reduces the amount of time it takes to detect a controller failure
in access points.
local
Configures the fast heartbeat
interval for access points in local mode.
flexconnect
Configures the fast heartbeat
interval for access points in FlexConnect mode.
all
Configures the fast heartbeat
interval for all the access points.
enable
Enables the fast heartbeat
interval.
disable
Disables the fast heartbeat
interval.
fast_heartbeat_seconds
Small heartbeat interval,
which reduces the amount of time it takes to detect a controller failure, in
seconds. The range is from 1 to 10.
ap-heartbeat-timeout
Configures Cisco
lightweight access point heartbeat timeout value.
heartbeat_seconds
Cisco the Cisco lightweight
access point heartbeat timeout value, in seconds. The range is from 1 to 30.
This value should be at least three times larger than the fast heartbeat timer.
ap-primary-discovery-timeout
Configures the access point
primary discovery request timer.
primary_discovery_timeout
Access point primary
discovery request time, in seconds. The range is from 30 to 3600.
ap-primed-join-timeout
Configures the access point
primed discovery timeout value.
primed_join_timeout
Access point primed
discovery timeout value, in seconds. The range is from 120 to 43200.
auth-timeout
Configures the
authentication timeout.
auth_timeout
Authentication response
timeout value, in seconds. The range is from 10 to 600.
pkt-fwd-watchdog
Configures the packet
forwarding watchdog timer to protect from fastpath deadlock.
watchdog_timer
Packet forwarding watchdog
timer, in seconds. The range is from 60 to 300.
default
Configures the watchdog
timer to the default value of 240 seconds.
eap-identity-request-delay
Configures the advanced
Extensible Authentication Protocol (EAP) identity request delay, in seconds.
eap_identity_request_delay
Advanced EAP identity
request delay, in seconds. The range is from 0 to 10.
eap-timeout
Configures the EAP
expiration timeout.
eap_timeout
EAP timeout value, in
seconds. The range is from 8 to 120.
Command Default
The default access
point discovery timeout is 10 seconds.
The default access point
heartbeat timeout is 30 seconds.
The default access point
primary discovery request timer is 120 seconds.
The default authentication
timeout is 10 seconds.
The default packet
forwarding watchdog timer is 240 seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The Cisco lightweight access
point discovery timeout indicates how often a Cisco WLC attempts to discover
unconnected Cisco lightweight access points.
The Cisco
lightweight access point heartbeat timeout controls how often the Cisco
lightweight access point sends a heartbeat keepalive signal to the Cisco
Wireless LAN Controller.
Examples
The following example shows
how to configure an access point discovery timeout with a timeout value of 20:
To change the default
transmission timeout for a RADIUS accounting server for the Cisco wireless LAN
controller, use the
config radius acct
retransmit-timeout command.
config radius
acct retransmit-timeout
index
timeout
Syntax Description
index
RADIUS server index.
timeout
Number of seconds (from 2 to
30) between retransmissions.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure retransmission timeout value 5 seconds between the
retransmission:
To change a default
transmission timeout for a RADIUS authentication server for the Cisco wireless
LAN controller, use the
config radius auth
retransmit-timeout command.
config radius
auth retransmit-timeout
index
timeout
Syntax Description
index
RADIUS server index.
timeout
Number of seconds (from 2 to
30) between retransmissions.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure a retransmission timeout of 5 seconds for a RADIUS
authentication server:
To specify the number of
seconds after which the rogue access point and client entries expire and are
removed from the list, use the
config rogue ap timeout
command.
config rogue ap timeout
seconds
Syntax Description
seconds
Value of 240 to 3600 seconds
(inclusive), with a default value of 1200 seconds.
Command Default
The default number
of seconds after which the rogue access point and client entries expire is 1200
seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set an expiration time for entries in the rogue access point and client
list to 2400 seconds:
(Cisco Controller) >config rogue ap timeout 2400
Related Commands
config rogue ap classify
config rogue ap friendly
config rogue ap rldp
config rogue ap ssid
config rogue rule
config trapflags rogueap
show rogue ap clients
show rogue ap detailed
show rogue ap summary
show rogue ap friendly summary
show rogue ap malicious summary
show rogue ap unclassified summary
show rogue ignore-list
show rogue rule detailed
show rogue rule summary
config tacacs athr
mgmt-server-timeout
To configure a default
TACACS+ authorization server timeout for management users, use the
config tacacs athr
mgmt-server-timeout command.
config tacacs
athr mgmt-server-timeout
index
timeout
Syntax Description
index
TACACS+ authorization server
index.
timeout
Timeout value. The range is 1
to 30 seconds.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to configure a default TACACS+ authorization server timeout for management
users:
To configure the timeout for idle client sessions for a WLAN, use the config wlan usertimeout command.
config wlan usertimeout timeout wlan_id
Syntax Description
timeout
Timeout for idle client sessions for a WLAN. If the client sends traffic less than the threshold, the client is removed on timeout. The range is from 15 to 100000 seconds.
wlan_id
Wireless LAN identifier between 1 and 512.
Command Default
The default client session idle timeout is 300 seconds.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The timeout value that you configure here overrides the global timeout that you define using the command config network usertimeout.
Examples
The following example shows how to
configure the idle client sessions for a WLAN:
(Cisco Controller) >config wlan usertimeout 100 1
config wlan security wpa akm ft
To configure authentication key-management using 802.11r fast transition 802.1X, use the config wlan security wpa akm ft command.
To clear the current counters
for an access control list (ACL), use the
clear acl
counters command.
clear acl
counters
acl_name
Syntax Description
acl_name
ACL name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Note
ACL counters are available
only on the following controllers: Cisco 4400 Series Controller, Cisco WiSM,
and Catalyst 3750G Integrated Wireless LAN Controller Switch.
Examples
The following example shows
how to clear the current counters for acl1:
(Cisco Controller) >clear acl counters acl1
Related Commands
config acl counter
show acl
clear ap config
To clear (reset to the
default values) a lightweight access point’s configuration settings, use the
clear ap config
command.
clear ap config
ap_name
Syntax Description
ap_name
Access point name.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Entering this
command does not clear the static IP address of the access point.
Examples
The following example shows
how to clear the access point’s configuration settings for the access point
named ap1240_322115:
(Cisco Controller) >clear ap config ap1240_322115
Clear ap-config will clear ap config and reboot the AP. Are you sure you want continue? (y/n)
clear ap eventlog
To delete the existing event
log and create an empty event log file for a specific access point or for all
access points joined to the controller, use the
clear ap
eventlog command.
clear ap eventlog
{
specific
ap_name |
all}
Syntax Description
specific
Specifies a specific access
point log file.
ap_name
Name of the access point for
which the event log file will be emptied.
all
Deletes the event log for all
access points joined to the controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to delete the event log for all access points:
(Cisco Controller) >clear ap eventlog all
This will clear event log contents for all APs. Do you want continue? (y/n) :y
Any AP event log contents have been successfully cleared.
clear ap join stats
To clear the join statistics
for all access points or for a specific access point, use the
clear ap join
stats command.
clear ap join
stats {
all
|
ap_mac}
Syntax Description
all
Specifies all access points.
ap_mac
Access point MAC address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the join statistics of all the access points:
(Cisco Controller) >clear ap join stats all
clear arp
To clear the Address
Resolution Protocol (ARP) table, use the
clear arp
command.
clear
arp
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the ARP table:
(Cisco Controller) >clear arp
Are you sure you want to clear the ARP cache? (y/n)
Related Commands
clear
transfer
clear download
datatype
clear download
filename
clear download
mode
clear download
serverip
clear download
start
clear upload
datatype
clear upload
filename
clear upload
mode
clear upload
path
clear upload
serverip
clear upload
start
clear stats
port
clear avc
statistics
To clear Application
Visibility and Control (AVC) statistics of a client, guest LAN, remote LAN, or
a WLAN use the
clear avc statistics
command.
clear avc statistics
{
client
{
all |
client-mac} |
guest-lan {
all |
guest-lan-id} |
remote-lan {
all
|
remote-lan-id} |
wlan {
all |
wlan-id}}
Syntax Description
client
Clears AVC
statistics of a client.
all
Clears AVC
statistics of all clients.
client-mac
MAC address
of a client.
guest-lan
Clears AVC
statistics of a guest LAN.
all
Clears AVC
statistics of all guest LANs.
guest-lan-id
Guest LAN
Identifier between 1 and 5.
remote-lan
Clears AVC
statistics of a remote LAN.
all
Clears AVC
statistics of all remote LANs.
remote-lan-id
Remote LAN
Identifier between 1 and 512.
wlan
Clears AVC
statistics of a WLAN.
all
Clears AVC
statistics of all WLANs.
wlan-id
WLAN
Identifier between 1 and 512.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following
example shows how to clear the AVC statistics of a client:
To clear the traffic stream
metrics (TSM) statistics for a particular access point or all the access points
to which this client is associated, use the
clear client
tsm command.
To clear a specific radio
frequency identification (RFID) tag or all of the RFID tags in the entire
database, use the
clear location rfid
command.
clear location
rfid
{
mac_address |
all}
Syntax Description
mac_address
MAC address of a specific
RFID tag.
all
Specifies all of the RFID
tags in the database.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to clear all of the RFID tags in the database:
(Cisco Controller) >clear location rfid all
Related Commands
clear location statistics rfid
config location
show location
show location statistics rfid
clear location statistics
rfid
To clear radio frequency
identification (RFID) statistics, use the
clear location statistics
rfid
command.
clear location
statistics rfid
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to clear RFID statistics:
(Cisco Controller) >clear location statistics rfid
Related Commands
config location
show location
show location statistics rfid
clear locp statistics
To clear the Location
Protocol (LOCP) statistics, use the
clear locp statistics
command.
clear locp
statistics
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to clear the statistics related to LOCP:
(Cisco Controller) >clear locp statistics
Related Commands
clear nmsp statistics
config nmsp notify-interval measurement
show nmsp notify-interval summary
show nmsp statistics
show nmsp status
clear login-banner
To remove the login banner
file from the controller, use the
clear
login-banner command.
clear login-banner
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to clear the login banner file:
(Cisco Controller) >clear login-banner
Related Commands
transfer download datatype
clear lwapp
private-config
To clear (reset to default
values) an access point’s current Lightweight Access Point Protocol (LWAPP)
private configuration, which contains static IP addressing and controller IP
address configurations, use the
clear lwapp
private-config command.
clear lwapp private-config
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Enter the command on the
access point console port.
Prior to changing the
FlexConnect configuration on an access point using the access point’s console
port, the access point must be in standalone mode (not connected to a Cisco WLC
) and you must remove the current LWAPP private configuration by using the
clear lwapp
private-config command.
Note
The access point must be
running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
Examples
The following example shows
how to clear an access point’s current LWAPP private configuration:
ap_console >clear lwapp private-config
removing the reap config file flash:/lwapp_reap.cfg
clear mdns
service-database
To clear the
multicast DNS service database, use the
clear mdns
service-databasecommand.
clear mdns service-database {
all |
service-name
Syntax Description
all
Clears the
mDNS service database.
service-name
Name of the
mDNS service. The Cisco WLC clears the details of the mDNS service.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The Cisco WLC snoops
and learns about the mDNS service advertisements only if the service is
available in the Master Services database.
Examples
The following
example shows how to clear the mDNS service database:
(Cisco Controller) >clear mdns service-database all
Related Commands
config mdns
query interval
config mdns
service
config mdns
snooping
config interface
mdns-profile
config interface group
mdns-profile
config wlan
mdns
show mdns
profile
show mnds
service
config mdns
profile
debug mdns all
debug mdns error
debug mdns detail
debug mdns message
clear nmsp statistics
To clear the Network Mobility
Services Protocol (NMSP) statistics, use the
clear nmsp
statistics command.
clear nmsp statistics
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to delete the NMSP statistics log file:
(Cisco Controller) >clear nmsp statistics
Related Commands
clear locp statistics
config nmsp notify-interval measurement
show nmsp notify-interval summary
show nmsp status
clear radius acct
statistics
To clear the RADIUS
accounting statistics on the controller, use the
clear radius acc
statistics command.
clear radius acct statistics
[
index
|
all]
Syntax Description
index
(Optional) Specifies the
index of the RADIUS accounting server.
all
(Optional) Specifies all
RADIUS accounting servers.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the RADIUS accounting statistics:
(Cisco Controller) >clear radius acc statistics
Related Commands
show radius acct statistics
clear tacacs auth
statistics
To clear the RADIUS
authentication server statistics in the controller, use the
clear tacacs auth
statistics command.
clear tacacs auth statistics
[
index
|
all]
Syntax Description
index
(Optional) Specifies the
index of the RADIUS authentication server.
all
(Optional) Specifies all
RADIUS authentication servers.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to clear the RADIUS authentication server statistics:
(Cisco Controller) >clear tacacs auth statistics
Related Commands
show tacacs auth statistics
show tacacs summary
config tacacs auth
clear redirect-url
To clear the custom web
authentication redirect URL on the Cisco Wireless LAN Controller, use the
clear
redirect-url command.
clear
redirect-url
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to clear the custom web authentication redirect URL:
To set the password for the
.PEM file so that the operating system can decrypt the web administration SSL
key and certificate, use the
transfer download
certpassword command.
transfer
download certpassword
private_key_password
Syntax Description
private_key_password
Certificate’s private key
password.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to transfer a file to the switch with the certificate’s private key
password certpassword:
To set a specific FTP or TFTP
path, use the
transfer download
path command.
transfer
download path
path
Syntax Description
path
Directory path.
Note
Path names on a TFTP or FTP
server are relative to the server’s default or root directory. For example, in
the case of the Solarwinds TFTP server, the path is “/”.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You cannot use
special characters such as \ : * ? " < > | for the file path.
Examples
The following example shows
how to transfer a file to the path c:\install\version2:
To initiate a download, use
the
transfer download
start command.
transfer
download start
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to initiate a download:
(Cisco Controller) >transfer download start
Mode........................................... TFTP
Data Type...................................... Site Cert
TFTP Server IP................................. 172.16.16.78
TFTP Path...................................... directory path
TFTP Filename.................................. webadmincert_name
This may take some time.
Are you sure you want to start? (y/n) Y
TFTP Webadmin cert transfer starting.
Certificate installed.
Please restart the switch (reset system) to use the new certificate.
transfer download
tftpPktTimeout
To specify the TFTP packet
timeout, use the
transfer download
tftpPktTimeout command.
transfer
download tftpPktTimeout
timeout
Syntax Description
timeout
Timeout in seconds between 1
and 254.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to transfer a file with the TFTP packet timeout of 55 seconds:
To configure the transfer
mode, use the
transfer upload
mode command.
transfer upload
mode {
ftp
|
tftp |
sftp}
Syntax Description
ftp
Sets the transfer mode to
FTP.
tftp
Sets the transfer mode to
TFTP.
sftp
Sets the transfer mode to
SFTP.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set the transfer mode to TFTP:
(Cisco Controller) >transfer upload mode tftp
transfer upload pac
To load a Protected Access
Credential (PAC) to support the local authentication feature and allow a client
to import the PAC, use the
transfer upload
pac command.
transfer upload
pac
username
validity
password
Syntax Description
username
User identity of the PAC.
validity
Validity period (days) of the
PAC.
password
Password to protect the PAC.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
The client upload process
uses a TFTP or FTP server.
Examples
The following example shows
how to upload a PAC with the username user1, validity period 53, and password
pass01:
To upload a file to
the peer WLC, use the
transfer upload peer-start
command.
transfer upload peer-start
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release
earlier than Release 7.6.
Examples
The following
example shows how to start uploading a file to the peer controller:
> transfer upload peer-start
Mode............................................. FTP
FTP Server IP.................................... 209.165.201.1
FTP Server Port.................................. 21
FTP Path......................................... /builds/nimm/
FTP Filename..................................... AS_5500_7_4_1_20.aes
FTP Username..................................... wnbu
FTP Password..................................... *********
Data Type........................................ Error Log
Are you sure you want to start upload from standby? (y/N) n
Transfer Canceled
transfer upload port
To specify the FTP port, use
the
transfer upload
port command.
transfer upload
port
port
Syntax Description
port
Port number.
Command Default
The default FTP port is 21.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to specify FTP port 23:
(Cisco Controller) >transfer upload port 23
transfer upload
serverip
To configure the IP address
of the TFTP server to upload files to, use the
transfer upload
serverip command.
transfer upload
serverip
ip_address
Syntax Description
ip_address
Server IP address.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set the IP address of the TFTP server to 175.31.56.78:
To initiate an upload, use
the
transfer upload
start command.
transfer upload
start
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to initiate an upload of a file:
(Cisco Controller) >transfer upload start
Mode........................................... TFTP
TFTP Server IP................................. 172.16.16.78
TFTP Path...................................... c:\find\off/
TFTP Filename.................................. wps_2_0_75_0.aes
Data Type...................................... Code
Are you sure you want to start? (y/n) n
Transfer Cancelled
transfer upload
username
To specify the FTP username,
use the
transfer upload
username command.
transfer upload
username
Syntax Description
username
Username required to access
the FTP server. The username can contain up to 31 characters.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to set the FTP username to ftp_username:
Installing and Modifying Licenses on Cisco 5500 Series Controllers
Use the license commands to install, remove, modify, or rehost licenses.
Note
Some license commands are available only on the Cisco 5500 Series Controller. Right to Use (RTU) licensing is not supported on Cisco 5500 Series Controllers.
Note
For detailed information on installing and rehosting licenses on the Cisco 5500 Series Controller, see the “Installing and Configuring Licenses” section in Chapter 4 of the Cisco Wireless LAN Controller Configuration Guide.
To remove a license from the
Cisco 5500 Series Controller, use the
license clear
command.
license clear
license_name
Syntax Description
license_name
Name of the license.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
You can delete an expired
evaluation license or any unused license. You cannot delete unexpired
evaluation licenses, the permanent base image license, or licenses that are in
use by the controller.
Examples
The following example shows
how to remove the license settings of the license named wplus-ap-count:
(Cisco Controller) >license clear wplus-ap-count
license comment
To add comments to a license
or delete comments from a license on the Cisco 5500 Series Controller, use the
license comment
command.
This command was introduced in a release earlier than Release 7.6.
Examples
The following example shows
how to add a comment “wplus ap count license” to the license name
wplus-ap-count:
(Cisco Controller) >license comment add wplus-ap-count Comment for wplus ap count license
license install
To install a license on the
Cisco 5500 Series Controller, use the
license install
command.
license install
url
Syntax Description
url
URL of the TFTP server
(tftp://server_ip/path/filename).
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
We recommend that the access
point count be the same for the base-ap-count and wplus-ap-count licenses
installed on your controller. If your controller has a base-ap-count license of
100 and you install a wplus-ap-count license of 12, the controller supports up
to 100 access points when the base license is in use but only a maximum of 12
access points when the wplus license is in use.
You cannot install a wplus
license that has an access point count greater than the controller's base
license. For example, you cannot apply a wplus-ap-count 100 license to a
controller with an existing base-ap-count 12 license. If you attempt to
register for such a license, an error message appears indicating that the
license registration has failed. Before upgrading to a wplus-ap-count 100
license, you would first have to upgrade the controller to a base-ap-count 100
or 250 license.
Examples
The following example shows
how to install a license on the controller from the URL
tftp://10.10.10.10/path/license.lic:
To raise or lower the
priority of the base-ap-count or wplus-ap-count evaluation license on a Cisco
5500 Series Controller, use the
license modify
priority command.
license modify priority
license_name {
high
|
low}
Syntax Description
license_name
Ap-count evaluation license.
high
Modifies the priority of an
ap-count evaluation license.
low
Modifies the priority of an
ap-count evaluation license.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
If you are considering
upgrading to a license with a higher access point count, you can try an
evaluation license before upgrading to a permanent version of the license. For
example, if you are using a permanent license with a 50 access point count and
want to try an evaluation license with a 100 access point count, you can try
out the evaluation license for 60 days.
AP-count evaluation licenses
are set to low priority by default so that the controller uses the ap-count
permanent license. If you want to try an evaluation license with an increased
access point count, you must change its priority to high. If you no longer want
to have this higher capacity, you can lower the priority of the ap-count
evaluation license, which forces the controller to use the permanent license.
Note
You can set the priority only
for ap-count evaluation licenses. AP-count permanent licenses always have a
medium priority, which cannot be configured.
Note
If the ap-count evaluation
license is a wplus license and the ap-count permanent license is a base
license, you must also change the feature set to wplus.
Note
To prevent disruptions in
operation, the controller does not switch licenses when an evaluation license
expires. You must reboot the controller in order to return to a permanent
license. Following a reboot, the controller defaults to the same feature set
level as the expired evaluation license. If no permanent license at the same
feature set level is installed, the controller uses a permanent license at
another level or an unexpired evaluation license.
Examples
The following example shows
how to set the priority of the wplus-ap-count to high:
(Cisco Controller) >license modify priority wplus-ap-count high
license revoke
To rehost a license on a
Cisco 5500 Series WLC, use the
license revoke
command.
URL of the TFTP server
(tftp://server_ip/path/filename) where you saved the permission ticket.
rehost
Specifies the rehost license
settings.
rehost_ticket_url
URL of the TFTP server
(tftp://server_ip/path/filename) where you saved the rehost ticket.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Before you revoke a license,
save the device credentials by using the
license save credential
url
command.
You can rehost all permanent
licenses except the permanent base image license. Evaluation licenses and the
permanent base image license cannot be rehosted.
In order to rehost a license,
you must generate credential information from the controller and use it to
obtain a permission ticket to revoke the license from the Cisco licensing site,
https://tools.cisco.com/SWIFT/LicensingUI/Quickstart.
Next, you must obtain a rehost ticket and use it to obtain a license
installation file for the controller on which you want to install the license.
For detailed information on
rehosting licenses, see the “Installing and Configuring Licenses” section in
the
Cisco Wireless LAN Controller Configuration Guide.
Examples
The following example shows
how to revoke the license settings from the saved permission ticket URL
tftp://10.10.10.10/path/permit_ticket.lic:
To save a backup copy of all
installed licenses or license credentials on the Cisco 5500 Series Controller,
use the
license save
command.
license save
credential
url
Syntax Description
credential
Device credential
information.
url
URL of the TFTP server
(tftp://server_ip/path/filename).
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Save the device credentials
before you revoke the license by using the
license revoke
command.
Examples
The following example shows
how to save a backup copy of all installed licenses or license credentials on
tftp://10.10.10.10/path/cred.lic:
(Cisco Controller) >license save credential tftp://10.10.10.10/path/cred.lic
Right to Use Licensing Commands
Use the license commands to configure Right to Use (RTU) licensing on Cisco Flex 7500 Series and 8500 Series controllers. This feature allows you to enable an AP license count on the controller without using any external tools after accepting an End User License Agreement (EULA).
To activate an
evaluation access point license on the Cisco Flex 7500 Series and Cisco 8500
Series Wireless LAN Controllers, use the
license
activate ap-count eval
command.
license activate ap-count eval
Syntax Description
This command has no arguments
or keywords.
Command Default
By default, in
release 7.3 Cisco Flex 7500 Series Controllers and Cisco 8500 Series Wireless
LAN Controllers support 6000 APs.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
When you activate
this license, the controller prompts you to accept or reject the End User
License Agreement (EULA) for the given license. If you activate a license that
supports a smaller number of APs than the current number of APs connected to
the controller, the activation command fails.
Examples
The following
example shows how to activate an evaluation AP-count license on a Cisco Flex
7500 Series controller:
To configure the
number of access points (APs) that an AP license can support on Cisco Flex 7500
and 8500 Series Wireless LAN controllers, use the
license add
ap-countcommand.
license add ap-count
count
Syntax Description
count
Number of
APs that the AP license supports. The range is from 1 to the maximum number of
APs that the controller can support. The count must be a multiple of 5.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Right to Use (RTU)
licensing allows you to enable a desired AP license count on the controller
after accepting the End User License Agreement (EULA). You can now easily add
AP counts on a controller without using external tools. RTU licensing is
available only on Cisco Flex 7500 and 8500 series Wireless LAN controllers.
You can use this
command to increase the count of an existing AP license. When you activate a
license that supports a smaller number of APs than the current number of APs
connected to the controller, the activation command fails.
Examples
The following
example shows how to configure the count of an AP license on a Cisco Flex 7500
Series controller:
(Cisco Controller) >license add ap-count 5000
license add
feature
To add a license for
a feature on the Cisco Flex 7500 Series and Cisco 8500 Series Wireless LAN
controllers, use the
license add
feature
command.
license add feature
license_name
Syntax Description
license_name
Name of the
feature license. The license name can be up to 50 case-sensitive characters.
For example, data_DTLS.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to add a DTLS feature license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) >license add feature data_DTLS
license deactivate
ap-count eval
To deactivate an
evaluation access point license on the Cisco Flex 7500 Series and Cisco 8500
Series Wireless LAN Controllers, use the
license
deactivate ap-count eval
command.
license deactivate ap-count eval
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to deactivate an evaluation AP license on a Cisco Flex 7500
Series controller:
To delete an access
point (AP) count license on the Cisco Flex 7500 Series and Cisco 8500 Series
Wireless LAN Controllers, use the
license delete
ap-count
command.
license delete ap-count
count
Syntax Description
count
Number of
APs that the AP license supports. The range is from 1 to the maximum number of
APs that the controller can support. The count must be a multiple of 5.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to delete an AP count license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) >license delete ap-count 5000
license delete
feature
To delete a license
for a feature on Cisco Flex 7500 Series and Cisco 8500 Series Wireless LAN
controllers, use the
license delete
feature
command.
license delete feature
license_name
Syntax Description
license_name
Name of the
feature license.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Examples
The following
example shows how to delete the High Availability feature license on a Cisco
Flex 7500 Series controller:
To disable all debug
messages, use the
debug
disable-all command.
debug
disable-all
Syntax Description
This command has no arguments
or keywords.
Command Default
Disabled.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to disable all debug messages:
(Cisco Controller) >debug disable-all
debug fastpath
To debug the issues in the 10-Gigabit Ethernet interface of the controller and to view details of all the management and control features of the
controller, use the
debug fastpath command.
Displays the debug messages related to the fastpath errors.
events
Displays the debug messages related to the fastpath events.
warnings
Displays the debug messages related to the fastpath warnings.
log
Configures debug of log messages.
errors
Configures debug of fastpath errors.
events
Configures debug of fastpath events.
show
Displays log of most recent events related to fastpath.
status
Displays status of fastpath configuration.
dump
Displays the CLI dump commands.
stats
Displays the debug statistics from the data plane.
DP_number
Displays the statistic counters at data plane based on selected data plane number. Values include 0, 1, and All. The default option is All. You must select:
The index 0 for the Cisco Wireless LAN Controller 2504 Series, Cisco Wireless LAN Controller 5508 Series, Cisco Wireless LAN Controller 7500 Series, Cisco Wireless LAN Controller 8500 Series.
The index 0 and/or 1 respectively for the two data planes in WiSM2 to view statistics of individual data plane or from both.
fpapool
Displays statistics of packet buffer in data plane.
DP_number
Displays statistics of packet buffer based on data plane number. Values include 0, 1, and All. The default option is All. You must select:
The index 0 for the Cisco Wireless LAN Controller 2504 Series, Cisco Wireless LAN Controller 5508 Series, Cisco Wireless LAN Controller 7500 Series, Cisco Wireless LAN Controller 8500 Series.
The index 0 and/or 1 respectively for the two data planes in WiSM2 to view statistics of individual data plane or from both.
ownerdb
Displays the data plane owner information.
portdb
Displays the port database at data plane.
tun4db
Dumps the first 20 tunnels from the data plane.
index
Dumps 20 tunnel entries from index provided. You must use data plane number 0/1 to denote WISM2 data plane processor.
DP_number
Dumps the first twenty client entries from the data plane. Values include 0, 1, and All. The default option is All. You must select:
The index 0 for the Cisco Wireless LAN Controller 2504 Series, Cisco Wireless LAN Controller 5508 Series, Cisco Wireless LAN Controller 7500 Series, Cisco Wireless LAN Controller 8500 Series.
The index 0 and/or 1 respectively for the two data planes in WiSM2 to view statistics of individual data plane or from both.
scbdb
Dumps 20 client entries starting from index provided. You must use data plane number 0/1 to denote WISM2 data plane processor.
index
Dumps client information for the selected MAC address.
DP_number
Dumps the first twenty client entries from the data plane. Values include 0, 1, and All. The default option is All. You must select:
The index 0 for the Cisco Wireless LAN Controller 2504 Series, Cisco Wireless LAN Controller 5508 Series, Cisco Wireless LAN Controller 7500 Series, Cisco Wireless LAN Controller 8500 Series.
The index 0 and/or 1 respectively for the two data planes in WiSM2 to view statistics of individual data plane or from both.
cfgtool -- dump.sfp
Displays the model/type of SX/LC/T small form-factor plug-in (SFP) modules with the OUI Partnumber.
vlandb
Dumps the VLAN database in the dataplane.
dpcp-stats
Displays the dataplane to controlplane message statistics.
clear stats
Clears the data plane statistic counters.
systemdb
Displays the global data plane configuration.
debug
Displays the few latest messages of the data plane to enable troubleshooting.
wlanappstats
Displays Application Visibility and Control (AVC) statistics of a WLAN.
wlan_id
The WLAN identifier of the WLAN you need identify the AVC statistics.
appqosdb
Displays Application Visibility and Control (AVC) database statistics of the data plane.
clear
Clear command.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
None
Examples
Examples
The following is an example of the SX/LC/T small form-factor plug-in (SFP) modules model/type with the respective OUI Partnumber.
(Cisco Controller) >debug fastpath status
STP Admin Physical Physical Link Link
Pr Type Stat Mode Mode Status Status Trap POE SFPType
-- ------- ---- ------- ---------- ---------- ------ ------- ------- ----------
1 Normal Forw Enable Auto 1000 Full Up Enable N/A 1000BaseTX
2 Normal Forw Enable Auto 1000 Full Up Enable N/A 1000BaseTX
The following is an example of the fastpath status displayed while you
execute the status command.
debug packet logging acl {
clear-all |
driver
rule_index action npu_encap port |
eoip-eth
rule_index action dst src type vlan |
eoip-ip
rule_index action src dst proto src_port dst_port |
eth
rule_index action dst src type vlan |
ip
rule_index action src dst proto src_port dst_port |
lwapp-dot11rule_index action dst src bssid type |
lwapp-ip
rule_index action src dst proto src_port dst_port}
Syntax Description
acl
Filters the
displayed packets according to a rule.
disable
Disables
logging of all the packets.
enable
Enables
logging of all the packets.
rx
Displays all
the received packets.
tx
Displays all
the transmitted packets.
all
Displays
both the transmitted and the received packets.
packet_count
Maximum
number of packets to be logged. The range is from 1 to 65535. The default value
is 25.
display_size
Number of
bytes to be displayed when printing a packet. By default, the entire packet is
displayed.
format
Configures
the format of the debug output.
hex2pcap
Configures
the output format to be compatible with the hex2pcap format. The standard
format used by Cisco IOS supports the use of hex2pcap and can be decoded using
an HTML front end.
text2pcap
Configures
the output format to be compatible with the text2pcap format. In this format,
the sequence of packets can be decoded from the same console log file. .
clear-all
Clears all
the existing rules pertaining to the packets.
driver
Filters
the packets based on an incoming port or a Network Processing Unit (NPU)
encapsulation type.
rule_index
Index of
the rule that is a value between 1 and 6 (inclusive).
action
Action for
the rule, which can be
permit,
deny, or
disable.
npu_encap
NPU
encapsulation type that determines how the packets are filtered. The possible
values are
dhcp,
dot11-mgmt, dot11-probe, dot1x, eoip-ping, iapp, ip, lwapp, multicast,
orphan-from-sta, orphan-to-sta, rbcp, wired-guest,
or
any.
port
Physical
port for packet transmission or reception.
eoip-eth
Filters
packets based on the Ethernet II header in the Ethernet over IP (EoIP) payload.
dst
Destination MAC address.
src
Source MAC
address.
type
Two-byte
type code, such as 0x800 for IP, 0x806 for Address Resolution Protocol (ARP).
You can also enter a few common string values such as
ip
(for 0x800) or
arp
(for 0x806).
vlan
Two-byte
VLAN identifier.
eoip-ip
Filters
packets based on the IP header in the EoIP payload.
To display a summary of
memory analysis settings and any discovered memory issues, use the
show memory
monitor command.
show memory
monitor
[
detail]
Syntax Description
detail
(Optional) Displays details
of any memory leaks or corruption.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
Be careful when changing the
defaults for the
config memory
monitor command unless you know what you are doing, you have
detected a problem, or you are collecting troubleshooting information.
Examples
The following is a sample
output of the
show buffers
command:
(Cisco Controller) >show memory monitor
Memory Leak Monitor Status:
low_threshold(10000), high_threshold(30000), current status(disabled)
-------------------------------------------
Memory Error Monitor Status:
Crash-on-error flag currently set to (disabled)
No memory error detected.
The following is a sample
output of the
show memory monitor
detail command:
To display a comprehensive
view of the current Cisco wireless LAN controller configuration, use the
show run-config
command.
show
run-config
[
no-ap |
commands]
Syntax Description
no-ap
(Optional) Excludes access
point configuration settings.
commands
(Optional) Displays a list of
user-configured commands on the controller.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release 7.6.
Usage Guidelines
These commands have replaced
the
show
running-config command.
Some WLAN controllers may
have no Crypto Accelerator (VPN termination module) or power supplies listed
because they have no provisions for VPN termination modules or power supplies.
The
show run-config
command shows only values configured by the user. It does not show
system-configured default values.
Examples
The following is a sample
output of the
show run-config
command:
(Cisco Controller) >show run-config
Press Enter to continue...
System Inventory
Switch Description............................... Cisco Controller
Machine Model....................................
Serial Number.................................... FLS0923003B
Burned-in MAC Address............................ xx:xx:xx:xx:xx:xx
Crypto Accelerator 1............................. Absent
Crypto Accelerator 2............................. Absent
Power Supply 1................................... Absent
Power Supply 2................................... Present, OK
Press Enter to continue Or <Ctl Z> to abort...
show process
To display how various processes in the system are using the CPU at that instant in time, use the show process command.
show process {
cpu |
memory}
Syntax Description
cpu
Displays how various system tasks are using the CPU at that moment.
memory
Displays the allocation and deallocation of memory from various processes in the system at that moment.
Command Default
None.
Usage Guidelines
This command is helpful in understanding if any single task is monopolizing the CPU and preventing other tasks from being performed.
Examples
This example shows how to display various tasks in the system that are using the CPU at a given moment:
> show process cpu
Name Priority CPU Use Reaper
reaperWatcher ( 3/124) 0 % ( 0/ 0)% I
osapiReaper (10/121) 0 % ( 0/ 0)% I
TempStatus (255/ 1) 0 % ( 0/ 0)% I
emWeb (255/ 1) 0 % ( 0/ 0)% T 300
cliWebTask (255/ 1) 0 % ( 0/ 0)% I
UtilTask (255/ 1) 0 % ( 0/ 0)% T 300
This example shows how to display the allocation and deallocation of memory from various processes at a given moment:
> show process memory
Name Priority BytesinUse Reaper
reaperWatcher ( 3/124) 0 ( 0/ 0)% I
osapiReaper (10/121) 0 ( 0/ 0)% I
TempStatus (255/ 1) 308 ( 0/ 0)% I
emWeb (255/ 1) 294440 ( 0/ 0)% T 300
cliWebTask (255/ 1) 738 ( 0/ 0)% I
UtilTask (255/ 1) 308 ( 0/ 0)% T 300
Related Commands
debug memory
transfer upload datatype
show tech-support
To display Cisco wireless LAN controller variables frequently requested by Cisco Technical Assistance Center (TAC), use the show tech-support command.
show tech-support
Syntax Description
This command has no arguments or keywords.
Command Default
None.
Examples
This example shows how to display system resource information:
> show tech-support
Current CPU Load................................. 0%
System Buffers
Max Free Buffers.............................. 4608
Free Buffers.................................. 4604
Buffers In Use................................ 4
Web Server Resources
Descriptors Allocated......................... 152
Descriptors Used.............................. 3
Segments Allocated............................ 152
Segments Used................................. 3
System Resources
Uptime........................................ 747040 Secs
Total Ram..................................... 127552 Kbytes
Free Ram...................................... 19540 Kbytes
Shared Ram.................................... 0 Kbytes
Buffer Ram.................................... 460 Kbytes
config memory monitor
errors
To enable or disable
monitoring for memory errors and leaks, use the
config memory monitor
errors command.
config memory
monitor errors
{
enable |
disable}
Caution
The
config memory monitor commands can be disruptive
to your system and should be run only when you are advised to do so by the
Cisco TAC.
Syntax Description
enable
Enables the monitoring for
memory settings.
disable
Disables the monitoring for
memory settings.
Command Default
Monitoring for
memory errors and leaks is disabled by default.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Be cautious about changing
the defaults for the
config memory
monitor command unless you know what you are doing, you have
detected a problem, or you are collecting troubleshooting information.
Examples
The following example shows
how to enable monitoring for memory errors and leaks for a controller:
The
config memory
monitor commands can be disruptive to your system and should be
run only when you are advised to do so by the Cisco TAC.
Syntax Description
low_thresh
Value below which free memory
cannot fall without crashing. This value cannot be set lower than 10000 KB.
high_thresh
Value below which the
controller enters auto-leak-analysis mode. See the “Usage Guidelines” section.
Command Default
The default value for
low_thresh is 10000 KB; the default value for
high_thresh is 30000 KB.
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
Note
Be cautious about changing
the defaults for the
config memory
monitor command unless you know what you are doing, you have
detected a problem, or you are collecting troubleshooting information.
Use this command if you
suspect that a memory leak has occurred.
If the free memory is lower
than the
low_thresh threshold, the system crashes,
generating a crash file. The default value for this parameter is 10000 KB, and
you cannot set it below this value.
Set the
high_thresh threshold to the current free memory
level or higher so that the system enters auto-leak-analysis mode. After the
free memory reaches a level lower than the specified
high_thresh threshold, the process of tracking and
freeing memory allocation begins. As a result, the
debug memory events
enable command shows all allocations and frees, and the
show memory monitor
detail command starts to detect any suspected memory leaks.
Examples
The following example shows
how to set the threshold values for auto-leak-analysis mode to 12000 KB for the
low threshold and 35000 KB for the high threshold:
To reset the message log so
that it collects and displays only critical (highest-level) messages, use the
config msglog level
critical command.
config msglog
level critical
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Usage Guidelines
The message log always
collects and displays critical messages, regardless of the message log level
setting.
Examples
The following example shows
how to configure the message log severity level and display critical messages:
(Cisco Controller) >config msglog level critical
Related Commands
show
msglog
config msglog level
error
To reset the message log so
that it collects and displays both critical (highest-level) and error
(second-highest) messages, use the
config msglog level
error command.
config msglog
level error
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to reset the message log to collect and display critical and noncritical
error messages:
(Cisco Controller) >config msglog level error
Related Commands
show
msglog
config msglog level
security
To reset the message log so
that it collects and displays critical (highest-level), error (second-highest),
and security (third-highest) messages, use the
config msglog level
security command.
config msglog
level security
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to reset the message log so that it collects and display critical,
noncritical, and authentication or security-related errors:
(Cisco Controller) >config msglog level security
Related Commands
show
msglog
config msglog level
verbose
To reset the message log so
that it collects and displays all messages, use the
config msglog level
verbose command.
config msglog
level verbose
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to reset the message logs so that it collects and display all messages:
(Cisco Controller) >config msglog level verbose
Related Commands
show
msglog
config msglog level
warning
To reset the message log so
that it collects and displays critical (highest-level), error (second-highest),
security (third-highest), and warning (fourth-highest) messages, use the
config msglog level
warning command.
config msglog
level warning
Syntax Description
This command has no arguments
or keywords.
Command Default
None
Command History
Release
Modification
7.6
This command was introduced in a release earlier than Release
7.6.
Examples
The following example shows
how to reset the message log so that it collects and displays warning messages
in addition to critical, noncritical, and authentication or security-related
errors: