WLANs Tab

The WLAN tab on the menu bar enables you to create, configure, and delete wireless local area networks (WLANs) on your Cisco WLC. Use the left navigation pane to access specific WLAN parameters.

You can access the following pages from the WLANs tab:

When you choose WLANs and click the blue arrow adjacent the profile, you can access the following options:

WLANs

Click WLANs to navigate to the WLANs page.

This page shows a summary of the wireless local area networks (WLANs) that you have configured on your network. From this page, you can add, remove, enable, disable, or edit WLANs.


Note The total number of WLANs appears in the upper right corner of the page. If the list of WLANs spans multiple pages, you can access these pages by clicking the page number links.


The Cisco UWN (Unified Wireless Network) solution can control up to 512 WLANs for lightweight access points. Each WLAN has a separate WLAN ID (1 through 512), a separate profile name, and a WLAN SSID (Service Set IDentifier), and it can be assigned with unique security policies. All Cisco WLCs publish up to 16 WLANs to each connected access point, but you can create up to 512 WLANs and then selectively publish these WLANs (using access point groups) to different access points to better manage your wireless network.


Note All OfficeExtend access points should be in the same access point group, and that group should contain no more than 15 WLANs. A Cisco WLC with OfficeExtend access points in an access point group publishes up to 15 WLANs to each connected OfficeExtend access point because it reserves one WLAN for the personal SSID, but for Cisco OEAP 600, this is not applicable.



Note The Cisco OEAP 600 Series access point supports only two WLANs and one RLAN, and the WLAN ID must be from 1 to 8.


You can associate up to 16 WLANs with each access point group and assign specific access points to each group. Each access point advertises only the enabled WLANs that belong to its access point group. The access point does not advertise disabled WLANs in its access point group or WLANs that belong to another group. See the AP Groups page for more information on access point groups.

WLAN List Filter

Click the Change Filter link to display the Search WLANs dialog box to create or change filter parameters. Click Clear Filter to remove the filter and display the entire WLAN list.

You can create a filter to display the list of WLANs by profile name, SSID, status, or a combination of SSID and status.

The current filter parameters are displayed in the Current Filter field.


Note When you enable the Profile Name filter, other filter options are disabled. When you enable the SSID or the Status filter, the Profile Name filter is disabled.


The Search WLANs dialog box enables you to search configured WLANs based on the following filters:

  • Profile Name—Select the Profile Name check box and enter a profile name.
  • SSID Select the SSID check box and enter an SSID.
  • Status Select the Status check box and choose Enabled or Disabled.
  • Find Click Find to search for the WLAN based on the filter parameters.

WLAN Information Table

Click WLANs from the left navigation menu to view the WLAN page. The WLANs page displays a summary of the configured WLANs.

This table describes the WLAN parameters.

 

Table 3-1 WLANs Summary

Parameter
Description

WLAN ID

ID of the WLAN.

Type

Type of LAN: WLAN, Guest LAN, or Remote LAN.

Profile Name

Profile name of the WLAN.

WLAN SSID

Definable name of the WLAN (text string).

Admin Status

Status of the WLAN is either enabled or disabled.

Security Policies

Security policies enabled on the WLAN.

Click the WLAN ID to modify the selected WLAN characteristics. The Editing WLANs page appears.

To view mobility anchor settings, click the blue arrow adjacent the profile and choose Mobility Anchors.

To enable or disable a WLAN from the WLANs page, select the check box to the left of the WLAN or WLANs, choose Enable Selected or Disable Selected from the drop-down list, and click Go.

To delete a WLAN, do one of the following:

  • Click the blue arrow adjacent the profile and choose Remove. You are prompted to confirm the removal of the selected WLAN.
  • Select the check box for the WLAN or WLANs, choose Remove Selected from the drop-down list, and select Go. You are prompted to confirm the removal of the selected WLAN.
  • Click Go to select an option from the drop-down list.

Creating New WLANs

To configure a new WLAN for a wired guest LAN, choose Create New from the drop-down list and click Go to navigate to the New WLAN page.

This table describes the WLAN > New parameters.

 

Table 3-2 WLAN > New Parameters

Parameter
Description

Type

Type of WLAN: Guest WLAN, WLAN, or Remote LAN.

Note Cisco 2504 Controllers does not support wired guest services.

Profile Name

Profile name of the WLAN.

SSID

SSID field is displayed if you choose WLAN from the Type drop-down list. Definable name of the WLAN (text string). This is the SSID broadcast name for the WLAN.

ID

ID number for the WLAN.

Guest LAN—Enter guest LAN identifier between 1 and 5.

WLAN—Enter WLAN identifier between 1 and 512. If there is more than one two WLANs enabled for an AP group, disable all WLANs and then enable only two of them.

Remote LAN—Enter remote LAN identifier between 1 and 512. If there is more than one remote LAN enabled for an AP group, disable all remote LANs and then enable only one of them.

Note If the Cisco OEAP 600 is in the default group, the WLAN/Remote LAN IDs must be set as less than ID 8.

Creating a WLAN


Step 1 Choose a WLAN type (Guest LAN, WLAN, or Remote LAN) from the drop-down list.


Note The WLANs that are not assigned to the access points are denoted with an asterisk (*) symbol.



Note To connect wired clients to a corporate network via an Office Extended AP, choose Remote LAN from the WLAN Type drop-down list. Once a user creates a remote LAN, it shows up on the list page as a distinct WLAN type.



Note Remote LANs should be removed from a Cisco WLC’s configuration before moving to a code base that does not support the remote LAN functionality. The remote LAN is called a WLAN in releases earlier than Cisco WLC Release 7.0.116.0, which may cause an undesirable or unsecured WLAN being broadcast on the wireless network. Remote LANs are supported only in Cisco WLC Release 7.0.116.0 and later.


Step 2 Enter a profile name for the WLAN in the Profile Name text box.

Step 3 Enter a text name for the WLAN in the WLAN SSID text box. (This is the SSID broadcast name for the WLAN.)


Note The SSID field is not available for Guest LANs and Remote LANs.


Step 4 Choose the ID number for the WLAN from the WLAN ID drop-down list.

Step 5 Click Apply to bring up the Editing WLANs page, where you can continue configuring the WLAN.

Once created, the selected WLAN type shows up in the list page as a distinct WLAN type: guest LAN, WLAN, or remote WLAN.


 

Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.

Creating a Remote LAN

This section describes configuring remote LANs.


Caution You must remove all the remote LANs from the configuration of the Cisco WLC before moving to a release that does not support the remote LAN functionality. The remote LAN is called a WLAN in releases earlier than Cisco WLC Release 7.0.116.0, which may cause an undesirable or unsecured WLAN being broadcast on the wireless network. Remote LANs are supported only in Cisco WLC 7.0.116.0 and later.


Note Only four clients can connect to an OEAP 600 series access point through a remote LAN port. This number does not affect the fifteen limit imposed for the Cisco WLC WLANs. The Remote LAN client limit supports connecting a switch or hub to the Remote LAN port for multiple devices or connecting directly to a Cisco IP phone that is connected to that port. Only the first four devices will be able to connect until one of the devices is idle for more than one minute.



Step 1 Choose WLANs to open the WLANs page.

This page lists all of the WLANs and remote LANs currently configured on the Cisco WLC. For each WLAN, you can see its WLAN/Remote LAN ID, profile name, type, SSID, status, and security policies.

The total number of WLANs appears in the upper right-hand corner of the page. If the list of WLANs spans multiple pages, you can access these pages by clicking the page number links.


Note If you want to delete a WLAN, click the blue arrow adjacent the WLAN and choose Remove, or select the check box to the left of the WLAN, choose Remove Selected from the drop-down list, and click Go. A message appears asking you to confirm your decision. If you proceed, the WLAN is removed from any access point group to which it is assigned and from the access point’s radio.


Step 2 Create a new WLAN by choosing Create New from the drop-down list and clicking Go. The WLANs > New page appears.

Step 3 From the Type drop-down list, choose Remote LAN to create a remote LAN.

Step 4 In the Profile Name text box, enter up to 32 alphanumeric characters for the profile name to be assigned to this WLAN. The profile name must be unique.

Step 5 From the WLAN ID drop-down list, choose the ID number for this WLAN.

Step 6 Click Apply to commit your changes. The WLANs > Edit page appears.


Note You can also open the WLANs > Edit page from the WLANs page by clicking the ID number of the WLAN that you want to edit.


Step 7 Use the parameters on the General, Security, and Advanced tabs to configure this remote LAN. See the sections in the rest of this chapter for instructions on configuring specific features.

Step 8 On the General tab, select the Status check box to enable this remote LAN. Be sure to leave it unselected until you have finished making configuration changes to the remote LAN.


Note You can also enable or disable remote LANs from the WLANs page by selecting the check boxes to the left of the IDs that you want to enable or disable, choosing Enable Selected or Disable Selected from the drop-down list, and clicking Go.


Step 9 Click Apply to commit your changes.

Step 10 Click Save Configuration to save your changes.


 

Editing WLANs

To edit your WLAN settings, choose WLANs and click the Profile name to navigate to the WLANs > Edit page. For new WLANs, create a new WLAN as described in Creating New WLANs page, and then click Apply to navigate to this page.

This page enables you to edit the configurable parameters for a WLAN.

The WLAN > Edit page consists of the following four tabs:

  • General
  • Security
  • QoS
  • Policy-Mapping
  • Advanced

General Tab

This table describes the General tab parameters.

 

Table 3-3 General Tab Parameters

Parameter
Description

Profile Name

Configured profile name of the WLAN.

Type

Type of LAN that is configured in the WLANs > New page: WLAN, Guest LAN, or Remote LAN.

SSID

SSID of the WLAN.

Status

WLAN that you want to enable or disable. The default is enabled.

Security Policies

Security policies for a WLAN that you set from the Security tab.

Note This field appears when you choose WLAN as the Type in the WLANs > New page.

Radio Policy

WLAN radio policy to apply to All (802.11a/b/g), 802.11a only, 802.11g only, 802.11b/g only, or 802.11a/g only. This setting requires that the selected bands be enabled on the 802.11a/n/ac Global Parameters and 802.11a/n/ac Client Roaming pages.

Note This field appears only when you choose WLAN as the Type in the WLANs > New page.

Interface/Interface Group (G)

Limited to the nonservice port and nonvirtual interface names configured on the Interfaces page.

Note This field appears only when you choose WLAN as the Type in the WLANs > New page.

Multicast Vlan Feature

Check box that you can select to enable the multicast VLAN feature. The default option is none.

Note The Multicast Interface field appears only after you enable the Multicast VLAN feature text box.

Note You have to configure the multicast VLAN feature only once if you want to use the multicast feature.

Broadcast SSID

Service Set Identifier for this WLAN.

Ingress Interface

Guest LAN’s ingress interface. By default, None is selected.

Note This field is available only for guest LANs.

Egress Interface

Remote LAN’s or guest LAN’s egress interface. By default, management is selected.

Note This field is available only for remote LANs and guest LANs.

NAS-ID

Network Access Server identifier. The NAS-ID is sent to the RADIUS server by the controller (as a RADIUS client) using the authentication request, which is used to classify users to different groups. You can enter up to 32 alphanumeric characters.

Beginning in Release 7.4 and later releases, you can configure the NAS-ID on the interface, WLAN, or an access point group. The order of priority is AP Group NAS-ID > WLAN NAS-ID > Interface NAS-ID.

Security Tab

The Security tab consists of three tabs:

Important Limitations and Guidelines:

  • CCX is not supported on the Cisco OEAP 600 access points and all elements related to CCX are not supported.
  • Layer 2 security is not supported on guest LANs.
  • Only the following options are supported for Cisco OEAP 600 Series access points: None, WPA+WPA2, Static WEP, and 802.1X (only for remote LANs).
  • Beginning in Release 7.4 and later releases, the controller performs both web authentication (WebAuth) and 802.1X authentication in the same WLAN. The clients are initially authenticated with 802.1X. After a successful authentication, the client must provide the WebAuth credentials. After a successful WebAuth authentication, the client is moved to the run state.

802.1x authentication can be performed using AAA or a local database.

  • For auto-anchored guest WLANs, the guidelines are as follows:

Only the anchor controller must have both dot1x and WebAuth configured.

Both anchor and foreign controller must be configured for dot1x.

This table describes the Layer 2 tab parameters.

 

Table 3-4 Layer 2 Tab Parameters

Parameter
Description

Layer 2 Security

None

No Layer 2 security selected.

WPA+WPA2

Wi-Fi Protected Access.

For information on these settings, see the Layer 2 WPA + WPA2 Parameters topic.

802.1X

WEP 802.1X data encryption type.

For information on these settings, see the Layer 2 802.1X Parameters topic.

Static WEP

Static WEP encryption parameters.

For information on these settings, see the Layer 2 Static WEP Parameters topic.

Static WEP + 802.1X

Both Static WEP and 802.1X parameters.

For information on these settings, see the Layer 2 Static WEP Parameters and Layer 2 802.1X Parameters topics.

CKIP

Cisco Key Integrity Protocol (CKIP). Functional on AP Models 1100, 1130, and 1200, but not AP 1000. Aironet IE needs to be enabled for this feature to work. CKIP expands the encryption keys to 16 bytes.

For information on these settings, see the Layer 2 CKIP Parameters topic.

None + EAP Passthrough

Both None and Extensible Authentication Protocol Passthrough parameters.

If EAP-Passthrough on the WLAN is enabled, the WLAN might be exposed to security attacks on the network.

MAC Filtering

MAC address filtering. You can locally configure clients by their MAC addresses in the Adding MAC Filters page. Otherwise, configure the clients on a RADIUS server.

Mac Auth or Dot1x

MAC authentication failover to Dot1x authentication for the WLAN. The prerequisites for the failover to work are as follows:

  • MAC Filtering must be enabled.
  • Layer 2 security must be 802.1X and Static WEP.

The failover does not work with Radius NAC feature.

If MAC authentication is successful and the client sends an EAP start request to start 802.1X authentication, the client must pass 802.1X authentication to send data traffic, or the client is deauthenticated.

When MAC Auth fails, the client authenticates using 802.1X or it is deauthenticated. If MAC Auth passes, then the client authenticates using 802.1X if required (for Static WEP Clients) depending on the client configuration.

Fast Transition

Fast Transition

Check box to enable or disable a fast transition between access points.

Over the DS

Check box to enable or disable a fast transition over a distributed system.

Reassociation Timeout

Time in seconds after which a fast transition reassociation times out.

This table describes the Layer 2 WPA + WPA2 parameters.

 

Table 3-5 Layer 2 WPA + WPA2 Parameters

Parameter
Description
Fast Transition

Fast Transition

Check box to enable or disable a fast transition between access points.

Over the DS

Check box to enable or disable a fast transition over a distributed system.

Re-association Timeout

Time in seconds after which a fast transition reassociation times out.

Protected Management Frame

PMF

Drop-down list from which you can choose the following:

  • Disabled—Disables 802.11w MFP protection on a WLAN.
  • Optional—Enables 802.11w MFP protection on a WLAN.
  • Required—Requires clients to negotiate 802.11w MFP protection on a WLAN.

802.11w introduces an Integrity Group Temporal Key (IGTK) that is used to protect broadcast or multicast management frames. IGTK is a random value, assigned by the authenticator station (Cisco WLC) used to protect MAC management protocol data units (MMPDUs) from the source STA. The 802.11w IGTK key is derived using the 4 way handshake and is used only on WLANs configured with WPA or WPA2 security at Layer 2.

Comeback Timer

Association comeback interval, in seconds. This is the interval for which an associated client must wait for before the association is tried again after it is denied with the status code 30 message:

Association request rejected temporarily; Try again later.

The range is from 1 to 20. The default value is 1.

SA Query Timeout

Security Association (SA) query interval, in ms. The timeout is an interval identified in the association response to an already associated client before the association can be tried again. This time interval checks if the client is a real client and not a rogue client during the association comeback time. If the client does not respond within this time, the client association is deleted from the Cisco WLC.

The range is from 100 to 500. The default value is 200.

WPA+WPA2 Parameters

WPA Policy

Check box to enable or disable the WPA Policy.

WPA2 Policy

Check box to enable or disable the WPA2 Policy.

WPA2 Encryption

WPA2 encryption type: TKIP or AES. Available only if the WPA2 Policy is enabled.

Authentication Key Management

802.1x

An access point that supports 802.1X acts as the interface between a wireless client and an authentication server, such as a RADIUS server, to which the access point communicates over the wired network. If 802.1X is selected, only 802.1X clients are supported.

CCKM

Cisco Centralized Key Management (CCKM) uses a fast rekeying technique that enables clients to roam from one access point to another without going through the controller, typically in under 150 ms.

PSK

ASCII or HEX format that you can choose, after which you enter the preshared key.

FT 802.1x

Authentication key management for fast transition using 802.1X.

Note You can configure FT 802.1X only if you enable the WPA2 policy.

FT PSK

ASCII or HEX format that you can choose, after which you enter the preshared key for fast transition.

Note You can configure FT PSK only if you enable the WPA2 policy.

PMF 802.1x

802.1X authentication for protection of management frames (PMF).

PMF PSK

Preshared keys (PSK) for PMF. Select an ASCII or HEX format, and enter the preshared key for fast transition.

WPA gtk-randomize State

Drop-down list to enable or disable the WPA group temporal key (GTK) randomize state.

Note For the Cisco OEAP 600 Series access points, do not choose CCKM. Choose either 802.1X or PSK.

Note For the Cisco OEAP 600 Series access point, security encryption settings must be identical for WPA and WPA2 for TKIP and AES.

Note Fast roaming for clients is not supported on the Cisco OEAP 600 Series access points. Dual mode voice clients might experience reduced call quality when they roam between the two spectrum's on the Cisco OEAP 600 Series access point. We recommend that you configure voice devices to only connect on one band, either the 2.4-GHz to 5.0-GHz radio.

This table describes the Layer 2 802.1X parameters.

 

Table 3-6 Layer 2 802.1X Parameters

Parameter
Description

802.11 data encryption

WEP 802.11 data encryption type.

Type

Security type.

Key size

Key size that you can choose:

  • None
  • 40 bits
  • 104 bits

Note The third-party AP WLAN (17) can only be configured with 802.1X encryption. Drop-down configurable 802.1X parameters are not available for this WLAN.

This table describes the Layer 2 Static WEP parameters.

 

Table 3-7 Layer 2 Static WEP Parameters

Parameter
Description

802.11 Data Encryption

Static WEP encryption type.

Type

Security type.

Key size

Key size that you can choose:

  • not set
  • 40 bits
  • 104 bits

Key Index

Key index, from 1 to 4.

Note One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption.

Encryption Key

Encryption key.

Key Format

Encryption key format in ASCII or HEX.

Allow Shared Key Authentication

Key authentication that you can enable or disable.

This table describes the Layer 2 CKIP parameters.

 

Table 3-8 Layer 2 CKIP Parameters

Parameter
Description

802.11 Data Encryption

Current key information.

Key size

Key size that you can choose:

  • not set
  • 40 bits
  • 104 bits

Key Index

Key index, from 1 to 4.

Note One unique WEP key index can be applied to each WLAN. Because there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer 2 encryption.

Encryption Key

Encryption key.

Key Format

Encryption key format in ASCII or HEX.

MMH Mode

Multimodular Hash (MMH) mode that you can enable; the default is enabled.

Key Permutation

Key permutation that you can enable or disable. The default is enabled. Key permutation is a data encryption technique that uses the basic encryption key and the current initialization vector (IV) to create a new key.

This table describes the Layer 3 Tab (for WLAN) parameters.

 

Table 3-9 Layer 3 Tab (for WLAN) Parameters

Parameter
Description

Layer 3 Security

None

Setting that indicates that no Layer 3 security is selected.

IPSec

Setting to enable IPsec. Check software availability and client hardware compatibility before implementing IPsec.

Note You must have the optional VPN/Enhanced Security Module (crypto processor card) installed to enable IPsec. Verify that it is installed on your Cisco WLC using the Inventory page.

VPN Pass-Through

VPN pass-through that you can enable or disable.

Note This option is not available on Cisco 5500 Series Controllers. However, you can replicate this functionality on the Cisco 5500 Series Controllers by creating an open WLAN using an ACL.

For information on these settings, see Layer 3 VPN Pass-Through Parameters .

Web Policy

Check box that you can select to enable Web Policy.

Note The Cisco WLC forwards DNS traffic to and from wireless clients prior to authentication if there is no explicit deny rule for DNS traffic in the Pre-Auth ACL.

Note Web Policy cannot be used with IPsec or VPN pass-through options.

The following parameters are displayed:

  • Authentication—Prompts the user for username and password while connecting the client to the wireless network.
  • Passthrough—Enables the user to access the network directly without entering the username and password.
  • Conditional Web Redirect—Enables the user to be conditionally redirected to a particular web page after 802.1X authentication has completed successfully. You can specify the redirect page and the conditions under which the redirect occurs on your RADIUS server.
  • Splash Page Web Redirect—Redirects the user to a particular web page after 802.1X authentication has completed successfully. After the redirect, the user has full access to the network. You can specify the splash web page on your RADIUS server.
  • On MAC Filter failure—Enables web authentication MAC filter failures.

Preauthentication ACL

IPv4 or IPv6 ACLs to be used for traffic between the client and the Cisco WLC. Refer to the Access Control Lists topic for more information.

WebAuth FlexACL

Drop-down list from which you can choose the FlexConnect ACL for external web authentication in locally switched WLANs.

For more information about creating FlexConnect ACLs, see Adding Access Control Lists.

Note The FlexConnect ACLs that are specific to an AP have the highest priority. The FlexConnect ACLs that are specific to WLANs have the lowest priority.

Sleeping Client

Check box that you can select to enable support for sleeping clients. This feature is not applicable for remote LANs and guest LANs.

Sleeping Client Timeout

Maximum amount of time after the idle timeout, in hours, before a sleeping client is forced to reauthenticate. The range is from 1 to 720. The default value is 12. This field is enabled only when you select the Sleeping Client check box. Also, the clients need not provide the login credentials when they move from one Cisco WLC to another (if Cisco WLCs are in the same mobility group) between the sleep and wake up times.

Over-ride Global Config

Setting that is displayed if you choose Authentication.

Select this check box to override the global authentication configuration set on the Web Login Page.

Web Auth type

Setting that is displayed if you choose Web Policy and Over-ride Global Config.

Type of web authentication:

  • Internal
  • Customized (Downloaded)

Login Page—Choose a login page from the drop-down list.

Login Failure page—Choose a login page that displays to the client if web authentication fails.

Logout page—Choose a login page that displays to the client when the user logs out of the system.

  • External (Redirect to external server)

URL—Enter the URL of the external server.

Email Input

Setting that is displayed if you choose Passthrough.

If you choose this option, you are prompted to specify your e-mail address when you try to connect to the network.

This table describes the Layer 3 Tab (for Guest LAN and Remote LAN) parameters.

 

Table 3-10 Layer 3 Tab (for Guest LAN and Remote LAN) Parameters

Parameter
Description

Layer 3 Security

None

Indicates that no Layer 3 security is selected.

Web authentication

Prompts you for your username and password while connecting the client to the network.

Web Passthrough

Enables you to access the network directly without entering the username and password.

Preauthentication ACL

IPv4 or IPv6 ACLs to be used for traffic between the client and the Cisco WLC. See the Access Control Lists topic for more information.

Over-ride Global Config

Check box that you enable to override the global authentication configuration set on the Web Login Page.

Web Auth type

Setting that is displayed if you selected Over-ride Global Config.

Type of web authentication:

  • Internal
  • Customized (Downloaded)

Login Page—Choose a login page from the drop-down list.

Login Failure page—Choose a login page that displays to the client if web authentication fails.

Logout page—Choose a login page that displays to the client when the user logs out of the system.

  • External (Redirect to external server)

URL—Enter the URL of the external server.

Email Input

Setting that is displayed if you selected Web Passthrough.

If you choose this option, you will be prompted for your e-mail address while connecting to the network.

This table describes the Layer 3 VPN Pass-Through parameters.

 

Table 3-11 Layer 3 VPN Pass-Through Parameters

Parameter
Description

VPN Gateway Address

VPN gateway IPsec pass-through address.

This table describes the AAA servers parameters.

 

Table 3-12 AAA Servers Tab Parameters

Parameter
Description

RADIUS Server Overwrite Interface

RADIUS Server Overwrite Interface that you can enable or disable. The default is disabled.

When you enable the RADIUS Server Overwrite Interface, the client authentication request is sent through the dynamic interface that is set on the WLAN. The Cisco WLC sources all RADIUS traffic to a WLAN using the dynamic interface configured on the WLAN.

Note You cannot enable the Radius Server Overwrite Interface when a diagnostic channel is enabled.

RADIUS Server Client Interface

RADIUS Server Client Interface that you can enable or disable on the WLAN. The default is disabled.

When you enable the RADIUS Server Client Interface, the RADIUS server packets pass through the same VLAN as the data traffic of the client.

RADIUS Servers

Authentication Servers
Accounting Servers

RADIUS server (configured from the RADIUS Authentication Servers page) that you choose from the drop-down lists.

If this server is chosen, it will be the default RADIUS authentication server for the specified WLAN and overrides the RADIUS server that is configured for the network.

You can choose up to three RADIUS servers, which are tried in priority order.

RADIUS accounting server that you can enable or disable. The default is Enabled.

Choose a RADIUS server (configured from the RADIUS Accounting Servers page) from the drop-down lists.

If this server is chosen, it is the default RADIUS accounting server for the specified WLAN and overrides the RADIUS server that is configured for the network.

You can choose up to six RADIUS servers, which are tried in priority order.

RADIUS Server Accounting

If you select the Interim Update check box, the statistical usage information about the client is sent in the interim interval that you specify. By default, the statistical information is sent every 600 seconds (10 minutes).


Note The Interim Update check box can be selected only if you have the RADIUS accounting servers enabled.


LDAP Servers

LDAP server (configured from the LDAP Servers page) that you can choose from the drop-down list.

You can choose up to three LDAP servers, which are tried in a priority order.

Local EAP Authentication1

Local EAP authentication that you can enable or disable. The default is disabled.

EAP Profile Name 1

EAP profile name (configured from the Local EAP Profiles page).

Authentication priority order for web-auth user

Order in which user credentials are retrieved from the back-end database servers.

Highlight the desired database from the left box.

Use the left and right arrows and the Up and Down buttons to move the desired database to the top of the right box.

If you select the RADIUS NAC feature for authentication, the priority for web authentication must only contain RADIUS.

1.This option is not available for guest LANs.

QoS Tab


Note The Cisco OEAP 600 Series access point does not support CAC. Therefore, we recommend that you do not enable 7920 AP CAC and 7920 Client CAC parameters.


You can override the defined values in the QoS profile when you specify some or all of the rate-limiting parameters in the QoS tab.

This table describes the QoS parameters.

 

Table 3-13 QoS Tab Parameters

Parameter
Description

Quality of Service (QoS)

Quality of Service Level, set on the Editing QoS Profile page:

  • Platinum (voice)—Assures a high Quality of Service for Voice over Wireless.
  • Gold (video)—Supports the high-quality video applications.
  • Silver (best effort)—Supports the normal bandwidth for clients.
  • Bronze (background)— Supports the lowest bandwidth for guest services.

VoIP clients should be set to Platinum, Gold, or Silver, while low-bandwidth clients can be set to Bronze.

Note Media Session Snooping is supported only for Platinum QoS profiles.

Application Visibility

Check box that you can select to view the classification of applications based on the Network Based Application Recognition (NBAR) deep packet inspection technology.

To view all the supported applications, choose WIRELESS > Application Visibility and Control > Applications.

To view all classified applications, choose Monitor > Applications and click the WLAN ID to navigate to the Monitor > Clients page.

AVC Profile

Drop-down list from which you can choose an Application Visibility and Control (AVC) profile for the WLAN. To configure a new AVC profile, choose WIRELESS > Application Visibility and Control > Applications and click New.

You can configure only one AVC profile per WLAN and each AVC profile can have up to 32 rules. Each rule states a Mark or a Drop action for one application, which allows you to configure up to 32 application actions per WLAN. You can configure up to 16 AVC profiles on a controller and associate an AVC profile with multiple WLANs. Only WLANS on local mode access points, or centrally switched on FlexConnect access points can have applications recognized by NBAR.

NetFlow Monitor

Drop-down list from which you can choose a NetFlow monitor for the WLAN. To configure a new NetFlow monitor, choose WIRELESS > Netflow > Monitor and click New.

Override Per-User Bandwidth Contracts

Note When you set the Per-User Bandwidth Contracts parameters to 0 (OFF), the traffic allowed is unlimited and is restricted by only other 802.11 limitations. The values that you set override the values configured in the QoS profile page.

Average Data Rate

User-defined average data rate (kbps) for non-UDP traffic.

The range is from 0 to 60,000; the default is 0 (OFF).

Burst Data Rate

User-defined peak data rate (kbps) for non-UDP traffic.

Valid values are from 0 to 60,000; the default is 0 (OFF).

Average Real-Time Rate

User-defined average data rate (kbps) for UDP traffic.

Valid values are from 0 to 60,000; the default is 0 (OFF).

Burst Real-Time Rate

User-defined peak data rate (kbps) for UDP traffic.

Valid values are from 0 to 60,000; the default is 0 (OFF).

Override Per-SSID Rate Limits

Note The values that you set override the values configured in the QoS profile page.

Override WLAN QoS Parameters

Average Data Rate

User-defined average data rate (kbps) for non-UDP traffic.

The range is from 0 to 60,000; the default is 0 (OFF).

Burst Data Rate

User-defined peak data rate (kbps) for non-UDP traffic.

The range is from 0 to 60,000; the default is 0 (OFF).

Average Real-Time Rate

User-defined average data rate (kbps) for UDP traffic.

The range is from 0 to 60,000; the default is 0 (OFF).

Burst Real-Time Rate

User-defined peak data rate (kbps) for UDP traffic.

The range is from 0 to 60,000; the default is 0 (OFF).

WMM

WMM Policy2

WMM Policy. Choose one of the following:

  • Disabled—Disables this WMM policy.
  • Allowed—Allows the clients to communicate with the WLAN.
  • Required—Ensures that it is mandatory for the clients to have WMM features enabled on them to communicate with the WLAN.

7920 AP CAC 1

Cisco 7920 AP CAC that you can enable or disable. Use this setting if you want the WLAN to support the newer version of the software on your Cisco 7920 phones. In newer versions, the CAC limit is advertised by the access points.

7920 Client CAC 1

Cisco 7920 client CAC. Use this setting if you want the WLAN to support the older version of the software on your Cisco 7920 phones. In older versions, the CAC limit is set on the client.

Media Stream

Multicast Direct

Check box to enable Multicast Direct on the WLAN.

Lync Policy
  • Audio
  • Video
  • Application-Sharing
  • File-Transfer

The following QoS policies can be applied for each of the Lync policies:

  • Bronze
  • Silver
  • Gold
  • Platinum

Note WLAN QoS must meet or exceed Lync policy QoS settings in order for Lync priorities to achieve the configured levels.

2.This option is not available for guest LANs and Remote LAN.

Policy Mapping Tab

This table describes the policy-mapping parameters.

 

Table 3-14 Policy-Mapping Parameters

Parameter
Description

Priority Index

Priority index of the policy configured on the WLAN. The policies are applied to the clients according to the priority index. The range is from 1 to 16.

Local Policy

Policy applied on the WLAN. To define new policies, choose Security > Local Policies > New.

Advanced Tab


Caution Do not enable Coverage Hole Detection and Aironet IE for the Cisco OEAP 600 Series access point.

This table describes the advanced parameters.

 

Table 3-15 Advanced Tab Parameters

Parameter
Description

Allow AAA Override

AAA Override for global WLAN parameters that you can enable or disable.

When AAA Override is enabled, and a client has conflicting AAA and Cisco WLC WLAN authentication parameters, client authentication is performed by the AAA server. As part of this authentication, the operating system moves clients from the default Cisco WLAN Solution WLAN VLAN to a VLAN returned by the AAA server and predefined in the Cisco WLC interface configuration (only when configured for MAC filtering, 802.1X, and/or WPA operation). In all cases, the operating system also uses QoS, DSCP, 802.1p priority tag values, and ACLs provided by the AAA server, if they are predefined in the Cisco WLC interface configuration. (This VLAN switching by AAA Override is also referred to as Identity Networking.)

If the Corporate WLAN primarily uses a Management Interface assigned to VLAN 2, and if AAA Override returns a redirect to VLAN 100, the operating system redirects all client transmissions to VLAN 100, regardless of the physical port to which VLAN 100 is assigned.

When AAA Override is disabled, all client authentication defaults to the Cisco WLC authentication parameter settings, and authentication is only performed by the AAA server if the Cisco WLC WLAN does not contain any client-specific authentication parameters.

The AAA Override values may come from a RADIUS server, for example.

Note AAA Override is not supported with FlexConnect.

Coverage Hole Detection

Coverage hole detection (CHD) on this WLAN that you can enable or disable.

By default, CHD is enabled on all WLANs on the Cisco WLC. You can disable CHD on a WLAN.

When you disable CHD on a WLAN, a coverage hole alert is still sent to the Cisco WLC, but no other processing is done to mitigate the coverage hole. This feature is useful for guest WLANs where guests are connected to your network for short periods of time and are likely to be highly mobile.

Note For the Cisco OEAP 600 Series access point, do not enable Coverage Hole Detection.

Enable Session Timeout

Session timeout that you can enable or disable. Maximum time in seconds for a client session before requiring reauthorization.

Aironet IE

Support of Aironet IEs on a per WLAN basis that you can enable or disable. The default is disabled. This option is not available for guest LANs and remote LANs.

Note For the Cisco OEAP 600 Series access point, do not enable Aironet IE.

Diagnostic Channel

Diagnostic channel support on the WLAN that you can enable or disable. The default is disabled. This option is not available for guest LANs and remote LANs.

Override Interface ACL

Access Control List (ACL) that overrides the ACL configured for the interface on this WLAN. ACLs are configured on the Access Control Lists page.

  • IPv4 ACL—Lists the IPv4 ACL that needs to be applied on this WLAN. ACLs are configured on the Access Control Lists page.
  • IPv6 ACL—Lists the IPv6 ACL that needs to be applied on this WLAN. ACLs are configured on the Access Control Lists page.

Layer 2 ACL

List the layer 2 ACL that needs to be applied to the WLAN. ACLs are configured on the Access Control Lists page.

P2P Blocking Action

Peer-to-peer blocking settings that you can choose.

  • Disabled—(Default) Disables peer-to-peer blocking and bridges traffic locally within the Cisco WLC whenever possible.

Note Traffic is never bridged across VLANs in the Cisco WLC.

  • Drop—Causes the Cisco WLC to discard the packets.
  • Forward-UpStream—Causes the packets to be forwarded on the upstream VLAN. The device above the Cisco WLC decides what action to take regarding the packets.

For FlexConnect local switching WLANs, the settings are as follows:

  • Disabled—(Default) Disables peer-to-peer blocking and bridges traffic locally within the AP whenever possible.
  • Drop—Causes the AP to discard the packets.
  • Forward-UpStream—Causes the AP to discard the packets.

Client Exclusion

Timeout in seconds for disabled client machines that you can enable or disable. Client machines are disabled by their MAC address and their status can be observed on the Client Details page. A timeout setting of 0 indicates that administrative control is required to re-enable the client. The default is enabled and the timeout setting configured as 60 seconds.

Maximum Allowed Clients

Maximum clients allowed per Cisco WLC.

You can set a limit to the number of clients that can connect to a WLAN. This feature is useful in scenarios where you have a limited number of clients that can connect to a Cisco WLC. For example, consider a scenario where the Cisco WLC can server up to 256 clients on a WLAN that can be shared between enterprise users (employees) and guest users. You can set a limit on the number of guest clients that can access a given WLAN. The number of clients that you can configure per WLAN depends on the platform that you are using. The range is from 1 to 200.

The number of clients that you can configure for a specific platform is as follows:

  • Cisco 5500 Series Controller—7000
  • Cisco 7500 Series Controller—30000
  • WiSM2—15000

Note The maximum number of clients per WLAN feature is supported only for access points that are in connected mode.

Note This feature is not supported when you use FlexConnect local authentication and is not applicable for remote and guest LANs.

Static IP Tunneling

Check box that you enable to configure static IP client tunneling support on a WLAN. The following restrictions apply when configuring Static IP tunneling in coordination with other features on the same WLAN:

  • Auto anchoring mobility (guest tunneling) cannot be configured for the same WLAN.
  • FlexConnect local authentication cannot be configured for the same WLAN.
  • DHCP required option cannot be configured for the same WLAN.

Note Dynamic anchoring of static IP clients cannot be configured with FlexConnect local switching.

Wi-Fi Direct Clients Policy

Drop-down list from which you can choose a Wi-Fi Direct Clients Policy for a WLAN.

Devices that are Wi-Fi Direct capable can connect directly to each other quickly and conveniently to do tasks such as printing, synchronization, and sharing of data. Wi-Fi Direct devices may associate with multiple peer-to-peer (P2P) devices and with infrastructure WLANs concurrently. Use the Cisco WLC to configure the Wi-Fi Direct Clients Policy, on a per WLAN basis, where you can allow or disallow the association of Wi-Fi devices with infrastructure WLANs, or disable the Wi-Fi Direct Clients Policy for WLANs.

Note Wi-Fi Direct Clients Policy is applicable to WLANs that have APs in local mode only.

The following options are available:

  • Disabled —Disables the Wi-Fi Direct Clients Policy for the WLAN and deauthenticates all Wi-Fi Direct clients
  • Allow —Allows Wi-Fi Direct clients to associate with the WLAN
  • Not-Allow —Disallows the Wi-Fi Direct clients from associating with the WLAN

Maximum Allowed Clients Per AP Radio

Maximum number of clients that are allowed to connect to an AP.

The maximum number you can configure is 200.

Clear HotSpot Configuration

WLAN HotSpot configuration that you can clear.

Client User Idle Timeout

Timeout for idle client sessions for a WLAN. This value overrides the global timeout value. The range is from 15 to 100000 seconds. The default value is 300 seconds.

Client User Idle Threshold

Threshold data sent by the client during the idle timeout for the client session. If the client send traffic less than the defined threshold, the client is removed on timeout. The range is from 0 bytes to 10 MB. The default value is 0 bytes.

Radius NAI-Realm

Enable this to match any incoming EAP request from clients that contain relam with the realm configured on RADIUS authentication and accounting servers.

Off Channel Scanning Defer

Scan Defer Priority

Assign a defer priority for the channel scan by clicking on the priority argument. The valid range for the priority is 0 to 7. The priority is 0 to 7 (this value should be set to 6 on the client and on the WLAN).

Scan Defer Time (msecs)

Assign the channel scan defer time in milliseconds. The valid range is 100 (default) to 60000 (60 seconds). This setting should match the requirements of the equipment on your wireless LAN.

FlexConnect

FlexConnect Local Switching

FlexConnect local switching that you can enable or disable. Any remote access point that advertises this WLAN, instead of tunneling to the Cisco WLC, can locally switch data packets.

Note In a network architecture where the WLAN is configured in FlexConnect local switching mode, if the client and Cisco WLC are in the same VLAN, a ping action will fail. Ping actions from the client to the Cisco WLC will work if both the client and Cisco WLC are on different VLANs.

Note The FlexConnect Local Switching text box must be enabled to enable local authentication.

FlexConnect Local Auth

FlexConnect local authentication that you can enable or disable.

Learn Client IP Address

Client IP address learning (this option is available when you enable FlexConnect Local Switching) that you can enable or disable.

Note If the client is configured with Fortress Layer 2 encryption, the Cisco WLC cannot learn the client IP address and will periodically drop the client. Disable this option so that the Cisco WLC maintains the client connection without waiting to learn the client IP address.

VLAN based Central Switching

VLAN central switching that you can enable or disable on the WLAN. You must enable FlexConnect local switching and an AAA override on the WLAN.

When you enable VLAN central switching, the access point bridges the traffic locally if the AAA override VLAN for the client is configured on the local IEEE 802.1Q link. If the AAA override VLAN is not configured on the access point, the AP tunnels the traffic back to the Cisco WLC and the Cisco WLC bridges the traffic to the corresponding VLAN.

VLAN central switching does not support:

  • FlexConnect Local Authentication
  • Layer 3 roaming of local switching client

Central Assoc

Check box to maintain the association table centrally on the controller. Disable this check box to maintain the association table locally on the AP.

Lync

Lync Server

To enable or disable WLAN Lync SDN service.

11k

Assisted Roaming Prediction Optimization

Check box to enable or disable assisted roaming prediction optimization for the WLAN.

Neighbor List

Check box to enable or disable 802.11k neighbor list for the WLAN.

Neighbor List Dual Band

Check box to enable or disable a dual-band 802.11k neighbor list for the WLAN.

DHCP

DHCP Server

When Override is selected, you can enter the IPv4 address of a DHCP server to be used by overriding the Primary/Secondary DHCP servers specified within the interface configuration.

Note IPv6 is not supported for DHCP Server override.

DHCP Addr. Assignment (Required)

Requires all WLAN clients to obtain an IP address from the DHCP Server.

Note DHCP address assignment (Required) is not supported for wired Guest LANs.

Note DHCP Server override is applicable only for the default group.

OEAP

 

Split Tunnel

Check box to enable split tunneling on OEAP access points.

Management Frame Protection (MFP)

MFP Client Protection

Disabled, Optional, or Required.

The client MFP will only be active for a session if the client supports Cisco Compatible eXtensions (CCX) MFP, and if WPA2 is negotiated with the client. If Optional is selected, clients that do not negotiate MFP will be allowed to associate. If Required is selected, only clients that successfully negotiate MFP will be allowed to associate.

This option is not available for guest LANs and remote LANs.

Note The Cisco OEAP 600 Series access point does not support MFP.

Note This check box represents the status of the Cisco MFP and not the status of 802.11w, introduced in Release 7.4

DTIM Period (in beacon intervals)

802.11a/n (1 - 255)

Delivery Traffic Indication Map (DTIM) Period. Number of beacon intervals that elapse between the transmission of beacon frames that contain a TIM element whose DTIM Count field is 0. Valid values are from 1 to 255; the default value is 1. This option is not available for guest LANs and remote LANs.

802.11b/g/n (1 - 255)

NAC

NAC State

Enables SNMP NAC or RADIUS NAC.

  • SNMP—Enables SNMP NAC support for the WLAN.
  • Radius NAC—Enables RADIUS NAC support for the WLAN.

Cisco Identity Services Engine (ISE) is a next-generation, context-based access control solution that provides the functions of Cisco secure Access Control System (ACS) and Cisco Network Admission Control (NAC) in one integrated platform.

Cisco ISE can be used to provide advanced security for your deployed network. It is an authentication server that you can configure on your Cisco WLC. When a client associates to the Cisco WLC on a RADIUS NAC-enabled WLAN, the Cisco WLC forwards the request to the ISE server.

The ISE server validates the user in the database and on successful authentication, the URL and pre-AUTH ACL is sent to the client. The client then moves to the “Posture Required” state and is redirected to the URL returned by the ISE server. The NAC agent in the client triggers the posture validation process. On a successful posture validation by the ISE server, the client is moved to the RUN state.

This feature enables you to create a RADIUS NAC-enabled WLAN with open authentication and MAC filtering. If you are using local web authentication with RADIUS NAC, the Layer 3 web authentication must also be enabled. Both internal and external web authentication are supported.

The following restrictions apply:

  • RADIUS NAC functionality with VLAN override is not available.
  • During slow roaming, the client goes through posture validation.
  • Guest tunneling mobility is supported for ISE NAC-enabled WLANs.
  • The VLAN select feature is not supported.
  • The NAC agent may also be available in a non-NAC-enabled WLAN.
  • The workgroup bridges are not supported.
  • The AP group over NAC feature is not supported over RADIUS NAC.

Note Do not swap AAA server indexes in a live network. This action might result in clients being disconnected and having to reconnect to the RADIUS server and log messages to be appended to the ISE server logs.

When clients move from one WLAN to another, the Cisco WLC retains the client’s audit session ID if it returns to the WLAN before the idle timeout occurs. As a result, when clients join back to the Cisco WLC before the idle timeout session expires, they are immediately moved to the RUN state. The clients are validated if they reassociate with the Cisco WLC after the session timeout.

Suppose you have two WLANs, where WLAN 1 is configured on a Cisco WLC (WLC1) and WLAN2 configured on another Cisco WLC (WLC2) and both are RADIUS NAC-enabled. The client first connects to WLC1 and moves to the RUN state after posture validation. Assume that the client now moved to WLC2. If the client connects back to WLC1 before the PMK expires for this client in WLC1, the posture validation is skipped for the client. The client directly moves to the RUN state bypassing posture validation as the Cisco WLC retains the old audit session ID for the client that is already known to ISE.

 

When deploying RADIUS NAC in your wireless network, do not configure a primary and secondary ISE server. Instead, we recommend that you configure HA between the two ISE servers. Having a primary and secondary ISE setup will require a posture validation to happen before the clients move to the RUN state. If HA is configured, the client is automatically moved to the RUN state in the fallback ISE server.

Cisco WLC software configured with RADIUS NAC does not support change of authorization (CoA) on the service port.

Load Balancing and Band Select

Note Client Load Balancing and Client Band Select is not available for the Cisco OEAP 600.

Client Load Balancing

Client load balancing that you can enable or disable.

Client Band Select

Client radio band that you can enable or disable.

Note Band Select is configurable only when the radio policy is set to All in the General Tab.

Passi ve Client

Passive Client

Passive clients that you can enable or disable on your WLAN.

Passive clients are wireless devices such as scales and printers that are configured with a static IP address. These clients do not transmit any IP information such as IP address, subnet mask, and gateway information when they associate with an access point. As a result, when passive clients are used, the Cisco WLC will never know the IP address unless they use DHCP.

Cisco WLC currently act as a proxy for ARP requests. On receiving an ARP request, the Cisco WLC responds with an ARP response instead of passing the request directly to the client. This has two advantages:

  • The upstream device that sends out the ARP request to the client cannot know where the client is located.
  • Power for battery-operated devices such as mobile phones and printers is preserved because they do not need to respond to every ARP request.

Since the wireless Cisco WLC does not have any IP-related information about passive clients, it cannot respond to any ARP requests. The current behavior does not allow the transfer of ARP requests to passive clients. Any application that tries to access a passive client results in a failure.

This feature enables ARP requests and responses to be exchanged between wired and wireless clients.

This feature when enabled allows the Cisco WLC to pass ARP requests from wired to wireless clients until the desired wireless client gets to RUN state.

Note This feature is supported only on the Cisco 5500 Series Controllers.

Note Passive clients are not supported with AP groups and FlexConnect centrally switched WLANs.

This feature works on the multicast-multicast mode of multicast operation.

Voice

Media Session Snooping

Access points that you can enable or disable to detect the establishment, termination, and failure of Session Initiation Protocol (SIP) voice calls and then report them to the Cisco WLC and PI.

See the Radio Statistics page to see the VoIP statistics for your access point radios.

See the SNMP Trap Logs page to see the traps generated for failed calls.

Re-anchor Roamed Voice Clients

Reanchoring of roamed voice clients that you can enable or disable.

This feature allows the voice client to get anchored on the best suited and nearest available Cisco WLC. In the case of inter Cisco WLC roaming, it avoids the use of tunnels to carry traffic between the foreign Cisco WLC and the anchor Cisco WLC, which removes unnecessary traffic from the network.

The ongoing call during roaming is not affected and it continues without any problem. The traffic passes through proper tunnels that are established between the foreign Cisco WLC and the anchor Cisco WLC. When the call ends, disassociation occurs and the client gets reassociated to a new Cisco WLC. By default, this feature is disabled.

Note The ongoing data session may be affected due to dissociation and reassociation.

Note This feature is supported for TSPEC-based calls and non-TSPEC-SIP based calls only when admission control is enabled.

Note You can reanchor roaming of voice clients for each WLAN.

Note This feature is not recommended for use on the Cisco 792x phone.

KTS based CAC Policy

To enable or disable CAC that is based on Key Telephone System (KTS) for the WLAN.

KTS-based CAC is a protocol that is used in NEC MH240 wireless IP telephones. You can configure the Cisco WLC to support CAC on KTS-based SIP clients, to process bandwidth request message from such clients, to allocate required bandwidth on the AP radio, and to handle other messages that are part of the protocol.

When a call is initiated, the KTS-based CAC client sends a Bandwidth Request message to which the Cisco WLC responds with a Bandwidth Confirm message indicating whether the bandwidth is allocated or not. The call is allowed only if the bandwidth is available. If the client roams from one AP to another, then the client sends another Bandwidth Request message to the Cisco WLC.

Bandwidth allocation depends on the medium time calculated using the data rate from the Bandwidth Request message and the packetization interval. For KTS-based CAC clients, G.711 codec with 20 milliseconds as packetization interval is used for computing the medium time.

The Cisco WLC releases the bandwidth after it receives the bandwidth release message from the clients. When the client roams to another AP, the Cisco WLC takes care of releasing the bandwidth on the previous AP and allocates bandwidth on the new AP, in both intra Cisco WLC and inter Cisco WLC roaming scenarios. The bandwidth is released if the client is dissociated or if there is inactivity for 120 seconds. The Cisco WLC does not inform the client when the bandwidth is released for the client due to inactivity or dissociation of the client.

Limitations:

  • KTS-based CAC is not supported on FlexConnect access points with the WLAN in the local switching mode.
  • The Cisco WLC ignores the SSID capability check request message from the clients.
  • Preferred call is not supported for KTS CAC clients.
  • Reason code 17 is not supported in inter Cisco WLC roaming scenarios.
  • This feature is applicable only when the QoS profile is set to Platinum for the WLAN.
RADIUS Client Profiling

DHCP Profiling

Check box to enable or disable DHCP profiling of all the clients that are associated with the WLAN. When you enable DHCP profiling, the Cisco WLC collects the DHCP attributes of clients for profiling.

HTTP Profiling

Check box to enable or disable HTTP profiling of all the clients that are associated with the WLAN. When you enable HTTP profiling, the Cisco WLC collects the HTTP attributes of clients for profiling.

PMIP

PMIP Mobility Type

Choose the type of PMIP mobility for the WLAN.

The following options are available:

  • None—Configures the WLAN with Simple IP.
  • PMIPv6—Configures the WLAN with only PMIPv6.

PMIP NAI Type

Drop-down list from which you can choose the PMIP NAI Type as Hexadecimal or Decimal.

PMIP Profile

Drop-down list from which you can choose a PMIP profile. You can configure the PMIP profile irrespective of the mobility type.

PMIP Realm

Default realm of the PMIPv6 WLAN.

mDNS

mDNS Snooping

Check box to enable or disable mDNS snooping on the WLAN. To check if global mDNS snooping is enabled, choose CONTROLLER > mDNS > General. mDNS snooping works on guest LANs and not on remote LANs.

mDNS Profile

Drop-down list from which you can choose the mDNS profile for the WLAN. Clients receive service advertisements only for the services associated with the profile.

 

Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.

Deleting WLANs

Click the WLANs tab. This displays the list of WLANs. Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Remove to delete the WLAN, Remote LAN, or Guest LAN. When you delete the WLAN, it will be removed from the AP group too.

Mobility Anchors

Click the WLANs tab. This displays the list of WLANs. Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Mobility Anchors to navigate to the Mobility Anchors page.

This page lists the Cisco WLCs that have already been configured as mobility anchors and shows the current state of their data and control paths. Cisco WLCs within a mobility group communicate among themselves over a well-known UDP port and exchange data traffic through an Ethernet-over-IP (EoIP) tunnel. Cisco WLCs send mpings and epings. Mpings test the mobility control packet reachability over the management interface over mobility UDP port 16666 and epings test the mobility data traffic over the management interface over EoIP port 97. The Control Path field shows whether mpings have passed (up) or failed (down), and the Data Path field shows whether epings have passed (up) or failed (down). If the Data Path field shows “down,” the mobility anchor cannot be reached and is considered failed.

Mobility anchors can also be used to provide geographic load balancing, because WLANs can be used to represent a particular section of the building such as engineering, marketing, and so on.

This table describes the mobility anchor parameters.

 

Table 3-16 Mobility Anchor Parameters

Parameter
Description

WLAN SSID

WLAN SSID.

Switch IP Address (Anchor)

IP address of the Cisco WLC that is designated as a mobility anchor.

Choose local from the drop-down list for the anchor Cisco WLC and all Cisco WLCs that are auto-anchors for this WLAN.

For foreign Cisco WLCs, select the anchor Cisco WLC from the drop-down list. Only Cisco WLCs configured as a mobility group members are available in the drop-down list.

Data Path

Whether epings have passed (up) or failed (down). If the Data Path field shows down, the mobility anchor cannot be reached and is considered failed.

Control Path

Whether mpings have passed (up) or failed (down).

Mobility Anchor Create

Mobility anchor that you can create. The selected Cisco WLC becomes an anchor for the WLAN.

Switch IP Address (Anchor)

Cisco WLC IP address from the drop-down list. You can select from either local, IPv4 address or an IPv6 address.

Creating a Mobility Anchor


Step 1 Click the WLANs tab. This displays the list of WLANs.

Step 2 Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Mobility Anchors to navigate to the Mobility Anchors page.

Step 3 Choose a Cisco WLC IP address from the Switch IP Address (Anchor) drop-down list. From Release 8.0, the controller supports both IPv4 and IPv6.

Step 4 Click Mobility Anchor Create.

The selected Cisco WLC now becomes an anchor for the WLAN.


 


Note A Cisco 2000 Series Wireless LAN Controller cannot be designated as an anchor for a WLAN. However, a WLAN created on a Cisco 2000 Series Wireless LAN Controller can have a Cisco 4100 Series Wireless LAN Controller and Cisco 4400 Series Wireless LAN Controller as its anchor.


Removing a Mobility Anchor


Step 1 Click the WLANs tab. This displays the list of WLANs.

Step 2 Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Mobility Anchors to navigate to the Mobility Anchors page.

Step 3 Click the blue arrow adjacent the corresponding Mobility Anchor and choose Remove.


 

802.11u

Click the WLANs tab. This displays the list of WLANs. Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose 802.11u to navigate to the 802.11u page.

This page lists the 802.11u configuration options available for the selected WLAN. You can configure a WLAN to enable interworking with external networks such as hotspots or other public Wi-Fi.

IEEE 802.11u is an extension to the IEEE 802.11 standard to improve the ability of devices to discover, authenticate, and use nearby Wi-Fi access points. IEEE 802.11u enables automatic WLAN offload for 802.1X devices at the hotspot of mobile or roaming partners.

This table describes the 801.11u parameters.

 

Table 3-17 801.11u General Parameters

Parameter
Description

802.11u Status

802.11u that you can enable or disable on this WLAN.

Internet Access

Internet access that you can enable or disable on this WLAN.

Network Type

Network type that you can set on this WLAN. The following options are available:

  • Private Network
  • Private Network with Guest Access
  • Chargeable Public Network
  • Free Public Network
  • Emergency Services Only Network
  • Personal Device Network
  • Test or Experimental
  • Wildcard

The default value is Chargeable Public Network.

Network Auth Type

Network authentication type that you can set on this WLAN for 802.11u. The following options are available:

  • Not configured
  • Acceptance of terms and conditions
  • Online enrollment
  • HTTP/HTTPS redirection
  • DNS Redirection

HESSID

Homogenous Extended Service Set Identifier (HESSID) that you can enter. The HESSID must be a valid MAC address that uniquely identifies the network. We recommend that the HESSID must be the actual BSSID of the first access point.

IPv4Type

IPv4 type address. The following options are available:

  • Unknown
  • Not available
  • Public address
  • Port-restricted
  • Single NATed private
  • Double NATed private
  • Port-restricted and single NATed
  • Port-restricted and double NATed

IPv6Type

IPv6type address. The following options are available:

  • Unknown
  • Not available
  • Available

The default value is Unknown.

This table describes the OUI parameters.

 

Table 3-18 OUI List Parameters

Parameter
Description

OUI

Organization Unique Identifier that you can enter. The OUI must be a hexadecimal number represented in six or ten characters. For example, AABBDF.

Is Beacon

OUI beacon responses that you can enable or disable. You can have a maximum of 3 OUIs with this field enabled.

OUI Index

Organization Unique Identifier index. Choose a value between 1 and 32 from the drop-down list. The default is 1.

Click Add to add the OUI details.

This table describes the domain list parameters.

 

Table 3-19 Domain List Parameters

Parameter
Description

Domain Name

Domain name that is operating in the WLAN network. The domain name is case sensitive and you can use alphanumeric characters.

Domain Index

Domain index of the domain name. Choose a value between 1 and 32 from the drop-down list. The default is 1.

Click Add to add the Domain List parameters.

This table describes the realm list parameters.

 

Table 3-20 Realm List Parameters

Parameter
Description

Realm

Realm name that you can assign for this WLAN.

Realm Index

Realm index that you can assign to this realm name. Choose a value between 1 and 32 from the drop-down list. The default is 1.

EAP List

Field that appears when you click on a realm name. It allows you to define the EAP method and EAP index for the realm.

EAP Method

EAP method for the realm in the WLAN. The following options are available:

  • LEAP
  • PEAP
  • EAP-PEAP
  • EAP-TLS
  • EAP-FAST
  • EAP-SIM
  • EAP-TTLS
  • EAP-AKA

EAP Index

EAP index. The range is 1 to 4.

Click Add to add a realm.

This table describes the cellular network parameters.

 

Table 3-21 Cellular Network Information List

Parameter
Description

Country Code

Mobile country code in Binary Coded Decimal (BCD) format. The country code should be 3 characters.

Cellular Index

Cellular Index. The range is from 1 to 32.

Network Code

Mobile network code in BCD format. The network code can be 2 or 3 characters.

Click Add to add the Cellular Network Information.

Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.

HotSpot 2.0

Click the WLANs tab. This displays the list of WLANs. Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Hotspot 2.0 to navigate to the HotSpot 2.0 page.

Hotspot 2.0 improves the ability of Wi-Fi devices to discover and securely connect to public Wi-Fi hotspots which enables easier roaming between public Wi-Fi networks.

You can enable or disable a hotspot by choosing the appropriate option from the HotSpot2 Enable drop-down list.

This table describes the HotSpot parameters.

 

Table 3-22 HotSpot 2.0 General Parameters

Parameter
Description

HotSpot2

HotSpot2 that you can enable or disable on this WLAN.

WAN Link Status

Link status. The following options are available:

  • Not configured
  • Link Up
  • Link Down
  • Link in Test

WAN Symmetric Link Status

Downlink and uplink speed of the WAN backhaul link. The following options are available:

  • Same
  • Different

WAN Downlink Speed

Downlink speed of the WAN backhaul link in kbps. The maximum value is 4,294,967,295 kbps.

WAN Uplink Speed

Uplink speed of the WAN backhaul link in kbps. The maximum value is 4,294,967,295 kbps.

This table describes the operator parameters.

 

Table 3-23 Operator Name List Parameters

Parameter
Description

Operator Name

Operator name of the hotspot provider that you can enter.

Operator Index

Operator index of the hotspot provider that you can assign. Choose a value between 1 and 32 from the drop-down list. The default is 1.

Language code

Language code that you can enter. For example, you can enter ENG for English.

Click Add to add the operator name.

This table describes the port config parameters.

 

Table 3-24 Port Config List Parameters

Parameter
Description

IP Protocol

Internet protocol name that you can select. This parameter provides information on the connection status of the most commonly used communication protocols and ports.

The following options are available:

  • ICMP
  • FTP/SSH/TLS/PPTP VPN/VOIP
  • IKEv2 (IPSec VPN/VoIP/ESP)

Port No.

Port number used for the IP. The following options are available:

  • ICMP/ESP (IPSec-VPN)
  • FTP
  • SSH
  • HTTP
  • TLS-VPN
  • IKEv2
  • PPTP-VPN
  • IPSec-NAT
  • VoIP

Status

Status of the IP port. The following options are available:

  • Closed
  • Open
  • Unknown

Index

Port configuration index that you can configure. Choose a value between 1 and 10 from the drop-down list. The default is 1.

 

Foreign Maps

Click the WLANs tab. This displays the list of WLANs.

Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Foreign Maps to navigate to the Foreign Controller Interface Mapping page.

Whenever a wireless client connects to a wireless network (WLAN), the client is placed in a VLAN that is associated with the WLAN. Release 7.0 and prior releases of the Cisco WLC software enabled you to associate one VLAN with a WLAN. Each VLAN required a single IP subnet. As a result, a WLAN required a large subnet to accommodate more clients. In a large venue such as an auditorium, a stadium, or a conference where there may be numerous wireless clients, having only a single WLAN to accommodate many clients might be a challenge.

The VLAN select feature enables you to use a single WLAN that can support multiple VLANs. Clients can get assigned to one of the configured VLANs. This feature enables you to map a WLAN to a single or multiple interfaces using interface groups. Wireless clients that associate to the WLAN get an IP address from a pool of subnets identified by the interfaces using a MAC based hashing algorithm. This feature also extends the current AP Group where AP groups can override an interface or interface group in a WLAN by an interface. This feature also provides the solution to guest anchor restrictions where a wireless guest user on a foreign location can get an IP address from multiple subnets based on their foreign locations or foreign Cisco WLCs from the same anchor Cisco WLC.

When a client roams from one Cisco WLC to another, the foreign Cisco WLC sends the VLAN information as part of the mobility announce message. Based on the VLAN information received, the anchor decides whether the tunnel should be created between the anchor Cisco WLC and the foreign Cisco WLC. If the same VLAN is available on the foreign Cisco WLC, the client context is completely deleted from the anchor and the foreign Cisco WLC becomes the new anchor Cisco WLC for the client.

As part of VLAN select feature, the mobility announce message carries an additional vendor payload that contains the list of VLAN interfaces that are mapped to a WLAN. This list helps the anchor to decide on a Local->Local type of handoff.


Note VLAN Select applies to wireless clients only.


This table describes the foreign map parameters.

 

Table 3-25 Foreign Map Parameters

Parameter
Description

WLAN SSID

WLAN SSID.

Foreign Controller MAC Address

Foreign Cisco WLC MAC address on a WLAN.

Interface / Interface Group Name (G)

Interface/interface group name that is mapped to a foreign switch.

Add Mapping

Mobility foreign map that you can add to a WLAN.

Foreign Controller MAC Address

Information about the MAC address of the foreign Cisco WLC to this interface/interface group.

Interface / Interface Group (G)

Interface/interface group.

Creating a Foreign Cisco WLC Interface Mapping


Step 1 Click the WLANs tab. This displays the list of WLANs.

Step 2 Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Foreign Maps to navigate to the Foreign Controller Interface Mapping page.

Step 3 From the Foreign Controller MAC Address drop-down list, choose a foreign Cisco WLC MAC address.

Step 4 From the Interface/Interface Group Name drop-down list, choose the interface/interface group name to be mapped to a foreign switch.

Step 5 Click Add Mapping.


 

Removing Foreign Maps


Step 1 Click the WLANs tab. This displays the list of WLANs.

Step 2 Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Foreign Maps to navigate to the Foreign Controller Interface Mapping page.

Step 3 Click the blue arrow adjacent the corresponding Foreign Controller and choose Remove.


 

Service Advertisement

Click the WLANs tab. This displays the list of WLANs.

Click the blue arrow adjacent the corresponding WLAN, and from the drop-down list that is displayed, choose Service Advertisement to navigate to the Service Advertisement page.

This page allows you to configure the Mobility Service Advertisement Protocol (MSAP) parameters on a WLAN. MSAP is used primarily by mobile devices that are configured with a set of policies for establishing network services. Service advertisements use MSAP to provide services to mobile devices prior to association to a Wi-Fi access network. This information is conveyed in a service advertisement.

This table describes the MSAP parameters.

 

Table 3-26 MSAP Parameters

Parameter
Description

MSAP Enable

Service advertisements that you can enable or disable on the WLAN.

Server Index

MSAP server ID. The server index field uniquely identifies an MSAP server instance serving a venue that is reachable through the BSSID. The range is from 1 to 10.

Configuring Dynamic Anchoring for Clients with a Static IP Address

You might need to configure static IP addresses for wireless clients. When these wireless clients move in a network, they try to associate with other Cisco WLCs. If the clients try to associate with a Cisco WLC that does not support the same subnet as the static IP, the clients fail to connect to the network. You can now enable dynamic tunneling of clients with static IP addresses. Using this feature, clients with static IP addresses can be associated with other Cisco WLCs where the client’s subnet is supported by tunneling the traffic to another Cisco WLC in the same mobility group. This feature enables you to configure your WLAN so that the network is serviced even though the clients use static IP addresses.

The following sequence occurs when a client with a static IP address tries to associate with a Cisco WLC:

1. When a client associates with a Cisco WLC, such as WLC-1, it performs a mobility announcement. If a Cisco WLC in the mobility group responds (such as WLC-2), the client traffic is tunneled to the Cisco WLC WLC-2. As a result, WLC 1 becomes foreign and WLC-2 becomes the anchor.

2. If none of the Cisco WLCs responds, the client is treated as a local client and authentication is performed. The IP address for the client is updated either through orphan packet handling or ARP request processing. If the client’s IP subnet is supported in the Cisco WLC (WLC-1), the client remains as a local client and traffic for this client is serviced by this Cisco WLC (WLC-1).

3. If the Cisco WLC (WLC-1) cannot service the client IP subnet, it sends a static IP client announcement. If a Cisco WLC in the mobility group responds (such as WLC2), the client is tunneled to WLC2. If there are multiple Cisco WLCs in the mobility group that respond to the static IP client announcement, the first Cisco WLC with a 50 percent or less load is selected for tunneling. If there are no Cisco WLCs with a 50 percent or less load, the Cisco WLC with the least load is selected.

4. If the maximum number of clients per WLAN is configured, the percentage load is calculated by using the following formula:

(total clients present in that WLAN/maximum clients supported in that WLAN) x 100.

or

(total clients present in the WLC/maximum clients supported) x 100.

5. Once the acknowledgement is received, the client traffic is tunneled between the anchor and the Cisco WLC (WLC-1).


Note If a WLAN is configured with an interface group and any of the interfaces in the interface group support the static IP client subnet, the client is assigned to that interface. This situation occurs in the local or remote (static IP anchor) Cisco WLC. For native IPv6 clients, that is clients with only IPv6 addresses, in the interface group, static IP is not supported.



Note A security level 2 authentication is performed only in the local (static IP foreign) Cisco WLC, also known as the exported foreign Cisco WLC.



Note If AAA is used for authentication, the VLAN override is ignored if static IP tunneling is required. You must configure the local Cisco WLC with the correct AAA server where this client entry is present.


The following restrictions apply when configuring static IP tunneling with other features on the same WLAN:

  • Auto anchoring mobility (guest tunneling) cannot be configured for the same WLAN.
  • FlexConnect local authentication cannot be configured for the same WLAN.
  • The DHCP required option cannot be configured for the same WLAN.

Note Dynamic anchoring of static IP clients cannot be configured with FlexConnect local switching.


Configuring Dynamic Anchoring of Static IP Clients


Step 1 Choose WLANs to open the WLANs page.

Step 2 Click the ID number of the desired WLAN on which you want to enable dynamic anchoring of IP clients. The WLANs > Edit page appears.

Step 3 Choose the Advanced tab to open the WLANs > Edit (Advanced) page.

Step 4 Enable dynamic anchoring of static IP clients by selecting the Static IP Tunneling check box.

Step 5 Click Apply to commit your changes.


 

Configuring the Maximum Number of Clients Per WLAN

You can set a limit to the number of clients that can connect to a WLAN. This feature is useful in scenarios where you have a limited number of clients that can connect to a Cisco WLC. For example, consider a scenario where the Cisco WLC can server up to 256 clients on a WLAN that can be shared between enterprise users (employees) and guest users. You can set a limit on the number of guest clients that can access a given WLAN. The number of clients that you can configure per WLAN depends on the platform that you are using. The range is from 1 to 200.


Step 1 Choose WLANs to open the WLANs page.

Step 2 Click the ID number of the WLAN for which you wish to limit the number of clients. The WLANs > Edit page appears.

Step 3 On the Advanced tab, set the Maximum Allowed Clients text box.


 

Click Apply to send data to the Cisco WLC, but the data is not preserved across a power cycle; these parameters are stored temporarily in volatile RAM.

AP Groups

Choose WLAN > Advanced > AP Groups to navigate to the AP Groups page. This page displays a summary of the AP groups configured on your network. This page enables you to add, remove, or view details of an AP group.

After you create up to 512 WLANs on the Cisco WLC, you can selectively publish them (using access point groups) to different access points to better manage your wireless network.

After all access points have joined the Cisco WLC, you can create up to 150 access point groups and assign up to 16 WLANs to each group. Each access point advertises only the enabled WLANs that belong to its access point group. The access point does not advertise disabled WLANs in its access point group or WLANs that belong to another group.


Note The Cisco WLC creates the default-group access point group and automatically populates it with the first 16 WLANs (WLANs with IDs 1 through 16, or fewer if 16 WLANs are not configured). This default group cannot be modified (you cannot add WLANs to it and you cannot delete WLANs from it). It is dynamically updated whenever the first 16 WLANs are added or deleted. If an access point does not belong to an access point group, it is assigned to the default group and uses the WLANs in that group. If an access point joins the Cisco WLC with an undefined access point group name, the access point keeps its group name but uses the WLANs in the default-group access point group.



Note If you clear the configuration on the Cisco WLC, all of the access point groups disappear except for the default-group access point group.



Note The OEAP 600 Series access point supports a maximum of two WLANs and one remote LAN. If you have configured more than two WLANs and one remote LAN, you can assign the 600 Series access point to an AP group. The support for two WLANs and one remote LAN still applies to the AP group if the 600 Series OEAP is in the default group. The WLAN/remote LAN IDs must be less than 8.


To remove an AP group, click the blue arrow adjacent the gruop and choose Remove.

An error message appears if you try to delete an access point group that is used by at least one access point. Before you can delete an AP group, move all APs in this group to another group. The access points are not moved to the default-group access point group as in previous releases.

  • To see the APs, click the AP group name, and choose the APs tab.
  • To move APs, click the AP group name, choose the APs tab, check the check box to the left of the AP name, or select the AP name check box to select all APs, and click the Add APs.

Prohibit One VLAN for Local Switching by FlexConnect

Choose an interface for Prohibit Local Switching from the drop-down list in the interface list page. Click Apply to prohibit local switching of the interface by the Cisco WLC. Click New to select another VLAN for the same action.

Creating a New AP Group


Step 1 On the WLAN > AP Groups page, click Add Group to display the Add New AP Group area.

Step 2 In the AP Group Nam e text box, enter the name of the AP group.

Step 3 In the Description text box, enter a brief description of the AP group.

Step 4 Click Add to add the AP group.

The AP group is created.


 

Editing AP Groups

Choose WLAN > Advanced > AP Groups and then click an AP group name to navigate to this page.

General Tab


Note AP 3600 with the 802.11ac module advertises only the first eight WLANs on the 5-GHz radios.


This table describes the general AP parameters.

 

Table 3-27 General Parameters

Parameter
Description

AP Group Name

AP group name.

AP Group Description

AP group description.

NAS-ID

Network Access Server identifier. The NAS-ID is sent to the RADIUS server by the controller (as a RADIUS client) using the authentication request, which is used to classify users to different groups. You can enter up to 32 alphanumeric characters.

Beginning in Release 7.4 and later releases, you can configure the NAS-ID on the interface, WLAN, or an access point group. The order of priority is AP Group NAS-ID > WLAN NAS-ID > Interface NAS-ID.

Enable Client Traffic QinQ

When enabled, double 802.1q tagging is enabled for client traffic associated to APs that are part of the WLAN and AP-Group.

QinQ Service VLAN ID must be configured for this to work.

Enable DHCPv4 QinQ

When enabled, double 802.1q tagging is enabled for client DHCPv4 packets associated to APs that are part of the WLAN and AP-Group.

QinQ Service VLAN ID must be configured for this to work.

QinQ Service VLAN ID

QinQ Service VLAN ID is the outer VLAN ID and the Interface mapped to WLAN in AP-Group will act as inner VLAN ID.

CAPWAP Preferred Mode

Select the check box to configure the CAPWAP Preferred mode for the AP Group. You can select between an IPv4 or IPv6. By field is by default un-configured.

Note The CAPWAP Preferred Mode can either be configured Globally (Controller > General Tab > CAPWAP Preferred Mode) or on a AP Group. If you unselect the check box, global configuration will take precedence.

Note The above configuration will be displayed in the Wireless > ALL APs > General Tab > IP Config.

Note The CAPWAP Preferred Mode field does not appear under the default-group. The APs by default are part of the default-group.

WLANs Tab

Click Add New to assign a WLAN to an access point group.

This table describes the WLAN parameters.

 

Table 3-28 WLANs Tab Parameters

Parameter
Description

WLAN SSID

WLAN SSID that you can select from the drop-down list.

Interface/Interface Group (G)

Interface name that you can select from the drop-down list.

SNMP NAC State

SNMP NAC out-of-band support for this access point group that you can enable or disable.

Note If you enable SNMP NAC out-of-band support, be sure to choose the quarantine VLAN from the Interface Name drop-down list.

Add button/Cancel button

Click Add to add this WLAN to the access point group. Click Cancel to close the Add New area without making any changes.

WLAN ID

Information about the WLANs that are currently assigned to this access point group.

WLAN SSID

Information about the WLAN SSID.

Interface Name/Interface Group (G)

Interface name or interface group that you can select from the drop-down list.

SNMP NAC State

SNMP NAC state that you can enable or disable.

Click the blue arrow adjacent the corresponding WLAN and choose one of the following options:

  • NAC Enable / NAC Disable —Changes the SNMP NAC state.
  • Policy-Mapping —Configures the policies for the WLAN.

You can configure a maximum of 16 policies. In the AP Group > Policy Mappings page, you can configure a priority index and a policy. To define new policies, choose Security > Local Policies > New.

  • Remove —Removes a WLAN from the access point group.

RF Profile Tab

This table describes the RF profile parameters.

 

Table 3-29 RF Profile Tab Parameters

Parameter
Description

802.11a

Drop-down list from which you can choose an RF profile for APs with 802.11a radios.

802.11b

Drop-down list from which you can choose an RF profile for APs with 802.11b radios.

 

Click Apply to apply the RF profile selected for the APs.


Note Applying an RF profile results in a reboot of all the APs associated with the AP Group.


APs Tab

This table describes the AP parameters.

 

Table 3-30 APs Tab Parameters

Parameter
Description

APs currently in the Group

Access points that are currently assigned to this group.

To remove an access point, select the check box to the left of the AP name or select the AP Name check box to select all APs, and click Remove APs.

Add APs to the Group

Access points that are available to be added to the group.

To add an access point, select the check box to the left of the AP Name or select the AP Name check box to select all APs, and click Add APs.

802.11u Tab

This table describes the 802.11u parameters.

 

Table 3-31 802.11u Parameters

Parameter
Description

Venue Group

Drop-down list from which you can choose a Hotspot group that groups similar Hotspot venues. The following options are available:

  • Unspecified
  • Assembly
  • Business
  • Educational
  • Factory and Industrial
  • Institutional
  • Mercantile
  • Residential
  • Storage
  • Utility and Misc
  • Vehicular
  • Outdoor

Venue Type

Drop-down list from which you can choose the type of venue based on the Venue Group that you choose.

Venue Name

Venue name that you can provide for this access point. This name is associated with the basic service set (BSS). This name is used in cases where the SSID does not provide enough information about the venue. The venue name is case sensitive and can be up to 252 alphanumeric characters.

Language

Language used at the venue. You must specify the language before you specify the venue name. ISO-639 encoded string defining the language used at the venue. This string is a three-character language code. For example, you can enter ENG for English.

Operating class

Select the check box to choose the 802.11u operating class. The different operating classes are 81, 83, 84, 112, 113, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127.

You can add a maximum of 10 operating classes.

Click Add New Venue to add a new venue for the AP group.

Click Apply to apply the Operating class to the AP group.