Monitor Controllers
Choose Monitor > Managed Elements > Network Devices , then select Device Type > Wireless Controller to view all the wireless controllers.
Monitor System Parameters
Choose Monitor > Managed Elements > Network Devices, then select Device Type > Wireless Controllerto view all the wireless controllers. Click a Device name to view its details.
From Release 3.2 onwards, for the following Monitor pages under Refresh from Device link in the upper right corner of the page. It also shows the date and time when the data was last refreshed on the Prime Infrastructure.
, by default the data is fetched from the Prime Infrastructure database. There is an option to refresh from device by clicking the-
Summary
-
CDP Neighbors
-
WLANs
From Release 3.2 onwards, for the following Monitor pages under
, the data is fetched directly from the device.-
CLI Sessions
-
DHCP Statistics
To View ... |
Select This Menu ... |
---|---|
System Information |
|
Summary information such as IP address, device type, location, reachability status, description, and total device count |
System > Summary under Device Details tab |
CLI session details |
System > CLI Sessions under Device Details tab |
DHCP statistics (for version 5.0.6.0 controllers or later) such as packets sent and received, DHCP server response information, and the last request time stamp |
System > DHCP Statistics under Device Details tab |
Multicast information |
System > Multicast under Configuration tab |
Stack information such as MAC address, role, and state |
System > Stacks under Device Details tab |
STP statistics |
System > Spanning Tree Protocol under Configuration tab |
Information about any user-defined fields |
System > User Defined Field under Device Details tab |
Wireless local access networks (WLANs) configured on a controller |
System >WLANs under Device Details tab |
Mobility |
|
Statistics for mobility group events such as receive and transmit errors, and handoff request |
Mobility > Mobility Stats under Device Details tab |
Ports |
|
Information regarding physical ports on the selected controller |
Ports > General under Configuration tab |
CDP Interfaces |
Ports > CDP Interface Neighbors under Configuration tab |
Security |
|
RADIUS accounting server information and statistics |
Security > RADIUS Accounting under Device Details tab |
RADIUS authentication server information |
Security > RADIUS Authentication under Device Details tab |
Information about network access control lists |
System > Security > Network Access Control |
Guest access deployment and network users |
Security > Guest Users under Device Details tab |
Management Frame Protection (MFP) summary information |
System > Security > Management Frame Protection under Device Details tab |
List of all rogue access point rules currently applied to a controller. |
System > Security > Rogue AP Rules under Device Details tab |
List of sleeping clients, which are clients with guest access that have had successful web authentication that are allowed to sleep and wake up without having to go through another authentication process through the login page |
Security > Sleeping Clients under Device Details tab |
IPv6 |
|
Statistics for the number of messages exchanged between the host or client and the router to generate and acquire IPv6 addresses, link, and MTU |
IPv6 > Neighbor Binding Timers under Configuration tab |
Redundancy |
|
Redundancy information |
System > Redundancy Summary under Device Details tab |
mDNS |
|
List of mDNS services and service provider information |
mDNS > mDNS Service Provider under Device Details tab |
What is Spanning Tree Protocol
The Spanning Tree Protocol (STP) is a link management protocol. Cisco WLAN Solution implements the IEEE 802.1D standard for media access control bridges.
The spanning tree algorithm provides redundancy while preventing undesirable loops in a network that are created by multiple active paths between stations. STP allows only one active path at a time between any two network devices (this prevents the loops) but establishes the redundant links as a backup if the initial link should fail.
The following controllers do not support Spanning Tree Protocol: WISM, 2500, 5500, 7500 and SMWLC.
What is Management Frame Protection
Management Frame Protection (MFP) provides the authentication of 802.11 management frames. Management frames can be protected to detect adversaries who are invoking denial of service attacks, flooding the network with probes, interjecting as rogue access points, and affecting the network performance by attacking the QoS and radio measurement frames.
If one or more of the WLANs for the controller has MFP enabled, the controller sends each registered access point a unique key for each BSSID the access point uses for those WLANs. Management frames sent by the access point over the MFP enabled WLANs is signed with a Frame Protection Information Element (IE). Any attempt to alter the frame invalidates the message causing the receiving access point configured to detect MFP frames to report the discrepancy to the WLAN controller.
What are Rogue Access Points Rules
Rogue Access Points rules automatically classify rogue access points based on criteria such as authentication type, matching configured SSIDs, client count, and RSSI values. Prime Infrastructure applies the rogue access point classification rules to the controllers and respective access points.
These rules can limit a rogue appearance on maps based on RSSI level (weaker rogue access points are ignored) and time limit (a rogue access point is not flagged unless it is seen for the indicated period of time).
Rogue Access Points Rules also help reduce false alarms.
Rogue classes include the following types:
- Malicious Rogue—A detected access point that matches the user-defined malicious rules or has been manually moved from the Friendly Access Points category.
- Friendly Rogue—Known, acknowledged, or trusted access point or a detected access point that matches user-defined friendly rules.
- Unclassified Rogue—A detected access point that does not match the malicious or friendly rules.
View System Details About Third-Party Controllers
Choose Monitor > Managed Elements > Network Devices> Third Party Wireless Controllers to view the detailed information about the third party (non-Cisco) controllers that are managed by Prime Infrastructure.
View System Details About Switch Controllers and Configure the Switch List
Choose Monitor > Managed Elements > Network Devices > Switches and Hubsto view the following detailed information about the switches:
- Searching Switches
Use the Prime Infrastructure search feature to find specific switches or to create and save custom searches.
- Viewing the Switches
Configure the Switch List Page
The Edit View page allows you to add, remove, or reorder columns in the Switches table.
To edit the available columns in the table, follow these steps:
Procedure
Step 1 |
Choose Monitor > Managed Elements > Network Devices > Switches and Hubs. |
Step 2 |
Click the Edit View link. |
Step 3 |
To add an additional column to the table, click to highlight the column heading in the left column. Click Show to move the heading to the right column. All items in the right column are displayed in the table. |
Step 4 |
To remove a column from the table, click to highlight the column heading in the right column. Click Hide to move the heading to the left column. All items in the left column are not displayed in the table. |
Step 5 |
Use the Up/Down buttons to specify the order in which the information appears in the table. Highlight the desired column heading and click Up or Down to move it higher or lower in the current list. |
Step 6 |
Click Reset to restore the default view. |
Step 7 |
Click Submit to confirm the changes. |
Monitor Access Points
This section describes access to the controller access points summary details. Use the main date area to access the respective access point details.
Choose Monitor > Wireless Technologies> Access Point Radios to access this page.
View Access Points
Choose Monitor > Wireless Technologies > Access Point Radios or perform an access point search to view the summary of access points including the default information.
Types of Reports for Access Points
The following reports can be generated for Access Points. These reports cannot be customized.
- Load—Traffic Load is the total amount of bandwidth used for transmitting and receiving traffic. This enables WLAN managers to track network growth and plan network growth ahead of client demand.
- Dynamic Power Control—Generates a report with Dynamic Power Control information.
- Noise—Generates a report with Noise information. The Noise report displays a bar graph of noise (RSSI in dBm) for each channel for the selected access points.
- Interference—The
Interference report displays a bar graph of interference (RSSI in dBm) for each
channel:
- High interference—40 to 0 dBm
- Marginal interference—100 to -40 dBm
- Low interference—110 to -100 dBm
- Coverage (RSSI)—The Coverage (RSSI) report displays a bar graph of client distribution by received signal strength showing the number of clients versus RSSI in dBm.
- Coverage (SNR)—The Access Points Coverage (SNR) report displays a bar graph of client distribution by signal-to-noise ratio showing the number of clients versus SNR.
- Up/Down Statistics—The Up/Down Statistics report displays a line graph of access point up time graphed against time. Time in days, hours and minutes since the last reboot.
- Network Airtime Fairness Statistics—Network Airtime Fairness Statistics is a tabular representation of Average Airtime used across different WLAN profiles in the selected interval of time.
- Voice
Statistics—Generates a report for selected access points showing radio
utilization by voice traffic. The Voice Statistics report displays the
following radio utilization statistics by voice traffic:
- Access Points Name
- Radio
- Calls in Progress
- Roaming Calls in Progress
- Bandwidth in Use
Voice Statistics reports are only applicable for CAC/WMM clients.
- Voice TSM Table—The Voice Traffic Stream Metrics Table is generated for the selected access points and radio, organized by client device showing QoS status, PLR, and latency of its voice traffic stream.
- Voice TSM Reports—The Voice Traffic Stream Metrics Table report displays a graphical representation of the Voice Traffic Stream Metrics Table except that metrics from the clients that are averaged together on the graphs for the selected access point.
- 802.11 Counters—The 8o2.11 Counters report displays counters for access points at the MAC layer. Statistics such as error frames, fragment counts, RTS/CTS frame count, and retried frames are generated based on the filtering criteria and can help interpret performance (and problems, if any) at the MAC layer.
- Access Points Profile Status—The Access Points Profile Status displays access point load, noise, interference, and coverage profile status.
- Air Quality vs. Time—The Radio Utilization Report displays the utilization trends of the access point radios based on the filtering criteria used when the report was generated. It helps to identify current network performance and capacity planning for future scalability needs. The Radio Utilization Report displays the air quality index of the wireless network during the configured time duration.
- Traffic Stream Metrics—The Traffic Stream Metrics Report is useful in determining the current and historical quality of service (QoS) for given clients at the radio level. It also displays uplink and downlink statistics such as packet loss rate, average queuing delay, distribution of delayed packets, and roaming delays.
- Tx Power and Channel—The Tx Power and Channel report displays the channel plan assignment and transmit power level trends of devices based on the filtering criteria used when the report was generated. It can help identify unexpected behavior or issues with network performance.
The Current Tx Power Level setting controls the maximum conducted transmit power. The maximum available transmit power varies according to the configured channel, individual country regulation, and access point capability. See the Product Guide or data sheet at for each specific model to determine the access point capability.
The Current Tx Power Level setting of 1 represents the maximum conducted power setting for the access point. Each subsequent power level (for example. 2, 3, 4, and so on.) represents approximately a 50% (or 3dBm) reduction in transmit power from the previous power level. The actual power reduction might vary slightly for different models of access points.
Based on the configured antenna gain, the configured channel, and the configured power level, the actual transmit power at the access point can be reduced so that the specific country regulations are not exceeded.
Irrespective of whether you choose Global or Custom assignment method, the actual conducted transmit power at the access point is verified such that country specific regulations are not exceeded.
The following command buttons are available to configure the transmission levels:
- Save—Save the current settings.
- Audit—Discover the present status of this access point.
- VoIP Calls Graph—VoIP Calls Graph analyzes wireless network usage from a voice perspective by providing details such as the number and duration of VoIP calls (per radio) on the network over time. VoIP snooping must be enabled on the WLAN to be able to gather useful data from this report. This report displays information in a graph.
- VoIP Calls Table—VoIP Calls Table provides the same information as the VoIP Calls Graph report but in table form.
- Voice Statistics—Voice Statistics Report analyzes wireless network usage from a voice perspective by providing details such as percentage of bandwidth used by voice clients, voice calls, roaming calls, and rejected calls (per radio) on the network. To be able to gather useful data from this report, make sure call admission control (CAC) is supported on voice clients.
- Worst Air Quality APs—Provides a high-level, easy-to- understand metric to facilitate understanding of where interference problems are impacting the network. Air Quality (AQ) is reported at a channel, floor, and system level and it supports AQ alerts, so that you can be automatically notified when AQ falls below a desired threshold.
View System Details About Access Points
The Access Points Details page enables you to view access point information for a single Access Point.
Choose Monitor > Wireless Technologies > Access Point Radios and click the access point name in the AP Name column to access this page. Depending on the type of access point, the following tabs are displayed:
- General Tab
The General tab fields differ between lightweight and autonomous access points.
For autonomous clients, Prime Infrastructure only collects client counts. The client counts in the Monitor page and reports have autonomous clients included. Client search, client traffic graphs, or other client reports (such as Unique Clients, Busiest Clients, Client Association) do not include clients from autonomous access points.
- Interfaces Tab
- CDP Neighbors Tab
This tab is visible only when CDP is enabled.
- Current Associated Clients Tab
This tab is visible only when there are clients associated to the Access Point (CAPWAP or Autonomous Access Point).
- SSID Tab
This tab is visible only when the access point is an Autonomous Access Point and there are SSIDs configured on the Access Point
- Clients Over Time Tab
This tab displays the following charts:
- Client Count on Access Point—Displays the total number of clients currently associated with an access point over time.
- Client Traffic on Access Point—Displays the traffic generated by the client connected in the Access Point distribution over time.
The information that appears in these charts is presented in a time-based graph. Time-based graphs have a link bar at the top of the graph page that displays 6h, 1d, 1w, 2w, 4w, 3m, 6m, 1y, and Custom. When selected, the data for that time frame is retrieved and the corresponding graph is displayed.