- Summary
- SNMP System Summary
- SNMP V3 Users
- SNMP v1/v2c Community
- SNMP Trap Receiver
- SNMP Trap Controls
- SNMP Trap Logs
- HTTP-HTTPS Configuration
- Telnet-SSH Configuration
- Serial Port Configuration
- Local Management Users
- CLI Sessions
- Syslog Configuration
- Message Logs
- Management Via Wireless
- Installing and Configuring Licenses
Management Tab
This tab on the menu bar enables you to access the Cisco WLC management details. Use the left navigation pane to access specific management parameters. Making this selection from the menu bar opens the Summary page.
You can access the following pages from the Management tab:
- Summary
- SNMP V3 Users
- SNMP v1/v2c Community
- SNMP Trap Receiver
- SNMP Trap Controls
- SNMP Trap Logs
- HTTP-HTTPS Configuration
- Telnet-SSH Configuration
- Serial Port Configuration
- Local Management Users
- Guest User Accounts
- CLI Sessions
- Syslog Configuration
- Message Logs
- Management Via Wireless
- Installing and Configuring Licenses
- Licenses
- License Detail
- License Level
- License Commands
- System Resource Information
- Controller Crash Information
- Core Dump
- AP Crash Logs
Summary
Choose MANAGEMENT > Summary to navigate to the Summary page. This page displays the network summary.
This table describes the management summary parameters.
SNMP System Summary
Choose MANAGEMENT > SNMP > General to navigate to the SNMP System Summary page. This page enables you to change some of the SNMP system parameters.
This table describes the SNMP system parameters.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
SNMP V3 Users
Choose MANAGEMENT > SNMP > SNMP V3 Users to navigate to the SNMP V3 Users page. This page provides a summary of the SNMP users.
This table describes the SNMP user summary parameters.
|
|
---|---|
To remove a user profile, click the blue arrow adjacent the desired profile and choose Remove. You are prompted for confirmation of the user removal.
Click New to add a new SNMP user (see the Adding SNMP V3 Users topic).
Adding SNMP V3 Users
Choose MANAGEMENT > SNMP > SNMP V3 Users and then click New to navigate to the SNMP V3 Users > New page. This page provides a summary of the SNMP users.
This table describes the SNMP user details parameters.
|
|
---|---|
None, HMAC-MD5, or HMAC-SHA (default). For HMAC-MD5 or HMAC-SHA, enter and confirm an authentication password. |
|
If you select an authentication or privacy protocol, you must enter a password for each.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
SNMP v1/v2c Community
Choose MANAGEMENT > SNMP > Communities to navigate to the SNMP v1 / v2c Community page.
Edit a user profile by choosing Edit (see the Editing SNMP v1/v2c Community topic).
To remove a community, click the blue arrow adjacent the desired community and choose Remove. You are prompted to confirm the removal of the community. This page provides a summary of the SNMP community.
This table describes the SNMP community summary parameters.
Click New to add a new community user profile (see the Adding SNMP v1/v2c Community topic).
Adding SNMP v1/v2c Community
Choose MANAGEMENT > SNMP Communities and then click New to navigate to the SNMP v1 / v2c Community > New page. This page enables you to add a new SNMP community profile.
Note There is no IPSec support for IPv6.
This table describes the SNMP community summary parameters.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Editing SNMP v1/v2c Community
Choose MANAGEMENT > SNMP Communities and then click Edit to navigate to the SNMP v1 / v2c Community > Edit page.
This page allows you to enable or disable an SNMP community profile. All fields are read-only except the Status text box.
Note There is no IPSec support for IPv6.
This table describes the SNMP community summary parameters.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
SNMP Trap Receiver
Choose MANAGEMENT > SNMP > Trap Receivers to navigate to the SNMP Trap Receiver page.
Edit a user profile by choosing Edit (see the Editing SNMP Trap Receivers topic).
Remove a user profile by choosing Remove. You are prompted for confirmation of the trap removal. This page provides a summary of existing SNMP trap receivers.
This table describes the SNMP trap receiver summary parameters.
|
|
---|---|
IP address of the server. From Release 8.0, SNMP trap receiver support IPv4 and IPv6. |
|
Status that must be enabled for the SNMP traps to be sent to the server. |
Click New to add a new trap receiver (see the Adding SNMP Trap Receivers topic).
Adding SNMP Trap Receivers
Choose MANAGEMENT > SNMP > Trap Receivers and then click New to navigate to the SNMP Trap Receiver > New page.
This page enables you to add a server to receive SNMP traps from this Cisco WLC.
This table describes the SNMP trap receiver detail parameters.
Note There is no IPSec support for IPv6.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Editing SNMP Trap Receivers
Choose MANAGEMENT > SNMP > Trap Receivers and then click the Community Name to edit an SNMP trap receivers and its IPSec details.
Note There is no IPSec support for IPv6.
This page enables you to configure sending traps to a particular server. Only the Status text box can be modified.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
SNMP Trap Controls
Choose MANAGEMENT > SNMP > Trap Controls to navigate to the SNMP Trap Controls page.
This page enables you to select which traps logs should be captured. Choose the applicable logs and choose Apply.
Note Select the Select All check box to enable all traps on a tab. Unselect the Select All check box to disable all traps on a tab.
General Tab
This table describes the SNMP trap control parameters.
|
|
---|---|
Spanning Tree1 |
Spanning tree traps. Refer to the STP specifications for descriptions of individual parameters. |
Notification sent when the number of RFID tags on the Cisco WLC exceeds the threshold limit defined in the Threshold field. |
|
Threshold number of the RFID tags on the Cisco WLC to trigger a trap. |
1.The Cisco 5500 Series Controllers do not support the Spanning Tree Protocol. |
Client Tab
This table describes the client tab parameters.
AP Tab
This table describes the AP tab parameters.
Security Tab
This table describes the security tab parameters.
Auto RF Tab
This table describes the auto RF tab parameters.
Mesh Tab
This table describes the mesh tab parameters.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
SNMP Trap Logs
Choose MANAGEMENT > SNMP > Trap Logs to navigate to the Trap Logs page.
This page enables you to view the trap logs that have been captured by the Cisco WLC. Each trap entry includes the log number, system time, and trap description.
This page also displays the number of traps since the last reset and number of traps since log last viewed.
Note Review the following client reason and status codes. You are likely to encounter them when reviewing the trap logs.
Client Reason Code Descriptions
This table describes the client reason code parameters.
Client Status Code Descriptions
This table describes the client status code parameters.
|
|
|
---|---|---|
Normal operation; no rejections of client association requests. |
||
Automatically disabled by the operating system for an operator-defined time. |
Click Clear Log to delete all log entries. You are prompted for confirmation to delete the logs.
HTTP-HTTPS Configuration
Choose MANAGEMENT > HTTP-HTTPS to navigate to the HTTP-HTTPS Configuration page.
This page enables you to configure the following settings for Web Mode or Secure Web Mode:
- HTTP Access—HTTP Web User Interface that is accessible using a login and password. If you disable HTTP Web Mode, you must enable Secure Web Mode or you must use the CLI or Cisco Wireless Control System interface to configure the Cisco WLC. If you disable Web Mode and Secure Web Mode, you must use the CLI interface to configure the Cisco WLC.
- HTTPS Access—HTTPS Secure Shell (SSL) interface that is accessible using secure certificate authentication (configured below). This is the default access. If you disable HTTPS Secure Web Mode, you must enable Web Mode or you must use the CLI or Cisco Wireless Control System interface to configure the Cisco WLC.
- Web Session Timeout—Amount of inactivity (in minutes) before the session times out.
- Current Certificate —Name, Type, Serial Number, Valid, Subject Name, Issuer Name, MD5 Fingerpoint, and SHA1 Fingerpoint.
- Download SSL Certificate — Certificate that you use to download an SSL Web Admin Certificate from a local TFTP server. Select the Download SSL Certificate check box to display the following entries:
– Server IP Address—IP address of the local TFTP server.
– Maximum Retries—Maximum number of times each download can be attempted.
– Timeout—Amount of time allowed for each download.
– Certificate File Path—Usually either \ or /, as most TFTP servers automatically determine the path to their default file location. Otherwise, use the TFTP server absolute file path.
– Certificate File Name—Web Administration Certificate filename in encrypted PEM (Privacy Enhanced Mail) format.
– Certificate Password—SSL certificate password that is used to decrypt the SSL Web Admin Certificate.
Note The TFTP server cannot run on the same computer because the Cisco Prime Infrastructure and the TFTP server use the same communication port.
Click Apply and Yes to download the SSL Web Admin Certificate. The operating system informs you of the file transfer and the certificate installation progress.
The SSL password decrypts the certificate, and the certificate is used for Secure Web Mode access when activated.
Note You must save the configuration changes and reboot the Cisco WLC after changing the SSL certificate.
Click Apply to send data or a download SSL certificate request to the Cisco WLC, but the result is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Click Delete Certificate to instruct the operating system to delete the current SSL certificate.
Click Regenerate Certificate to instruct the operating system to generate a new SSL certificate to replace any existing certificate; the Web User Interface displays the “Successfully Generated SSL Web Admin Certificate” message when done.
Telnet-SSH Configuration
Choose MANAGEMENT > Telnet-SSH to navigate to the Telnet-SSH Configuration page.
Note Only FIPS approved algorithm 128-cbc is supported when using SSH to control WLANs.
This page enables you to modify the following settings for Telnet accessibility to the Cisco WLC:
- Session Timeout (minutes)—Number of minutes that a Telnet session is allowed to remain inactive before being logged off. A zero means there is no timeout. The timeout may be specified as a number from 0 to 160. The default is 5 minutes.
- Maximum Number of Telnet Sessions—Values from 0 to 5. This object indicates the number of simultaneous Telnet sessions allowed. The default is 5.
- Allow New Telnet Sessions—Whether new Telnet sessions are not allowed on the DS port when set to no. The default is no.
Note New Telnet sessions are allowed or disallowed on both the DS (network) port and the Service port using the Allow New Telnet Sessions parameter.
- Allow New SSH Sessions—Whether new Secure Shell Telnet sessions are not allowed when set to no. The default value is yes.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Serial Port Configuration
Choose MANAGEMENT > Serial Port to navigate to the Serial Port Configuration page. This page enables you to modify configurable serial session properties.
This table describes the serial port configuration parameters.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Local Management Users
Choose MANAGEMENT > Local Management Users to navigate to the Local Management Users page.
This page lists current management user logins on the Cisco WLC and the users’ access privileges.
You may remove a user account by click the blue arrow adjacent the desired account and choose Remove.
- Click New to add a new management user (see the Adding Local Management Users topic).
Adding Local Management Users
Choose MANAGEMENT > Local Management Users and then click New to navigate to the Local Management Users > New page.
This page enables you to add management user accounts on the Cisco WLC and the user’s access privileges.
Note The settings for the Management User Details parameters depends on the settings that you make in the Password Policy page. The following requirements are enforced on the password:
- The password should contain characters from at least three of the following classes: lowercase letters, uppercase letters, digits, and special characters.
- No character in the password can be repeated more than three times consecutively.
- The password should not contain a management username or the reverse letters of a username.
- The password should not contain words like Cisco, oscic, admin, nimda, or any variant obtained by changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for s.
This table describes the management user details parameters.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Guest User Accounts
The first step in creating guest user accounts is for the system administrator to set up a lobby administrator account, also known as a Lobby Ambassador account. A Lobby Ambassador account has limited configuration privileges and has access only to the pages that are used to configure and manage guest user accounts. This feature enables a nontechnical person to create and manage guest user accounts on the Cisco WLC.
A guest user account can provide a user account for a limited amount of time. The Lobby Ambassador is able to configure a specific time frame for the guest user account to be active. After the specified time period, the guest user account automatically expires.
To create a guest user account, log out of the Cisco WLC and log back in again as Lobby Administrator. You will view the guest user accounts you create on the Cisco WLC (and all others) on the local net user’s page (see the Local Net Users topic).
Lobby Ambassador Account Setup
Step 1 Go to Management > Local Management Users > New.
Step 2 Create a username for the Lobby Ambassador account and enter it in the User Name text box.
Step 3 Create a password for the Lobby Ambassador account and enter it in the Password text box.
Step 4 Reenter the Lobby Ambassador account password in the Confirm Password text box.
Step 5 Select LobbyAdmin in the User Access Mode box.
Step 6 Click Apply. The Local Management Users page opens and displays all registered users, including the new username that you just created, identified as LobbyAdmin. You may create additional new users from this page, or remove any except the admin user.
Step 1 Log into the Cisco WLC user as Lobby Ambassador.
Step 2 Click Configure > Controller Templates to display the NTP Server Templates page.
Step 3 From the left navigation, choose Security, and then choose Guest Users to display the Guest Users page.
Step 4 From the Select a Command drop-down list, choose Add Template and click GO.
Step 5 On the Guest User > New Template page, follow these steps to add a new guest user account:
a. Enter the guest username. The maximum is 24 characters.
b. Select the check box to generate an automatic password or enter a password. If you enter a password, enter it twice to confirm. The generated password is automatically entered into the password text box.
Note Passwords are case sensitive.
c. From the drop-down list, choose an SSID (WLAN Service Set Identifier). The SSID that this guest user applies must be a WLAN that has a Layer 3 web authentication policy configured. Your administrator can advise which SSID to use.
d. Enter a description of the guest user account.
e. From the drop-down list, choose days, hours, or minutes for the lifetime of this guest user account. The maximum is 30 days. A value of zero (0) implies infinity and will be a permanent account.
Step 6 Click Save to save your changes or click Cancel to leave the settings unchanged. When you click Save, the screen refreshes and includes the following:
- Save—Save your changes.
- Apply to Controllers—The Apply to Controller page appears. Select the check box for the Cisco WLC or Config Group name that the guest user account applies to and click OK. If you do not want to apply to Cisco WLCs, click Cancel. If you click OK, the Apply to Controllers page refreshes and shows the operation status. If the operation status shows as successful, the guest user account has been completed and can be used immediately.
- The Account Expiry page displays the Cisco WLC to which the guest user account was applied and the seconds remaining before the guest user account expires.
- Delete—Deletes the displayed guest user template.
- Cancel—Disregards any settings or changes.
CLI Sessions
Choose MANAGEMENT > User Sessions to navigate to the CLI Sessions page. This page provides a list of open CLI sessions.
This table describes the management user details parameters.
|
|
---|---|
To stop an existing Telnet session, click the blue arrow adjacent the desired session and choose Close.
Syslog Configuration
Choose MANAGEMENT > Logs > Config to navigate to the Syslog Configuration page.
This page enables you to configure system logs.
If you enable system logs, enter the IP address of the server to which to send the syslog messages and click Add. You can add up to three syslog servers to the Cisco WLC. The list of syslog servers that have already been added to the Cisco WLC appears below this field.
Syslog Server
This table describes the syslog server parameters.
Msg Log Configuration
This table describes the message log configuration parameters.
|
|
---|---|
Severity level for logging messages to the Cisco WLC buffer and console: |
|
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Message Logs
Choose MANAGEMENT > Logs > Message logs to navigate to the Message Logs page.
This page enables you to view the message logs that have been captured by the Cisco WLC, by the last to the first message. Each trap entry includes the system time, filename and line, message type and message.
Management Via Wireless
Choose MANAGEMENT > Mgmt Via Wireless to navigate to the Management Via Wireless page. This page enables you to configure access to the Cisco WLC management interface from wireless clients using IPv4 and IPv6 methods. The default is disabled.
Note Due to IPsec limitations, the Management Via Wireless feature is available only if you log in across WPA, Static WEP, or VPN Pass Through WLANs. The Management feature is not available if you attempt to log on through an IPsec WLAN.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
Installing and Configuring Licenses
You can order Cisco 5500 Series Controllers with support for 12, 25, 50, 100, 250 or 500 access points as the Cisco WLC’s base capacity. You can add additional access point capacity through capacity adder licenses available at 25, 50, 100, and 250 access point capacities. You can add the capacity adder licenses to any base license in any combination to arrive at the maximum capacity of 500 access points. The base and adder licenses are supported through both rehosting and RMAs.
Note These Cisco WLC platforms do not require licenses: Cisco 4400 Series Controllers, Cisco WiSMs, Controller Network Modules, and Catalyst 3750G Integrated Wireless LAN Controller Switches.
Note All features included in a Wireless LAN Controller Wplus license are now included in the base license; this change is introduced in release 6.0.196.0. There are no changes to WCS BASE and PLUS licensing.
The base license supports the standard base software set and, for 6.0196.0 and later releases, the premium software set is included as part of the base feature set, which includes this functionality:
- Datagram Transport Layer Security (DTLS) data encryption for added security across remote WAN and LAN links.
About the availability of data DTLS for the 7.0.116.0 release:
– Cisco 5500 Series Controller—The Cisco 5500 Series Controller will be available with two licensing options: one with data DTLS capabilities and another image without data DTLS.
– Cisco 7500, 2500, WiSM2, WLC2—These platforms by default will not contain DTLS. To turn on data DTLS, a license must be installed. That is, these platforms will have a single image with data DTLS turned off. To use data DTLS you must have a license.
- Support for OfficeExtend Access Points, which are used for secure mobile telecommuting. For more information about OfficeExtend access points, see OfficeExtend Access Points.
- Support for the 1130AG and 1240AG series indoor mesh access points, which dynamically establish wireless connections in locations where it might be difficult to connect to the wired network.
All features included in a Wireless LAN Controller WPLUS license are now included in the base license; this change is introduced in release 6.0.196.0. There are no changes to WCS BASE and PLUS licensing. These WPLUS license features are included in the base license:
The licensing change can affect features on your wireless LAN when you upgrade or downgrade software releases, so you should be aware of these guidelines:
- If you have a WPLUS license and you upgrade from 6.0.x.x to 7.0.98.0, your license file contains both Basic and WPLUS license features. You will not see any disruption in feature availability and operation.
- If you have a WPLUS license and you downgrade from 7.0.98.0 to 6.0.196.0 or 6.0.188 or 6.0.182, your license file contains only base license, and you will lose all WPLUS features.
- If you have a base license and downgrade from 6.0.196.0 to 6.0.188 or 6.0.182, when you downgrade, you lose all WPLUS features.
To view the Cisco WLC trap log, choose Monitor and click View All under “Most Recent Traps” on the Cisco WLC GUI.
Note You can also view traps by using SNMP-based management tools.
The ap-count licenses and their corresponding image-based licenses are installed together. The Cisco WLC keeps track of the licensed access point count and does not allow more than the number of access points to associate to it.
The Cisco 5500 Series Controller is shipped with both permanent and evaluation base and base-ap-count licenses. If desired, you can activate the evaluation licenses, which are designed for temporary use and set to expire after 60 days.
No licensing steps are required after you receive your Cisco 5500 Series Controller because the licenses you ordered are installed at the factory. In addition, licenses and product authorization keys (PAKs) are preregistered to serial numbers. However, as your wireless network evolves, you might want to add support for additional access points or upgrade from the standard software set to the base software set. To do so, you need to obtain and install an upgrade license.
A certificate with a product authorization key (PAK) is required before you can obtain an upgrade license.
You can use the capacity adder licenses to increase the number of access points supported by the Cisco WLC up to a maximum of 500 access points. The capacity adder licenses are available in access point capacities of 10, 25, 50, 100 and 250 access points. You can add these licenses to any of the base capacity licenses of 12, 25, 50, 100 and 250 access points.
For example, if your Cisco WLC was initially ordered with support for 100 access points (base license AIR-CT5508-100-K9), you could increase the capacity to 500 access points by purchasing a 250 access point, 100 access point, and a 50 access point additive capacity license (LIC-CT5508-250A, LIC-CT5508-100A, and LIC-CT5508-50A).
You can find more information on ordering capacity adder licenses at this URL: http://www.cisco.com/c/en/us/products/wireless/5500-series-wireless-controllers/datasheet-listing.html
If you skip any tiers when upgrading (for example, if you do not install the -25U and -50U licenses along with the -100U), the license registration fails.
For a single Cisco WLC, you can order different upgrade licenses in one transaction (for example, -25U, -50U, -100U, and -250U), for which you receive one PAK with one license. Then you have only one license (instead of four) to install on your Cisco WLC.
If you have multiple Cisco WLCs and want to upgrade all of them, you can order multiple quantities of each upgrade license in one transaction (for example, you can order 10 each of the -25U, -50U, -100U, and -250 upgrade licenses), for which you receive one PAK with one license. You can continue to register the PAK for multiple Cisco WLCs until it is exhausted.
Base license SKUs for the Cisco Flex 7500 Series Controllers are as follows:
Base license SKUs for the Cisco 5500 Series Controllers are as follows:
- AIR-CT5508-12-K9
- AIR-CT5508-25-K9
- AIR-CT5508-50-K9
- AIR-CT5508-100-K9
- AIR-CT5508-250-K9
- AIR-CT5508-500-K9
The capacity adder SKUs are as follows:
Base license SKUs for the Cisco 2500 Series Controllers are as follows:
Base license SKUs for the Cisco WiSM2 Controllers are as follows:
- WS-SVC-WISM2-1-K9—WiSM2 with 100 AP support
- WS-SVC-WISM2-3-K9—WiSM2 with 300 AP support
- WS-SVC-WISM2-5-K9—WiSM2
To obtain and register a PAK certificate, follow these steps:
Step 1 Order the PAK certificate for an upgrade license through your Cisco channel partner or your Cisco sales representative, or order it online at this URL:
http://www.cisco.com/web/ordering/root/index.html
Step 2 If you are ordering online, begin by choosing the primary upgrade SKU L-LIC-CT5508-UPG or LIC CT5508-UPG. Then, choose any number of the following options to upgrade one or more Cisco WLCs under one PAK.
This table describes the controller configuration parameters.
Note If you require a paper certificate for Customs, order it without the “L-” in the SKU (for example, LIC-CT5508-250A) and choose to ship it using the U.S. mail.
Step 3 After you receive the certificate, use one of two methods to register the PAK:
- Cisco License Manager (CLM)—This method automates the process of obtaining licenses and deploying them on Cisco devices. For deployments with more than five Cisco WLCs, we recommend using CLM to register PAKs and install licenses. You can also use CLM to rehost or RMA a license.
Note You can download the CLM software and access user documentation at http://www.cisco.com/c/en/us/products/cloud-systems-management/license-manager/index.html
- Licensing portal—This alternative method enables you to manually obtain and install licenses on your Cisco WLC. If you want to use the licensing portal to register the PAK, follow the instructions in Step 4.
Step 4 Use the licensing portal to register the PAK as follows:
a. Go to http://tools.cisco.com/SWIFT/Licensing/PrivateRegistrationServlet
b. On the main Product License Registration page, enter the PAK mailed with the certificate in the Product Authorization Key (PAK) text box and click Submit.
c. On the Validate Features page, enter the number of licenses that you want to register in the Qty text box and click Update.
d. To determine the Cisco WLC’s product ID and serial number, choose Controller > Inventory on the Cisco WLC GUI or enter the show license udi command on the Cisco WLC CLI.
Note To determine the Cisco WLC’s product ID and serial number, see the Inventory page.
e. On the Designate Licensee page, enter the product ID and serial number of the Cisco WLC on which you plan to install the license, read and accept the conditions of the end-user license agreement (EULA), complete the rest of the text boxes on this page, and click Submit.
f. On the Finish and Submit page, verify that all information is correct and click Submit.
g. When a message appears indicating that the registration is complete, click Download License. The license is emailed within 1 hour to the address that you specified.
h. When the e-mail arrives, follow the instructions provided.
i. Copy the license file to your TFTP server.
j. Follow the instructions in the “Installing a License” section below to install the license on your Cisco WLC.
For installation instructions, see the Install License section on the License Commands page.
Licenses
Choose MANAGEMENT > Software Activation > Licenses to navigate to the Licenses page.
This page enables you to view all of the following types of information about the licenses installed on the Cisco WLC:
- License—Name of the license.
- Type—Permanent, evaluation, or extension.
- Time (expires)—How long until the license expires.
- HBL Count—Maximum number of access points allowed for the adder license. This field appears only for Cisco Flex 7500 Series and 8500 Series Controllers.
- Non HBL Count—Maximum number of access points allowed for the CDK license. This field appears only for Cisco Flex 7500 Series and 8500 Series Controllers.
- Count—Maximum number of access points allowed for this license. This field does not appear for Cisco Flex 7500 Series and 8500 Series Controllers.
- Priority—Low, medium, or high.
- Status—In use, not in use, inactive, or End User License Agreement (EULA) not accepted.
If you ever want to remove a license from the Cisco WLC, click the blue arrow adjacent the desired license and choose Remove. For example, you might want to delete an expired evaluation license or any unused license. You cannot delete unexpired evaluation licenses, the permanent base image license, or licenses that are in use by the Cisco WLC.
For Cisco Flex 7500 Series and 8500 Series Controllers, honor-based licensing also called Right to Use licensing was introduced in Cisco WLC Release 7.3. This feature allows you to add and activate an AP-count license on the Cisco WLC without using any external tools after accepting an End User License Agreement (EULA).
To add an AP-count license for Cisco Flex 7500 Series and 8500 Series Controllers follow these steps:
Step 1 Enter the count in the License Count text box.
Step 2 Choose Add from the License Count drop-down list.
Step 4 When the end-user license agreement (EULA) appears, read the terms of the agreement and then click Accept.
The ap-count permanent license is active now.
To delete an AP-count license or reduce the count for Cisco Flex 7500 Series and 8500 Series Controllers follow these steps:
Step 1 Enter the count in the License Count text box.
Step 2 Choose Delete from the License Count drop-down list.
Step 4 When the end-user license agreement (EULA) appears, read the terms of the agreement and then click Accept.
If the count is equal to the HBL count of the license, the license is removed from the list. If the count is less than the HBL count, the license appears with the decremented count.
To view more details for a particular license, click the link for the desired license. The License Detail page appears.
License Detail
Choose MANAGEMENT > Software Activation > License and then click a license name to navigate to the License Detail page.
This page shows the following additional information for the license:
The license type can be permanent, evaluation, or extension.
You can enter a comment for this license in the Comment text box and click Apply.
Status of the license. It can be one of the following:
– End user license agreement not accepted
This field appears only for Cisco Flex 7500 Series and 8500 Series Controllers. It indicates the current status of the license. It can be one of the following:
– End user license agreement not accepted
Length of time before the license expires
Note Permanent licenses never expire.
This field appears only for Cisco Flex 7500 Series and 8500 Series Controllers.You can activate or deactivate the license by choosing Activate or Deactivate from the drop-down list.
Whether the license is a built-in license.
Maximum number of access points allowed for this license. This field does not appear for Cisco Flex 7500 Series and 8500 Series Controllers.
Number of access points currently using this license. This field does not appear for Cisco Flex 7500 Series and 8500 Series Controllers.
To activate an ap-count evaluation license, you must change its priority to high. If you no longer want to have this higher capacity, you can lower the priority of the ap-count evaluation license, which forces the controller to use the permanent license. This field does not appear for Cisco Flex 7500 Series and 8500 Series Controllers.
Note You can set the priority only for ap-count evaluation licenses. AP-count permanent licenses always have a medium priority, which cannot be configured.
Activating an AP-Count Evaluation License
If you are considering upgrading to a license with a higher access point count, you can try an evaluation license before upgrading to a permanent version of the license. For example, if you are using a permanent license with a 50 access point count and want to try an evaluation license with a 100 access point count, you can try out the evaluation license for 60 days.
AP-count evaluation licenses are set to low priority by default so that the Cisco WLC uses the ap-count permanent license. If you want to try an evaluation license with an increased access point count, you must change its priority to high. If you no longer want to have this higher capacity, you can lower the priority of the ap-count evaluation license, forcing the Cisco WLC to use the permanent license.
Note If the ap-count evaluation license is a wplus license and the ap-count permanent license is a base license, you must also change the feature set to wplus. See the License Level page for instructions.
Note To prevent disruptions in operation, the Cisco WLC does not switch licenses when an evaluation license expires. You must reboot the Cisco WLC in order to return to a permanent license. Following a reboot, the Cisco WLC defaults to the same feature set level as the expired evaluation license. If no permanent license at the same feature set level is installed, the Cisco WLC uses a permanent license at another level or an unexpired evaluation license.
To activate an ap-count evaluation license, follow these steps:
Step 1 Choose High from the Priority drop-down list and click Set Priority.
Step 2 Click OK when prompted to confirm your decision about changing the priority of the license.
Step 3 When the end-user license agreement (EULA) appears, read the terms of the agreement and then click Accept.
Step 4 When prompted to reboot the Cisco WLC, click OK.
Step 5 Reboot the Cisco WLC in order for the priority change to take effect.
Step 6 Click Licenses to open the Licenses page and verify that the ap-count evaluation license now has a high priority and is in use. You can use the evaluation license until it expires.
If you decide to stop using the ap-count evaluation license and want to revert to using an ap-count permanent license, follow these steps:
Step 1 Choose Low from the Priority drop-down list and click Set Priority.
Step 2 Click OK when prompted to confirm your decision about changing the priority of the license.
Step 3 When the end-user license agreement (EULA) appears, read the terms of the agreement and then click Accept.
Step 4 When prompted to reboot the Cisco WLC, click OK.
Step 5 Reboot the Cisco WLC in order for the priority change to take effect.
Step 6 Click Licenses to open the Licenses page and verify that the ap-count evaluation license now has a low priority and is not in use. Instead, the ap-count permanent license should be in use.
License Level
Choose MANAGEMENT > Software Activation > License Usage to navigate to the License Level page.
This page enables you to configure the Cisco WLC to specify which feature set it uses (base or wplus). Only the base or wplus license can be active at a time. The currently active license determines the feature set and number of access points supported on the Cisco WLC.
This page shows the current license level (base or wplus) and the level to be used after the next Cisco WLC reboot. It also shows the maximum number of access points allowed by the license on the Cisco WLC, the number of access points currently joined to the Cisco WLC, and the number of access points that can still join the Cisco WLC.
Note To learn more about the available license levels, click the base or wplus license level link to open the Licenses page. This page shows the licenses applicable to this level and the list of features supported. Click Back to return to the License Level page.
To change the license level, follow these steps:
Step 1 Choose the license level to be used on the next reboot: base, wplus, or auto. If you choose auto, the licensing software automatically chooses the license level to use on the next reboot. It chooses permanent licenses over evaluation licenses and wplus licenses over base licenses.
Note If you are considering upgrading from a base license to a wplus license, you can try an evaluation wplus license before upgrading to a permanent wplus license. To activate the evaluation license, you need to set the image level to wplus in order for the Cisco WLC to use the wplus evaluation license instead of the base permanent license. If no valid licenses are installed, the Cisco WLC can always operate in base level.
Note To prevent disruptions in operation, the Cisco WLC does not switch licenses when an evaluation license expires. You must reboot the Cisco WLC in order to return to a permanent license. Following a reboot, the Cisco WLC defaults to the same feature set level as the expired evaluation license. If no permanent license at the same feature set level is installed, the Cisco WLC uses a permanent license at another level or an unexpired evaluation license.
Step 3 Click OK when prompted to confirm your decision to change the license level on the next reboot.
Step 4 If the end-user license agreement (EULA) appears, read the terms of the agreement and then click Accept. The Next Boot Level text box now shows the license level that you specified as the level to be used after the next Cisco WLC reboot.
Step 5 Reboot the Cisco WLC for the specified license level to take effect.
License Commands
Choose MANAGEMENT > Software Activation > Commands to navigate to the License Commands page.
From this page, you can install, save, or rehost licenses, and save device credentials.
Install License
Note For information about obtaining an upgrade license, see the Obtaining an Upgrade License topic.
Step 1 From the Action drop-down list, choose Install License. The Install license from a file section appears.
Step 2 In the File Name to Install text box, enter the path to the license (*.lic) on the TFTP server.
Step 3 Click Install License. A message appears to show whether the license was installed successfully. If the installation fails, the message provides the reason for the failure, such as the license is an existing license, the path was not found, the license does not belong to this device, you do not have correct permissions for the license, and so on.
Step 4 If the end-user license agreement (EULA) acceptance window appears, read the agreement and click Accept to accept the terms of the agreement.
Note Typically you are prompted to accept the end-user license agreement (EULA) for evaluation, extension, and rehost licenses. The EULA is also required for permanent licenses, but it is accepted during license generation.
Save License
Step 1 From the Action drop-down list, choose Save License. This saves all the licenses to a file, except the evaluation license section that appears.
Step 2 In the File Name to Save text box, enter the path on the TFTP server where you want the licenses to be saved.
Note You cannot save evaluation licenses.
Save Credentials
To save device credential information to a file, enter the path on the TFTP server where you want the device credentials to be saved and click Save Credentials. You need to save the device credentials to rehost a license.
Rehost
Revoking a license from one Cisco WLC and installing it on another is called rehosting. You might want to rehost a license to change the purpose of a Cisco WLC. For example, if you want to move your OfficeExtend or indoor mesh access points to a different Cisco WLC, you could transfer the wplus license from one Cisco WLC to another.
In order to rehost a license, you must generate credential information from the Cisco WLC and use it to obtain a permission ticket to revoke the license from the Cisco licensing site. Next, you must obtain a rehost ticket and use it to obtain a license installation file for the Cisco WLC on which you want to install the license.
Evaluation licenses and the permanent base image license cannot be rehosted.
Note A revoked license cannot be reinstalled on the same Cisco WLC.
To rehost a license, follow these steps:
Step 1 In the File Name to Save Credentials text box, enter the path on the TFTP server where you want the device credentials to be saved and click Save Credentials.
Step 2 Obtain a permission ticket to revoke the license as follows:
a. Click Cisco Licensing ( https://tools.cisco.com/SWIFT/Licensing/PrivateRegistrationServlet). The Product License Registration page appears.
b. Under Manage Licenses, click Look Up a License.
c. Enter the product ID and serial number for your Cisco WLC.
Note To determine the Cisco WLC’s product ID and serial number, see the Inventory page.
d. Open the device credential information file that you saved in Step 1 and copy and paste the contents of the file into the Device Credentials text box.
e. Enter the security code in the blank box and click Continue.
f. Choose the licenses that you want to revoke from this Cisco WLC and click Start License Transfer.
g. On the Rehost Quantities page, enter the number of licenses that you want to revoke in the To Rehost box and click Continue.
h. On the Designate Licensee page, enter the product ID and serial number of the Cisco WLC for which you plan to revoke the license, read and accept the conditions of the end-user license agreement (EULA), complete the rest of the text boxes on this page, and click Continue.
i. On the Review and Submit page, verify that all information is correct and click Submit.
j. When a message appears indicating that the registration is complete, click Download Permission Ticket. The rehost permission ticket is e-mailed within 1 hour to the address that you specified.
k. After the e-mail arrives, copy the rehost permission ticket to your TFTP server.
Step 3 Use the rehost permission ticket to revoke the license from this Cisco WLC and generate a rehost ticket as follows:
a. In the Cisco WLC GUI Enter Saved Permission Ticket File Name text box, enter the TFTP path and filename (*.lic) for the rehost permission ticket that you generated in Step 2.
b. In the Rehost Ticket File Name text box, enter the TFTP path and filename (*.lic) for the ticket that will be used to rehost this license on another Cisco WLC.
c. Click Generate Rehost Ticket.
d. When the EULA acceptance page appears, read the agreement and click Accept to accept the terms of the agreement.
Step 4 Use the rehost ticket that you generated in Step 3 to obtain a license installation file, which can then be installed on another Cisco WLC as follows:
a. Click Cisco Licensing ( http://www.cisco.com/go/license)
b. On the Product License Registration page, click Upload Rehost Ticket under Manage Licenses.
c. On the Upload Ticket page, enter the rehost ticket that you generated in Step 3 in the Enter Rehost Ticket text box and click Continue.
d. On the Validate Features page, verify that the license information for your Cisco WLC is correct, enter the rehost quantity, and click Continue.
e. On the Designate Licensee page, enter the product ID and serial number of the Cisco WLC on which you plan to use the license, read and accept the conditions of the EULA, complete the rest of the text boxes on this page, and click Continue.
f. On the Review and Submit page, verify that all information is correct and click Submit.
g. When a message appears indicating that the registration is complete, click Download License. The rehost license key is e-mailed within 1 hour to the address you specified.
h. After the e-mail arrives, copy the rehost license key to your TFTP server.
i. Follow the instructions from the Install License page to install this license on another Cisco WLC.
System Resource Information
Choose MANAGEMENT > Tech Support > System Resource Information to navigate to the System Resource Information page.
This page enables you to view the settings for the current Cisco WLC CPU usage, system buffers, and web server buffers.
For Cisco 5500 Series Controllers, the System Resource Information page also shows the Individual CPU usage, which is the percentage of the CPU in use and the percentage of the CPU time spent at the interrupt level.
Controller Crash Information
Choose MANAGEMENT > Tech Support > Controller Crash to navigate to the Controller Crash Information page.
This page displays the most recent Cisco WLC CPU crash files from most to least recent.
Core Dump
Choose MANAGEMENT > Tech Support > Core Dump to navigate to the Core Dump page.
You can configure the following settings so that the Cisco WLC can automatically upload a core dump file of the Cisco WLC:
- Core Dump Transfer—Setting to enable or disable the Cisco WLC to generate a core dump file following a crash.
- Transfer Mode—Transfer mode type. Choose FTP. The default is FTP.
- IP Address—IP address of the FTP server to which the core dump file is uploaded.
- File Name—Name that the Cisco WLC uses to label the core dump file.
- User Name—Username to log on to FTP.
- Password—Password to log on to FTP.
Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.
AP Crash Logs
Choose MANAGEMENT > Tech Support > AP Crash Log to navigate to the AP Crash Logs page.
This page enables you to view the following settings for the most recent access point log:
- AP Name—Access point name
- AP ID—Access point ID
- MAC Address—MAC address of the access point
- Admin Status—Admin status of the access point
- Operational Status—Operational status of the access point
- Port—Port number
- FileName—Name of the crash log file
- FileSize—Size of the crash log file
- TimeStamp—Crash Timestamp