Config Commands: a to i

config aaa auth

To configure the AAA authentication search order for management users, use the config aaa auth command.

config aaa auth mgmt [ aaa_server_type1 | aaa_server_type2]

Syntax Description

mgmt

Configures the AAA authentication search order for controller management users by specifying up to three AAA authentication server types. The order that the server types are entered specifies the AAA authentication search order.

aaa_server_type

(Optional) AAA authentication server type (local , radius , or tacacs ). The local setting specifies the local database, the radius setting specifies the RADIUS server, and the tacacs setting specifies the TACACS+ server.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You can enter two AAA server types as long as one of the server types is local . You cannot enter radius and tacacs together.

Examples

The following example shows how to configure the AAA authentication search order for controller management users by the authentication server type local:

(Cisco Controller) > config aaa auth radius local

config aaa auth mgmt

To configure the order of authentication when multiple databases are configured, use the config aaa auth mgmt command.

config aaa auth mgmt [ radius | tacacs]

Syntax Description

radius

(Optional) Configures the order of authentication for RADIUS servers.

tacacs

(Optional) Configures the order of authentication for TACACS servers.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the order of authentication for the RADIUS server:

(Cisco Controller) > config aaa auth mgmt radius

The following example shows how to configure the order of authentication for the TACACS server:

(Cisco Controller) > config aaa auth mgmt tacacs

config acl apply

To apply an access control list (ACL) to the data path, use the config acl apply command.

config acl apply rule_name

Syntax Description

rule_name

ACL name that contains up to 32 alphanumeric characters.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Example

Examples

The following example shows how to apply an ACL to the data path:


(Cisco Controller) > config acl apply acl01

config acl counter

To see if packets are hitting any of the access control lists (ACLs) configured on your controller, use the config acl counter command.

config acl counter { start | stop}

Syntax Description

start

Enables ACL counters on your controller.

stop

Disables ACL counters on your controller.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

ACL counters are available only on the following controllers: 4400 series, Cisco WiSM, and Catalyst 3750G Integrated Wireless LAN Controller Switch.

Examples

The following example shows how to enable ACL counters on your controller:


(Cisco Controller) > config acl counter start

config acl create

To create a new access control list (ACL), use the config acl create command.

config acl create rule_name

Syntax Description

rule_name

ACL name that contains up to 32 alphanumeric characters.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN Controllers.

Examples

The following example shows how to create a new ACL:


(Cisco Controller) > config acl create acl01

config acl cpu

To create a new access control list (ACL) rule that restricts the traffic reaching the CPU, use the config acl cpu command.

config acl cpu rule_name { wired | wireless | both}

Syntax Description

rule_name

Specifies the ACL name.

wired

Specifies an ACL on wired traffic.

wireless

Specifies an ACL on wireless traffic.

both

Specifies an ACL on both wired and wireless traffic.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This command allows you to control the type of packets reaching the CPU.

Examples

The following example shows how to create an ACL named acl101 on the CPU and apply it to wired traffic:

(Cisco Controller) > config acl cpu acl01 wired

config acl delete

To delete an access control list (ACL), use the config acl delete command.

config acl delete rule_name

Syntax Description

rule_name

ACL name that contains up to 32 alphanumeric characters.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN Controllers.

Examples

The following example shows how to delete an ACL named acl101 on the CPU:

(Cisco Controller) > config acl delete acl01

config acl layer2

To configure a Layer 2 access control list (ACL), use the config acl layer2 command.

config acl layer2 { apply acl_name | create acl_name | delete acl_name | rule { action acl_name index { permit | deny} | add acl_name index | change index acl_name old_index new_index | delete acl_name index | etherType acl_name index etherType etherTypeMask | swap index acl_name index1 index2}}

Syntax Description

apply

Applies a Layer 2 ACL to the data path.

acl_name

Layer 2 ACL name. The name can be up to 32 alphanumeric characters.

create

Creates a Layer 2 ACL.

delete

Deletes a Layer 2 ACL.

rule

Configures a Layer 2 ACL rule.

action

Configures the action for the Layer 2 ACL rule.

index

Index of the Layer 2 ACL rule.

permit

Permits rule action.

deny

Denies rule action.

add

Creates a Layer 2 ACL rule.

change index

Changes the index of the Layer 2 ACL rule.

old_index

Old index of the Layer 2 ACL rule.

new_index

New index of the Layer 2 ACL rule.

delete

Deletes a Layer 2 ACL rule.

etherType

Configures the EtherType of a Layer 2 ACL rule.

etherType

EtherType of a Layer 2 ACL rule. EtherType is used to indicate the protocol that is encapsulated in the payload of an Ethernet frame. The range is a hexadecimal value from 0x0 to 0xffff.

etherTypeMask

Netmask of the EtherType. The range is a hexadecimal value from 0x0 to 0xffff.

swap index

Swaps the index values of two rules.

index1 index2

Index values of two Layer 2 ACL rules.

Command Default

The Cisco WLC does not have any Layer2 ACLs.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Command History

Release Modification

7.5

This command was introduced.

Usage Guidelines

You can create a maximum of 16 rules for a Layer 2 ACL.

You can create a maximum of 64 Layer 2 ACLs on a Cisco WLC.

A maximum of 16 Layer 2 ACLs are supported per access point because an access point supports a maximum of 16 WLANs.

Ensure that the Layer 2 ACL names do not conflict with the FlexConnect ACL names because an access point does not support the same Layer 2 and Layer 3 ACL names.

Examples

The following example shows how to apply a Layer 2 ACL:

 (Cisco Controller) >config acl layer2 apply acl_l2_1

config acl rule

To configure ACL rules, use the config acl rule command.

config acl rule { action rule_name rule_index { permit | deny} | 
 add rule_name rule_index | 
 change index rule_name old_index new_index | 
 delete rule_name rule_index | 
 destination address rule_name rule_index ip_address netmask | 
 destination port range rule_name rule_index start_port end_port |
 direction rule_name rule_index { in | out | any} | 
 dscp rule_name rule_index dscp | 
 protocol rule_name rule_index protocol | 
 source address rule_name rule_index ip_address netmask | 
 source port range rule_name rule_index start_port end_port |
 swap index rule_name index_1 index_2}

Syntax Description

action

Configures whether to permit or deny access.

rule_name

ACL name that contains up to 32 alphanumeric characters.

rule_index

Rule index between 1 and 32.

permit

Permits the rule action.

deny

Denies the rule action.

add

Adds a new rule.

change

Changes a rule’s index.

index

Specifies a rule index.

delete

Deletes a rule.

destination address

Configures a rule’s destination IP address and netmask.

destination port range

Configure a rule's destination port range.

ip_address

IP address of the rule.

netmask

Netmask of the rule.

start_port

Start port number (between 0 and 65535).

end_port

End port number (between 0 and 65535).

direction

Configures a rule’s direction to in, out, or any.

in

Configures a rule’s direction to in.

out

Configures a rule’s direction to out.

any

Configures a rule’s direction to any.

dscp

Configures a rule’s DSCP.

dscp

Number between 0 and 63, or any .

protocol

Configures a rule’s DSCP.

protocol

Number between 0 and 255, or any .

source address

Configures a rule’s source IP address and netmask.

source port range

Configures a rule’s source port range.

swap

Swaps two rules’ indices.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN Controllers.

Examples

The following example shows how to configure an ACL to permit access:

(Cisco Controller) > config acl rule action lab1 4 permit

config acl url-domain

To add or delete an URL domain for the access control list, use the config acl url-domain command.

config acl url-domain {add | delete} domain_name acl_name

Syntax Description

domain_name

URL domain name for the access control list

acl_name

Name of the access control list.

Command Default

None

Command History

Release Modification
7.6

This command was introduced.

Examples

The following example shows how to add a new URL domain for the access control list:


(Cisco Controller) > config acl url-domain add cisco.com android

The following example shows how to delete an existing URL domain from the access control list:


(Cisco Controller) > config acl url-domain delete play.google.com android

config advanced 802.11 7920VSIEConfig

To configure the Cisco unified wireless IP phone 7920 VISE parameters, use the config advanced 802.11 7920VSIEConfig command.

config advanced 802.11{ a | b} 7920VSIEConfig { call-admission-limit limit | 
 G711-CU-Quantum quantum}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

call-admission-limit

Configures the call admission limit for the 7920s.

G711-CU-Quantum

Configures the value supplied by the infrastructure indicating the current number of channel utilization units that would be used by a single G.711-20ms call.

limit

Call admission limit (from 0 to 255). The default value is 105.

quantum

G711 quantum value. The default value is 15.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

This example shows how to configure the call admission limit for 7920 VISE parameters:


(Cisco Controller) >config advanced 802.11 7920VSIEConfig call-admission-limit 4

config advanced 802.11 channel add

To add channel to the 802.11 networks auto RF channel list, use the config advanced 802.11 channel add command.

config advanced 802.11{ a | b} channel add channel_number

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

add

Adds a channel to the 802.11 network auto RF channel list.

channel_number

Channel number to add to the 802.11 network auto RF channel list.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to add a channel to the 802.11a network auto RF channel list:

(Cisco Controller) >config advanced 802.11 channel add 132

config advanced 802.11 channel cleanair-event

To configure CleanAir event driven Radio Resource Management (RRM) parameters for all 802.11 Cisco lightweight access points, use the config advanced 802.11 channel cleanair-event command.

config advanced 802.11{ a | b} channel cleanair-event { enable | disable | sensitivity [ low | medium | high] | custom threshold threshold_value}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables the CleanAir event-driven RRM parameters.

disable

Disables the CleanAir event-driven RRM parameters.

sensitivity

Sets the sensitivity for CleanAir event-driven RRM.

low

(Optional) Specifies low sensitivity.

medium

(Optional) Specifies medium sensitivity

high

(Optional) Specifies high sensitivity

custom

Specifies custom sensitivity.

threshold

Specifies the EDRRM AQ threshold value.

threshold_value

Number of custom threshold.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the CleanAir event-driven RRM parameters:

(Cisco Controller) > config advanced 802.11 channel cleanair-event enable

The following example shows how to configure high sensitivity for CleanAir event-driven RRM:

(Cisco Controller) > config advanced 802.11 channel cleanair-event sensitivity high

config advanced 802.11 channel dca anchor-time

To specify the time of day when the Dynamic Channel Assignment (DCA) algorithm is to start, use the config advanced 802.11 channel dca anchor-time command.

config advanced 802.11{ a | b} channel dca anchor-time value

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

value

Hour of the time between 0 and 23. These values represent the hour from 12:00 a.m. to 11:00 p.m.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the time of delay when the DCA algorithm starts:


(Cisco Controller) > config advanced 802.11 channel dca anchor-time 17

config advanced 802.11 channel dca chan-width-11n

To configure the Dynamic Channel Assignment (DCA) channel width for all 802.11n radios in the 5-GHz band, use the config advanced 802.11 channel dca chan-width-11n command.

config advanced 802.11{ a | b} channel dca chan-width-11n { 20 | 40 | 80}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

20

Sets the channel width for 802.11n radios to 20 MHz.

40

Sets the channel width for 802.11n radios to 40 MHz.

80

Sets the channel width for 802.11ac radios to 80-MHz.

Command Default

The default channel width is 20.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If you choose 40, be sure to set at least two adjacent channels in the config advanced 802.11 channel {add | delete} channel_number command (for example, a primary channel of 36 and an extension channel of 40). If you set only one channel, that channel is not used for the 40-MHz channel width.

To override the globally configured DCA channel width setting, you can statically configure an access point’s radio for 20- or 40-MHz mode using the config 802.11 chan_width command. If you then change the static configuration to global on the access point radio, the global DCA configuration overrides the channel width configuration that the access point was previously using.

Examples

The following example shows how to add a channel to the 802.11a network auto channel list:


(Cisco Controller) >config advanced 802.11a channel dca chan-width-11n 40

Examples

The following example shows how to set the channel width for the 802.11ac radio as 80-MHz:


(Cisco Controller) >config advanced 802.11a channel dca chan-width-11n 80

config advanced 802.11 channel dca interval

To specify how often the Dynamic Channel Assignment (DCA) is allowed to run, use the config advanced 802.11 channel dca interval command.

config advanced 802.11{ a | b} channel dca interval value

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

value

Valid values are 0, 1, 2, 3, 4, 6, 8, 12, or 24 hours. 0 is 10 minutes (600 seconds).

Command Default

The default DCA channel interval is 10 (10 minutes).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If your controller supports only OfficeExtend access points, we recommend that you set the DCA interval to 6 hours for optimal performance. For deployments with a combination of OfficeExtend access points and local access points, the range of 10 minutes to 24 hours can be used.

Examples

The following example shows how often the DCA algorithm is allowed to run:


(Cisco Controller) > config advanced 802.11 channel dca interval 8

config advanced 802.11 channel dca min-metric

To configure the 5-GHz minimum RSSI energy metric for DCA, use the config advanced 802.11 channel dca min-metric command.

config advanced 802.11{ a | b} channel dca RSSI_value

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

RSSI_value

Minimum received signal strength indicator (RSSI) that is required for the DCA to trigger a channel change. The range is from –100 to –60 dBm.

Command Default

The default minimum RSSI energy metric for DCA is –95 dBm.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the minimum 5-GHz RSSI energy metric for DCA:

(Cisco Controller) > config advanced 802.11a channel dca min-metric –80

In the above example, the RRM must detect an interference energy of at least -80 dBm in RSSI for the DCA to trigger a channel change.

config advanced 802.11 channel dca sensitivity

To specify how sensitive the Dynamic Channel Assignment (DCA) algorithm is to environmental changes (for example, signal, load, noise, and interference) when determining whether or not to change channels, use the config advanced 802.11 channel dca sensitivity command.

config advanced 802.11{ a | b} channel dcasensitivity { low | medium | high}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

low

Specifies the DCA algorithm is not particularly sensitive to environmental changes. See the “Usage Guidelines” section for more information.

medium

Specifies the DCA algorithm is moderately sensitive to environmental changes. See the “Usage Guidelines” section for more information.

high

Specifies the DCA algorithm is highly sensitive to environmental changes. See the “Usage Guidelines” section for more information.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The DCA sensitivity thresholds vary by radio band as shown in the table below.

To aid in troubleshooting, the output of this command shows an error code for any failed calls. This table explains the possible error codes for failed calls.

Table 1. DCA Sensitivity Thresholds

Sensitivity

2.4-GHz DCA Sensitivity Threshold

5-GHz DCA Sensitivity Threshold

High

5 dB

5 dB

Medium

15 dB

20 dB

Low

30 dB

35 dB

Examples

The following example shows how to configure the value of DCA algorithm’s sensitivity to low:


(Cisco Controller) > config advanced 802.11 channel dca sensitivity low

config advanced 802.11 channel foreign

To have Radio Resource Management (RRM) consider or ignore foreign 802.11a interference avoidance in making channel selection updates for all 802.11a Cisco lightweight access points, use the config advanced 802.11 channel foreign command.

config advanced 802.11{ a | b} channel foreign { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables the foreign access point 802.11a interference avoidance in the channel assignment.

disable

Disables the foreign access point 802.11a interference avoidance in the channel assignment.

Command Default

The default value for the foreign access point 802.11a interference avoidance in the channel assignment is enabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to have RRM consider foreign 802.11a interference when making channel selection updates for all 802.11a Cisco lightweight access points:


(Cisco Controller) > config advanced 802.11a channel foreign enable

config advanced 802.11 channel load

To have Radio Resource Management (RRM) consider or ignore the traffic load in making channel selection updates for all 802.11a Cisco lightweight access points, use the config advanced 802.11 channel load command.

config advanced 802.11{ a | b} channel load { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables the Cisco lightweight access point 802.11a load avoidance in the channel assignment.

disable

Disables the Cisco lightweight access point 802.11a load avoidance in the channel assignment.

Command Default

The default value for Cisco lightweight access point 802.11a load avoidance in the channel assignment is disabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to have RRM consider the traffic load when making channel selection updates for all 802.11a Cisco lightweight access points:


(Cisco Controller) > config advanced 802.11 channel load enable

config advanced 802.11 channel noise

To have Radio Resource Management (RRM) consider or ignore non-802.11a noise in making channel selection updates for all 802.11a Cisco lightweight access points, use the config advanced 802.11 channel noise command.

config advanced 802.11{ a | b} channel noise { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables non-802.11a noise avoidance in the channel assignment. or ignore.

disable

Disables the non-802.11a noise avoidance in the channel assignment.

Command Default

The default value for non-802.11a noise avoidance in the channel assignment is disabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to have RRM consider non-802.11a noise when making channel selection updates for all 802.11a Cisco lightweight access points:


(Cisco Controller) > config advanced 802.11 channel noise enable

config advanced 802.11 channel outdoor-ap-dca

To enable or disable the controller to avoid checking the non-Dynamic Frequency Selection (DFS) channels, use the config advanced 802.11 channel outdoor-ap-dca command.

config advanced 802.11{ a | b} channel outdoor-ap-dca { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables 802.11 network DCA list option for outdoor access point.

disable

Disables 802.11 network DCA list option for outdoor access point.

Command Default

The default value for 802.11 network DCA list option for outdoor access point is disabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The config advanced 802.11{a | b} channel outdoor-ap-dca {enable | disable} command is applicable only for deployments having outdoor access points such as 1522 and 1524.

Examples

The following example shows how to enable the 802.11a DCA list option for outdoor access point:

(Cisco Controller) > config advanced 802.11a channel outdoor-ap-dca enable

config advanced 802.11 channel pda-prop

To enable or disable propagation of persistent devices, use the config advanced 802.11 channel pda-prop command.

config advanced 802.11{ a | b} channel pda-prop { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables the 802.11 network DCA list option for the outdoor access point.

disable

Disables the 802.11 network DCA list option for the outdoor access point.

Command Default

The default 802.11 network DCA list option for the outdoor access point is disabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable or disable propagation of persistent devices:


(Cisco Controller) > config advanced 802.11 channel pda-prop enable

config advanced 802.11 channel update

To have Radio Resource Management (RRM) initiate a channel selection update for all 802.11a Cisco lightweight access points, use the config advanced 802.11 channel update command.

config advanced 802.11{ a | b} channel update

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to initiate a channel selection update for all 802.11a network access points:


(Cisco Controller) > config advanced 802.11a channel update

config advanced 802.11 coverage

To enable or disable coverage hole detection, use the config advanced 802.11 coverage command.

config advanced 802.11{ a | b} coverage { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables the coverage hole detection.

disable

Disables the coverage hole detection.

Command Default

The default coverage hole detection value is enabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If you enable coverage hole detection, the Cisco WLC automatically determines, based on data that is received from the access points, whether any access points have clients that are potentially located in areas with poor coverage.

If both the number and percentage of failed packets exceed the values that you entered in the config advanced 802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the config advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands over a 90-second period. The Cisco WLC determines whether the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.

Examples

The following example shows how to enable coverage hole detection on an 802.11a network:


(Cisco Controller) > config advanced 802.11a coverage enable

config advanced 802.11 coverage exception global

To specify the percentage of clients on an access point that are experiencing a low signal level but cannot roam to another access point, use the config advanced 802.11 coverage exception global command.

config advanced 802.11{ a | b} coverage exception global percent

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

percent

Percentage of clients. Valid values are from 0 to 100%.

Command Default

The default percentage value for clients on an access point is 25%.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If both the number and percentage of failed packets exceed the values that you entered in the config advanced 802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in theconfig advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands over a 90-second period. The controller determines whether the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.

Examples

The following example shows how to specify the percentage of clients for all 802.11a access points that are experiencing a low signal level:


(Cisco Controller) > config advanced 802.11 coverage exception global 50

config advanced 802.11 coverage fail-rate

To specify the failure rate threshold for uplink data or voice packets, use the config advanced 802.11 coverage fail-rate command.

config advanced 802.11{ a | b} coverage { data | voice} fail-rate percent

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

data

Specifies the threshold for data packets.

voice

Specifies the threshold for voice packets.

percent

Failure rate as a percentage. Valid values are from 1 to 100 percent.

Command Default

The default failure rate threshold uplink coverage fail-rate value is 20%.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If both the number and percentage of failed packets exceed the values that you entered in theconfig advanced 802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the config advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands over a 90-second period. The controller determines whether the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.

Examples

The following example shows how to configure the threshold count for minimum uplink failures for data packets:


(Cisco Controller) > config advanced 802.11 coverage fail-rate 80

config advanced 802.11 coverage level global

To specify the minimum number of clients on an access point with an received signal strength indication (RSSI) value at or below the data or voice RSSI threshold, use the config advanced 802.11 coverage level global command.

config advanced 802.11{ a | b} coverage level global clients

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

clients

Minimum number of clients. Valid values are from 1 to 75.

Command Default

The default minimum number of clients on an access point is 3.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If both the number and percentage of failed packets exceed the values that you entered in the config advanced 802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the config advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands over a 90-second period. The controller determines whether the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.

Examples

The following example shows how to specify the minimum number of clients on all 802.11a access points with an RSSI value at or below the RSSI threshold:


(Cisco Controller) > config advanced 802.11 coverage level global 60

config advanced 802.11 coverage packet-count

To specify the minimum failure count threshold for uplink data or voice packets, use the config advanced 802.11 coverage packet-count command.

config advanced 802.11{ a | b} coverage { data | voice} packet-count packets

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

data

Specifies the threshold for data packets.

voice

Specifies the threshold for voice packets.

packets

Minimum number of packets. Valid values are from 1 to 255 packets.

Command Default

The default failure count threshold for uplink data or voice packets is10.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If both the number and percentage of failed packets exceed the values that you entered in the config advanced 802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the config advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands over a 90-second period. The controller determines whether the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.

Examples

The following example shows how to configure the failure count threshold for uplink data packets:

(Cisco Controller) > config advanced 802.11 coverage packet-count 100

config advanced 802.11 coverage rssi-threshold

To specify the minimum receive signal strength indication (RSSI) value for packets that are received by an access point, use the config advanced 802.11 coverage rssi-threshold command.

config advanced 802.11{ a | b} coverage { data | voice} rssi-threshold rssi

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

data

Specifies the threshold for data packets.

voice

Specifies the threshold for voice packets.

rssi

Valid values are from –60 to –90 dBm.

Command Default

  • The default RSSI value for data packets is –80 dBm.

  • The default RSSI value for voice packets is –75 dBm.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The rssi value that you enter is used to identify coverage holes (or areas of poor coverage) within your network. If the access point receives a packet in the data or voice queue with an RSSI value that is below the value that you enter, a potential coverage hole has been detected.

The access point takes RSSI measurements every 5 seconds and reports them to the controller in 90-second intervals.

If both the number and percentage of failed packets exceed the values that you entered in the config advanced 802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the config advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands over a 90-second period. The controller determines whether the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.

Examples

The following example shows how to configure the minimum receive signal strength indication threshold value for data packets that are received by an 802.11a access point:


(Cisco Controller) > config advanced 802.11a coverage rssi-threshold -60

config advanced 802.11 edca-parameters

To enable a specific Enhanced Distributed Channel Access (EDCA) profile on a 802.11a network, use the config advanced 802.11 edca-parameters command.

config advanced 802.11{ a | b} edca-parameters { wmm-default | svp-voice | optimized-voice | optimized-video-voice | custom-voice | fastlane | custom-set { QoS Profile Name } { aifs AP-value (0-16 ) Client value (0-16) | ecwmax AP-Value (0-10) Client value (0-10) | ecwmin AP-Value (0-10) Client value (0-10) | txop AP-Value (0-255) Client value (0-255) } }

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

wmm-default

Enables the Wi-Fi Multimedia (WMM) default parameters. Choose this option if voice or video services are not deployed on your network.

svp-voice

Enables Spectralink voice-priority parameters. Choose this option if Spectralink phones are deployed on your network to improve the quality of calls.

optimized-voice

Enables EDCA voice-optimized profile parameters. Choose this option if voice services other than Spectralink are deployed on your network.

optimized-video-voice

Enables EDCA voice-optimized and video-optimized profile parameters. Choose this option when both voice and video services are deployed on your network.

Note 

If you deploy video services, admission control must be disabled.

custom-voice

Enables custom voice EDCA parameters for 802.11a. The EDCA parameters under this option also match the 6.0 WMM EDCA parameters when this profile is applied.

fastlane

Enables fastlane on compatible devices.

custom-set

Enables customization of EDCA parameters

  • aifs—Configures the Arbitration Inter-Frame Space.

    AP Value (0-16) Client value (0-16)

  • ecwmax—Configures the maximum Contention Window.

    AP Value(0-10) Client Value (0-10)

  • ecwmin—Configures the minimum Contention Window.

    AP Value(0-10) Client Value(0-10)

  • txop—Configures the Arbitration Transmission Opportunity Limit.

    AP Value(0-255) Client Value(0-255)

QoS Profile Name - Enter the QoS profile name:

  • bronze

  • silver

  • gold

  • platinum

Command Default

The default EDCA parameter is wmm-default .

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

8.2.110.0

In this release, custom-set keyword was added to edca-parameters command.

8.3

This command was modified and the fastlane keyword was added.

Examples

The following example shows how to enable Spectralink voice-priority parameters:


(Cisco Controller) > config advanced 802.11 edca-parameters svp-voice

config advanced 802.11 factory

To reset 802.11a advanced settings back to the factory defaults, use the config advanced 802.11 factory command.

config advanced 802.11{ a | b} factory

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to return all the 802.11a advanced settings to their factory defaults:


(Cisco Controller) > config advanced 802.11a factory

config advanced 802.11 group-member

To configure members in 802.11 static RF group, use the config advanced 802.11 group-member command.

config advanced 802.11{ a | b} group-member { add | remove} controller controller-ip-address

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

add

Adds a controller to the static RF group.

remove

Removes a controller from the static RF group.

controller

Name of the controller to be added.

controller-ip-address

IP address of the controller to be added.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to add a controller in the 802.11a automatic RF group:

(Cisco Controller) > config advanced 802.11a group-member add cisco-controller 209.165.200.225

config advanced 802.11 group-mode

To set the 802.11a automatic RF group selection mode on or off, use the config advanced 802.11 group-mode command.

config advanced 802.11{ a | b} group-mode { auto | leader | off | restart}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

auto

Sets the 802.11a RF group selection to automatic update mode.

leader

Sets the 802.11a RF group selection to static mode, and sets this controller as the group leader.

off

Sets the 802.11a RF group selection to off.

restart

Restarts the 802.11a RF group selection.

Command Default

The default 802.11a automatic RF group selection mode is auto.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the 802.11a automatic RF group selection mode on:


(Cisco Controller) > config advanced 802.11a group-mode auto

The following example shows how to configure the 802.11a automatic RF group selection mode off:


(Cisco Controller) > config advanced 802.11a group-mode off

config advanced 802.11 logging channel

To turn the channel change logging mode on or off, use the config advanced 802.11 logging channel command.

config advanced 802.11{ a | b} logging channel { on | off}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

logging channel

Logs channel changes.

on

Enables the 802.11 channel logging.

off

Disables 802.11 channel logging.

Command Default

The default channel change logging mode is Off (disabled).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to turn the 802.11a logging channel selection mode on:


(Cisco Controller) > config advanced 802.11a logging channel on

config advanced 802.11 logging coverage

To turn the coverage profile logging mode on or off, use the config advanced 802.11 logging coverage command.

config advanced 802.11{ a | b} logging coverage { on | off}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

on

Enables the 802.11 coverage profile violation logging.

off

Disables the 802.11 coverage profile violation logging.

Command Default

The default coverage profile logging mode is Off (disabled).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to turn the 802.11a coverage profile violation logging selection mode on:


(Cisco Controller) > config advanced 802.11a logging coverage on

config advanced 802.11 logging foreign

To turn the foreign interference profile logging mode on or off, use the config advanced 802.11 logging foreign command.

config advanced 802.11{ a | b} logging foreign { on | off}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

on

Enables the 802.11 foreign interference profile violation logging.

off

Disables the 802.11 foreign interference profile violation logging.

Command Default

The default foreign interference profile logging mode is Off (disabled).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to turn the 802.11a foreign interference profile violation logging selection mode on:


(Cisco Controller) > config advanced 802.11a logging foreign on

config advanced 802.11 logging load

To turn the 802.11a load profile logging mode on or off, use the config advanced 802.11 logging load command.

config advanced 802.11{ a | b} logging load { on | off}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

on

Enables the 802.11 load profile violation logging.

off

Disables the 802.11 load profile violation logging.

Command Default

The default 802.11a load profile logging mode is Off (disabled).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to turn the 802.11a load profile logging mode on:


(Cisco Controller) > config advanced 802.11 logging load on

config advanced 802.11 logging noise

To turn the 802.11a noise profile logging mode on or off, use the config advanced 802.11 logging noise command.

config advanced 802.11{ a | b} logging noise { on | off}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

on

Enables the 802.11 noise profile violation logging.

off

Disables the 802.11 noise profile violation logging.

Command Default

The default 802.11a noise profile logging mode is off (disabled).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to turn the 802.11a noise profile logging mode on:


(Cisco Controller) > config advanced 802.11a logging noise on

config advanced 802.11 logging performance

To turn the 802.11a performance profile logging mode on or off, use the config advanced 802.11 logging performance command.

config advanced 802.11{ a | b} logging performance { on | off}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

on

Enables the 802.11 performance profile violation logging.

off

Disables the 802.11 performance profile violation logging.

Command Default

The default 802.11a performance profile logging mode is off (disabled).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to turn the 802.11a performance profile logging mode on:


(Cisco Controller) > config advanced 802.11a logging performance on

config advanced 802.11 logging txpower

To turn the 802.11a transmit power change logging mode on or off, use the config advanced 802.11 logging txpower command.

config advanced 802.11{ a | b} logging txpower { on | off}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

on

Enables the 802.11 transmit power change logging.

off

Disables the 802.11 transmit power change logging.

Command Default

The default 802.11a transmit power change logging mode is off (disabled).

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to turn the 802.11a transmit power change mode on:


(Cisco Controller) > config advanced 802.11 logging txpower off

config advanced 802.11 monitor channel-list

To set the 802.11a noise, interference, and rogue monitoring channel list, use the config advanced 802.11 monitor channel-list command.

config advanced 802.11{ a | b} monitor channel-list { all | country | dca}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

all

Monitors all channels.

country

Monitors the channels used in the configured country code.

dca

Monitors the channels used by the automatic channel assignment.

Command Default

The default 802.11a noise, interference, and rogue monitoring channel list is country.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to monitor the channels used in the configured country:


(Cisco Controller) > config advanced 802.11 monitor channel-list country

config advanced 802.11 monitor load

To set the load measurement interval between 60 and 3600 seconds, use the config advanced 802.11 monitor load command.

config advanced 802.11{ a | b} monitor load seconds

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

seconds

Load measurement interval between 60 and 3600 seconds.

Command Default

The default load measurement interval is 60 seconds.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to set the load measurement interval to 60 seconds:

(Cisco Controller) > config advanced 802.11 monitor load 60

config advanced 802.11 monitor measurement

To set the signal measurement interval between 60 and 3600 seconds, use the config advanced 802.11 monitor measurement command.

config advanced 802.11{ a | b} monitor measurement seconds

Syntax Description

seconds

Signal measurement interval that you need to enter. Valid range is between 60 and 3600 seconds.

Command Default

The default signal measurement interval is 180 seconds.

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to set the signal measurement interval to 300 seconds:


(Cisco Controller) > config advanced 802.11 monitor measurement 300

config advanced 802.11 monitor mode

To enable or disable 802.11a access point monitoring, use the config advanced 802.11 monitor mode command.

config advanced 802.11{ a | b} monitor mode { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables the 802.11 access point monitoring.

disable

Disables the 802.11 access point monitoring.

Command Default

The default 802.11a access point monitoring is enabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the 802.11a access point monitoring:


(Cisco Controller) > config advanced 802.11a monitor mode enable

config advanced 802.11 monitor ndp-type

To configure the 802.11 access point radio resource management (RRM) Neighbor Discovery Protocol (NDP) type, use the config advanced 802.11 monitor ndp-type command:

config advanced 802.11{ a | b} monitor ndp-type { protected | transparent}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

protected

Specifies the Tx RRM protected NDP.

transparent

Specifies the Tx RRM transparent NDP.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Before you configure the 802.11 access point RRM NDP type, ensure that you have disabled the network by entering the config 802.11 disable network command.

Examples

The following example shows how to enable the 802.11a access point RRM NDP type as protected:


(Cisco Controller) > config advanced 802.11 monitor ndp-type protected

config advanced 802.11 monitor timeout-factor

To configure the 802.11 neighbor timeout factor, use the config advanced 802.11 monitor timeout-factor command:

config advanced 802.11{ a | b} monitor timeout-factor factor-value-in-minutes

Syntax Description

factor-value-in-minutes

Neighbor timeout factor value that you must enter. Valid range is between 5 minutes to 60 minutes. We recommend that you set the timeout factor to 60 minutes.

Command Default

None

Command History

Release Modification

8.1

This command was introduced

config advanced 802.11 optimized roaming

To configure the optimized roaming parameters for each 802.11 band, use the config advanced 802.11 optimized roaming command.

config advanced { 802.11a | 802.11b} optimized-roaming { enable | disable | interval seconds | datarate mbps}

Syntax Description

802.11a

Configures optimized roaming parameters for 802.11a network.

802.11b

Configures optimized roaming parameters for 802.11b network.

enable

Enables optimized roaming.

disable

Disables optimized roaming.

interval

Configures the client coverage reporting interval for 802.11a/b networks.

seconds

Client coverage reporting interval in seconds. The range is from 5 to 90 seconds.

datarate

Configures the threshold data rate for 802.11a/b networks.

mbps

Threshold data rate in Mbps for 802.11a/b networks.

For 802.11a, the configurable data rates are 6, 9, 12, 18, 24, 36, 48, and 54.

For 802.11b, the configurable data rates are 1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, and 54.

You can configure 0 to disable the data rate for disassociating clients.

Command Default

By default, optimized roaming is disabled. The default value for client coverage reporting interval is 90 seconds and threshold data rate is 0 (disabled state).

Command History

Release Modification
8.0

This command was introduced.

Usage Guidelines

You must disable the 802.11a/b network before you configure the optimized roaming reporting interval. If you configure a low value for the reporting interval, the network can get overloaded with coverage report messages.

Examples

The following example shows how to enable optimized roaming for the 802.11a network:

(Cisco Controller) > config advanced 802.11a optimized roaming enable

The following example shows how to configure the data rate interval for the 802.11a network:

(Cisco Controller) > config advanced 802.11a optimized roaming datarate 9

config advanced 802.11 packet

To configure the maximum packet retries, consecutive packet failure thresholds, and the default timeout value, use config advanced 802.11 packet command.

config advanced 802.11{ a | b} < QoS Profile Name > { max-client-count <threshold value (0-1000)> | max-packet-count <threshold value (0-1000)> | max-retry <maximum retry count> | timeout <time(in miliseconds)> }

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

QoS Profile Name

  • bronze

  • silver

  • gold

  • platinum

max-client-count

Configures the consecutive packet failure threshold before disassociating a client.

threshold value - Enter the client count threshold value in the range 0 to 1000

max-packet-count

Configures the consecutive packet failure threshold before not retrying failure packet.

threshold value - Enter the packet failure threshold value in the range 0 to 1000

max-retry

Configures the packet retry time for failure packet.

maximum retry count - Enter the maximum number of retries allowed.

timeout

Configures the packet aging or discard timeout threshold.

time - Enter the maximum time before the packet times out.

Command Default

The default values for parameters in config advanced 802.11 packet command are:

Keyword

Default Value

max-client-count

500

max-packet-count

100

max-retry

3

timeout

35 miliseconds

Command History

Release Modification

8.2

packet command was introduced in this release.

Examples


(Cisco Controller) > config advanced 802.11a packet platinum max-packet-count 200

config advanced 802.11 profile clients

To set the Cisco lightweight access point clients threshold between 1 and 75 clients, use the config advanced 802.11 profile clients command.

config advanced 802.11{ a | b} profile clients { global | cisco_ap} clients

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures all 802.11a Cisco lightweight access points.

cisco_ap

Cisco lightweight access point name.

clients

802.11a Cisco lightweight access point client threshold between 1 and 75 clients.

Command Default

The default Cisco lightweight access point clients threshold is 12 clients.

Examples

The following example shows how to set all Cisco lightweight access point clients thresholds to 25 clients:

(Cisco Controller) >config advanced 802.11 profile clients global 25
Global client count profile set.

The following example shows how to set the AP1 clients threshold to 75 clients:

(Cisco Controller) >config advanced 802.11 profile clients AP1 75
Global client count profile set.

config advanced 802.11 profile customize

To turn customizing on or off for an 802.11a Cisco lightweight access point performance profile, use the config advanced 802.11 profile customize command.

config advanced 802.11{ a | b} profile customize cisco_ap { on | off}

Syntax Description

a

Specifies the 802.11a/n network.

b

Specifies the 802.11b/g/n network.

cisco_ap

Cisco lightweight access point.

on

Customizes performance profiles for this Cisco lightweight access point.

off

Uses global default performance profiles for this Cisco lightweight access point.

Command Default

The default state of performance profile customization is Off.

Examples

The following example shows how to turn performance profile customization on for 802.11a Cisco lightweight access point AP1:

(Cisco Controller) >config advanced 802.11 profile customize AP1 on

config advanced 802.11 profile foreign

To set the foreign 802.11a transmitter interference threshold between 0 and 100 percent, use the config advanced 802.11 profile foreign command.

config advanced 802.11{ a | b} profile foreign { global | cisco_ap} percent

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures all 802.11a Cisco lightweight access points.

cisco_ap

Cisco lightweight access point name.

percent

802.11a foreign 802.11a interference threshold between 0 and 100 percent.

Command Default

The default foreign 802.11a transmitter interference threshold value is 10.

Examples

The following example shows how to set the foreign 802.11a transmitter interference threshold for all Cisco lightweight access points to 50 percent:

(Cisco Controller) >config advanced 802.11a profile foreign global 50

The following example shows how to set the foreign 802.11a transmitter interference threshold for AP1 to 0 percent:

(Cisco Controller) >config advanced 802.11 profile foreign AP1 0

config advanced 802.11 profile noise

To set the 802.11a foreign noise threshold between –127 and 0 dBm, use the config advanced 802.11 profile noise command.

config advanced 802.11{ a | b} profile noise { global | cisco_ap} dBm

Syntax Description

a

Specifies the 802.11a/n network.

b

Specifies the 802.11b/g/n network.

global

Configures all 802.11a Cisco lightweight access point specific profiles.

cisco_ap

Cisco lightweight access point name.

dBm

802.11a foreign noise threshold between –127 and 0 dBm.

Command Default

The default foreign noise threshold value is –70 dBm.

Examples

The following example shows how to set the 802.11a foreign noise threshold for all Cisco lightweight access points to –127 dBm:

(Cisco Controller) >config advanced 802.11a profile noise global -127

The following example shows how to set the 802.11a foreign noise threshold for AP1 to 0 dBm:

(Cisco Controller) >config advanced 802.11a profile noise AP1 0

config advanced 802.11 profile throughput

To set the Cisco lightweight access point data-rate throughput threshold between 1000 and 10000000 bytes per second, use the config advanced 802.11 profile throughput command.

config advanced 802.11{ a | b} profile throughput { global | cisco_ap} value

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures all 802.11a Cisco lightweight access point specific profiles.

cisco_ap

Cisco lightweight access point name.

value

802.11a Cisco lightweight access point throughput threshold between 1000 and 10000000 bytes per second.

Command Default

The default Cisco lightweight access point data-rate throughput threshold value is 1,000,000 bytes per second.

Examples

The following example shows how to set all Cisco lightweight access point data-rate thresholds to 1000 bytes per second:

(Cisco Controller) >config advanced 802.11 profile throughput global 1000

The following example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:

(Cisco Controller) >config advanced 802.11 profile throughput AP1 10000000

config advanced 802.11 profile utilization

To set the RF utilization threshold between 0 and 100 percent, use the config advanced 802.11 profile utilization command. The operating system generates a trap when this threshold is exceeded.

config advanced 802.11{ a | b} profile utilization { global | cisco_ap} percent

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures a global Cisco lightweight access point specific profile.

cisco_ap

Cisco lightweight access point name.

percent

802.11a RF utilization threshold between 0 and 100 percent.

Command Default

The default RF utilization threshold value is 80 percent.

Examples

The following example shows how to set the RF utilization threshold for all Cisco lightweight access points to 0 percent:

(Cisco Controller) >config advanced 802.11 profile utilization global 0

The following example shows how to set the RF utilization threshold for AP1 to 100 percent:

(Cisco Controller) >config advanced 802.11 profile utilization AP1 100

config advanced 802.11 receiver

To set the advanced receiver configuration settings, use the config advanced 802.11 receiver command.

config advanced 802.11{ a | b} receiver { default | rxstart jumpThreshold value}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

receiver

Specifies the receiver configuration.

default

Specifies the default advanced receiver configuration.

rxstart jumpThreshold

Specifies the receiver start signal.

Note 

We recommend that you do not use this option as it is for Cisco internal use only.

value

Jump threshold configuration value between 0 and 127.

Command Default

None

Usage Guidelines

  • Before you change the 802.11 receiver configuration, you must disable the 802.11 network.

  • We recommend that you do not use the rxstart jumpThreshold value option as it is for Cisco internal use only.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to prevent changes to receiver parameters while the network is enabled:


(Cisco Controller) > config advanced 802.11 receiver default

config advanced 802.11 reporting measurement

To set the reporting measurement interval between 60 and 3600 seconds,, use the config advanced 802.11 reporting measurement command.

config advanced 802.11{ a | b} reporting measurement seconds

Syntax Description

seconds

Reporting measurement interval that you need to enter. Valid range is between 60 and 3600 seconds.

Command Default

The default reporting measurement interval is 180 seconds.

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to set the signal measurement interval to 300 seconds:


(Cisco Controller) > config advanced 802.11 reporting measurement 300

config advanced 802.11 tpc-version

To configure the Transmit Power Control (TPC) version for a radio, use the config advanced 802.11 tpc-version command.

config advanced 802.11{ a | b} tpc-version { 1 | 2}

Syntax Description

1

Specifies the TPC version 1 that offers strong signal coverage and stability.

2

Specifies TPC version 2 is for scenarios where voice calls are extensively used. The Tx power is dynamically adjusted with the goal of minimum interference. It is suitable for dense networks. In this mode, there could be higher roaming delays and coverage hole incidents.

Command Default

The default TPC version for a radio is 1.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the TPC version as 1 for the 802.11a radio:


(Cisco Controller) > config advanced 802.11a tpc-version 1

config advanced 802.11 tpcv1-thresh

To configure the threshold for Transmit Power Control (TPC) version 1 of a radio, use the config advanced 802.11 tpcv1-thresh command.

config advanced 802.11{ a | b} tpcv1-thresh threshold

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g/n network.

threshold

Threshold value between –50 dBm to –80 dBm.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the threshold as –60 dBm for TPC version 1 of the 802.11a radio:


(Cisco Controller) > config advanced 802.11 tpcv1-thresh -60

config advanced 802.11 tpcv2-intense

To configure the computational intensity for Transmit Power Control (TPC) version 2 of a radio, use the config advanced 802.11 tpcv2-intense command.

config advanced 802.11{ a | b} tpcv2-intense intensity

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g/n network.

intensity

Computational intensity value between 1 to 100.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the computational intensity as 50 for TPC version 2 of the 802.11a radio:


(Cisco Controller) > config advanced 802.11 tpcv2-intense 50

config advanced 802.11 tpcv2-per-chan

To configure the Transmit Power Control Version 2 on a per-channel basis, use the config advanced 802.11 tpcv2-per-chan command.

config advanced 802.11{ a | b} tpcv2-per-chan { enable | disable}

Syntax Description

enable

Enables the configuration of TPC version 2 on a per-channel basis.

disable

Disables the configuration of TPC version 2 on a per-channel basis.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable TPC version 2 on a per-channel basis for the 802.11a radio:


(Cisco Controller) > config advanced 802.11 tpcv2-per-chan enable

config advanced 802.11 tpcv2-thresh

To configure the threshold for Transmit Power Control (TPC) version 2 of a radio, use the config advanced 802.11 tpcv2-thresh command.

config advanced 802.11{ a | b} tpcv2-thresh threshold

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

threshold

Threshold value between –50 dBm to –80 dBm.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the threshold as –60 dBm for TPC version 2 of the 802.11a radio:


(Cisco Controller) > config advanced 802.11a tpcv2-thresh -60

config advanced 802.11 txpower-update

To initiate updates of the 802.11a transmit power for every Cisco lightweight access point, use the config advanced 802.11 txpower-update command.

config advanced 802.11{ a | b} txpower-update

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to initiate updates of 802.11a transmit power for an 802.11a access point:


(Cisco Controller) > config advanced 802.11 txpower-update

config advanced eap

To configure advanced extensible authentication protocol (EAP) settings, use the config advanced eap command.

config advanced eap { bcast-key-interval seconds | eapol-key-timeout timeout | eapol-key-retries retries | identity-request-timeout timeout | identity-request-retries retries | key-index index | max-login-ignore-identity-response
{ enable | disable} request-timeout timeout | request-retries retries} }

Syntax Description

bcast-key-interval seconds

Specifies the EAP-broadcast key renew interval time in seconds.

The range is from 120 to 86400 seconds.

eapol-key-timeout timeout

Specifies the amount of time (200 to 5000 milliseconds) that the controller waits before retransmitting an EAPOL (WPA) key message to a wireless client using EAP or WPA/WPA-2 PSK.

The default value is 1000 milliseconds.

eapol-key-retries retries

Specifies the maximum number of times (0 to 4 retries) that the controller retransmits an EAPOL (WPA) key message to a wireless client.

The default value is 2.

identity-request-
timeout timeout

Specifies the amount of time (1 to 120 seconds) that the controller waits before retransmitting an EAP Identity Request message to a wireless client.

The default value is 30 seconds.

identity-request-
retries

Specifies the maximum number of times (0 to 4 retries) that the controller retransmits an EAPOL (WPA) key message to a wireless client.

The default value is 2.

key-index index

Specifies the key index (0 or 3) used for dynamic wired equivalent privacy (WEP).

max-login-ignore-
identity-response

When enabled, this command ignores the limit set for the number of devices that can be connected to the controller with the same username using 802.1xauthentication. When disabled, this command limits the number of devices that can be connected to the controller with the same username. This option is not applicable for Web auth user.

Use the command config netuser maxUserLogin to set the limit of maximum number of devices per same username

enable

Ignores the same username reaching the maximum EAP identity response.

disable

Checks the same username reaching the maximum EAP identity response.

request-timeout

For EAP messages other than Identity Requests or EAPOL (WPA) key messages, specifies the amount of time (1 to 120 seconds) that the controller waits before retransmitting the message to a wireless client.

The default value is 30 seconds.

request-retries

(Optional) For EAP messages other than Identity Requests or EAPOL (WPA) key messages, specifies the maximum number of times (0 to 20 retries) that the controller retransmits the message to a wireless client.

The default value is 2.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the key index used for dynamic wired equivalent privacy (WEP):


(Cisco Controller) > config advanced eap key-index 0

config advanced hyperlocation

To configure Cisco Hyperlocation globally on all APs that have the Cisco Hyperlocation module, use the config advanced hyperlocation command.

config advanced hyperlocation {enable | disable | ntp ipv4-addr | flag-unset ap-name | reset-threshold value | threshold value | trigger-threshold value}

Syntax Description

enable

Enables Cisco Hyperlocation globally on all Cisco APs that have the Cisco Hyperlocation module.

disable

Disables Cisco Hyperlocation globally on all Cisco APs that have the Cisco Hyperlocation module.

ntp ipv4-addr

Sets up the NTP server for Cisco Hyperlocation. Enter the IPv4 address of the NTP server that all APs that are involved in this calculation need to synchronize to.

flag-unset ap-name

Configures the AP specified to accept any other level of Cisco Hyperlocation configuration.

reset-threshold value

Configures PRL reset threshold value below which RSSI is ignored while sending to Cisco WLC.

reset-threshold value

Configures the threshold value below which RSSI is ignored while sending to Cisco WLC.

trigger-threshold value

Configures the number of scan cycles between PAK RSSI location trigger.

Command Default

Disabled

Usage Guidelines

  • Cisco Hyperlocation in enabled state has an impact on performance where both radios of APs that do not have Cisco Hyperlocation module go off-channel for about 100 milliseconds every 3 seconds.

  • We recommend that you use the same NTP server that is used by the general Cisco WLC infrastructure. The scans from multiple AP need to be synchronized for the location to be accurately calculated.

Command History

Release Modification

8.1

This command was introduced.

Examples

This example shows how to enable Cisco Hyperlocation on all APs:
(Cisco Controller) >config advanced hyperlocation enable

config advanced hyperlocation apgroup

To configure Cisco Hyperlocation for an AP group that contains APs with the Cisco Hyperlocation module, use the config advanced hyperlocation apgroup command.

config advanced hyperlocation apgroup group-name {enable | disable}

config advanced hyperlocation apgroup group-name ntp server-ipv4-address

Syntax Description

enable

Enables Cisco Hyperlocation for the AP group that contains APs with the Cisco Hyperlocation module

disable

Disables Cisco Hyperlocation for the AP group that contains APs with the Cisco Hyperlocation module

ntp

Configures NTP server for the AP group.

server-ipv4-address

IPv4 address of the NTP server for the AP group.

Command Default

Disabled

Usage Guidelines

Cisco Hyperlocation in enabled state has an impact on performance where both radios of APs that do not have Cisco Hyperlocation module go off-channel for about 100 milliseconds every 3 seconds.

Command History

Release Modification

8.1

This command was introduced.

Examples

This example shows how to enable Cisco Hyperlocation for an AP group:
(Cisco Controller) >config advanced hyperlocation apgroup myapgroup enable

config advanced hyperlocation ble-beacon

To configure BLE beacon parameters, use the config advanced hyperlocation ble-beacon command.

config advanced hyperlocation ble-beacon {advertised-power rssi-value | interval value | ap-name ap-name | {advertised-power rssi-value | interval value | unset}}

Syntax Description

advertised-power rssi-value

Configures BLE advertised transmit power for all APs. Valid range is between –40 dBm to –100 dBm

interval value

Configures BLE beacon interval for all APs. Valid range is between 1 to 10 seconds.

ap-name ap-name

Configures BLE beacon parameters for the specified AP.

unset

Clears AP-specific BLE configuration and sets global BLE configuration when applied.

Command History

Release Modification

8.1

This command was introduced.

Examples

This example shows how to set the BLE beacon interval for all APs to 8 seconds:
(Cisco Controller) >config advanced hyperlocation ble-beacon interval 8

config advanced hyperlocation ble-beacon beacon-id

To configure BLE beacon parameters for a specific beacon, use the config advanced hyperlocation ble-beacon beacon-id command.

config advanced hyperlocation ble-beacon beacon-id id { {delete | enable | disable } | add {txpwr value | uuid value} | add ap-group group-name {enable | disable | major mjr-value | minor mnr-value | txpwr value | uuid value} | add ap-name ap-name {enable | disable | major mjr-value | minor mnr-value | txpwr value | uuid value}}

Syntax Description

beacon-id id

Configures BLE parameters for the beacon ID that you enter. Valid range is between 1 to 5.

delete

Deletes the BLE beacon.

enable

Enables the BLE beacon.

disable

Disables the BLE beacon.

add

Adds a BLE beacon.

txpwr value

Configures the BLE attenuation level. You can choose to configure this for all APs, an AP group, or a specific AP. Valid range is between –52 dBm to 0.

uuid value

Configures universally unique identifier (UUID) for the beacon. You can choose to configure this for all APs, an AP group, or a specific AP. Enter a value in the xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx format.

ap-group group-name

Configures BLE beacon parameters for the AP group specified.

ap-name ap-name

Configures BLE beacon parameters for the AP specified.

major mjr-value

Configures major value for the BLE beacon. You can choose to configure this for an AP group or a specific AP.

minor mnr-value

Configures minor value for the BLE beacon. You can choose to configure this for an AP group or a specific AP.

Command History

Release Modification

8.1

This command was introduced.

Examples

This example shows how to enable the BLE beacon with ID value as 3:
(Cisco Controller) >config advanced hyperlocation ble-beacon beacon-id 3 enable

config advanced hotspot

To configure advanced hotspot configurations, use the config advanced hotspot command.

config advanced hotspot { anqp-4way { disable | enable | threshold value } | cmbk-delay value | garp { disable | enable } | gas-limit { disable | enable } }

Syntax Description

anqp-4way

Enables, disables, or, configures the Access Network Query Protocol (ANQP) four way fragment threshold.

disable

Disables the ANQP four way message.

enable

Enables the ANQP four way message.

threshold

Configures the ANQP fourway fragment threshold.

value

ANQP four way fragment threshold value in bytes. The range is from 10 to 1500. The default value is 1500.

cmbk-delay

Configures the ANQP comeback delay in Time Units (TUs).

value

ANQP comeback delay in Time Units (TUs). 1 TU is defined by 802.11 as 1024 usec. The range is from 1 milliseconds to 30 seconds.

garp

Disables or enables the Gratuitous ARP (GARP) forwarding to wireless network.

disable

Disables the Gratuitous ARP (GARP) forwarding to wireless network.

enable

Enables the Gratuitous ARP (GARP) forwarding to wireless network.

gas-limit

Limits the number of Generic Advertisement Service (GAS) request action frames sent to the switch by an access point in a given interval.

disable

Disables the GAS request action frame limit on access points.

enable

Enables the GAS request action frame limit on access points.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the ANQP four way fragment threshold value:

(Cisco Controller) >config advanced hotspot anqp-4way threshold 200

config advanced timers auth-timeout

To configure the authentication timeout, use the config advanced timers auth-timeout command.

config advanced timers auth-timeout seconds

Syntax Description

seconds

Authentication response timeout value in seconds between 10 and 600.

Command Default

The default authentication timeout value is 10 seconds.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the authentication timeout to 20 seconds:

(Cisco Controller) >config advanced timers auth-timeout 20

config advanced timers eap-timeout

To configure the Extensible Authentication Protocol (EAP) expiration timeout, use the config advanced timers eap-timeout command.

config advanced timers eap-timeout seconds

Syntax Description

seconds

EAP timeout value in seconds between 8 and 120.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the EAP expiration timeout to 10 seconds:

(Cisco Controller) >config advanced timers eap-timeout 10

config advanced timers eap-identity-request-delay

To configure the advanced Extensible Authentication Protocol (EAP) identity request delay in seconds, use the config advanced timers eap-identity-request-delay command.

config advanced timers eap-identity-request-delay seconds

Syntax Description

seconds

Advanced EAP identity request delay in number of seconds between 0 and 10.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the advanced EAP identity request delay to 8 seconds:

(Cisco Controller) >config advanced timers eap-identity-request-delay 8

config advanced timers

To configure an advanced system timer, use the config advanced timers command.

config advanced timers { ap-coverage-report seconds | ap-discovery-timeout discovery-timeout | ap-fast-heartbeat { local | flexconnect | all} { enable | disable} fast_heartbeat_seconds | ap-heartbeat-timeout heartbeat_seconds | ap-primary-discovery-timeout primary_discovery_timeout | ap-primed-join-timeout primed_join_timeout | auth-timeout auth_timeout | pkt-fwd-watchdog { enable | disable} { watchdog_timer | default} | eap-identity-request-delay eap_identity_request_delay | eap-timeout eap_timeout}

Syntax Description

ap-coverage-report

Configures RRM coverage report interval for all APs.

seconds

Configures the ap coverage report interval in seconds. The range is between 60 and 90 seconds. Default is 90 seconds.

ap-discovery-timeout

Configures the Cisco lightweight access point discovery timeout value.

discovery-timeout

Cisco lightweight access point discovery timeout value, in seconds. The range is from 1 to 10.

ap-fast-heartbeat

Configures the fast heartbeat timer, which reduces the amount of time it takes to detect a controller failure in access points.

local

Configures the fast heartbeat interval for access points in local mode.

flexconnect

Configures the fast heartbeat interval for access points in FlexConnect mode.

all

Configures the fast heartbeat interval for all the access points.

enable

Enables the fast heartbeat interval.

disable

Disables the fast heartbeat interval.

fast_heartbeat_seconds

Small heartbeat interval, which reduces the amount of time it takes to detect a controller failure, in seconds. The range is from 1 to 10.

ap-heartbeat-timeout

Configures Cisco lightweight access point heartbeat timeout value.

heartbeat_seconds

Cisco the Cisco lightweight access point heartbeat timeout value, in seconds. The range is from 1 to 30. This value should be at least three times larger than the fast heartbeat timer.

ap-primary-discovery-timeout

Configures the access point primary discovery request timer.

primary_discovery_timeout

Access point primary discovery request time, in seconds. The range is from 30 to 3600.

ap-primed-join-timeout

Configures the access point primed discovery timeout value.

primed_join_timeout

Access point primed discovery timeout value, in seconds. The range is from 120 to 43200.

auth-timeout

Configures the authentication timeout.

auth_timeout

Authentication response timeout value, in seconds. The range is from 10 to 600.

pkt-fwd-watchdog

Configures the packet forwarding watchdog timer to protect from fastpath deadlock.

watchdog_timer

Packet forwarding watchdog timer, in seconds. The range is from 60 to 300.

default

Configures the watchdog timer to the default value of 240 seconds.

eap-identity-request-delay

Configures the advanced Extensible Authentication Protocol (EAP) identity request delay, in seconds.

eap_identity_request_delay

Advanced EAP identity request delay, in seconds. The range is from 0 to 10.

eap-timeout

Configures the EAP expiration timeout.

eap_timeout

EAP timeout value, in seconds. The range is from 8 to 120.

Command Default

  • The default access point discovery timeout is 10 seconds.

  • The default access point heartbeat timeout is 30 seconds.

  • The default access point primary discovery request timer is 120 seconds.

  • The default authentication timeout is 10 seconds.

  • The default packet forwarding watchdog timer is 240 seconds.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.3

This command was enhanced.

Usage Guidelines

The Cisco lightweight access point discovery timeout indicates how often a Cisco WLC attempts to discover unconnected Cisco lightweight access points.

The Cisco lightweight access point heartbeat timeout controls how often the Cisco lightweight access point sends a heartbeat keepalive signal to the Cisco Wireless LAN Controller.

Examples

The following example shows how to configure an access point discovery timeout with a timeout value of 20:

(Cisco Controller) >config advanced timers ap-discovery-timeout 20

The following example shows how to enable the fast heartbeat interval for an access point in FlexConnect mode:

(Cisco Controller) >config advanced timers ap-fast-heartbeat flexconnect enable 8

The following example shows how to configure the authentication timeout to 20 seconds:

(Cisco Controller) >config advanced timers auth-timeout 20

config advanced fastpath fastcache

To configure the fastpath fast cache control, use the config advanced fastpath fastcache command.

config advanced fastpath fastcache { enable | disable}

Syntax Description

enable

Enables the fastpath fast cache control.

disable

Disables the fastpath fast cache control.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the fastpath fast cache control:


(Cisco Controller) > config advanced fastpath fastcache enable

config advanced fastpath pkt-capture

To configure the fastpath packet capture, use the config advanced fastpath pkt-capture command.

config advanced fastpath pkt-capture { enable | disable}

Syntax Description

enable

Enables the fastpath packet capture.

disable

Disables the fastpath packet capture.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the fastpath packet capture:


(Cisco Controller) > config advanced fastpath pkt-capture enable

config advanced sip-preferred-call-no

To configure voice prioritization, use the config advanced sip-preferred-call-no command.

config advanced sip-preferred-call-no call_index { call_number | none}

Syntax Description

call_index

Call index with valid values between 1 and 6.

call_number

Preferred call number that can contain up to 27 characters.

none

Deletes the preferred call set for the specified index.

Command Default

None

Usage Guidelines

Before you configure voice prioritization, you must complete the following prerequisites:

  • Set the voice to the platinum QoS level by entering the config wlan qos wlan-id platinum command.

  • Enable the admission control (ACM) to this radio by entering the config 802.11 {a | b} cac {voice | video} acm enable command.

  • Enable the call-snooping feature for a particular WLAN by entering the config wlan call-snoop enable wlan-id command.

    To view statistics about preferred calls, enter the show ap stats {802.11{a | b} | wlan} cisco_ap command.

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to add a new preferred call for index 2:


(Cisco Controller) > config advanced sip-preferred-call-no 2 0123456789

config advanced sip-snooping-ports

To configure call snooping ports, use the config advanced sip-snooping-ports command.

config advanced sip-snooping-ports start_port end_port

Syntax Description

start_port

Starting port for call snooping. The range is from 0 to 65535.

end_port

Ending port for call snooping. The range is from 0 to 65535.

Usage Guidelines

If you need only a single port for call snooping, configure the start and end port with the same number.

The port used by the CIUS tablet is 5060 and the port range used by Facetime is from 16384 to16402.

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the call snooping ports:


(Cisco Controller) > config advanced sip-snooping-ports 4000 4500

config advanced backup-controller primary

To configure a primary backup controller, use the config advanced backup-controller primary command.

config advanced backup-controller primary system name IP addr

Syntax Description

system name

Configures primary|secondary backup controller.

IP addr

IP address of the backup controller.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.0 This command supports both IPv4 and IPv6 address formats.

Usage Guidelines

To delete a primary backup controller entry (IPv6 or IPv4), enter 0.0.0.0 for the controller IP address.

Examples

The following example shows how to configure the IPv4 primary backup controller:

(Cisco Controller) >config advanced backup-controller primary Controller_1 10.10.10.10

The following example shows how to configure the IPv6 primary backup controller:

(Cisco Controller) >config advanced backup-controller primary systemname 2001:9:6:40::623

The following example shows how to remove the IPv4 primary backup controller:

(Cisco Controller) >config advanced backup-controller primary Controller_1 10.10.10.10

The following example shows how to remove the IPv6 primary backup controller:

(Cisco Controller) >config advanced backup-controller primary Controller_1 0.0.0.0

config advanced backup-controller secondary

To configure a secondary backup controller, use the config advanced backup-controller secondary command.

config advanced backup-controller secondary system name IP addr

Syntax Description

system name

Configures primary|secondary backup controller.

IP addr

IP address of the backup controller.

Command Default

None

Usage Guidelines

To delete a secondary backup controller entry (IPv4 or IPv6), enter 0.0.0.0 for the controller IP address.

Examples

The following example shows how to configure an IPv4 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 10.10.10.10

The following example shows how to configure an IPv6 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 2001:9:6:40::623

The following example shows how to remove an IPv4 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 0.0.0.0

The following example shows how to remove an IPv6 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 0.0.0.0

config advanced client-handoff

To set the client handoff to occur after a selected number of 802.11 data packet excessive retries, use the config advanced client-handoff command.

config advanced client-handoff num_of_retries

Syntax Description

num_of_retries

Number of excessive retries before client handoff (from 0 to 255).

Command Default

The default value for the number of 802.11 data packet excessive retries is 0.

Examples

This example shows how to set the client handoff to 100 excessive retries:

(Cisco Controller) >config advanced client-handoff 100

config advanced dot11-padding

To enable or disable over-the-air frame padding, use the config advanced dot11-padding command.

config advanced dot11-padding { enable | disable}

Syntax Description

enable

Enables the over-the-air frame padding.

disable

Disables the over-the-air frame padding.

Command Default

The default over-the-air frame padding is disabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable over-the-air frame padding:


(Cisco Controller) > config advanced dot11-padding enable

config advanced assoc-limit

To configure the rate at which access point radios send association and authentication requests to the controller, use the config advanced assoc-limit command.

config advanced assoc-limit { enable [ number of associations per interval | interval ] | disable}

Syntax Description

enable

Enables the configuration of the association requests per access point.

disable

Disables the configuration of the association requests per access point.

number of associations per interval

(Optional) Number of association request per access point slot in a given interval. The range is from 1 to 100.

interval

(Optional) Association request limit interval. The range is from 100 to 10000 milliseconds.

Command Default

The default state of the command is disabled state.

Usage Guidelines

When 200 or more wireless clients try to associate to a controller at the same time, the clients no longer become stuck in the DHCP_REQD state when you use the config advanced assoc-limit command to limit association requests from access points.

Examples

The following example shows how to configure the number of association requests per access point slot in a given interval of 20 with the association request limit interval of 250:

(Cisco Controller) >config advanced assoc-limit enable 20 250

config advanced max-1x-sessions

To configure the maximum number of simultaneous 802.1X sessions allowed per access point, use the config advanced max-1x-sessions command.

config advanced max-1x-sessions no_of_sessions

Syntax Description

no_of_sessions

Number of maximum 802.1x session initiation per AP at a time. The range is from 0 to 255, where 0 indicates unlimited.

Command Default

None

Examples

The following example shows how to configure the maximum number of simultaneous 802.1X sessions:

(Cisco Controller) >config advanced max-1x-sessions 200

config advanced rate

To configure switch control path rate limiting, use the config advanced rate command.

config advanced rate { enable | disable}

Syntax Description

enable

Enables the switch control path rate limiting feature.

disable

Disables the switch control path rate limiting feature.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable switch control path rate limiting:

(Cisco Controller) >config advanced rate enable

config advanced probe backoff

To configure the backoff parameters for probe queue in a Cisco AP, use the config advanced probe backoff command.

config advanced probe backoff { enable | disable}

Syntax Description

enable

To use default backoff parameter value for probe response.

disable

To use increased backoff parameters for probe response.

Command Default

Disabled

Examples

The following example shows how to use increased backoff parameters for probe response:

(Cisco Controller) >config advanced probe backoff enable

config advanced probe filter

To configure the filtering of probe requests forwarded from an access point to the controller, use the config advanced probe filter command.

config advanced probe filter { enable | disable}

Syntax Description

enable

Enables the filtering of probe requests.

disable

Disables the filtering of probe requests.

Command Default

None

Examples

The following example shows how to enable the filtering of probe requests forwarded from an access point to the controller:

(Cisco Controller) >config advanced probe filter enable

config advanced probe limit

To limit the number of probes sent to the WLAN controller per access point per client in a given interval, use the config advanced probe limit command.

config advanced probe limit num_probes interval

Syntax Description

num_probes

Number of probe requests (from 1 to 100) forwarded to the controller per client per access point radio in a given interval.

interval

Probe limit interval (from 100 to 10000 milliseconds).

Command Default

The default number of probe requests is 2.
The default interval is 500 milliseconds.

Examples

This example shows how to set the number of probes per access point per client to 5 and the probe interval to 800 milliseconds:

(Cisco Controller) >config advanced probe limit 5 800

config advanced timers

To configure an advanced system timer, use the config advanced timers command.

config advanced timers { ap-coverage-report seconds | ap-discovery-timeout discovery-timeout | ap-fast-heartbeat { local | flexconnect | all} { enable | disable} fast_heartbeat_seconds | ap-heartbeat-timeout heartbeat_seconds | ap-primary-discovery-timeout primary_discovery_timeout | ap-primed-join-timeout primed_join_timeout | auth-timeout auth_timeout | pkt-fwd-watchdog { enable | disable} { watchdog_timer | default} | eap-identity-request-delay eap_identity_request_delay | eap-timeout eap_timeout}

Syntax Description

ap-coverage-report

Configures RRM coverage report interval for all APs.

seconds

Configures the ap coverage report interval in seconds. The range is between 60 and 90 seconds. Default is 90 seconds.

ap-discovery-timeout

Configures the Cisco lightweight access point discovery timeout value.

discovery-timeout

Cisco lightweight access point discovery timeout value, in seconds. The range is from 1 to 10.

ap-fast-heartbeat

Configures the fast heartbeat timer, which reduces the amount of time it takes to detect a controller failure in access points.

local

Configures the fast heartbeat interval for access points in local mode.

flexconnect

Configures the fast heartbeat interval for access points in FlexConnect mode.

all

Configures the fast heartbeat interval for all the access points.

enable

Enables the fast heartbeat interval.

disable

Disables the fast heartbeat interval.

fast_heartbeat_seconds

Small heartbeat interval, which reduces the amount of time it takes to detect a controller failure, in seconds. The range is from 1 to 10.

ap-heartbeat-timeout

Configures Cisco lightweight access point heartbeat timeout value.

heartbeat_seconds

Cisco the Cisco lightweight access point heartbeat timeout value, in seconds. The range is from 1 to 30. This value should be at least three times larger than the fast heartbeat timer.

ap-primary-discovery-timeout

Configures the access point primary discovery request timer.

primary_discovery_timeout

Access point primary discovery request time, in seconds. The range is from 30 to 3600.

ap-primed-join-timeout

Configures the access point primed discovery timeout value.

primed_join_timeout

Access point primed discovery timeout value, in seconds. The range is from 120 to 43200.

auth-timeout

Configures the authentication timeout.

auth_timeout

Authentication response timeout value, in seconds. The range is from 10 to 600.

pkt-fwd-watchdog

Configures the packet forwarding watchdog timer to protect from fastpath deadlock.

watchdog_timer

Packet forwarding watchdog timer, in seconds. The range is from 60 to 300.

default

Configures the watchdog timer to the default value of 240 seconds.

eap-identity-request-delay

Configures the advanced Extensible Authentication Protocol (EAP) identity request delay, in seconds.

eap_identity_request_delay

Advanced EAP identity request delay, in seconds. The range is from 0 to 10.

eap-timeout

Configures the EAP expiration timeout.

eap_timeout

EAP timeout value, in seconds. The range is from 8 to 120.

Command Default

  • The default access point discovery timeout is 10 seconds.

  • The default access point heartbeat timeout is 30 seconds.

  • The default access point primary discovery request timer is 120 seconds.

  • The default authentication timeout is 10 seconds.

  • The default packet forwarding watchdog timer is 240 seconds.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.3

This command was enhanced.

Usage Guidelines

The Cisco lightweight access point discovery timeout indicates how often a Cisco WLC attempts to discover unconnected Cisco lightweight access points.

The Cisco lightweight access point heartbeat timeout controls how often the Cisco lightweight access point sends a heartbeat keepalive signal to the Cisco Wireless LAN Controller.

Examples

The following example shows how to configure an access point discovery timeout with a timeout value of 20:

(Cisco Controller) >config advanced timers ap-discovery-timeout 20

The following example shows how to enable the fast heartbeat interval for an access point in FlexConnect mode:

(Cisco Controller) >config advanced timers ap-fast-heartbeat flexconnect enable 8

The following example shows how to configure the authentication timeout to 20 seconds:

(Cisco Controller) >config advanced timers auth-timeout 20

config ap 802.1Xuser

To configure the global authentication username and password for all access points currently associated with the controller as well as any access points that associate with the controller in the future, use the config ap 802.1Xuser command.

config ap 802.1Xuser add username ap-username password ap-password { all | cisco_ap}

Syntax Description

add username

Specifies to add a username.

ap-username

Username on the Cisco AP.

password

Specifies to add a password.

ap-password

Password.

cisco_ap

Specific access point.

all

Specifies all access points.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You must enter a strong password . Strong passwords have the following characteristics:

  • They are at least eight characters long.

  • They contain a combination of uppercase and lowercase letters, numbers, and symbols.

  • They are not a word in any language.

    You can set the values for a specific access point.

Examples

This example shows how to configure the global authentication username and password for all access points:

(Cisco Controller) >config ap 802.1Xuser add username cisco123 password cisco2020 all

config ap 802.1Xuser delete

To force a specific access point to use the controller’s global authentication settings, use the config ap 802.1Xuser delete command.

config ap 802.1Xuser delete cisco_ap

Syntax Description

cisco_ap

Access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to delete access point AP01 to use the controller’s global authentication settings:

(Cisco Controller) >config ap 802.1Xuser delete AP01

config ap 802.1Xuser disable

To disable authentication for all access points or for a specific access point, use the config ap 802.1Xuser disable command.

config ap 802.1Xuser disable { all | cisco_ap}

Syntax Description

disable

Disables authentication.

all

Specifies all access points.

cisco_ap

Access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You can disable 802.1X authentication for a specific access point only if global 802.1X authentication is not enabled. If global 802.1X authentication is enabled, you can disable 802.1X for all access points only.

Examples

The following example shows how to disable the authentication for access point cisco_ap1:

(Cisco Controller) >config ap 802.1Xuser disable 

config advanced dot11-padding

To enable or disable over-the-air frame padding, use the config advanced dot11-padding command.

config advanced dot11-padding { enable | disable}

Syntax Description

enable

Enables the over-the-air frame padding.

disable

Disables the over-the-air frame padding.

Command Default

The default over-the-air frame padding is disabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable over-the-air frame padding:


(Cisco Controller) > config advanced dot11-padding enable

config ap

To configure a Cisco lightweight access point or to add or delete a third-party (foreign) access point, use the config ap command.

config ap {{ enable | disable} cisco_ap | { add | delete} MAC port { enable | disable} IP_address}

Syntax Description

enable

Enables the Cisco lightweight access point.

disable

Disables the Cisco lightweight access point.

cisco_ap

Name of the Cisco lightweight access point.

add

Adds foreign access points.

delete

Deletes foreign access points.

MAC

MAC address of a foreign access point.

port

Port number through which the foreign access point can be reached.

IP_address

IP address of the foreign access point.

Command Default

None

Examples

The following example shows how to disable lightweight access point AP1:

(Cisco Controller) >config ap disable AP1

The following example shows how to add a foreign access point with MAC address 12:12:12:12:12:12 and IP address 192.12.12.1 from port 2033:

(Cisco Controller) >config ap add 12:12:12:12:12:12 2033 enable 192.12.12.1

config ap aid-audit

To configure the Cisco lightweight access point AID audit mechanism, use the config ap aid-audit command.

config ap aid-audit { enable | disable}

Syntax Description

aid-audit

Configures AID audit mechanism.

enable

Enables AID audit mechanism.

disable

Disables AID audit mechanism.

Command Default

Disabled.

Command History

Release Modification
8.6 This command was introduced.

Examples

The following example shows how to enable AP aid-audit:

(Cisco Controller) >config ap aid-audit enable

config ap antenna band-mode

To configure a Cisco AP antenna's band mode as either single or dual, use the config ap antenna band-mode command.

config ap antenna band-mode { single | dual} cisco-ap

Syntax Description

single

Configures single band antenna mode for a Cisco AP.

dual

Configures dual band antenna mode for a Cisco AP.

cisco-ap

Cisco AP name.

Command Default

None

Command History

Release Modification
7.6 This command was introduced.

8.3 and later releases

The antenna-band-mode parameter was modified to antenna band-mode .

config ap atf 802.11

Configure Cisco Airtime Fairness at an AP level by using the config ap atf 802.11 command.

config ap atf 802.11{ a | b} { mode { disable | monitor | enforce-policy} ap-name} | { optimization { enable | disable}}

Syntax Description

a

Specifies the 802.11a network settings

b

Specifies the 802.11b/g network settings

mode

Configures the granularity of Cisco ATF enforcement

disable

Disables Cisco ATF

monitor

Configures Cisco ATF in monitor mode

enforce-policy

Configures Cisco ATF in enforcement mode

ap-name

AP name that you must specify

optimization

Configures airtime optimization

enable

Enables airtime optimization

disable

Disables airtime optimization

Command History

Release Modification

8.1

This command was introduced

Examples

To enable airtime optimization on an 802.11a network for a Cisco AP, my-ap , enter the following command:

(Cisco Controller) >config ap atf 802.11a optimization enable my-ap

config ap atf 802.11 policy

To configure AP-level override for Cisco ATF policy on a WLAN, enter this command:

confit ap atf 802.11{ a | b} policy wlan-id policy-name ap-name override { enable | disable}

Syntax Description

a

Specifies the 802.11a network settings

b

Specifies the 802.11b network settings

policy

Specifies the Cisco ATF policy

wlan-id

WLAN ID or Remote LAN ID that you must specify

policy-name

Cisco ATF policy name that you must specify

ap-name

Name of the AP that you must specify

override

Configures ATF policy override for a WLAN in the AP group

enable

Enables ATF policy override for a WLAN in the AP group

disable

Disables ATF policy override for a WLAN in the AP group

Command History

Release Modification

8.1

This command was introduced

config ap autoconvert

To automatically convert all access points to FlexConnect mode or Monitor mode upon associating with the Cisco WLC, use the config ap autoconvert command.

config ap autoconvert { flexconnect | monitor | disable}

Syntax Description

flexconnect

Configures all the access points automatically to FlexConnect mode.

monitor

Configures all the access points automatically to monitor mode.

disable

Disables the autoconvert option on the access points.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

When access points in local mode connect to a Cisco 7500 Series Wireless Controller, they do not serve clients. The access point details are available in the controller. To enable access points to serve clients or perform monitoring related tasks when connected to the Cisco 7500 Series Wireless Controller, the access points must be in FlexConnect mode or Monitor mode.

The command can also be used for conversion of AP modes in Cisco 5520, 8540, and 8510 Series Wireless Controller platforms.

Examples

The following example shows how to automatically convert all access points to the FlexConnect mode:

(Cisco Controller) >config ap autoconvert flexconnect

The following example shows how to disable the autoconvert option on the APs:

(Cisco Controller) >config ap autoconvert disable

config ap bhrate

To configure the Cisco bridge backhaul Tx rate, use the config ap bhrate command.

config ap bhrate { rate | auto} cisco_ap

Syntax Description

rate

Cisco bridge backhaul Tx rate in kbps. The valid values are 6000, 12000, 18000, 24000, 36000, 48000, and 54000.

auto

Configures the auto data rate.

cisco_ap

Name of a Cisco lightweight access point.

Command Default

The default status of the command is set to Auto.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

In previous software releases, the default value for the bridge data rate was 24000 (24 Mbps). In controller software release 6.0, the default value for the bridge data rate is auto . If you configured the default bridge data rate value (24000) in a previous controller software release, the bridge data rate is configured with the new default value (auto) when you upgrade to controller software release 6.0. However, if you configured a non default value (for example, 18000) in a previous controller software release, that configuration setting is preserved when you upgrade to Cisco WLC Release 6.0.

When the bridge data rate is set to auto , the mesh backhaul chooses the highest rate where the next higher rate cannot be used due to unsuitable conditions for that specific rate (and not because of conditions that affect all rates).

Examples

The following example shows how to configure the Cisco bridge backhaul Tx rate to 54000 kbps:

(Cisco Controller) >config ap bhrate 54000 AP01

config ap bridgegroupname

To set or delete a bridge group name on a Cisco lightweight access point, use the config ap bridgegroupname command.

config ap bridgegroupname { set groupname | delete | { strict-matching { enable | disable}}} cisco_ap

Syntax Description

set

Sets a Cisco lightweight access point’s bridge group name.

groupname

Bridge group name.

delete

Deletes a Cisco lightweight access point’s bridge group name.

cisco_ap

Name of a Cisco lightweight access point.

strict-matching

Restricts the possible parent list, if the MAP has a non-default BGN, and the potential parent has a different BGN

enable

Enables a Cisco lightweight access point's group name.

disable

Disables a Cisco lightweight access point's group name.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.0

The strict-matching parameter was added.

Usage Guidelines

Only access points with the same bridge group name can connect to each other. Changing the AP bridgegroupname may strand the bridge AP.

Examples

The following example shows how to delete a bridge group name on Cisco access point’s bridge group name AP02:

(Cisco Controller) >config ap bridgegroupname delete AP02
Changing the AP's bridgegroupname may strand the bridge AP. Please continue with caution.
Changing the AP's bridgegroupname will also cause the AP to reboot.
Are you sure you want to continue? (y/n)

config ap bridging

To configure Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the config ap bridging command.

config ap bridging { enable | disable} cisco_ap

Syntax Description

enable

Enables the Ethernet-to-Ethernet bridging on a Cisco lightweight access point.

disable

Disables Ethernet-to-Ethernet bridging.

cisco_ap

Name of a Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable bridging on an access point:

(Cisco Controller) >config ap bridging enable nyc04-44-1240

The following example shows hot to disable bridging on an access point:

(Cisco Controller) >config ap bridging disable nyc04-44-1240

config ap cdp

To configure the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the config ap cdp command.

config ap cdp { enable | disable | interface { ethernet interface_number | slot slot_id}} { cisco_ap | all}

Syntax Description

enable

Enables CDP on an access point.

disable

Disables CDP on an access point.

interface

Configures CDP in a specific interface.

ethernet

Configures CDP for an ethernet interface.

interface_number

Ethernet interface number between 0 and 3.

slot

Configures CDP for a radio interface.

slot_id

Slot number between 0 and 3.

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

Enabled on radio interfaces of mesh APs and disabled on radio interfaces of non-mesh APs. Enabled on Ethernet interfaces of all APs.

Usage Guidelines

The config ap cdp disable all command disables CDP on all access points that are joined to the controller and all access points that join in the future. CDP remains disabled on both current and future access points even after the controller or access point reboots. To enable CDP, enter the config ap cdp enable all command.


Note

CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all access points joined to the controller, you may disable and then reenable CDP on individual access points using the config ap cdp {enable | disable} cisco_ap command . After you disable CDP on all access points joined to the controller, you may not enable and then disable CDP on individual access points.


Examples

The following example shows how to enable CDP on all access points:

(Cisco Controller) >config ap cdp enable all

The following example shows how to disable CDP on ap02 access point:

(Cisco Controller) >config ap cdp disable ap02

The following example shows how to enable CDP for Ethernet interface number 2 on all access points:

(Cisco Controller) >config ap cdp ethernet 2 enable all

config ap core-dump

To configure a Cisco lightweight access point’s memory core dump, use the config ap core-dump command.

config ap core-dump { disable | enable tftp_server_ipaddress filename { compress | uncompress} { cisco_ap | all}

Syntax Description

enable

Enables the Cisco lightweight access point’s memory core dump setting.

disable

Disables the Cisco lightweight access point’s memory core dump setting.

tftp_server_ipaddress

IP address of the TFTP server to which the access point sends core dump files.

filename

Name that the access point uses to label the core file.

compress

Compresses the core dump file.

uncompress

Uncompresses the core dump file.

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points.


Note

If an AP itself is configured with the name ‘all’, then the ‘all access points’ case takes precedence over the AP that is named ‘all’.


Command Default

None

Usage Guidelines

The access point must be able to reach the TFTP server. This command is applicable for both IPv4 and IPv6 addresses.

Examples

The following example shows how to configure and compress the core dump file:

(Cisco Controller) >config ap core-dump enable 209.165.200.225 log compress AP02

config ap crash-file clear-all

To delete all crash and radio core dump files, use the config ap crash-file clear-all command.

config ap crash-file clear-all

Syntax Description

This command has no arguments or keywords.

Command Default

None

Examples

The following example shows how to delete all crash files:

(Cisco Controller) >config ap crash-file clear-all

config ap crash-file delete

To delete a single crash or radio core dump file, use the config ap crash-file delete command.

config ap crash-file delete filename

Syntax Description

filename

Name of the file to delete.

Command Default

None

Examples

The following example shows how to delete crash file 1:

(Cisco Controller) >config ap crash-file delete crash_file_1

config ap crash-file get-crash-file

To collect the latest crash data for a Cisco lightweight access point, use the config ap crash-file get-crash-file command.

config ap crash-file get-crash-file cisco_ap

Syntax Description

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Usage Guidelines

Use the transfer upload datatype command to transfer the collected data to the Cisco wireless LAN controller.

Examples

The following example shows how to collect the latest crash data for access point AP3:

(Cisco Controller) >config ap crash-file get-crash-file AP3

config ap crash-file get-radio-core-dump

To get a Cisco lightweight access point’s radio core dump, use the config ap crash-file get-radio-core-dump command.

config ap crash-file get-radio-core-dump slot_id cisco_ap

Syntax Description

slot_id

Slot ID (either 0 or 1).

cisco_ap

Name of a Cisco lightweight access point.

Command Default

None

Examples

The following example shows how to collect the radio core dump for access point AP02 and slot 0:

(Cisco Controller) >config ap crash-file get-radio-core-dump 0 AP02

config ap dhcp release-override

To configure DHCP release override on Cisco APs, use the config ap dhcp release-override command.

config ap dhcp release-override { enable | disable} { cisco-ap-name | all}

Syntax Description

enable

Enables DHCP release override and sets number of DHCP releases sent by AP to 1. To be used as a workaround for a few DHCP servers that mark the AP's IP address as bad. We recommend that you use this configuration only in highly reliable networks.

disable

Disables DHCP release override and sets number of DHCP releases sent by AP to 3, which is the default value. This ensures that the DHCP server receives the release message even if one of the packets is lost.

cisco-ap-name

Configuration is applied to the Cisco AP that you enter

all

Configuration is applied to all Cisco APs

Command Default

Disabled

Command History

Release Modification

8.2

This command was introduced.

Usage Guidelines

Use this command when you are using Cisco lightweight APs with Windows Server 2008 R2 or 2012 as the DHCP server.

config ap dtls-cipher-suite

To enable new cipher suites for DTLS connection between AP and controller, use the config ap dtls-cipher-suite command.

config ap dtls-cipher-suite { RSA-AES256-SHA256 | RSA-AES256-SHA | RSA-AES128-SHA }

Syntax Description

RSA-AES256-SHA256

Cipher suite using either RSA key exchange or authentication, using 256 bit AES and SHA 256.

RSA-AES256-SHA

Cipher suite using either RSA key exchange or authentication, using 256 bit AES and SHA.

RSA-AES128-SHA

Cipher suite using either RSA key exchange or authentication, using 128 bit AES and SHA.

Command Default

None

Command History

Release Modification

8.0

This command was introduced.

Examples

The following example shows how to enable RSA cipher suites using 256 bit AES and SHA 256 for DTLS connection between AP and controller:


(Cisco Controller) >config ap dtls-cipher-suite RSA-AES256-SHA256

config ap dtls-version

To configure the cipher DTLS version, use the config ap dtls-version command.

config ap dtls-version{ dtls1.0 | dtls1.2 | dtls_all}

Syntax Description

dtls1.0

Select DTLS 1.0 version

dtls1.2

Select DTLS 1.2 version

dtls_all

Select all DTLS versions for backward compatibility

Command Default

None

Command History

Release Modification

8.3.111.0

This command was introduced.

Examples

The following example shows how to configure cipher dtls version 1.2:


(Cisco Controller) > config ap dtls-version dtls1.2

config ap ethernet duplex

To configure the Ethernet port duplex and speed settings of the lightweight access points, use the config ap ethernet duplex command.

config ap ethernet duplex [ auto | half | full] speed [ auto | 10 | 100 | 1000] { all | cisco_ap}

Syntax Description

auto

(Optional) Specifies the Ethernet port duplex auto settings.

half

(Optional) Specifies the Ethernet port duplex half settings.

full

(Optional) Specifies the Ethernet port duplex full settings.

speed

Specifies the Ethernet port speed settings.

auto

(Optional) Specifies the Ethernet port speed to auto.

10

(Optional) Specifies the Ethernet port speed to 10 Mbps.

100

(Optional) Specifies the Ethernet port speed to 100 Mbps.

1000

(Optional) Specifies the Ethernet port speed to 1000 Mbps.

all

Specifies the Ethernet port setting for all connected access points.

cisco_ap

Cisco access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the Ethernet port duplex half settings as 10 Mbps for all access points:

(Cisco Controller) >config ap ethernet duplex half speed 10 all

config ap ethernet tag

To configure VLAN tagging of the Control and Provisioning of Wireless Access Points protocol (CAPWAP) packets, use the config ap ethernet tag command.

config ap ethernet tag { id vlan_id | disable} { cisco_ap | all}

Syntax Description

id

Specifies the VLAN id.

vlan_id

ID of the trunk VLAN.

disable

Disables the VLAN tag feature. When you disable VLAN tagging, the access point untags the CAPWAP packets.

cisco_ap

Name of the Cisco AP.

all

Configures VLAN tagging on all the Cisco access points.

Command Default

None

Usage Guidelines

After you configure VLAN tagging, the configuration comes into effect only after the access point reboots.

You cannot configure VLAN tagging on mesh access points.

If the access point is unable to route traffic or reach the controller using the specified trunk VLAN, it falls back to the untagged configuration. If the access point joins the controller using this fallback configuration, the controller sends a trap to a trap server such as the Cisco Prime Infrastructure, which indicates the failure of the trunk VLAN. In this scenario, the "Failover to untagged" message appears in show command output.

Examples

The following example shows how to configure VLAN tagging on a trunk VLAN:

(Cisco Controller) >config ap ethernet tag 6 AP1

config ap autoconvert

To automatically convert all access points to FlexConnect mode or Monitor mode upon associating with the Cisco WLC, use the config ap autoconvert command.

config ap autoconvert { flexconnect | monitor | disable}

Syntax Description

flexconnect

Configures all the access points automatically to FlexConnect mode.

monitor

Configures all the access points automatically to monitor mode.

disable

Disables the autoconvert option on the access points.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

When access points in local mode connect to a Cisco 7500 Series Wireless Controller, they do not serve clients. The access point details are available in the controller. To enable access points to serve clients or perform monitoring related tasks when connected to the Cisco 7500 Series Wireless Controller, the access points must be in FlexConnect mode or Monitor mode.

The command can also be used for conversion of AP modes in Cisco 5520, 8540, and 8510 Series Wireless Controller platforms.

Examples

The following example shows how to automatically convert all access points to the FlexConnect mode:

(Cisco Controller) >config ap autoconvert flexconnect

The following example shows how to disable the autoconvert option on the APs:

(Cisco Controller) >config ap autoconvert disable

config ap flexconnect central-dhcp

To enable central-DHCP on a FlexConnect access point in a WLAN, use the config ap flexconnect central-dhcp command.

config ap flexconnect central-dhcp wlan_id cisco_ap [ add | delete] { enable | disable} override dns { enable | disable} nat-pat { enable | disable}

Syntax Description

wlan_id

Wireless LAN identifier from 1 to 512.

cisco_ap

Name of the Cisco lightweight access point.

add

(Optional) Adds a new WLAN DHCP mapping.

delete

(Optional) Deletes a WLAN DHCP mapping.

enable

Enables central-DHCP on a FlexConnect access point. When you enable this feature, the DHCP packets received from the access point are centrally switched to the controller and then forwarded to the corresponding VLAN based on the AP and the SSID.

disable

Disables central-DHCP on a FlexConnect access point.

override dns

Overrides the DNS server address on the interface assigned by the controller. When you override DNS in centrally switched WLANs, the clients get their DNS server IP address from the AP and not from the controller.

enable

Enables the Override DNS feature on a FlexConnect access point.

disable

Disables the Override DNS feature on a FlexConnect access point.

nat-pat

Network Address Translation (NAT) and Port Address Translation (PAT) that you can enable or disable.

enable

Enables NAT-PAT on a FlexConnect access point.

disable

Deletes NAT-PAT on a FlexConnect access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable central-DHCP, Override DNS, and NAT-PAT on a FlexConnect access point:

(Cisco Controller) >config ap flexconnect central-dhcp 1 ap1250 enable override dns enable nat-pat enable

config ap flexconnect local-split

To configure a local-split tunnel on a FlexConnect access point, use the config ap flexconnect local-split command.

config ap flexconnect local-split wlan_id cisco_ap { enable | disable} acl acl_name

Syntax Description

wlan_id

Wireless LAN identifier between 1 and 512.

cisco_ap

Name of the FlexConnect access point.

enable

Enables local-split tunnel on a FlexConnect access point.

disable

Disables local-split tunnel feature on a FlexConnect access point.

acl

Configures a FlexConnect local-split access control list.

acl_name

Name of the FlexConnect access control list.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This command allows you to configure a local-split tunnel in a centrally switched WLAN using a FlexConnect ACL. A local split tunnel supports only for unicast Layer 4 IP traffic as NAT/PAT does not support multicast IP traffic.

Examples

The following example shows how to configure a local-split tunnel using a FlexConnect ACL:

(Cisco Controller) >config ap flexconnect local-split 6 AP2 enable acl flex6
 

config ap flexconnect module-vlan

To configure VLAN tagging for Cisco USC 8x18 Dual Mode Module in FlexConnect Local Switching, use the config ap flexconnect module-vlan command.

config ap flexconnect module-vlan {{ enable ap-name [ vlan vlan-id]} | {{ disable | remove} ap-name}}

Syntax Description

enable ap-name

Enables FlexConnect local switching for the external module of the specified Cisco AP with native VLAN

enable ap-name vlan vlan-id

Enables FlexConnect local switching with non-native VLAN for the external module of the specified Cisco AP

disable ap-name

Disables FlexConnect local switching for the external module of the specified Cisco AP

remove ap-name

Removes the AP-specific external module VLAN configuration

Command Default

None

Command History

Release Modification

8.1

This command was introduced.

Examples

This example shows how to enable FlexConnect local switching with non-native VLAN for the external module of a Cisco AP:

(Cisco Controller) >config ap flexconnect module-vlan enable 3600i-ap vlan4

config ap flexconnect policy

To configure a policy ACL on a FlexConnect access point, use the config ap flexconnect policy command.

config ap flexconnect policy { add | delete} acl_name

Syntax Description

add

Adds a policy ACL on a FlexConnect access point.

deletes

Deletes a policy ACL on a FlexConnect access point.

acl_name

Name of the ACL.

Command Default

None

Command History

Release Modification

7.5

This command was introduced.

Examples

The following example shows how to add a policy ACL on a FlexConnect access point:

(Cisco Controller) >config ap flexconnect policy add acl1

config ap flexconnect radius auth set

To configure a primary or secondary RADIUS server for a specific FlexConnect access point, use the config ap flexconnect radius auth set command.

config ap flexconnect radius auth set { primary | secondary} ip_address auth_port secret

Syntax Description

primary

Specifies the primary RADIUS server for a specific FlexConnect access point

secondary

Specifies the secondary RADIUS server for a specific FlexConnect AP

ip_address

IP address of the RADIUS server

auth_port secret

Name of the port

secret

RADIUS server secret

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure a primary RADIUS server for a specific access point:

(Cisco Controller) >config ap flexconnect radius auth set primary 192.12.12.1

config ap flexconnect vlan

To enable or disable VLAN tagging for a FlexConnect access, use the config ap flexconnect vlan command.

config ap flexconnect vlan { enable | disable} cisco_ap

Syntax Description

enable

Enables the access point’s VLAN tagging.

disable

Disables the access point’s VLAN tagging.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

Disabled. Once enabled, WLANs enabled for local switching inherit the VLAN assigned at the Cisco WLC.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

This example shows how to enable the access point’s VLAN tagging for a FlexConnect access:

(Cisco Controller) >config ap flexconnect vlan enable AP02

config ap flexconnect vlan add

To add a VLAN to a FlexConnect access point, use the config ap flexconnect vlan add command.

config ap flexconnect vlan add vlan-id acl in-acl out-acl cisco_ap

Syntax Description

vlan-id

VLAN identifier.

acl

ACL name that contains up to 32 alphanumeric characters.

in-acl

Inbound ACL name that contains up to 32 alphanumeric characters.

out-acl

Outbound ACL name that contains up to 32 alphanumeric characters.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the FlexConnect access point:

(Cisco Controller) >config ap flexconnect vlan add 21 acl inacl1 outacl1 ap1

config ap flexconnect vlan native

To configure a native VLAN for a FlexConnect access point, use the config ap flexconnect vlan native command.

config ap flexconnect vlan native vlan-id cisco_ap

Syntax Description

vlan-id

VLAN identifier.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure a native VLAN for a FlexConnect access point mode:

(Cisco Controller) >config ap flexconnect vlan native 6 AP02

config ap flexconnect vlan wlan

To assign a VLAN ID to a FlexConnect access point, use the config ap flexconnect vlan wlan command.

config ap flexconnect vlan wlan wlan-id vlan-id cisco_ap

Syntax Description

wlan-id

WLAN identifier

vlan-id

VLAN identifier (1 - 4094).

cisco_ap

Name of the Cisco lightweight access point.

Command Default

VLAN ID associated to the WLAN.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to assign a VLAN ID to a FlexConnect access point:

(Cisco Controller) >config ap flexconnect vlan wlan 192.12.12.1 6 AP02 

config ap flexconnect web-auth

To configure a FlexConnect ACL for external web authentication in locally switched WLANs, use the config ap flexconnect web-auth command.

config ap flexconnect web-auth wlan wlan_id cisco_ap acl_name { enable | disable }

Syntax Description

wlan

Specifies the wireless LAN to be configured with a FlexConnect ACL.

wlan_id

Wireless LAN identifier between 1 and 512 (inclusive).

cisco_ap

Name of the FlexConnect access point.

acl_name

Name of the FlexConnect ACL.

enable

Enables the FlexConnect ACL on the locally switched wireless LAN.

disable

Disables the FlexConnect ACL on the locally switched wireless LAN.

Command Default

FlexConnect ACL for external web authentication in locally switched WLANs is disabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The FlexConnect ACLs that are specific to an AP have the highest priority. The FlexConnect ACLs that are specific to WLANs have the lowest priority.

Examples

The following example shows how to enable FlexConnect ACL for external web authentication on WLAN 6:

(Cisco Controller) >config ap flexconnect web-auth wlan 6 AP2 flexacl2 enable

config ap flexconnect web-policy acl

To configure a Web Policy FlexConnect ACL on an access point, use the config ap flexconnect web-policy acl command.

config ap flexconnect web-policy acl { add | delete} acl_name

Syntax Description

add

Adds a Web Policy FlexConnect ACL on an access point.

delete

Deletes Web Policy FlexConnect ACL on an access point.

acl_name

Name of the Web Policy FlexConnect ACL.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to add a Web Policy FlexConnect ACL on an access point:

(Cisco Controller) >config ap flexconnect web-policy acl add flexacl2

config ap flexconnect wlan

To configure a FlexConnect access point in a locally switched WLAN, use the config ap flexconnect wlan command.

config ap flexconnect wlan l2acl { add wlan_id cisco_ap acl_name | delete wlan_id cisco_ap}

Syntax Description

add

Adds a Layer 2 ACL to the FlexConnect access point.

wlan_id

Wireless LAN identifier from 1 to 512.

cisco_ap

Name of the Cisco lightweight access point.

acl_name

Layer 2 ACL name. The name can be up to 32 alphanumeric characters.

delete

Deletes a Layer 2 ACL from the FlexConnect access point.

Command Default

None

Command History

Release Modification

7.5

This command was introduced.

Usage Guidelines

  • You can create a maximum of 16 rules for a Layer 2 ACL.

  • You can create a maximum of 64 Layer 2 ACLs on a Cisco WLC.

  • A maximum of 16 Layer 2 ACLs are supported per AP because an AP supports a maximum of 16 WLANs.

  • Ensure that the Layer 2 ACL names do not conflict with the FlexConnect ACL names because an AP does not support the same Layer 2 and Layer 3 ACL names.

Examples

The following example shows how to configure a Layer 2 ACL on a FlexConnect AP.

(Cisco Controller) >config ap flexconnect wlan add 1 AP1600_1 acl_l2_1

config ap group-name

To specify a descriptive group name for a Cisco lightweight access point, use the config ap group-name command.

config ap group-name groupname cisco_ap

Syntax Description

groupname

Descriptive name for the access point group.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The Cisco lightweight access point must be disabled before changing this parameter.

Examples

The following example shows how to configure a descriptive name for access point AP01:

(Cisco Controller) >config ap group-name superusers AP01

config ap hotspot

To configure hotspot parameters on an access point, use the config ap hotspot command.

config ap hotspot venue { type group_code type_code | name { add language_code venue_name | delete}} cisco_ap


Syntax Description

venue

Configures venue information for given AP group.

type

Configures the type of venue for given AP group.

group_code

Venue group information for given AP group.

The following options are available:

  • 0—UNSPECIFIED

  • 1—ASSEMBLY

  • 2—BUSINESS

  • 3—EDUCATIONAL

  • 4—FACTORY-INDUSTRIAL

  • 5—INSTITUTIONAL

  • 6—MERCANTILE

  • 7—RESIDENTIAL

  • 8—STORAGE

  • 9—UTILITY-MISC

  • 10—VEHICULAR

  • 11—OUTDOOR

type_code

Venue type information for the AP group.

For venue group 1 (ASSEMBLY), the following options are available:

  • 0—UNSPECIFIED ASSEMBLY

  • 1—ARENA

  • 2—STADIUM

  • 3—PASSENGER TERMINAL

  • 4—AMPHITHEATER

  • 5—AMUSEMENT PARK

  • 6—PLACE OF WORSHIP

  • 7—CONVENTION CENTER

  • 8—LIBRARY

  • 9—MUSEUM

  • 10—RESTAURANT

  • 11—THEATER

  • 12—BAR

  • 13—COFFEE SHOP

  • 14—ZOO OR AQUARIUM

  • 15—EMERGENCY COORDINATION CENTER

For venue group 2 (BUSINESS), the following options are available:

  • 0—UNSPECIFIED BUSINESS

  • 1—DOCTOR OR DENTIST OFFICE

  • 2—BANK

  • 3—FIRE STATION

  • 4—POLICE STATION

  • 6—POST OFFICE

  • 7—PROFESSIONAL OFFICE

  • 8—RESEARCH AND DEVELOPMENT FACILITY

  • 9—ATTORNEY OFFICE

For venue group 3 (EDUCATIONAL), the following options are available:

  • 0—UNSPECIFIED EDUCATIONAL

  • 1—PRIMARY SCHOOL

  • 2—SECONDARY SCHOOL

  • 3—UNIVERSITY OR COLLEGE

For venue group 4 (FACTORY-INDUSTRIAL), the following options are available:

  • 0—UNSPECIFIED FACTORY AND INDUSTRIAL

  • 1—FACTORY

For venue group 5 (INSTITUTIONAL), the following options are available:

  • 0—UNSPECIFIED INSTITUTIONAL

  • 1—HOSPITAL

  • 2—LONG-TERM CARE FACILITY

  • 3—ALCOHOL AND DRUG RE-HABILITATION CENTER

  • 4—GROUP HOME

  • 5 :PRISON OR JAIL

type_code

For venue group 6 (MERCANTILE), the following options are available:

  • 0—UNSPECIFIED MERCANTILE

  • 1—RETAIL STORE

  • 2—GROCERY MARKET

  • 3—AUTOMOTIVE SERVICE STATION

  • 4—SHOPPING MALL

  • 5—GAS STATION

For venue group 7 (RESIDENTIAL), the following options are available:

  • 0—UNSPECIFIED RESIDENTIAL

  • 1—PRIVATE RESIDENCE

  • 2—HOTEL OR MOTEL

  • 3—DORMITORY

  • 4—BOARDING HOUSE

For venue group 8 (STORAGE), the option is:

  • 0—UNSPECIFIED STORAGE

For venue group 9 (UTILITY-MISC), the option is:

  • 0—UNSPECIFIED UTILITY AND MISCELLANEOUS

For venue group 10 (VEHICULAR), the following options are available:

  • 0—UNSPECIFIED VEHICULAR

  • 1—AUTOMOBILE OR TRUCK

  • 2—AIRPLANE

  • 3—BUS

  • 4—FERRY

  • 5—SHIP OR BOAT

  • 6—TRAIN

  • 7—MOTOR BIKE

For venue group 11 (OUTDOOR), the following options are available:

  • 0—UNSPECIFIED OUTDOOR

  • 1—MINI-MESH NETWORK

  • 2—CITY PARK

  • 3—REST AREA

  • 4—TRAFFIC CONTROL

  • 5—BUS STOP

  • 6—KIOSK

name

Configures the name of venue for this access point.

language_code

ISO-639 encoded string defining the language used at the venue. This string is a three-character language code. For example, you can enter ENG for English.

venue_name

Venue name for this access point. This name is associated with the basic service set (BSS) and is used in cases where the SSID does not provide enough information about the venue. The venue name is case sensitive and can be up to 252 alphanumeric characters.

add

Adds the HotSpot venue name for this access point.

delete

Deletes the HotSpot venue name for this access point.

cisco_ap

Name of the Cisco access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the venue group as educational and venue type as university:

(Cisco Controller) >config ap hotspot venue type 3 3

config ap image predownload

To configure an image on a specified access point, use the config ap image predownload command.

config ap image predownload { abort | primary | backup} { cisco_ap | all}

Syntax Description

abort

Terminates the predownload image process.

primary

Predownloads an image to a Cisco access point from the controller's primary image.

cisco_ap

Name of a Cisco lightweight access point.

all

(Cisco Controller) >

Specifies all access points to predownload an image.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to predownload an image to an access point from the primary image:

(Cisco Controller) >config ap image predownload primary all

config ap image swap

To swap an access point’s primary and backup images, use the config ap image swap command.

config ap image swap { cisco_ap | all}

Syntax Description

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points to interchange the boot images.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Examples

The following example shows how to swap an access point’s primary and secondary images:

(Cisco Controller) >config ap image swap all

config ap ipsla

To configure the IP Service Level Agreements of the AP, use the config ap ipsla command.

config ap ipsla { enable | disable } ap_name

Syntax Description

Enable

Enables IPSLA on an AP.

Disable

Disables IPSLA on an AP.

Command Default

None

Examples

The following example shows how to enable IPSLA on an AP:


(Cisco Controller) > config ap ipsla cz2340212

config ap lag-mode support

Configure link aggregation on either all Cisco Aironet 1850 Series AP or a specific Cisco Aironet 1850 Series AP by entering this command:

config ap lag-mode support { enable | disable} [ ap-name]

Syntax Description

enable

Enables link aggregation on all Cisco Aironet 1850 Series APs.

disable

Disables link aggregation on all Cisco Aironet 1850 Series APs.

enable ap-name

Enables link aggregation on the specified Cisco Aironet 1850 Series AP.

disable ap-name

Disables link aggregation on the specified Cisco Aironet 1850 Series AP.

Command History

Release Modification

8.1.110.0

This command was introduced.

config ap led-state

To configure the LED state of an access point or to configure the flashing of LEDs, use the config ap led-state command.

config ap led-state { enable | disable} { cisco_ap | all}

config ap led-state flash { seconds | indefinite | disable} { cisco_ap | dual-band}

Syntax Description

enable

Enables the LED state of an access point.

disable

Disables the LED state of an access point.

cisco_ap

Name of a Cisco lightweight access point.

flash

Configure the flashing of LEDs for an access point.

seconds

Duration that the LEDs have to flash. The range is from 1 to 3600 seconds.

indefinite

Configures indefinite flashing of the access point’s LED.

dual-band

Configures the LED state for all dual-band access points.

Usage Guidelines


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


LEDs on access points with dual-band radio module will flash green and blue when you execute the led state flash command.

Command Default

None

Examples

The following example shows how to enable the LED state for an access point:

(Cisco Controller) >config ap led-state enable AP02

The following example shows how to enable the flashing of LEDs for dual-band access points:

(Cisco Controller) >config ap led-state flash 20 dual-band

config ap link-encryption

To configure the Datagram Transport Layer Security (DTLS) data encryption for access points on the 5500 series controller, use the config ap link-encryption command.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


config ap link-encryption { enable | disable} { cisco_ap | all}

Syntax Description

enable

Enables the DTLS data encryption for access points.

disable

Disables the DTLS data encryption for access points.

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points.

Command Default

DTLS data encryption is enabled automatically for OfficeExtend access points but disabled by default for all other access points.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Only Cisco 5500 Series Controllers support DTLS data encryption. This feature is not available on other controller platforms. If an access point with data encryption enabled tries to join any other controller, the access point joins the controller, but data packets are sent unencrypted.

Only Cisco 1130, 1140, 1240, and 1250 series access points support DTLS data encryption, and data-encrypted access points can join a Cisco 5500 Series Controller only if the wplus license is installed on the controller. If the wplus license is not installed, the access points cannot join the controller.

Examples

The following example shows how to enable the data encryption for an access point:

(Cisco Controller) >config ap link-encryption enable AP02

config ap link-latency

To configure link latency for a specific access point or for all access points currently associated to the controller, use the config ap link-latency command:


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


config ap link-latency { enable | disable | reset} { cisco_ap | all}

Syntax Description

enable

Enables the link latency for an access point.

disable

Disables the link latency for an access point.

reset

Resets all link latency for all access points.

cisco_ap

Name of the Cisco lightweight access point.

all

Specifies all access points.

Command Default

By default, link latency is in disabled state.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This command enables or disables link latency only for access points that are currently joined to the controller. It does not apply to access points that join in the future.

Examples

The following example shows how to enable the link latency for all access points:

(Cisco Controller) >config ap link-latency enable all

config ap location

To modify the descriptive location of a Cisco lightweight access point, use the config ap location command.

config ap location location cisco_ap

Syntax Description

location

Location name of the access point (enclosed by double quotation marks).

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Usage Guidelines

The Cisco lightweight access point must be disabled before changing this parameter.

Examples

The following example shows how to configure the descriptive location for access point AP1:

(Cisco Controller) >config ap location “Building 1” AP1

config ap logging syslog level

To set the severity level for filtering syslog messages for a particular access point or for all access points, use the config ap logging syslog level command.

config ap logging syslog level severity_level { cisco_ap | all}

Syntax Description

severity_level

Severity levels are as follows:

  • emergencies—Severity level 0

  • alerts—Severity level 1

  • critical—Severity level 2

  • errors—Severity level 3

  • warnings—Severity level 4

  • notifications—Severity level 5

  • informational—Severity level 6

  • debugging—Severity level 7

cisco_ap

Cisco access point.

all

Specifies all access points.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Usage Guidelines

If you set a syslog level, only those messages whose severity is equal to or less than that level are sent to the access point. For example, if you set the syslog level to Warnings (severity level 4), only those messages whose severity is between 0 and 4 are sent to the access point.

Examples

This example shows how to set the severity for filtering syslog messages to 3:

(Cisco Controller) >config ap logging syslog level 3

config ap logging syslog facility

To set the facility level for filtering syslog messages for a particular access point or for all access points, use the config ap logging syslog facility command.

config ap logging syslog facility facility-level { cisco_ap | all}

Syntax Description

facility-level

Facility level is one of the following:

  • auth = Authorization system.

  • cron = Cron/at facility.

  • daemon = System daemons.

  • kern = Kernel.

  • local0 = Local use.

  • local1 = Local use.

  • local2 = Local use.

  • local3 = Local use.

  • local4 = Local use.

  • local5 = Local use.

  • local5 = Local use.

  • local6 = Local use.

  • local7 = Local use.

  • lpr = Line printer system.

  • mail = Mail system.

  • news = USENET news.

  • sys10 = System use.

  • sys11 = System use.

  • sys12 = System use.

  • sys13 = System use.

  • sys14 = System use.

  • sys9 = System use.

  • syslog = Syslog itself.

  • user = User process.

  • uucp Unix-to-Unix copy system.

cisco_ap

Configures for a specific access point.

all

Configures for all access points.

Command Default

None

Examples

This example shows how to set the facility level for filtering syslog messages to auth for all access points:

(Cisco Controller) >config ap logging syslog facility auth all

config ap max-count

To configure the maximum number of access points supported by the Cisco Wireless LAN Controller (WLC), use the config ap max-count command.

config ap max-count number

Syntax Description

number

Number of access points supported by the Cisco WLC.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The access point count of the Cisco WLC license overrides this count if the configured value is greater than the access point count of the license. A value of 0 indicates that there is no restriction on the maximum number of access points. If high availability is configured, you must reboot both the active and the standby Cisco WLCs after you configure the maximum number of access points supported by the Cisco WLC.

Examples

The following example shows how to configure the number of access points supported by the Cisco WLC:

(Cisco Controller) >config ap max-count 100

config ap mgmtuser add

To configure username, password, and secret password for AP management, use the config ap mgmtuser add command.

config ap mgmtuser add username AP_username password AP_password secret secret 
{ all | cisco_ap}

Syntax Description

username

Configures the username for AP management.

AP_username

Management username.

password

Configures the password for AP management.

AP_password

AP management password.

secret

Configures the secret password for privileged AP management.

secret

AP managemetn secret password.

all

Applies configuration to every AP that does not have a specific username.

cisco_ap

Cisco access point.

Command Default

None

Usage Guidelines

The following requirements are enforced on the password:

  • The password should contain characters from at least three of the following classes: lowercase letters, uppercase letters, digits, and special characters.

  • No character in the password can be repeated more than three times consecutively.

  • The password sould not contain management username or reverse of usename.

  • The password should not contain words like Cisco, oscic, admin, nimda or any variant obtained by changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for s.

    The following requirement is enforced on the secret password:

  • The secret password should contain characters from at least three of the following classes: lowercase letters, uppercase letters, digits, or special characters.

Examples

The following example shows how to add a username, password, and secret password for AP management:

(Cisco Controller) > config ap mgmtuser add username acd password Arc_1234 secret Mid_45 all

config ap mgmtuser delete

To force a specific access point to use the controller’s global credentials, use the config ap mgmtuser delete command.

config ap mgmtuser delete cisco_ap

Syntax Description

cisco_ap

Access point.

Command Default

None

Examples

The following example shows how to delete the credentials of an access point:


(Cisco Controller) > config ap mgmtuser delete cisco_ap1

config ap mode

To change a Cisco WLC communication option for an individual Cisco lightweight access point, use the config ap mode command.

config ap mode { bridge | flexconnect sensor submode { none | wips} | local submode { none | wips} | reap | rogue | sniffer | se-connect | monitor submode { none | wips} | } cisco_ap

Syntax Description

bridge

Converts from a lightweight access point to a mesh access point (bridge mode).

flexconnect

Enables FlexConnect mode on an access point.

local

Converts from an indoor mesh access point (MAP or RAP) to a nonmesh lightweight access point (local mode).

reap

Enables remote edge access point mode on an access point.

rogue

Enables wired rogue detector mode on an access point.

sniffer

Enables wireless sniffer mode on an access point.

se-connect

Enables flex+bridge mode on an access point.

flex+bridge

Enables spectrum expert mode on an access point.

submode

(Optional) Configures wIPS submode on an access point.

none

Disables the wIPS on an access point.

wips

Enables the wIPS submode on an access point.

sensor

Enables sensor mode for the Cisco AP

cisco_ap

Name of the Cisco lightweight access point.

Command Default

Local

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The sniffer mode captures and forwards all the packets from the clients on that channel to a remote machine that runs AiroPeek or other supported packet analyzer software. It includes information on the timestamp, signal strength, packet size and so on.

Examples

The following example shows how to set the controller to communicate with access point AP91 in bridge mode:


(Cisco Controller) > config ap mode bridge AP91

The following example shows how to set the controller to communicate with access point AP01 in local mode:


(Cisco Controller) > config ap mode local AP01

The following example shows how to set the controller to communicate with access point AP91 in remote office (REAP) mode:


(Cisco Controller) > config ap mode flexconnect AP91

The following example shows how to set the controller to communicate with access point AP91 in a wired rogue access point detector mode:


(Cisco Controller) > config ap mode rogue AP91

The following example shows how to set the controller to communicate with access point AP02 in wireless sniffer mode:

(Cisco Controller) > config ap mode sniffer AP02

config ap module3g

To configure the Cisco Universal Small Cell (USC) 8x18 Dual Mode Module, use the config ap module3g command.

config ap module3g { enable | disable} ap-name

Syntax Description

enable

Enables the Cisco USC 8x18 Dual Mode Module on the specified Cisco AP.

disable

Disables the Cisco USC 8x18 Dual Mode Module on the specified Cisco AP.

ap-name

Name of the Cisco AP

Note 

In Release 8.1, only Cisco Aironet 3600I and 3700I APs are supported.

Command Default

Enabled

Command History

Release Modification
8.1

This command was introduced.

Usage Guidelines

You might be prompted with a co-existence warning when Wi-Fi in 2.4-GHz and 3G/4G module are enabled.

Examples

This example shows how to enable Cisco USC 8x18 Dual Mode Module on a Cisco AP named my-ap

(Cisco Controller) >config ap module3g enable my-ap

config ap monitor-mode

To configure Cisco lightweight access point channel optimization, use the config ap monitor-mode command.

config ap monitor-mode { 802.11b fast-channel | no-optimization | tracking-opt | wips-optimized} cisco_ap

Syntax Description

802.11b fast-channel

Configures 802.11b scanning channels for a monitor-mode access point.

no-optimization

Specifies no channel scanning optimization for the access point.

tracking-opt

Enables tracking optimized channel scanning for the access point.

wips-optimized

Enables wIPS optimized channel scanning for the access point.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Examples

The following example shows how to configure a Cisco wireless intrusion prevention system (wIPS) monitor mode on access point AP01:

(Cisco Controller) > config ap monitor-mode wips-optimized AP01

config ap name

To modify the name of a Cisco lightweight access point, use the config ap name command.

config ap name new_name old_name

Syntax Description

new_name

Desired Cisco lightweight access point name.

old_name

Current Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to modify the name of access point AP1 to AP2:


(Cisco Controller) > config ap name AP1 AP2

config ap packet-dump

To configure the Packet Capture parameters on access points, use the config ap packet-dump command.

config ap packet-dump { buffer-size Size _in_KB| capture-time Time_in_Min| ftp serverip IP_addr path path username usernamepassword password | start MAC_address Cisco_AP | stop | truncate Length_in_Bytes}

config ap packet-dump classifier {{ arp | broadcast | control | data | dot1x | iapp | ip | management | multicast } { enable | disable} | tcp { enable | disable | port TCP_Port { enable | disable} } | udp { enable | disable | port UDP_Port { enable | disable} } }

Syntax Description

buffer-size

Configures the buffer size for Packet Capture in the access point.

Size _in_KB

Size of the buffer. The range is from 1024 to 4096 KB.

capture-time

Configures the timer value for Packet Capture.

Time_in_Min

Timer value for Packet Capture. The range is from 1 to 60 minutes.

ftp

Configures FTP parameters for Packet Capture.

serverip

Configures the FTP server.

IP_addr

IP address of the FTP server.

path path

Configures FTP server path.

username user_ID

Configures the username for the FTP server.

password password

Configures the password for the FTP server.

start

Starts Packet Capture from the access point.

MAC_address

Client MAC Address for Packet Capture.

Cisco_AP

Name of the Cisco access point.

stop

Stops Packet Capture from the access point.

truncate

Truncates the packet to the specified length during Packet Capture.

Length_in_Bytes

Length of the packet after truncation. The range is from 20 to 1500.

classifier

Configures the classifier information for Packet Capture. You can specify the type of packets that needs to be captured.

arp

Captures ARP packets.

enable

Enables capture of ARP, broadcast, 802.11 control, 802.11 data, dot1x, Inter Access Point Protocol (IAPP), IP, 802.11 management, or multicast packets.

disable

Disables capture of ARP, broadcast, 802.11 control, 802.11 data, dot1x, IAPP, IP, 802.11management, or multicast packets.

broadcast

Captures broadcast packets.

control

Captures 802.11 control packets.

data

Captures 802.11 data packets.

dot1x

Captures dot1x packets.

iapp

Captures IAPP packets.

ip

Captures IP packets.

management

Captures 802.11 management packets.

multicast

Captures multicast packets.

tcp

Captures TCP packets.

TCP_Port

TCP port number. The range is from 1 to 65535.

udp

Captures TCP packets.

UDP_Port

UDP port number. The range is from 1 to 65535.

ftp

Configures FTP parameters for Packet Capture.

server_ip

FTP server IP address.

Command Default

The default buffer size is 2 MB. The default capture time is 10 minutes.

Usage Guidelines

Packet Capture does not work during intercontroller roaming.

The controller does not capture packets created in the radio firmware and sent out of the access point, such as a beacon or probe response. Only packets that flow through the Radio driver in the Tx path will be captured.

Use the command config ap packet-dump start to start the Packet Capture from the access point. When you start Packet Capture, the controller sends a Control and Provisioning of Wireless Access Points protocol (CAPWAP) message to the access point to which the client is associated and captures packets. You must configure the FTP server and ensure that the client is associated to the access point before you start Packet Capture. If the client is not associated to the access point, you must specify the name of the access point.

This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to start Packet Capture from an access point:


(Cisco Controller) >config ap packet-dump start 00:0d:28:f4:c0:45 AP1

The following example shows how to capture 802.11 control packets from an access point:


(Cisco Controller) >config ap packet-dump classifier control enable

config ap port

To configure the port for a foreign access point, use the config ap port command.

config ap port MAC port

Syntax Description

MAC

Foreign access point MAC address.

port

Port number for accessing the foreign access point.

Command Default

None

Examples

The following example shows how to configure the port for a foreign access point MAC address:

(Cisco Controller) > config ap port 12:12:12:12:12:12 20

config ap power injector

To configure the power injector state for an access point, use the config ap power injector command.

config ap power injector { enable | disable} { cisco_ap | all} { installed | override | switch_MAC}

Syntax Description

enable

Enables the power injector state for an access point.

disable

Disables the power injector state for an access point.

cisco_ap

Name of the Cisco lightweight access point.

all

Specifies all Cisco lightweight access points connected to the controller.

installed

Detects the MAC address of the current switch port that has a power injector.

override

Overrides the safety checks and assumes a power injector is always installed.

switch_MAC

MAC address of the switch port with an installed power injector.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Examples

The following example shows how to enable the power injector state for all access points:

(Cisco Controller) > config ap power injector enable all 12:12:12:12:12:12

config ap power pre-standard

To enable or disable the inline power Cisco pre-standard switch state for an access point, use the config ap power pre-standard command.

config ap power pre-standard { enable | disable} cisco_ap

Syntax Description

enable

Enables the inline power Cisco pre-standard switch state for an access point.

disable

Disables the inline power Cisco pre-standard switch state for an access point.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

Disabled.

Examples

The following example shows how to enable the inline power Cisco pre-standard switch state for access point AP02:


(Cisco Controller) > config ap power pre-standard enable AP02

config ap preferred-mode

To configure the preferred mode, use the config ap preferred-mode command.

config appreferred-mode{ ipv4 | ipv6| any} { AP_name | Ap-group_name | all }

Syntax Description

ipv4

Configures IPv4 as the preferred mode

ipv6

Configures IPv6 as the preferred mode

any

Configures any as the preferred mode

AP_name

Configures the preferred mode to the AP

Ap-group_name

Configures the preferred mode to the AP group members

all

Configures the preferred mode to all the APs

Command Default

None

Examples

The following example shows how to configure IPv6 as the preferred mode to lightweight access point AP1

(Cisco Controller) >config ap preferred-mode ipv6 AP1

config ap primary-base

To set the Cisco lightweight access point primary Cisco WLC, use the config ap primary-base command.

config ap primary-base controller_name Cisco_AP[ controller_ip_address]

Syntax Description

controller_name

Name of the Cisco WLC.

Cisco_AP

Cisco lightweight access point name.

controller_ip_address

(Optional) If the backup controller is outside the mobility group to which the access point is connected, then you need to provide the IP address of the primary, secondary, or tertiary controller.

Note 

For OfficeExtend access points, you must enter both the name and IP address of the controller. Otherwise, the access point cannot join this controller.

Command Default

None

Usage Guidelines

The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event of a hardware reset.

OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find a controller. You must configure one or more controllers because OfficeExtend access points try to connect only to their configured controllers.

This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to set an access point primary Cisco WLC IPv4 address for an Cisco AP:


(Cisco Controller) > config ap primary-base SW_1 AP2 10.0.0.0

The following example shows how to set an access point primary Cisco WLC IPv6 address for an Cisco AP:


(Cisco Controller) > config ap primary-base SW_1 AP2 2001:DB8:0:1::1

config ap priority

To assign a priority designation to an access point that allows it to reauthenticate after a controller failure by priority rather than on a first-come-until-full basis, use the config ap priority command.

config ap priority { 1 | 2 | 3 | 4} cisco_ap

Syntax Description

1

Specifies low priority.

2

Specifies medium priority.

3

Specifies high priority.

4

Specifies the highest (critical) priority.

cisco_ap

Cisco lightweight access point name.

Command Default

1 - Low priority.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

In a failover situation, if the backup controller does not have enough ports to allow all the access points in the affected area to reauthenticate, it gives priority to higher-priority access points over lower-priority ones, even if it means replacing lower-priority access points.

Examples

The following example shows how to assign a priority designation to access point AP02 that allows it to reauthenticate after a controller failure by assigning a reauthentication priority 3:


(Cisco Controller) > config ap priority 3 AP02

config ap reporting-period

To reset a Cisco lightweight access point, use the config ap reporting-period command.

config ap reporting-period period

Syntax Description

period

Time period in seconds between 10 and 120.

Command Default

None

Examples

The following example shows how to reset an access point reporting period to 120 seconds:


> config ap reporting-period 120

config ap reset

To reset a Cisco lightweight access point, use the config ap reset command.

config ap reset cisco_ap

Syntax Description

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to reset an access point:


(Cisco Controller) > config ap reset AP2

config ap retransmit interval

To configure the access point control packet retransmission interval, use the config ap retransmit interval command.

config ap retransmit interval seconds { all | cisco_ap}

Syntax Description

seconds

AP control packet retransmission timeout between 2 and 5 seconds.

all

Specifies all access points.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to configure the retransmission interval for all access points globally:


(Cisco Controller) > config ap retransmit interval 4 all

config ap retransmit count

To configure the access point control packet retransmission count, use the config ap retransmit count command.

config ap retransmit count count { all | cisco_ap}

Syntax Description

count

Number of times control packet will be retransmitted. The range is from 3 to 8.

all

Specifies all access points.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to configure the retransmission retry count for a specific access point:


(Cisco Controller) > config ap retransmit count 6 cisco_ap

config ap role

To specify the role of an access point in a mesh network, use the config ap role command.

config ap role { rootAP | meshAP} cisco_ap

Syntax Description

rootAP

Designates the mesh access point as a root access point (RAP).

meshAP

Designates the mesh access point as a mesh access point (MAP).

cisco_ap

Name of the Cisco lightweight access point.

Command Default

meshAP .

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Use the meshAP keyword if the access point has a wireless connection to the controller, or use the rootAP keyword if the access point has a wired connection to the controller. If you change the role of the AP, the AP will be rebooted.

Examples

The following example shows how to designate mesh access point AP02 as a root access point:


(Cisco Controller) > config ap role rootAP AP02
Changing the AP's role will cause the AP to reboot.
Are you sure you want to continue? (y/n)

config ap rst-button

To configure the Reset button for an access point, use the config ap rst-button command.

config ap rst-button { enable | disable} cisco_ap

Syntax Description

enable

Enables the Reset button for an access point.

disable

Disables the Reset button for an access point.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the Reset button for access point AP03:


(Cisco Controller) > config ap rst-button enable AP03

config ap secondary-base

To set the Cisco lightweight access point secondary Cisco WLC, use the config ap secondary-base command.

config ap secondary-base Controller_name Cisco_AP [ Controller_IP_address]

Syntax Description

controller_name

Name of the Cisco WLC.

Cisco_AP

Cisco lightweight access point name.

Controller_IP_address

(Optional). If the backup Cisco WLC is outside the mobility group to which the access point is connected, then you need to provide the IP address of the primary, secondary, or tertiary Cisco WLC.

Note 

For OfficeExtend access points, you must enter both the name and IP address of the Cisco WLC. Otherwise, the access point cannot join this Cisco WLC.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.0 This command supports both IPv4 and IPv6 address formats.

Usage Guidelines

The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event of a hardware reset.

OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find a Cisco WLC. You must configure one or more Cisco WLCs because OfficeExtend access points try to connect only to their configured Cisco WLCs.

This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to set an access point secondary Cisco WLC:


(Cisco Controller) > config ap secondary-base SW_1 AP2 10.0.0.0
			

The following example shows how to set an access point primary Cisco WLC IPv6 address for an Cisco AP:


(Cisco Controller) > config ap secondary-base SW_1 AP2 2001:DB8:0:1::1

config ap sniff

To enable or disable sniffing on an access point, use the config ap sniff command.

config ap sniff { 802.11a | 802.11b} { enable channel server_ip | disable} cisco_ap

Syntax Description

802.11a

Specifies the 802.11a network.

802.11b

Specifies the 802.11b network.

enable

Enables sniffing on an access point.

channel

Channel to be sniffed.

server_ip

IP address of the remote machine running Omnipeek, Airopeek,AirMagnet, or Wireshark software.

disable

Disables sniffing on an access point.

cisco_ap

Access point configured as the sniffer.

Command Default

Channel 36.

Usage Guidelines

When the sniffer feature is enabled on an access point, it starts sniffing the signal on the given channel. It captures and forwards all the packets to the remote computer that runs Omnipeek, Airopeek, AirMagnet, or Wireshark software. It includes information on the timestamp, signal strength, packet size and so on.

Before an access point can act as a sniffer, a remote computer that runs one of the listed packet analyzers must be set up so that it can receive packets sent by the access point. After the Airopeek installation, copy the following .dll files to the location where airopeek is installed:

  • socket.dll file to the Plug-ins folder (for example, C:\Program Files\WildPackets\AiroPeek\Plugins)

  • socketres.dll file to the PluginRes folder (for example, C:\Program Files\WildPackets\AiroPeek\ 1033\PluginRes)

Examples

The following example shows how to enable the sniffing on the 802.11a an access point from the primary Cisco WLC:


(Cisco Controller) > config ap sniff 80211a enable 23 11.22.44.55 AP01

config ap ssh

To enable Secure Shell (SSH) connectivity on an access point, use the config ap ssh command.

config ap ssh { enable | disable | default} cisco_ap | all

Syntax Description

enable

Enables the SSH connectivity on an access point.

disable

Disables the SSH connectivity on an access point.

default

Replaces the specific SSH configuration of an access point with the global SSH configuration.

cisco_ap

Cisco access point name.

all

All access points.

Command Default

None

Usage Guidelines

The Cisco lightweight access point associates with this Cisco wireless LAN controller for all network operation and in the event of a hardware reset.

Examples

The following example shows how to enable SSH connectivity on access point Cisco_ap2:


> config ap ssh enable cisco_ap2

config ap static-ip

To configure Static IP address settings on Cisco lightweight access point , use the config ap static-ip command.

config ap static-ip { enable Cisco_AP AP_IP_addr IP_netmask /prefix_length gateway | disable Cisco_AP| add { domain { Cisco_AP | all} domain_name | nameserver { Cisco_AP | all} nameserver-ip} | delete { domain | nameserver} { Cisco_AP | all}}

Syntax Description

enable

Enables the Cisco lightweight access point static IP address.

disable

Disables the Cisco lightweight access point static IP address. The access point uses DHCP to get the IP address.

Cisco_AP

Cisco lightweight access point name.

AP_IP_addr

Cisco lightweight access point IP address

IP_netmask/prefix_length

Cisco lightweight access point network mask.

gateway

IP address of the Cisco lightweight access point gateway.

add

Adds a domain or DNS server.

domain

Specifies the domain to which a specific access point or all access points belong.

all

Specifies all access points.

domain_name

Specifies a domain name.

nameserver

Specifies a DNS server so that a specific access point or all access points can discover the controller using DNS resolution.

nameserver-ip

DNS server IP address.

delete

Deletes a domain or DNS server.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Usage Guidelines

An access point cannot discover the controller using Domain Name System (DNS) resolution if a static IP address is configured for the access point, unless you specify a DNS server and the domain to which the access point belongs.

After you enter the IPv6 address, Prefix-length and IPv6 gateway address, the CAPWAP tunnel will restart for access point. Changing the AP's IP address will cause the AP to disjoin. After the access point rejoins the controller, you can enter the domain and IPv6 DNS server information.

This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to configure static IP address on an access point:


(Cisco Controller) >config ap static-ip enable AP2 209.165.200.225 255.255.255.0 209.165.200.254

The following example shows how to configure static IPv6 address on an access point:


(Cisco Controller) > config ap static-ip enable AP2 2001:DB8:0:1::1

config ap stats-timer

To set the time in seconds that the Cisco lightweight access point sends its DOT11 statistics to the Cisco wireless LAN controller, use the config ap stats-timer command.

config ap stats-timer period cisco_ap

Syntax Description

period

Time in seconds from 0 to 65535. A zero value disables the timer.

cisco_ap

Cisco lightweight access point name.

Command Default

The default value is 0 (disabled state).

Usage Guidelines

A value of 0 (zero) means that the Cisco lightweight access point does not send any DOT11 statistics. The acceptable range for the timer is from 0 to 65535 seconds, and the Cisco lightweight access point must be disabled to set this value.

Examples

The following example shows how to set the stats timer to 600 seconds for access point AP2:


(Cisco Controller) > config ap stats-timer 600 AP2

config ap syslog host global

To configure a global syslog server for all access points that join the controller, use the config ap syslog host global command.

config ap syslog host global ip_address

Syntax Description

ip_address

IPv4/IPv6 address of the syslog server.

Command Default

The default value of the IPv4 address of the syslog server is 255.255.255.255.

Usage Guidelines

By default, the global syslog server IP address for all access points is 255.255.255.255. Make sure that the access points can reach the subnet on which the syslog server resides before configuring the syslog server on the controller. If the access points cannot reach this subnet, the access points are unable to send out syslog messages.

This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to configure a global syslog server, using IPv4 address, for all access points:


(Cisco Controller) > config ap syslog host global 255.255.255.255

Examples

The following example shows how to configure a global syslog server, using IPv6 address, for all access points:


(Cisco Controller) > config ap syslog host global  2001:9:10:56::100

config ap syslog host specific

To configure a syslog server for a specific access point, use the config ap syslog host specific command.

config ap syslog host specific ap_nameip_address

Syntax Description

ap_name

Cisco lightweight access point.

ip_address

IPv4/IPv6 address of the syslog server.

Command Default

The default value of the syslog server IP address is 0.0.0.0.

Usage Guidelines

By default, the syslog server IP address for each access point is 0.0.0.0, indicating that it is not yet set. When the default value is used, the global access point syslog server IP address is pushed to the access point.

This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to configure a syslog server:


(Cisco Controller) >config ap syslog host specific 0.0.0.0

Examples

The following example shows how to configure a syslog server for a specific AP, using IPv6 address:


(Cisco Controller) > config ap syslog host specific AP3600 2001:9:10:56::100

config ap tcp-mss-adjust

To enable or disable the TCP maximum segment size (MSS) on a particular access point or on all access points, use the config ap tcp-mss-adjust command.

config ap tcp-mss-adjust { enable | disable} { cisco_ap | all} size

Syntax Description

enable

Enables the TCP maximum segment size on an access point.

disable

Disables the TCP maximum segment size on an access point.

cisco_ap

Cisco access point name.

all

Specifies all access points.

size

Maximum segment size.

  • IPv4—Specify a value between 536 and 1363.
  • IPv6—Specify a value between 1220 and 1331.
    Note 
    Any TCP MSS value that is below 1220 and above 1331 will not be effective for CAPWAP v6 AP.

Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Usage Guidelines

When you enable this feature, the access point checks for TCP packets to and from wireless clients in its data path. If the MSS of these packets is greater than the value that you configured or greater than the default value for the CAPWAP tunnel, the access point changes the MSS to the new configured value.

Examples

This example shows how to enable the TCP MSS on access point cisco_ap1 with a segment size of 1200 bytes:


(Cisco Controller) > config ap tcp-mss-adjust enable cisco_ap1 1200

config ap telnet

To enable Telnet connectivity on an access point, use the config ap telnet command.

config ap telnet { enable | disable | default} cisco_ap | all

Syntax Description

enable

Enables the Telnet connectivity on an access point.

disable

Disables the Telnet connectivity on an access point.

default

Replaces the specific Telnet configuration of an access point with the global Telnet configuration.

cisco_ap

Cisco access point name.

all

All access points.

Command Default

None

Usage Guidelines

  • The Cisco lightweight access point associates with this Cisco WLC for all network operation and in the event of a hardware reset.

  • Telnet is not supported on Cisco Aironet 1810 OEAP, 1810W, 1830, 1850, 2800, and 3800 Series APs.

Examples

The following example shows how to enable Telnet connectivity on access point cisco_ap1:


(Cisco Controller) >config ap telnet enable cisco_ap1

The following example shows how to disable Telnet connectivity on access point cisco_ap1:


(Cisco Controller) > config ap telnet disable cisco_ap1

config ap tertiary-base

To set the Cisco lightweight access point tertiary Cisco WLC, use the config ap tertiary-base command.

config ap tertiary-base controller_name Cisco_AP [ controller_ip_address]

Syntax Description

controller_name

Name of the Cisco WLC.

Cisco_AP

Cisco lightweight access point name.

controller_ip_address

(Optional) If the backup controller is outside the mobility group to which the access point is connected, then you need to provide the IP address of the primary, secondary, or tertiary Cisco WLC.

Note 

For OfficeExtend access points, you must enter both the name and IP address of the Cisco WLC. Otherwise, the access point cannot join this Cisco WLC.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.0 This command supports both IPv4 and IPv6 address formats.

Usage Guidelines

OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find a Cisco WLC. You must configure one or more controllers because OfficeExtend access points try to connect only to their configured Cisco WLCs.

The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event of a hardware reset.

This command supports both IPv4 and IPv6 address formats.

Examples

This example shows how to set the access point tertiary Cisco WLC:


(Cisco Controller) > config ap tertiary-base SW_1 AP02 10.0.0.0

The following example shows how to set an access point tertiary Cisco WLC IPv6 address for an Cisco AP:


(Cisco Controller) > config ap tertiary-base SW_1 AP2 2001:DB8:0:1::1

config ap tftp-downgrade

To configure the settings used for downgrading a lightweight access point to an autonomous access point, use the config ap ftp-downgrade command.

config ap tftp-downgrade tftp_ip_addressfilename Cisco_AP

Syntax Description

tftp_ip_address

IP address of the TFTP server.

filename

Filename of the access point image file on the TFTP server.

Cisco_AP

Access point name.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.0 This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to configure the settings for downgrading access point ap1240_102301:


(Cisco Controller) >config ap ftp-downgrade 209.165.200.224 1238.tar ap1240_102301

config ap username

To assign a username and password to access either a specific access point or all access points, use the config ap username command.

config ap username user_id password passwd [ all | ap_name]

Syntax Description

user_id

Administrator username.

passwd

Administrator password.

all

(Optional) Specifies all access points.

ap_name

Name of a specific access point.

Command Default

None

Examples

The following example shows how to assign a username and password to a specific access point:


(Cisco Controller) > config ap username jack password blue la204

The following example shows how to assign the same username and password to a all access points:


(Cisco Controller) > config ap username jack password blue all

config ap venue

To configure the venue information for 802.11u network on an access point, use the config ap venue command.

config ap venue { addvenue_name venue-group venue-type lang-code cisco-ap | delete}

Syntax Description

add

Adds venue information.

venue_name

Venue name.

venue_group

Venue group category. See the table below for details on venue group mappings.

venue_type

Venue type. This value depends on the venue-group specified. See the table below for venue group mappings.

lang_code

Language used. An ISO-14962-1997 encoded string that defines the language. This string is a three character language code. Enter the first three letters of the language in English (for example, eng for English).

cisco_ap

Name of the access point.

deletes

Deletes venue information.

Command Default

None

Examples

The following example shows how to set the venue details for an access point named cisco-ap1:

(Cisco Controller) > config ap venue add test 11 34 eng cisco-ap1

This table lists the different venue types for each venue group.

Table 2. Venue Group Mapping

Venue Group Name

Value

Venue Type for Group

UNSPECIFIED

0

ASSEMBLY

1

  • 0—UNSPECIFIED ASSEMBLY

  • 1—ARENA

  • 2—STADIUM

  • 3—PASSENGER TERMINAL (E.G., AIRPORT, BUS, FERRY, TRAIN STATION)

  • 4—AMPHITHEATER

  • 5—AMUSEMENT PARK

  • 6—PLACE OF WORSHIP

  • 7—CONVENTION CENTER

  • 8—LIBRARY

  • 9—MUSEUM

  • 10—RESTAURANT

  • 11—THEATER

  • 12—BAR

  • 13—COFFEE SHOP

  • 14—ZOO OR AQUARIUM

  • 15—EMERGENCY COORDINATION CENTER

BUSINESS

2

  • 0—UNSPECIFIED BUSINESS

  • 1—DOCTOR OR DENTIST OFFICE

  • 2—BANK

  • 3—FIRE STATION

  • 4—POLICE STATION

  • 6—POST OFFICE

  • 7—PROFESSIONAL OFFICE

  • 8—RESEARCH AND DEVELOPMENT FACILITY

  • 9—ATTORNEY OFFICE

EDUCATIONAL

3

  • 0—UNSPECIFIED EDUCATIONAL

  • 1—SCHOOL, PRIMARY

  • 2—SCHOOL, SECONDARY

  • 3—UNIVERSITY OR COLLEGE

FACTORY-INDUSTRIAL

4

  • 0—UNSPECIFIED FACTORY AND INDUSTRIAL

  • 1—FACTORY

INSTITUTIONAL

5

  • 0—UNSPECIFIED INSTITUTIONAL

  • 1—HOSPITAL

  • 2—LONG-TERM CARE FACILITY (E.G., NURSING HOME, HOSPICE, ETC.)

  • 3—ALCOHOL AND DRUG RE-HABILITATION CENTER

  • 4—GROUP HOME

  • 5—PRISON OR JAIL

MERCANTILE

6

  • 0—UNSPECIFIED MERCANTILE

  • 1—RETAIL STORE

  • 2—GROCERY MARKET

  • 3—AUTOMOTIVE SERVICE STATION

  • 4—SHOPPING MALL

  • 5—GAS STATION

RESIDENTIAL

7

  • 0—UNSPECIFIED RESIDENTIAL

  • 1—PRIVATE RESIDENCE

  • 2—HOTEL OR MOTEL

  • 3—DORMITORY

  • 4—BOARDING HOUSE

STORAGE

8

UNSPECIFIED STORAGE

UTILITY-MISC

9

0—UNSPECIFIED UTILITY AND MISCELLANEOUS

VEHICULAR

10

  • 0—UNSPECIFIED VEHICULAR

  • 1—AUTOMOBILE OR TRUCK

  • 2—AIRPLANE

  • 3—BUS

  • 4—FERRY

  • 5—SHIP OR BOAT

  • 6—TRAIN

  • 7—MOTOR BIKE

OUTDOOR

11

  • 0—UNSPECIFIED OUTDOOR

  • 1—MUNI-MESH NETWORK

  • 2—CITY PARK

  • 3—REST AREA

  • 4—TRAFFIC CONTROL

  • 5—BUS STOP

  • 6—KIOSK

config ap wlan

To enable or disable wireless LAN override for a Cisco lightweight access point radio, use the config ap wlan command.

config ap wlan { enable | disable} { 802.11a | 802.11b} wlan_id cisco_ap

Syntax Description

enable

Enables the wireless LAN override on an access point.

disable

Disables the wireless LAN override on an access point.

802.11a

Specifies the 802.11a network.

802.11b

Specifies the 802.11b network.

wlan_id

Cisco wireless LAN controller ID assigned to a wireless LAN.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to enable wireless LAN override on the AP03 802.11a radio:


(Cisco Controller) > config ap wlan 802.11a AP03

config atf 802.11

Configure Cisco Air Time Fairness at the network level, at an AP group level, or at an AP radio level by using the config atf 802.11 command.

config atf 802.11{ a | b} { mode { disable | monitor | enforce-policy} {[ ap-group-name] | [ ap-name]}} | { optimization { enable | disable}}

Syntax Description

a

Specifies the 802.11a network settings

b

Specifies the 802.11b/g network settings

mode

Configures the granularity of Cisco ATF enforcement

disable

Disables Cisco ATF

monitor

Configures Cisco ATF in monitor mode

enforce-policy

Configures Cisco ATF in enforcement mode

optimization

Configures airtime optimization

enable

Enables airtime optimization

disable

Disabled airtime optimization

Command History

Release Modification

8.1

This command was introduced

Examples

  • To configure Cisco ATF in monitor mode on an 802.11a network, enter this command:

    (Cisco Controller) >config atf 802.11a mode monitor
  • To enable airtime optimization on an 802.11a network, enter this command:
    (Cisco Controller) >config atf 802.11a optimization enable

config atf policy

To configure Cisco Air Time Fairness (ATF) policies, use the config atf policy command.

config atf policy {{create policy-id policy-name policy-weight} | {modify {weight policy-weight policy-name} | {client-sharing {enable | disable} policy-name}} | {delete policy-name}}

Syntax Description

create

Creates an air time policy

modify

Modifies an air time policy

delete

Deletes an air time policy

client-sharing {enable | disable policy-name}

Enables or disables client fair sharing for the specified policy name

policy-id

Policy ID between 1 and 511

policy-name

Name of the Cisco ATF policy

policy-weight

Policy weight between 5 and 100

Command History

Release Modification

8.1.122.0

This command was introduced

8.2

client-sharing {enable | disable} option was added.

Examples

This example shows how to create a Cisco ATF policy:

(Cisco Controller) >config atf policy create 2 test-policy 70

config auth-list add

To create an authorized access point entry, use the config auth-list add command.

config auth-list add { mic | ssc} AP_MAC [ AP_key]

Syntax Description

mic

Specifies that the access point has a manufacture-installed certificate.

ssc

Specifies that the access point has a self-signed certificate.

AP_MAC

MAC address of a Cisco lightweight access point.

AP_key

(Optional) Key hash value that is equal to 20 bytes or 40 digits.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to create an authorized access point entry with a manufacturer-installed certificate on MAC address 00:0b:85:02:0d:20:


(Cisco Controller) > config auth-list add 00:0b:85:02:0d:20

config auth-list ap-policy

To configure an access point authorization policy, use the config auth-list ap-policy command.

config auth-list ap-policy { authorize-ap { enable | disable} | ssc { enable | disable}}

Syntax Description

authorize-ap enable

Enables the authorization policy.

authorize-ap disable

Disables the AP authorization policy.

ssc enable

Allows the APs with self-signed certificates to connect.

ssc disable

Disallows the APs with self-signed certificates to connect.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable an access point authorization policy:


(Cisco Controller) > config auth-list ap-policy authorize-ap enable

The following example shows how to enable an access point with a self-signed certificate to connect:


(Cisco Controller) > config auth-list ap-policy ssc disable

config auth-list delete

To delete an access point entry, use the config auth-list delete command.

config auth-list delete AP_MAC

Syntax Description

AP_MAC

MAC address of a Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to delete an access point entry for MAC address 00:1f:ca:cf:b6:60:


(Cisco Controller) > config auth-list delete 00:1f:ca:cf:b6:60

config auto-configure voice

To auto-configure voice deployment in WLANs, use the config auto-configure voice command.

config auto-configure voice cisco wlan_id radio { 802.11a | 802.11b | all}

Syntax Description

cisco

Auto-configure WLAN for voice deployment of Cisco end points.

wlan_id

Wireless LAN identifier from 1 to 512 (inclusive).

radio

Auto-configures voice deployment for a radio in a WLAN.

802.11a

Auto-configures voice deployment for 802.11a in a WLAN.

802.11b

Auto-configures voice deployment for 802.11b in a WLAN.

all

Auto-configures voice deployment for all radios in a WLAN.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

When you configure this command, all WLANs and radios are automatically disabled. After the completion of the configuration, the previous state of the WLANs and radios is restored.

Examples

The following example shows how to auto-configure voice deployment for all radios in a WLAN:

(Cisco Controller) >config auto-configure voice cisco 2 radio all
Warning! This command will automatically disable all WLAN's and Radio's.
 It will be reverted to the previous state once configuration is complete.
 Are you sure you want to continue? (y/N)y


Auto-Configuring these commands in WLAN for Voice..
 wlan qos 2 platinum 
 - Success
 wlan call-snoop enable 2 
 - Success
 wlan wmm allow 2 
 - Success
 wlan session-timeout 2 86400
 - Success
 wlan peer-blocking disable 2
 - Success
 wlan security tkip hold-down 0 2 
 - Success
 wlan exclusionlist 2 disable 
 - Success
 wlan mac-filtering disable 2
 - Success
 wlan dtim 802.11a 2 2
 - Success
 wlan dtim 802.11b 2 2
 - Success
 wlan ccx aironetIeSupport  enabled 2
 - Success
 wlan channel-scan defer-priority 4 enable 2 
 - Success
 wlan channel-scan defer-priority 5 enable 2 
 - Success
 wlan channel-scan defer-priority 6 enable 2 
 - Success
 wlan channel-scan defer-time 100 2 
 - Success
wlan load-balance allow disable 2
 - Success
 wlan mfp client enable 2
 - Success
 wlan security wpa akm  cckm enable 2
 - Success
 wlan security wpa akm cckm timestamp-tolerance  5000 2
 - Success
 wlan band-select allow disable 2 
 - Success
***********************************************

Auto-Configuring these commands for Voice - Radio 802.11a.

 advanced 802.11a edca-parameter optimized-voice
 - Success
 802.11a cac voice acm enable 
 - Success
 802.11a cac voice max-bandwidth 75 
 - Success
 802.11a cac voice roam-bandwidth 6 
 - Success
 802.11a cac voice cac-method load-based 
 - Success
 802.11a cac voice sip disable 
 - Success
 802.11a tsm enable 
 - Success
 802.11a exp-bwreq  enable 
 - Success
 802.11a txPower global auto 
 - Success
 802.11a channel global auto 
 - Success
 advanced 802.11a channel dca interval 24
 - Success
 advanced 802.11a channel dca anchor-time 0
 - Success
 qos protocol-type platinum dot1p
 - Success
 qos dot1p-tag platinum 6
 - Success
 qos priority platinum voice voice besteffort
 - Success
 802.11a beacon period 100 
 - Success
 802.11a dtpc enable
 - Success
 802.11a Coverage Voice RSSI Threshold -70
 - Success
 802.11a txPower global min 11
  - Success
 advanced eap eapol-key-timeout 250
 - Success
 advanced 802.11a voice-mac-optimization disable 
 - Success
802.11h channelswitch enable 1
 - Success
Note: Data rate configurations are not changed.
It should be changed based on the recommended values after analysis.
***********************************************

Auto-Configuring these commands for Voice - Radio 802.11b.
 advanced 802.11b edca-parameter optimized-voice
 - Success
 802.11b cac voice acm enable 
 - Success
 802.11b cac voice max-bandwidth 75 
 - Success
 802.11b cac voice roam-bandwidth 6 
 - Success
 802.11b cac voice cac-method load-based 
 - Success
 802.11b cac voice sip disable 
 - Success
 802.11b tsm enable 
 - Success
 802.11b exp-bwreq  enable 
 - Success
 802.11b txPower global auto
  - Success
 802.11b channel global auto - Success
 advanced 802.11b channel dca interval 24
 - Success
 advanced 802.11b channel dca anchor-time 0
 - Success
 802.11b beacon period 100 
 - Success
 802.11b dtpc enable 
 - Success
 802.11b Coverage Voice RSSI Threshold -70
 - Success
 802.11b preamble short 
 - Success
advanced 802.11a voice-mac-optimization disable 
 - Success
Note: Data rate configurations are not changed.
It should be changed based on the recommended values after analysis.

config avc profile create

To create a new Application Visibility and Control (AVC) profile, use the config avc profile create command.

config avc profile profile_name create

Syntax Description

profile_name

Name of the AVC profile. The profile name can be up to 32 case-sensitive, alphanumeric characters.

create

Creates a new AVC profile.

Command Default

None

Command History

Release Modification

7.4

This command was introduced.

Usage Guidelines

You can configure up to 16 AVC profiles on a controller and associate an AVC profile with multiple WLANs. You can configure only one AVC profile per WLAN and each AVC profile can have up to 32 rules. Each rule states a Mark or Drop action for an application, which allows you to configure up to 32 application actions per WLAN.

Examples

The following example shows how to create a new AVC profile:


(Cisco Controller) > config avc profile avcprofile1 create

config avc profile delete

To delete an Application Visibility and Control (AVC) profile, use the config avc profile delete command.

config avc profile profile_name delete

Syntax Description

profile_name

Name of the AVC profile.

delete

Deletes an AVC profile.

Command Default

The AVC profile is not deleted.

Command History

Release Modification

7.4

This command was introduced.

Examples

The following example shows how to delete an AVC profile:


(Cisco Controller) > config avc profile avcprofile1 delete

config avc profile rule

To configure a rule for an Application Visibility and Control (AVC) profile, use the config avc profile rule command.

config avc profile profile_name rule { add | remove} application application_name { drop | mark dscp}

Syntax Description

profile_name

Name of the AVC profile.

rule

Configures a rule for the AVC profile.

add

Creates a rule for the AVC profile.

remove

Deletes a rule for the AVC profile.

application

Specifies the application that has to be dropped or marked.

application_name

Name of the application. The application name can be up to 32 case-sensitive, alphanumeric characters.

drop

Drops the upstream and downstream packets that correspond to the chosen application.

mark

Marks the upstream and downstream packets that correspond to the chosen application with the Differentiated Services Code Point (DSCP) value that you specify in the drop-down list. The DSCP value helps you provide differentiated services based on the QoS levels.

dscp

Packet header code that is used to define the QoS across the Internet. The range is from 0 to 63.

Command Default

None

Command History

Release Modification

7.4

This command was introduced.

Examples

The following example shows how to configure a rule for an AVC profile:


(Cisco Controller) > config avc profile avcprofile1 rule add application gmail mark 10 

config band-select cycle-count

To set the band select probe cycle count, use the config band-select cycle-count command.

config band-select cycle-count count

Syntax Description

count

Value for the cycle count between 1 to 10.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to set the probe cycle count for band select to 8:


(Cisco Controller) > config band-select cycle-count 8

config band-select cycle-threshold

To set the time threshold for a new scanning cycle, use the config band-select cycle-threshold command.

config band-select cycle-threshold threshold

Syntax Description

threshold

Value for the cycle threshold between 1 and 1000 milliseconds.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to set the time threshold for a new scanning cycle with threshold value of 700 milliseconds:


(Cisco Controller) > config band-select cycle-threshold 700

config band-select expire

To set the entry expire for band select, use the config band-select expire command.

config band-select expire { suppression | dual-band} seconds

Syntax Description

suppression

Sets the suppression expire to the band select.

dual-band

Sets the dual band expire to the band select.

seconds

  • Value for suppression between 10 to 200 seconds.

  • Value for a dual-band between 10 to 300 seconds.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to set the suppression expire to 70 seconds:


(Cisco Controller) > config band-select expire suppression 70

config band-select client-rssi

To set the client received signal strength indicator (RSSI) threshold for band select, use the config band-select client-rssi command.

config band-select client-rssi rssi

Syntax Description

rssi

Minimum dBM of a client RSSI to respond to probe between 20 and 90.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to set the RSSI threshold for band select to 70:


(Cisco Controller) > config band-select client-rssi 70

config boot

To change a Cisco wireless LAN controller boot option, use the config boot command.

config boot { primary | backup}

Syntax Description

primary

Sets the primary image as active.

backup

Sets the backup image as active.

Command Default

The default boot option is primary .

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Each Cisco wireless LAN controller can boot off the primary, last-loaded operating system image (OS) or boot off the backup, earlier-loaded OS image.

Examples

The following example shows how to set the primary image as active so that the LAN controller can boot off the primary, last loaded image:


(Cisco Controller) > config boot primary

The following example shows how to set the backup image as active so that the LAN controller can boot off the backup, earlier loaded OS image:


(Cisco Controller) > config boot backup

config call-home contact email address

To configure the call-home contact email address, use the config call-home contact-email-addr command.

config call-home contact-email-addr email-address

Syntax Description

email-address

call-home contact email address

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to add call-home contact email address:


(Cisco Controller) >config call-home contact-email-addr device1@example1.com

config call-home events

To enable or disable the call-home event reporting, use the call-home events command.

config call-home events { enable | disable}

Syntax Description

enable

Enables the call-home event reporting.

disable

Disables the call-home event reporting.

Command Default

Enable

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to disable call-home event reporting:


(Cisco Controller) > config call-home events disable

config call-home http-proxy ipaddr

To configure the http proxy address for reporting, use the config call-home http-proxy ipaddr command.

config call-home http-proxy ipaddr ip-address port port

Syntax Description

ip-address

the http-proxy IP address

port

the http-proxy port number

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to configure call home with the http-proxy IP address:


(Cisco Controller) >config call-home http-proxy ipaddr 209.165.200.224 port 773

config call-home http-proxy ipaddr 0.0.0.0

To reset the http proxy settings for reporting, use the config call-home http-proxy ipaddr 0.0.0.0 command.

config call-home http-proxy ipaddr 0.0.0.0

Syntax Description

0.0.0.0

resets the http-proxy settings

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to reset call home http-proxy settings:


(Cisco Controller) >config call-home http-proxy ipaddr 0.0.0.0

config call-home profile

To create, update the call-home profile, use the config call-home profile command.

config call-home profile { create | update } profile-name { sm-license-data | all | call-home-data} { short-text | long-text | xml } url

Syntax Description

create

create a Call-Home profile

update

updates a Call-Home profile

sm-license-data

Configures Smart license reporting profile

all

Configures reporting profile for all modules

call-home-data

Configures call home data reporting profile

short-text

Configures data reporting in short-text format

long-text

Configures data reporting in long-text format

xml

Configures data reporting in XML format

url

url name

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to create a xml format reporting Call-Home profile:


(Cisco Controller) > config call-home profile create example-profile sm-license-data xml internal.example.com

config call-home profile delete

To delete the call-home profile, use the config call-home profile delete command.

config call-home profile delete profile-name

Syntax Description

profile-name

Call-Home profile to be deleted.

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to delete a Call-Home profile:


(Cisco Controller) > config call-home profile delete example-profile

config call-home profile status

To enable or disable the user profile, use the config call-home profile status command.

config call-home profile status { enable | disable}

Syntax Description

enable

enables the status of call-home profile

disable

disables the status of call-home profile

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to disable a Call-Home profile:


(Cisco Controller) >config call-home profile status disable

config call-home reporting

To set the privacy level for data reporting, use the config call-home reporting data-privacy level command.

config call-home reporting data-privacy level { normal | high} hostname host name

Syntax Description

normal

scrubs all normal-level commands

high

scrubs all normal-level commands, the IP domain name and IP address commands

hostname

scrubs all high-level commands plus the hostname command

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to configure normal privacy level:


(Cisco Controller) >config call-home reporting data-privacy- level normal hostname internal.example.com

config call-home tac-profile

To enable or disable the tac-profile, use the config call-home tac-profile status command.

config call-home tac-profile status{ enable | disable}

Syntax Description

enable

enables call-home TAC profile.

disable

disables call-home TAC profile.

Command Default

Enable

Command History

Release Modification

8.2

This command was introduced.

Examples

The following example shows how to disable call home tac-profile:


(Cisco Controller) >config call-home tac-profile status disable

config cdp

To configure the Cisco Discovery Protocol (CDP) on the controller, use the config cdp command.

config cdp { enable | disable | advertise-v2 { enable | disable} | timerseconds | holdtime holdtime_interval}

Syntax Description

enable

Enables CDP on the controller.

disable

Disables CDP on the controller.

advertise-v2

Configures CDP version 2 advertisements.

timer

Configures the interval at which CDP messages are to be generated.

seconds

Time interval at which CDP messages are to be generated. The range is from 5 to 254 seconds.

holdtime

Configures the amount of time to be advertised as the time-to-live value in generated CDP packets.

holdtime_interval

Maximum hold timer value. The range is from 10 to 255 seconds.

Command Default

The default value for CDP timer is 60 seconds.

The default value for CDP holdtime is 180 seconds.

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the CDP maximum hold timer to 150 seconds:


(Cisco Controller) > config cdp timer 150

config certificate lsc

To configure Locally Significant Certificate (LSC) certificates, use the config certificate lsc command.

config certificate lsc { enable | disable | ca-server http://url:port/path | ca-cert { add | delete} | 
 subject-params country state city orgn dept email | other-params keysize} |
 ap-provision { auth-list { add | delete} ap_mac | revert-cert retries}

Syntax Description

enable

Enables LSC certificates on the controller.

disable

Disables LSC certificates on the controller.

ca-server

Specifies the Certificate Authority (CA) server settings.

http://url:port/path

Domain name or IP address of the CA server.

ca-cert

Specifies CA certificate database settings.

add

Obtains a CA certificate from the CA server and adds it to the controller’s certificate database.

delete

Deletes a CA certificate from the controller’s certificate database.

subject-params

Specifies the device certificate settings.

country state city orgn dept email

Country, state, city, organization, department, and email of the certificate authority.

Note 

The common name (CN) is generated automatically on the access point using the current MIC/SSC format Cxxxx-MacAddr , where xxxx is the product number.

other-params

Specifies the device certificate key size settings.

keysize

Value from 384 to 2048 (in bits); the default value is 2048.

ap-provision

Specifies the access point provision list settings.

auth-list

Specifies the provision list authorization settings.

ap_mac

MAC address of access point to be added or deleted from the provision list.

revert-cert

Specifies the number of times the access point attempts to join the controller using an LSC before reverting to the default certificate.

retries

Value from 0 to 255; the default value is 3.

Note 

If you set the number of retries to 0 and the access point fails to join the controller using an LSC, the access point does not attempt to join the controller using the default certificate. If you are configuring LSC for the first time, we recommend that you configure a nonzero value.

Command Default

The default value of keysize is 2048 bits. 
The default value of retries is 3.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You can configure only one CA server. To configure a different CA server, delete the configured CA server by using the config certificate lsc ca-server delete command, and then configure a different CA server.

If you configure an access point provision list, only the access points in the provision list are provisioned when you enable AP provisioning (in Step 8). If you do not configure an access point provision list, all access points with an MIC or SSC certificate that join the controller are LSC provisioned.

Examples

The following example shows how to enable the LSC settings:

(Cisco Controller) >config certificate lsc enable

This example shows how to enable the LSC settings for Certificate Authority (CA) server settings:

(Cisco Controller) >config certificate lsc ca-server http://10.0.0.1:8080/caserver

The following example shows how to add a CA certificate from the CA server and add it to the controller’s certificate database:

(Cisco Controller) >config certificate lsc ca-cert add

The following example shows how to configure an LSC certificate with the keysize of 2048 bits:

(Cisco Controller) >config certificate lsc keysize 2048

config certificate ssc

To configure Self Signed Certificates (SSC) certificates, use the config certificate ssc command.

config certificate ssc hash validation { enable | disable}

Syntax Description

hash

Configures the SSC hash key.

validation

Configures hash validation of the SSC certificate.

enable

Enables hash validation of the SSC certificate.

disable

Disables hash validation of the SSC certificate.

Command Default

The SSC certificate is enabled by default..

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

When you enable the SSC hash validation, an AP validates the SSC certificate of the virtual controller. When an AP validates the SSC certificate, it checks if the hash key of the virtual controller matches the hash key stored in its flash. If a match is found, the validation passes and the AP moves to the Run state. If a match is not found, the validation fails and the AP disconnects from the controller and restarts the discovery process. By default, hash validation is enabled. Hence, an AP must have the virtual controller hash key in its flash before associating with the virtual controller. If you disable hash validation of the SSC certificate, the AP bypasses the hash validation and directly moves to the Run state.

APs can associate with a physical controller, download the hash keys and then associate with a virtual controller. If the AP is associated to a physical controller and if hash validation is disabled, it joins any virtual controller without hash validation.

Examples

The following example shows how to enable hash validation of the SSC certificate:


(Cisco Controller) > config certificate ssc hash validation enable

config certificate use-device-certificate webadmin

To use a device certificate for web administration, use the config certificate use-device-certificate webadmin command.

config certificate use-device-certificate webadmin

Syntax Description

This command has no arguments or keywords.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to use a device certificate for web administration:


(Cisco Controller) > config certificate use-device-certificate webadmin
Use device certificate for web administration. Do you wish to continue? (y/n) y
Using device certificate for web administration.
Save configuration and restart controller to use new certificate.

config client ccx clear-reports

To clear the client reporting information, use the config client ccx clear-reports command.

config client ccx clear-reports client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to clear the reporting information of the client MAC address 00:1f:ca:cf:b6:60:

(Cisco Controller) >config client ccx clear-reports 00:1f:ca:cf:b6:60

config client ccx clear-results

To clear the test results on the controller, use the config client ccx clear-results command.

config client ccx clear-results client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to clear the test results of the client MAC address 00:1f:ca:cf:b6:60:

(Cisco Controller) >config client ccx clear-results 00:1f:ca:cf:b6:60

config client ccx default-gw-ping

To send a request to the client to perform the default gateway ping test, use the config client ccx default-gw-ping command.

config client ccx default-gw-ping client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This test does not require the client to use the diagnostic channel.

Examples

The following example shows how to send a request to the client00:0b:85:02:0d:20 to perform the default gateway ping test:

(Cisco Controller) >config client ccx default-gw-ping 00:0b:85:02:0d:20

config client ccx dhcp-test

To send a request to the client to perform the DHCP test, use the config client ccx dhcp-test command.

config client ccx dhcp-test client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

 This test does not require the client to use the diagnostic channel.

Examples

The following example shows how to send a request to the client 00:E0:77:31:A3:55 to perform the DHCP test:

(Cisco Controller) >config client ccx dhcp-test 00:E0:77:31:A3:55

config client ccx dns-ping

To send a request to the client to perform the Domain Name System (DNS) server IP address ping test, use the config client ccx dns-ping command.

config client ccx dns-ping client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This test does not require the client to use the diagnostic channel.

Examples

The following example shows how to send a request to a client to perform the DNS server IP address ping test:

(Cisco Controller) >config client ccx dns-ping 00:E0:77:31:A3:55

config client ccx dns-resolve

To send a request to the client to perform the Domain Name System (DNS) resolution test to the specified hostname, use the config client ccx dns-resolve command.

config client ccx dns-resolve client_mac_address host_name

Syntax Description

client_mac_address

MAC address of the client.

host_name

Hostname of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This test does not require the client to use the diagnostic channel.

Examples

The following example shows how to send a request to the client 00:E0:77:31:A3:55 to perform the DNS name resolution test to the specified hostname:

(Cisco Controller) >config client ccx dns-resolve 00:E0:77:31:A3:55 host_name

config client ccx get-client-capability

To send a request to the client to send its capability information, use the config client ccx get-client-capability command.

config client ccx get-client-capability client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a request to the client 172.19.28.40 to send its capability information:

(Cisco Controller) >config client ccx get-client-capability 172.19.28.40

config client ccx get-manufacturer-info

To send a request to the client to send the manufacturer’s information, use the config client ccx get-manufacturer-info command.

config client ccx get-manufacturer-info client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a request to the client 172.19.28.40 to send the manufacturer’s information:

(Cisco Controller) >config client ccx get-manufacturer-info 172.19.28.40

config client ccx get-operating-parameters

To send a request to the client to send its current operating parameters, use the config client ccx get-operating-parameters command.

config client ccx get-operating-parameters client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a request to the client 172.19.28.40 to send its current operating parameters:

(Cisco Controller) >config client ccx get-operating-parameters 172.19.28.40

config client ccx get-profiles

To send a request to the client to send its profiles, use the config client ccx get-profiles command.

config client ccx get-profiles client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a request to the client 172.19.28.40 to send its profile details:

(Cisco Controller) >config client ccx get-profiles 172.19.28.40

config client ccx log-request

To configure a Cisco client eXtension (CCX) log request for a specified client device, use the config client ccx log-request command.

config client ccx log-request { roam | rsna | syslog} client_mac_address

Syntax Description

roam

(Optional) Specifies the request to specify the client CCX roaming log.

rsna

(Optional) Specifies the request to specify the client CCX RSNA log.

syslog

(Optional) Specifies the request to specify the client CCX system log.

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to specify the request to specify the client CCS system log:

(Cisco Controller) >config client ccx log-request syslog 00:40:96:a8:f7:98
Tue Oct 05 13:05:21 2006
SysLog Response LogID=1: Status=Successful
Event Timestamp=121212121212
Client SysLog = 'This is a test syslog 2'
Event Timestamp=121212121212
Client SysLog = 'This is a test syslog 1'
Tue Oct 05 13:04:04 2006
SysLog Request LogID=1

The following example shows how to specify the client CCX roaming log:

(Cisco Controller) >config client ccx log-request roam 00:40:96:a8:f7:98
Thu Jun 22 11:55:14 2006
Roaming Response LogID=20: Status=Successful
Event Timestamp=121212121212
Source BSSID=00:40:96:a8:f7:98, Target BSSID=00:0b:85:23:26:70,
Transition Time=100(ms)
Transition Reason: Unspecified Transition Result: Success
Thu Jun 22 11:55:04 2006
Roaming Request LogID=20
Thu Jun 22 11:54:54 2006
Roaming Response LogID=19: Status=Successful
Event Timestamp=121212121212
Source BSSID=00:40:96:a8:f7:98, Target BSSID=00:0b:85:23:26:70,
Transition Time=100(ms)
Transition Reason: Unspecified Transition Result: Success
Thu Jun 22 11:54:33 2006  Roaming Request LogID=19

The following example shows how to specify the client CCX RSNA log:

(Cisco Controller) >config client ccx log-request rsna 00:40:96:a8:f7:98
Tue Oct 05 11:06:48 2006
RSNA Response LogID=2: Status=Successful
Event Timestamp=242424242424
Target BSSID=00:0b:85:23:26:70
RSNA Version=1
Group Cipher Suite=00-x0f-ac-01
Pairwise Cipher Suite Count = 2
Pairwise Cipher Suite 0 = 00-0f-ac-02
Pairwise Cipher Suite 1 = 00-0f-ac-04
AKM Suite Count = 2
KM Suite 0 = 00-0f-ac-01
KM Suite 1 = 00-0f-ac-02
SN Capability = 0x1
PMKID Count = 2
PMKID 0 = 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16
PMKID 1 = 0a 0b 0c 0d 0e 0f 17 18 19 20 1a 1b 1c 1d 1e 1f
802.11i Auth Type: EAP_FAST
RSNA Result: Success

config client ccx send-message

To send a message to the client, use the config client ccx send-message command.

config client ccx send-message client_mac_address message_id

Syntax Description

client_mac_address

MAC address of the client.

message_id

Message type that involves one of the following:

  • 1—The SSID is invalid.

  • 2—The network settings are invalid.

  • 3—There is a WLAN credibility mismatch.

  • 4—The user credentials are incorrect.

  • 5—Please call support.

  • 6—The problem is resolved.

  • 7—The problem has not been resolved.

  • 8—Please try again later.

  • 9—Please correct the indicated problem.

  • 10—Troubleshooting is refused by the network.

  • 11—Retrieving client reports.

  • 12—Retrieving client logs.

  • 13—Retrieval complete.

  • 14—Beginning association test.

  • 15—Beginning DHCP test.

  • 16—Beginning network connectivity test.

  • 17—Beginning DNS ping test.

  • 18—Beginning name resolution test.

  • 19—Beginning 802.1X authentication test.

  • 20—Redirecting client to a specific profile.

  • 21—Test complete.

  • 22—Test passed.

  • 23—Test failed.

  • 24—Cancel diagnostic channel operation or select a WLAN profile to resume normal operation.

  • 25—Log retrieval refused by the client.

  • 26—Client report retrieval refused by the client.

  • 27—Test request refused by the client.

  • 28—Invalid network (IP) setting.

  • 29—There is a known outage or problem with the network.

  • 30—Scheduled maintenance period.

    (continued on next page)

message_type (cont.)

  • 31—The WLAN security method is not correct.

  • 32—The WLAN encryption method is not correct.

  • 33—The WLAN authentication method is not correct.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a message to the client MAC address 172.19.28.40 with the message user-action-required:

(Cisco Controller) >config client ccx send-message 172.19.28.40 user-action-required

config client ccx stats-request

To send a request for statistics, use the config client ccx stats-request command.

config client ccx stats-request measurement_duration { dot11 | security} client_mac_address

Syntax Description

measurement_duration

Measurement duration in seconds.

dot11

(Optional) Specifies dot11 counters.

security

(Optional) Specifies security counters.

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to specify dot11 counter settings:

(Cisco Controller) >config client ccx stats-request 1 dot11 00:40:96:a8:f7:98
Measurement duration = 1
dot11TransmittedFragmentCount       = 1
dot11MulticastTransmittedFrameCount = 2
dot11FailedCount                    = 3
dot11RetryCount                     = 4
dot11MultipleRetryCount             = 5
dot11FrameDuplicateCount            = 6
dot11RTSSuccessCount                = 7
dot11RTSFailureCount                = 8
dot11ACKFailureCount                = 9
dot11ReceivedFragmentCount          = 10
dot11MulticastReceivedFrameCount    = 11
dot11FCSErrorCount                  = 12
dot11TransmittedFrameCount          = 13

config client ccx test-abort

To send a request to the client to terminate the current test, use the config client ccx test-abort command.

config client ccx test-abort client_mac_address

Syntax Description

client_mac_address

MAC address of the client.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Only one test can be pending at a time.

Examples

The following example shows how to send a request to a client to terminate the correct test settings:

(Cisco Controller) >config client ccx test-abort 11:11:11:11:11:11

config client ccx test-association

To send a request to the client to perform the association test, use the config client ccx test-association command.

config client ccx test-association client_mac_address ssid bssid 802.11{ a | b | g} channel

Syntax Description

client_mac_address

MAC address of the client.

ssid

Network name.

bssid

Basic SSID.

802.11a

Specifies the 802.11a network.

802.11b

Specifies the 802.11b network.

802.11g

Specifies the 802.11g network.

channel

Channel number.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a request to the client MAC address 00:0E:77:31:A3:55 to perform the basic SSID association test:

(Cisco Controller) >config client ccx test-association 00:E0:77:31:A3:55 ssid bssid 802.11a

config client ccx test-dot1x

To send a request to the client to perform the 802.1x test, use the config client ccx test-dot1x command.

config client ccx test-dot1x client_mac_address profile_id bssid 802.11 { a | b | g} channel

Syntax Description

client_mac_address

MAC address of the client.

profile_id

Test profile name.

bssid

Basic SSID.

802.11a

Specifies the 802.11a network.

802.11b

Specifies the 802.11b network.

802.11g

Specifies the 802.11g network.

channel

Channel number.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a request to the client to perform the 802.11b test with the profile name profile_01:

(Cisco Controller) >config client ccx test-dot1x 172.19.28.40 profile_01 bssid 802.11b

config client ccx test-profile

To send a request to the client to perform the profile redirect test, use the config client ccx test-profile command.

config client ccx test-profile client_mac_address profile_id

Syntax Description

client_mac_address

MAC address of the client.

profile_id

Test profile name.

Note 

The profile_id should be from one of the client profiles for which client reporting is enabled.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to send a request to the client to perform the profile redirect test with the profile name profile_01:

(Cisco Controller) >config client ccx test-profile 11:11:11:11:11:11 profile_01

config client deauthenticate

To disconnect a client, use the config client deauthenticate command.

config client deauthenticate { MAC | IPv4/v6_address | user_name}

Syntax Description

MAC

Client MAC address.

IPv4/v6_address

IPv4 or IPv6 address.

user_name

Client user name.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to deauthenticate a client using its MAC address:


(Cisco Controller) >config client deauthenticate 11:11:11:11:11

config client location-calibration

To configure link aggregation, use the config client location-calibration command.

config client location-calibration { enable mac_address interval | disable mac_address}

Syntax Description

enable

(Optional) Specifies that client location calibration is enabled.

mac_address

MAC address of the client.

interval

Measurement interval in seconds.

disable

(Optional) Specifies that client location calibration is disabled.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the client location calibration for the client 37:15:85:2a with a measurement interval of 45 seconds:

(Cisco Controller) >config client location-calibration enable 37:15:86:2a:Bc:cf 45

config client profiling delete

To delete client profile , use the config client profiling command.

config client profiling delete { mac_address}

Syntax Description

mac_address

MAC address of the client.

Command History

Release Modification
8.2 This command was introduced in this release.

Examples

The following example shows how to delete a client profile:

(Cisco Controller) >config client profiling delete 37:15:86:2a:Bc:cf

Note

Executing the above command changes the Device Type to "Unknown". The Client does not get deleted but instead the profiling info of the client is removed, and retains the client as it is still associated. There is no confirmation message from the CLI, due to architecture limitation of the Cisco WLC.


config coredump

To enable or disable the controller to generate a core dump file following a crash, use the config cordump command.

config coredump { enable | disable}

Syntax Description

enable

Enables the controller to generate a core dump file.

disable

Disables the controller to generate a core dump file.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the controller to generate a core dump file following a crash:


(Cisco Controller) > config coredump enable

config coredump ftp

To automatically upload a controller core dump file to an FTP server after experiencing a crash, use the config coredump ftp command.

config coredump ftp server_ip_address filename

Syntax Description

server_ip_address

IP address of the FTP server to which the controller sends its core dump file.

filename

Name given to the controller core dump file.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

8.0

This command supports only IPv4 address format.

Usage Guidelines

The controller must be able to reach the FTP server to use this command.

Examples

The following example shows how to configure the controller to upload a core dump file named core_dump_controller to an FTP server at network address 192.168.0.13 :


(Cisco Controller) > config coredump ftp 192.168.0.13 core_dump_controller

config coredump username

To specify the FTP server username and password when uploading a controller core dump file after experiencing a crash, use the config coredump username command.

config coredump username ftp_username password ftp_password

Syntax Description

ftp_username

FTP server login username.

ftp_password

FTP server login password.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The controller must be able to reach the FTP server to use this command.

Examples

The following example shows how to specify a FTP server username of admin and password adminpassword for the core dump file upload:


(Cisco Controller) > config coredump username admin password adminpassword

config country

To configure the controller’s country code, use the config country command.

config country country_code

Syntax Description

country_code

Two-letter or three-letter country code.

Command Default

us (country code of the United States of America).

Usage Guidelines

Cisco WLCs must be installed by a network administrator or qualified IT professional and the installer must select the proper country code. Following installation, access to the unit should be password protected by the installer to maintain compliance with regulatory requirements and to ensure proper unit functionality. See the related product guide for the most recent country codes and regulatory domains.

You can use the show country command to display a list of supported countries.

Examples

The following example shows how to configure the controller’s country code to DE:

(Cisco Controller) >config country DE

config cts sxp

To configure Cisco TrustSec SXP (CTS) connections on the controller, use the config cts sxp command.

config cts sxp { enable | disable | connection { delete | peer} | default password password | retry period time-in-seconds}

Syntax Description

enable

Enables CTS connections on the controller.

disable

Disables CTS connections on the controller.

connection

Configures CTS connection on the controller.

delete

Deletes the CTS connection on the controller.

peer

Configures the next hop switch with which the controller is connected.

ip-address

Only IPv4 address of the peer.

default password

Configures the default password for MD5 authentication of SXP messages.

password

Default password for MD5 Authentication of SXP messages. The password should contain a minimum of six characters.

retry period

Configures the SXP retry period.

time-in-seconds

Time after which a CTS connection should be again tried for after a failure to connect.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

For release 8.0, only IPv4 is supported for TrustSec SXP configuration.

Examples

The following example shows how to enable CTS on the controller:


(Cisco Controller) > config cts sxp enable

The following example shows how to configure a peer for a CTS connection:

> config cts sxp connection peer 209.165.200.224

config custom-web ext-webauth-mode

To configure external URL web-based client authorization for the custom-web authentication page, use the config custom-web ext-webauth-mode command.

config custom-web ext-webauth-mode { enable | disable}

Syntax Description

enable

Enables the external URL web-based client authorization.

disable

Disables the external URL we-based client authentication.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the external URL web-based client authorization:


(Cisco Controller) > config custom-web ext-webauth-mode enable

config custom-web ext-webauth-url

To configure the complete external web authentication URL for the custom-web authentication page, use the config custom-web ext-webauth-url command.

config custom-web ext-webauth-url URL

Syntax Description

URL

URL used for web-based client authorization.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the complete external web authentication URL http://www.AuthorizationURL.com/ for the web-based client authorization:


(Cisco Controller) > config custom-web ext-webauth-url http://www.AuthorizationURL.com/

config custom-web ext-webserver

To configure an external web server, use the config custom-web ext-webserver command.

config custom-web ext-webserver { add index IP_address | delete index}

Syntax Description

add

Adds an external web server.

index

Index of the external web server in the list of external web server. The index must be a number between 1 and 20.

IP_address

IP address of the external web server.

delete

Deletes an external web server.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

8.0

This command supports only IPv4 address format.

Examples

The following example shows how to add the index of the external web server 2 to the IP address of the external web server 192.23.32.19:


(Cisco Controller) > config custom-web ext-webserver add 2 192.23.32.19

config custom-web logout-popup

To enable or disable the custom web authentication logout popup, use the config custom-web logout-popup command.

config custom-web logout-popup { enable| disable}

Syntax Description

enable

Enables the custom web authentication logout popup. This page appears after a successful login or a redirect of the custom web authentication page.

disable

Disables the custom web authentication logout popup.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to disable the custom web authentication logout popup:


(Cisco Controller) > config custom-web logout-popup disable

config custom-web radiusauth

To configure the RADIUS web authentication method, use the config custom-web radiusauth command.

config custom-web radiusauth { chap | md5chap | pap}

Syntax Description

chap

Configures the RADIUS web authentication method as Challenge Handshake Authentication Protocol (CHAP).

md5chap

Configures the RADIUS web authentication method as Message Digest 5 CHAP (MD5-CHAP).

pap

Configures the RADIUS web authentication method as Password Authentication Protocol (PAP).

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the RADIUS web authentication method as MD5-CHAP:


(Cisco Controller) > config custom-web radiusauth md5chap

config custom-web redirectUrl

To configure the redirect URL for the custom-web authentication page, use the config custom-web redirectUrl command.

config custom-web redirectUrl URL

Syntax Description

URL

URL that is redirected to the specified address.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the URL that is redirected to abc.com:


(Cisco Controller) > config custom-web redirectUrl abc.com

config custom-web sleep-client

To delete a web-authenticated sleeping client, use the config custom-web sleep-client command.

config custom-web sleep-client delete mac_address

Syntax Description

delete

Deletes a web-authenticated sleeping client with the help of the client MAC address.

mac_address

MAC address of the sleeping client.

Command Default

The web-authenticated sleeping client is not deleted.

Command History

Release Modification

7.5

This command was introduced.

Examples

The following example shows how to delete a web-authenticated sleeping client:


(Cisco Controller) > config custom-web sleep-client delete 0:18:74:c7:c0:90

config custom-web webauth-type

To configure the type of web authentication, use the config custom-web webauth-type command.

config custom-web webauth-type { internal | customized | external}

Syntax Description

internal

Configures the web authentication type to internal.

customized

Configures the web authentication type to customized.

external

Configures the web authentication type to external.

Command Default

The default web authentication type is internal .

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the type of the web authentication type to internal:


(Cisco Controller) > config custom-web webauth-type internal

config custom-web weblogo

To configure the web authentication logo for the custom-web authentication page, use the config custom-web weblogo command.

config custom-web weblogo { enable | disable}

Syntax Description

enable

Enables the web authentication logo settings.

disable

Enable or disable the web authentication logo settings.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the web authentication logo:


(Cisco Controller) > config custom-web weblogo enable

config custom-web webmessage

To configure the custom web authentication message text for the custom-web authentication page, use the config custom-web webmessage command.

config custom-web webmessage message

Syntax Description

message

Message text for web authentication.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the message text Thisistheplace for webauthentication:


(Cisco Controller) > config custom-web webmessage Thisistheplace

config custom-web webtitle

To configure the web authentication title text for the custom-web authentication page, use the config custom-web webtitle command.

config custom-web webtitle title

Syntax Description

title

Custom title text for web authentication.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to set the custom title text Helpdesk for web authentication:


(Cisco Controller) > config custom-web webtitle Helpdesk

config database size

To configure the local database, use the config database size command.

config database size count

Syntax Description

count

Database size value between 512 and 2040

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Use the show database command to display local database configuration.

Examples

The following example shows how to configure the size of the local database:


(Cisco Controller) > config database size 1024

config dhcp

To configure the internal DHCP, use the config dhcp command.

config dhcp { address-pool scope start end | create-scope scope | 
 default-router scope router_1 [ router_2] [ router_3] | delete-scope scope | disable scope | 
 dns-servers scope dns1 [ dns2] [ dns3] | domain scope domain | 
 enable scope | lease scope lease_duration | 
 netbios-name-server scope wins1 [ wins2] [ wins3] | 
 networkscope network netmask}

config dhcpopt-82 remote-id { ap_mac | ap_mac:ssid | ap-ethmac | apname:ssid | ap-group-name | flex-group-name | ap-location | apmac-vlan_id | apname-vlan_id | ap-ethmac-ssid }

Syntax Description

address-pool scope start end

Configures an address range to allocate. You must specify the scope name and the first and last addresses of the address range.

create-scope name

Creates a new DHCP scope. You must specify the scope name.

default-router scope router_1 [router_2] [router_3]

Configures the default routers for the specified scope and specify the IP address of a router. Optionally, you can specify the IP addresses of secondary and tertiary routers.

delete-scope scope

Deletes the specified DHCP scope.

disable scope

Disables the specified DHCP scope.

dns-servers scope dns1 [dns2] [dns3]

Configures the name servers for the given scope. You must also specify at least one name server. Optionally, you can specify secondary and tertiary name servers.

domain scope domain

Configures the DNS domain name. You must specify the scope and domain names.

enable scope

Enables the specified dhcp scope.

lease scope lease_duration

Configures the lease duration (in seconds) for the specified scope.

netbios-name-server scope wins1 [wins2] [wins3]

Configures the netbios name servers. You must specify the scope name and the IP address of a name server. Optionally, you can specify the IP addresses of secondary and tertiary name servers.

network scope network netmask

Configures the network and netmask. You must specify the scope name, the network address, and the network mask.

opt-82 remote-id

Configures the DHCP option 82 remote ID field format.

DHCP option 82 provides additional security when DHCP is used to allocate network addresses. The controller acts as a DHCP relay agent to prevent DHCP client requests from untrusted sources. The controller adds option 82 information to DHCP requests from clients before forwarding the requests to the DHCP server.

ap_mac

MAC address of the access point to the DHCP option 82 payload.

ap_mac:ssid

MAC address and SSID of the access point to the DHCP option 82 payload.

ap-ethmac

Remote ID format as AP Ethernet MAC address.

apname:ssid

Remote ID format as AP name:SSID.

ap-group-name

Remote ID format as AP group name.

flex-group-name

Remote ID format as FlexConnect group name .

ap-location

Remote ID format as AP location.

apmac-vlan_id

Remote ID format as AP radio MAC address:VLAN_ID.

apname-vlan_id

Remote ID format as AP Name:VLAN_ID.

ap-ethmac-ssid

Remote ID format as AP Ethernet MAC:SSID address.

Command Default

The default value for ap-group-name is default-group, and for ap-location, the default value is default location.

If ap-group-name and flex-group-name are null, the system MAC is sent as the remote ID field.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Use the show dhcp command to display the internal DHCP configuration.

Examples

The following example shows how to configure the DHCP lease for the scope 003:


(Cisco Controller) >config dhcp lease 003

config dhcp opt-82 format

To configure the DHCP option 82 format, use the config dhcp opt-82 format command.

config dhcp opt-82 format{ binary | ascii}

Syntax Description

binary

Specifies the DHCP option 82 format as binary.

ascii

Specifies the DHCP option 82 format as ASCII.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the format of DHCP option 82 payload:

(Cisco Controller) > config dhcp opt-82 format binary

config dhcp opt-82 remote-id

To configure the format of the DHCP option 82 payload, use the config dhcp opt-82 remote-id command.

config dhcp opt-82 remote-id { ap_mac | ap_mac:ssid | ap-ethmac | apname:ssid | ap-group-name | flex-group-name | ap-location | apmac-vlan-id | apname-vlan-id | ap-ethmac-ssid}

Syntax Description

ap_mac

Specifies the radio MAC address of the access point to the DHCP option 82 payload.

ap_mac:ssid

Specifies the radio MAC address and SSID of the access point to the DHCP option 82 payload.

ap-ethmac

Specifies the Ethernet MAC address of the access point to the DHCP option 82 payload.

apname:ssid

Specifies the AP name and SSID of the access point to the DHCP option 82 payload.

ap-group-name

Specifies the AP group name to the DHCP option 82 payload.

flex-group-name

Specifies the FlexConnect group name to the DHCP option 82 payload.

ap-location

Specifies the AP location to the DHCP option 82 payload.

apmac-vlan-id

Specifies the radio MAC address of the access point and the VLAN ID to the DHCP option 82 payload.

apname-vlan-id

Specifies the AP name and its VLAN ID to the DHCP option 82 payload.

ap-ethmac-ssid

Specifies the Ethernet MAC address of the access point and the SSID to the DHCP option 82 payload.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the remote ID of DHCP option 82 payload:

(Cisco Controller) > config dhcp opt-82 remote-id apgroup1

config dhcp proxy

To specify the level at which DHCP packets are modified, use the config dhcp proxy command.

config dhcp proxy { enable | disable { bootp-broadcast [ enable | disable]}

Syntax Description

enable

Allows the controller to modify the DHCP packets without a limit.

disable

Reduces the DHCP packet modification to the level of a relay.

bootp-broadcast

Configures DHCP BootP broadcast option.

Command Default

DHCP is enabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Use the show dhcp proxy command to display the status of DHCP proxy handling.

To enable third-party WGB support, you must enable the passive-client feature on the wirless LAN by entering the config wlan passive-client enable command.

Examples

The following example shows how to disable the DHCP packet modification:


(Cisco Controller) >config dhcp proxy disable

The following example shows how to enable the DHCP BootP broadcast option:

(Cisco Controller) >config dhcp proxy disable bootp-broadcast enable

config dhcp timeout

To configure a DHCP timeout value, use the config dhcp timeout command. If you have configured a WLAN to be in DHCP required state, this timer controls how long the WLC will wait for a client to get a DHCP lease through DHCP.

config dhcp timeout timeout-value

Syntax Description

timeout-value

Timeout value in the range of 5 to 120 seconds.

Command Default

The default timeout value is 120 seconds.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to set the DHCP timeout to 10 seconds:

(Cisco Controller) >config dhcp timeout 10

config exclusionlist

To create or delete an exclusion list entry, use the config exclusionlist command.

config exclusionlist { add MAC [ description] | delete MAC | description MAC [ description]}

Syntax Description

config exclusionlist

Configures the exclusion list.

add

Creates a local exclusion-list entry.

delete

Deletes a local exclusion-list entry

description

Specifies the description for an exclusion-list entry.

MAC

MAC address of the local Excluded entry.

description

(Optional) Description, up to 32 characters, for an excluded entry.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to create a local exclusion list entry for the MAC address xx:xx:xx:xx:xx:xx:

(Cisco Controller) > config exclusionlist add xx:xx:xx:xx:xx:xx lab

The following example shows how to delete a local exclusion list entry for the MAC address xx:xx:xx:xx:xx:xx:

(Cisco Controller) > config exclusionlist delete xx:xx:xx:xx:xx:xx lab

config flexconnect [ipv6] acl

To apply access control lists that are configured on a FlexConnect access point, use the config flexconnect [ipv6] acl command. Use the ipv6 keyword to configure IPv6 FlexConnect ACLs .

config flexconnect [ ipv6] acl { apply | create | delete} acl_name

Syntax Description

ipv6

Use this option to configure IPv6 FlexConnect ACLs. If you don't use this option, then IPv4 FlexConnect ACLs will be configured.

apply

Applies an ACL to the data path.

create

Creates an ACL.

delete

Deletes an ACL.

acl_name

ACL name that contains up to 32 alphanumeric characters.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

8.8

IPv6 ACL option was introduced.

Examples

The following example shows how to apply the IPv4 ACL configured on a FlexConnect access point:

(Cisco Controller) >config flexconnect acl apply acl1

config flexconnect [ipv6] acl rule

To configure access control list (ACL) rules on a FlexConnect access point, use the config flexconnect [ipv6] acl rule command.

config flexconnect [ ipv6] acl rule { action rule_name rule_index { permit | deny} | 
 add rule_name rule_index | 
 change index rule_name old_index new_index | 
 delete rule_name rule_index | 
 destination address rule_name rule_index ip_address netmask | 
 destination port range rule_name rule_index start_port end_port |
 direction rule_name rule_index { in | out | any} | 
 dscp rule_name rule_index dscp | 
 protocol rule_name rule_index protocol | 
 source address rule_name rule_index ip_address netmask | 
 source port range rule_name rule_index start_port end_port |
 swap index rule_name index_1 index_2}

Syntax Description

ipv6

Use this option to configure IPv6 FlexConnect ACL rules. If you don't use this option, then IPv4 FlexConnect ACL rules will be configured.

action

Configures whether to permit or deny access.

rule_name

ACL name that contains up to 32 alphanumeric characters.

rule_index

Rule index between 1 and 32.

permit

Permits the rule action.

deny

Denies the rule action.

add

Adds a new rule.

change

Changes a rule’s index.

index

Specifies a rule index.

delete

Deletes a rule.

destination address

Configures a rule’s destination IP address and netmask.

ip_address

IP address of the rule.

netmask

Netmask of the rule.

start_port

Start port number (between 0 and 65535).

end_port

End port number (between 0 and 65535).

direction

Configures a rule’s direction to in, out, or any.

in

Configures a rule’s direction to in.

out

Configures a rule’s direction to out.

any

Configures a rule’s direction to any.

dscp

Configures a rule’s DSCP.

dscp

Number between 0 and 63, or any .

protocol

Configures a rule’s DSCP.

protocol

Number between 0 and 255, or any .

source address

Configures a rule’s source IP address and netmask.

source port range

Configures a rule’s source port range.

swap

Swaps two rules’ indices.

index_1

The rule first index to swap.

index_2

The rule index to swap the first index with.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

8.8

IPv6 ACL option was introduced.

Examples

This example shows how to configure an ACL to permit access:

(Cisco Controller) >config flexconnect acl rule action lab1 4 permit

config flexconnect [ipv6] acl url-domain

To configure a URL domain-based rule for a FlexConnect ACL, use the config flexconnect acl [ipv6] url-domain command.

config flexconnect [ ipv6]acl url-domain {action acl-name index action | add acl-name index | delete acl-name index | url acl-name index url-name}

Syntax Description

ipv6

Use this option to configure URL domain-based rules for IPv6 FlexConnect ACLs. If you don't use this option, then IPv4 FlexConnect ACL rules will be configured.

action acl-name index action

Configures the action for the FlexConnect ACL rule, whether to permit or deny access.

add acl-name index

Adds URL domain to the FlexConnect ACL.

delete acl-name index

Deletes the URL domain from the FlexConnect ACL.

url acl-name index url-name

Configures the URL name in the FlexConnect ACL.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

8.8

IPv6 ACL option was introduced.

Examples

This example shows how to configure URL-based rule for an IPv6 FlexConnect ACL:

(Cisco Controller) >config flexconnect ipv6 acl url-domain action acls-to-allow 2 permit

config flexconnect arp-caching

To save an ARP entry for a client in the cache with locally switched WLAN on FlexConnect APs or in a software-defined access (Fabric) deployment, use config flexconnect arp-caching command.

config flexconnect arp-caching { enable } disable}

Syntax Description

arp-caching enable

Instructs the access point to save the ARP entry for a client in the cache and reply on its behalf of the client for locally switched WLAN.

arp-caching disable

Disables ARP caching.

Command Default

None

Command History

Release Modification
8.0

This command was introduced.

8.5.151.0, 8.8.12x.0, 8.9.111.0, 8.10

This command was made applicable to software-defined access deployments as well.

Examples

The following example shows how to apply the proxy ARP with locally switched WLAN on FlexConnect APs.

(Cisco Controller) >config flexconnect arp-caching enable

config flexconnect avc profile

To configure a Flexconnect Application Visibility and Control (AVC) profile, use the config flexconnect avc profile command.

config flexconnect avc profile profilename { create | delete} | apply | rule { add application app-name { drop| { mark dscp-value}}}| { remove application app-name}

Syntax Description

proflie-name

Name of the AVC profile. The range is from 0 to 32 alphanumeric characters.

create

Creates an AVC profile.

delete

Deletes an AVC profile.

apply

Applies an AVC profile.

rule

Configures a Rule for an AVC profile.

add application

Adds a rule for an AVC profile.

app-name

Name of the application. The range is from 0 to 32 alphanumeric characters.

drop

Adds a rule to drop packets.

mark

Adds a rule to mark packets with specific differentiated services code point (DSCP).

dscp-value

DSCP value for marking packets. The range is from 0 to 63.

remove application

Removes a rule for an AVC profile.

Command Default

None

Command History

Release Modification
8.1

This command was introduced.

Examples

The following example shows how to create a FlexConnect profile:

(Cisco Controller) >config flexconnect avc profile profile1 create

config flexconnect fallback-radio-shut

To configure the radio interface of an access point when the Ethernet link is not operational, use the config flexconnect fallback-radio-shut command.

config flexconnect fallback-radio-shut { disable | enable delay delay-in-sec}

Syntax Description

disable

Disables the radio interface shutdown.

enable

Enables the radio interface shutdown.

delay

Specifies the delay for the interface after which the radio interface has to be shut down.

delay-in-sec

Delay duration, in seconds.

Command Default

The radio interface shutdown is disabled.

Command History

Release Modification
7.6

This command was introduced.

Usage Guidelines

You can specify the delay duration only if you enable the radio interface shutdown.

Examples

The following example shows how to enable the radio interface shutdown after a delay duration of 5 seconds:

(Cisco Controller) >config flexconnect fallback-radio-shut enable delay 5

config flexconnect group

To add, delete, or configure a FlexConnect group, use the config flexconnect group command.

config flexconnect group group_name 
{ add | delete | ap { add | delete} ap-mac | radius { ap { authority { id hex_id | info auth_info} | disable | eap-fast { enable | disable} | enable | leap { enable | disable} | pac-timeout timeout | server-key { auto | key} | user { add { username password} | delete username}}} | server auth { add | delete} { primary | secondary} server_index IP_address auth_port secret} | predownload { disable | enable} | master ap_name | slave { retry-count max_count | ap-name cisco_ap} | start { primary backup abort} | local-split { wlan wlan_id acl acl_name { enable | disable}} | multicast overridden-interface { enable | disable} | vlan { add vlan_id acl in-aclname out-aclname | delete vlan_id } | web-auth wlan wlan_id acl acl_name { enable | disable} | web-policy acl { add | delete} acl_name}

config flexconnect group group_name radius ap { eap-cert download | eap-tls { enable | disable} | peap { enable | disable} }

config flexconnect group group_name policy acl { add | delete} acl_name

config flexconnect group group_name { add | delete} http-proxy ipaddress ip-address port port -no

Syntax Description

group_name

Group name.

add

Adds a FlexConnect group.

delete

Deletes a FlexConnect group.

ap

Adds or deletes an access point to a FlexConnect group.

add

Adds an access point to a FlexConnect group.

delete

Deletes an access point to a FlexConnect group.

ap_mac

MAC address of the access point.

radius

Configures the RADIUS server for client authentication for a FlexConnect group.

ap

Configures an access point based RADIUS server for client authentication for a FlexConnect group.

authority

Configures the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) authority parameters.

id

Configures the authority identifier of the local EAP-FAST server.

hex_id

Authority identifier of the local EAP-FAST server in hexadecimal characters. You can enter up to 32 hexadecimal even number of characters.

info

Configures the authority identifier of the local EAP-FAST server in text format.

auth_info

Authority identifier of the local EAP-FAST server in text format.

disable

Disables an AP based RADIUS server.

eap-fast

Enables or disables Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) authentication.

enable

Enables EAP-FAST authentication.

disable

Disables EAP-FAST authentication.

enable

Enables AP based RADIUS Server.

leap

Enables or disables Lightweight Extensible Authentication Protocol (LEAP) authentication.

disable

Disables LEAP authentication.

enable

Enables LEAP authentication.

pac-timeout

Configures the EAP-FAST Protected Access Credential (PAC) timeout parameters.

timeout

PAC timeout in days. The range is from 2 to 4095. A value of 0 indicates that it is disabled.

server-key

Configures the EAP-FAST server key. The server key is used to encrypt and decrypt PACs.

auto

Automatically generates a random server key.

key

Key that disables efficient upgrade for a FlexConnect group.

user

Manages the user list at the AP-based RADIUS server.

add

Adds a user. You can configure a maximum of 100 users.

username

Username that is case-sensitive and alphanumeric and can be up to 24 characters.

password

Password of the user.

delete

Deletes a user.

server

Configures an external RADIUS server.

add

Adds an external RADIUS server.

delete

Deletes an external RADIUS server.

primary

Configures an external primary RADIUS server.

secondary

Configures an external secondary RADIUS server.

server_index

Index of the RADIUS server.

IP_address

IP address of the RADIUS server.

auth_port

Port address of the RADIUS server.

secret

Index of the RADIUS server.

predownload

Configures an efficient AP upgrade for the FlexConnect group. You can download an upgrade image to the access point from the controller without resetting the access point or losing network connectivity.

disable

Disables an efficient upgrade for a FlexConnect group.

enable

Enables an efficient upgrade for a FlexConnect group.

master

Manually designates an access point in the FlexConnect group as the primary AP.

ap_name

Access point name.

slave

Manually designates an access point in the FlexConnect group as the subordinate AP.

retry-count

Configures the number of times the subordinate access point tries to predownload an image from the primary.

max_count

Maximum number of times the subordinate access point tries to predownload an image from the primary.

ap_name

Override the manually configured primary.

cisco_ap

Name of the primary access point.

start

Starts the predownload image upgrade for the FlexConnect group.

primary

Starts the predownload primary image upgrade for the FlexConnect group.

backup

Starts the predownload backup image upgrade for the FlexConnect group.

abort

Terminates the predownload image upgrade for the FlexConnect group.

local-split

Configures a local-split ACL on a FlexConnect AP group per WLAN.

wlan

Configures a WLAN for a local split ACL on a FlexConnect AP group.

wlan_id

Wireless LAN identifier between 1 and 512 (inclusive).

acl

Configures a local split ACL on a FlexConnect AP group per WLAN.

acl_name

Name of the ACL.

multicast overridden-interface

Configures multicast across the Layer 2 broadcast domain on the overridden interface for locally switched clients.

vlan

Configures a VLAN to the FlexConnect group.

add

Adds a VLAN to the FlexConnect group.

vlan_id

VLAN identifier.

in-acl

Inbound ACL name that contains up to 32 alphanumeric characters.

out-acl

Outbound ACL name that contains up to 32 alphanumeric characters.

delete

Deletes a VLAN from the FlexConnect group.

web-auth

Configures a FlexConnect ACL for external web authentication.

wlan

Specifies the wireless LAN to be configured with a FlexConnect ACL.

wlan_id

Wireless LAN identifier between 1 and 512 (inclusive).

cisco_ap

Name of the FlexConnect access point.

acl

Configures a FlexConnect ACLs.

web-policy

Configures a web policy FlexConnect ACL.

add

Adds a web policy FlexConnect ACL to the FlexConnect group.

delete

Deletes a web policy FlexConnect ACL from the FlexConnect group

eap-cert download

Downloads the EAP root and device certificate.

eap-tls

Enables or disables EAP-Transport Layer Security (EAP-TLS) authentication.

peap

Enables or disables Protected Extensible Authentication Protocol (PEAP) authentication.

policy acl

Configures policy ACL on the FlexConnect group.

http-proxy ipaddress

Configures http-proxy server.

ip-address

IP address for flexgroup http-proxy.

port-no

Port number for flexgroup http-proxy.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.3 This command was modified.

Usage Guidelines

You can add up to 100 clients.

Beginning in Release 7.4 and later releases, the supported maximum number of RADIUS servers is 100.

Examples

The following example shows how to add a FlexConnect group for MAC address 192.12.1.2:

(Cisco Controller) >config flexconnect group 192.12.1.2 add

The following example shows how to add a RADIUS server as a primary server for a FlexConnect group with the server index number 1:

(Cisco Controller) >config flexconnect group 192.12.1.2 radius server add primary 1

The following example shows how to enable a local split ACL on a FlexConnect AP group for a WLAN:

(Cisco Controller) >config flexconnect group flexgroup1 local-split wlan 1 acl flexacl1 enable

config flexconnect group vlan

To configure VLAN for a FlexConnect group, use the config flexconnect group vlan command.

config flexconnect group group_name vlan { add vlan-id acl in-aclname out-aclname | delete vlan-id}

Syntax Description

group_name

FlexConnect group name.

add

Adds a VLAN for the FlexConnect group.

vlan-id

VLAN ID.

acl

Specifies an access control list.

in-aclname

In-bound ACL name.

out-aclname

Out-bound ACL name.

delete

Deletes a VLAN from the FlexConnect group.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to add VLAN ID 1 for the FlexConnect group myflexacl where the in-bound ACL name is in-acl and the out-bound ACL is out-acl:

(Cisco Controller) >config flexconnect group vlan myflexacl vlan add 1 acl in-acl out-acl

config flexconnect group group-name dhcp overridden-interface

To enable or disable the DHCP overridden interface for a FlexConnect group, use the config flexconnect group group-name dhcp overridden-interface command.

config flexconnect group group-name dhcp overridden-interface { enable | disable}

Syntax Description

overridden-interface

The DHCP overridden interface for FlexConnect group.

group-name

Name of the FlexConnect group.

enable

Instructs the access point to enable DHCP broadcast for locally switched clients.

disable

Disables the feature.

Command Default

None

Command History

Release Modification
8.0

This command was introduced.

Examples

The following example shows how to enable DHCP broadcast for locally switched clients.

(Cisco Controller) >config flexconnect
	 group flexgroup dhcp overridden-interface enable

config flexconnect group web-auth

To configure Web-Auth ACL for a FlexConnect group, use the config flexconnect group web-auth command.

config flexconnect group group_name web-auth wlan wlan-id acl acl-name { enable | disable}

Syntax Description

group_name

FlexConnect group name.

wlan-id

WLAN ID.

acl-name

ACL name.

enable

Enables the Web-Auth ACL for a FlexConnect group.

disable

Disables the Web-Auth ACL for a FlexConnect group.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable Web-Auth ACL webauthacl for the FlexConnect group myflexacl on WLAN ID 1:

(Cisco Controller) >config flexconnect group myflexacl web-auth wlan 1 acl webauthacl enable

config flexconnect group web-policy

To configure Web Policy ACL for a FlexConnect group, use the config flexconnect group web-policy command.

config flexconnect group group_name web-policy acl { add | delete} acl-name

Syntax Description

group_name

FlexConnect group name.

add

Adds the Web Policy ACL.

delete

Deletes the Web Policy ACL.

acl-name

Name of the Web Policy ACL.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to add the Web Policy ACL mywebpolicyacl to the FlexConnect group myflexacl:

(Cisco Controller) >config flexconnect group myflexacl web-policy acl add mywebpolicyacl

config flexconnect join min-latency

To enable or disable the access point to choose the controller with the least latency when joining, use the config flexconnect join min-latency command.

config flexconnect join min-latency { enable | disable} cisco_ap

Syntax Description

enable

Enables the access point to choose the controller with the least latency when joining.

disable

Disables the access point to choose the controller with the least latency when joining.

cisco_ap

Cisco lightweight access point.

Command Default

The access point cannot choose the controller with the least latency when joining.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

When you enable this feature, the access point calculates the time between the discovery request and discovery response and joins the controller that responds first.

This configuration overrides the HA setting on the controller, and is applicable only for OEAP access points.

Examples

The following example shows how to enable the access point to choose the controller with the least latency when joining:

(Cisco Controller) >config flexconnect join min-latency enable CISCO_AP

config flexconnect office-extend

To configure FlexConnect mode for an OfficeExtend access point, use the config flexconnect office-extend command.

config flexconnect office-extend {{ enable | disable} cisco_ap | clear-personalssid-config cisco_ap}

Syntax Description

enable

Enables the OfficeExtend mode for an access point.

disable

Disables the OfficeExtend mode for an access point.

clear-personalssid-config

Clears only the access point’s personal SSID.

cisco_ap

Cisco lightweight access point.

Command Default

OfficeExtend mode is enabled automatically when you enable FlexConnect mode on the access point.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Currently, only Cisco Aironet 1130 series and 1140 series access points that are joined to a Cisco 5500 Series Controller with a WPlus license can be configured to operate as OfficeExtend access points.

Rogue detection is disabled automatically when you enable the OfficeExtend mode for an access point. OfficeExtend access points, which are deployed in a home environment, are likely to detect a large number of rogue devices. You can enable or disable rogue detection for a specific access point or for all access points by using the config rogue detection command.

DTLS data encryption is enabled automatically when you enable the OfficeExtend mode for an access point. However, you can enable or disable DTLS data encryption for a specific access point or for all access points by using the config ap link-encryption command.

Telnet and SSH access are disabled automatically when you enable the OfficeExtend mode for an access point. However, you can enable or disable Telnet or SSH access for a specific access point by using the config ap telnet or config ap ssh command.

Link latency is enabled automatically when you enable the OfficeExtend mode for an access point. However, you can enable or disable link latency for a specific access point or for all access points currently associated to the controller by using the config ap link-latency command.

Examples

The following example shows how to enable the office-extend mode for the access point Cisco_ap:

(Cisco Controller) >config flexconnect office-extend enable Cisco_ap

The following example shows how to clear only the access point’s personal SSID for the access point Cisco_ap:

(Cisco Controller) >config flexconnect office-extend clear-personalssid-config Cisco_ap

config flow

To configure a NetFlow Monitor and Exporter, use the config flow command.

config flow { add | delete} monitor monitor_name { exporter exporter_name | record{ ipv4_client_app_flow_record | ipv4_client_src_dst_flow_record}

Syntax Description

add

Associates either a NetFlow monitor with an exporter, or a NetFlow record with a NetFlow monitor.

delete

Dissociates either a NetFlow monitor from an exporter, or a NetFlow record from a NetFlow monitor.

monitor

Configures a NetFlow monitor.

monitor_name

Name of the NetFlow monitor. The monitor name can be up to 32 case-sensitive, alphanumeric characters. You cannot include spaces in a monitor name.

exporter

Configures a NetFlow exporter.

exporter_name

Name of the NetFlow exporter. The exporter name can be up to 32 case-sensitive, alphanumeric characters. You cannot include spaces in an exporter name.

record

Associates a NetFlow record to the NetFlow monitor.

ipv4_client_app_flow_record

Existing record template for better performance.

ipv4_client_src_dst_flow_record

Enhanced record template for better coverage.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

An exporter is a network entity that exports the template with IP traffic information. The Cisco WLC acts as an exporter. A NetFlow record in the Cisco WLC contains the information about the traffic in a given flow, such as client MAC address, client source IP address, WLAN ID, incoming and outgoing bytes of data, incoming and outgoing packets, and incoming and outgoing Differentiated Services Code Point (DSCP).

Examples

The following example shows how to configure a NetFlow monitor and exporter:


(Cisco Controller) > config flow add monitor monitor1 exporter exporter1

config guest-lan

To create, delete, enable or disable a wireless LAN, use the config guest-lan command.

config guest-lan { create | delete} guest_lan_id interface_name | { enable | disable} guest_lan_id

Syntax Description

create

Creates a wired LAN settings.

delete

Deletes a wired LAN settings:

guest_lan_id

LAN identifier between 1 and 5 (inclusive).

interface_name

Interface name up to 32 alphanumeric characters.

enable

Enables a wireless LAN.

disable

Disables a wireless LAN.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable a wireless LAN with the LAN ID 16:


(Cisco Controller) > config guest-lan enable 16

config guest-lan custom-web ext-webauth-url

To redirect guest users to an external server before accessing the web login page, use the config guest-lan custom-web ext-webauth-url command.

config guest-lan custom-web ext-webauth-url ext_web_url guest_lan_id

Syntax Description

ext_web_url

URL for the external server.

guest_lan_id

Guest LAN identifier between 1 and 5 (inclusive).

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable a wireless LAN with the LAN ID 16:


(Cisco Controller) > config guest-lan custom-web ext-webauth-url http://www.AuthorizationURL.com/ 1

config guest-lan custom-web global disable

To use a guest-LAN specific custom web configuration rather than a global custom web configuration, use the config guest-lan custom-web global disable command.

config guest-lan custom-web global disable guest_lan_id

Syntax Description

guest_lan_id

Guest LAN identifier between 1 and 5 (inclusive).

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If you enter the config guest-lan custom-web global enable guest_lan_id command, the custom web authentication configuration at the global level is used.

Examples

The following example shows how to disable the global web configuration for guest LAN ID 1:


(Cisco Controller) > config guest-lan custom-web global disable 1

config guest-lan custom-web login_page

To enable wired guest users to log into a customized web login page, use the config guest-lan custom-web login_page command.

config guest-lan custom-web login_page page_name guest_lan_id

Syntax Description

page_name

Name of the customized web login page.

guest_lan_id

Guest LAN identifier between 1 and 5 (inclusive).

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to customize a web login page custompage1 for guest LAN ID 1:


(Cisco Controller) > config guest-lan custom-web login_page custompage1 1

config guest-lan custom-web webauth-type

To define the web login page for wired guest users, use the config guest-lan custom-web webauth-type command.

config guest-lan custom-web webauth-type { internal | customized | external} guest_lan_id

Syntax Description

internal

Displays the default web login page for the controller. This is the default value.

customized

Displays the custom web login page that was previously configured.

external

Redirects users to the URL that was previously configured.

guest_lan_id

Guest LAN identifier between 1 and 5 (inclusive).

Command Default

The default web login page for the controller is internal.

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the guest LAN with the webauth-type as internal for guest LAN ID 1:


(Cisco Controller) > config guest-lan custom-web webauth-type internal 1

config guest-lan ingress-interface

To configure the wired guest VLAN’s ingress interface that provides a path between the wired guest client and the controller through the Layer 2 access switch, use the config guest-lan ingress-interface command.

config guest-lan ingress-interface guest_lan_id interface_name

Syntax Description

guest_lan_id

Guest LAN identifier from 1 to 5 (inclusive).

interface_name

Interface name.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to provide a path between the wired guest client and the controller with guest LAN ID 1 and the interface name guest01:


(Cisco Controller) > config guest-lan ingress-interface 1 guest01

config guest-lan interface

To configure an egress interface to transmit wired guest traffic out of the controller, use the config guest-lan interface command.

config guest-lan interface guest_lan_id interface_name

Syntax Description

guest_lan_id

Guest LAN identifier between 1 and 5 (inclusive).

interface_name

Interface name.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure an egress interface to transmit guest traffic out of the controller for guest LAN ID 1 and interface name guest01:


(Cisco Controller) > config guest-lan interface 1 guest01

config guest-lan mobility anchor

To add or delete mobility anchor, use the config guest-lan mobility anchor command.

config guest-lan mobility anchor { add | delete} Guest LAN Id IP addr

Syntax Description

add

Adds a mobility anchor to a WLAN.

delete

Deletes a mobility anchor from a WLAN.

Guest LAN Id

Guest LAN identifier between 1 and 5.

IP addr

Member switch IPv4 or IPv6 address to anchor WLAN.

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

8.0

This command supports both IPv4 and IPv6 address formats.

Examples

The following example shows how to delete a mobility anchor for WAN ID 4 and the anchor IP 192.168.0.14 :


(Cisco Controller) > config guest-lan mobility anchor delete 4 192.168.0.14

config guest-lan nac

To enable or disable Network Admission Control (NAC) out-of-band support for a guest LAN, use the config guest-lan nac command:

config guest-lan nac { enable | disable} guest_lan_id

Syntax Description

enable

Enables the NAC out-of-band support.

disable

Disables the NAC out-of-band support.

guest_lan_id

Guest LAN identifier between 1 and 5 (inclusive).

Command Default

None

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the NAC out-of-band support for guest LAN ID 3:


(Cisco Controller) > config guest-lan nac enable 3

config guest-lan security

To configure the security policy for the wired guest LAN, use the config guest-lan security command.

config guest-lan security { web-auth { enable | disable | acl | server-precedence} guest_lan_id | web-passthrough { acl | email-input | disable | enable} guest_lan_id}

Syntax Description

web-auth

Specifies web authentication.

enable

Enables the web authentication settings.

disable

Disables the web authentication settings.

acl

Configures an access control list.

server-precedence

Configures the authentication server precedence order for web authentication users.

guest_lan_id

LAN identifier between 1 and 5 (inclusive).

web-passthrough

Specifies the web captive portal with no authentication required.

email-input

Configures the web captive portal using an e-mail address.

Command Default

The default security policy for the wired guest LAN is web authentication.

Command History

Release Modification

7.6

This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the security web authentication policy for guest LAN ID 1:


(Cisco Controller) > config guest-lan security web-auth enable 1

config interface 3g-vlan

To configure 3G/4G-VLAN interface, use the config interface 3g-vlan command.

config interface 3g-vlan interface-name { enable | disable}

Syntax Description

interface-name enable

Enables the specified 3G/4G-VLAN interface

interface-name disable

Disables the specified 3G/4G-VLAN interface

Command Default

None

Command History

Release Modification

8.1

This command was introduced.

Examples

The following example shows how to configure 3G/4G-VLAN interface,:


(Cisco Controller) > config interface 3g-vlan vlan-int enable

config interface acl

To configure access control list of an interface, use the config interface acl command.

config interface acl { ap-manager | management | interface_name} { ACL | none}

Syntax Description

ap-manager

Configures the access point manager interface.

management

Configures the management interface.

interface_name

Interface name.

ACL

ACL name up to 32 alphanumeric characters.

none

Specifies none.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN Controllers.

Examples

The following example shows how to configure an access control list with a value None:


(Cisco Controller) > config interface acl management none

config interface address

To configure address information for an interface, use the config interface address command.

config interface address 
{ ap-manager IP_address netmask gateway | 
 management IP_address netmask gateway | 
 service-port IP_address netmask | 
 virtual IP_address | 
 dynamic-interface IP_address dynamic_interface netmask gateway | redundancy-management IP_address peer-redundancy-management IP_address }

Syntax Description

ap-manager

Specifies the access point manager interface.

IP_address

IP address— IPv4 only.

netmask

Network mask.

gateway

IP address of the gateway.

management

Specifies the management interface.

service-port

Specifies the out-of-band service port interface.

virtual

Specifies the virtual gateway interface.

interface-name

Specifies the interface identified by the interface-name parameter.

interface-name

Interface name.

redundancy-management

Configures redundancy management interface IP address.

peer-redundancy-management

Configures the peer redundancy management interface IP address.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The management interface acts like an AP-manager interface by default.

This command is applicable for IPv4 addresses only.

Ensure that the management interfaces of both controllers are in the same subnet. Ensure that the Redundant Management IP address for both controllers is the same. Likewise, ensure that the Peer Redundant Management IP address for both the controllers is the same.

Examples

The following example shows how to configure an access point manager interface with IP address 209.165.201.31, network mask 255.255.0.0, and gateway address 209.165.201.30:

(Cisco Controller) > config interface address ap-manager 209.165.201.31 255.255.0.0 209.165.201.30

The following example shows how to configure a redundancy management interface on the controller:

(Cisco Controller) > config interface address redundancy-management 209.4.120.5 peer-redundancy-management 209.4.120.6

The following example shows how to configure a virtual interface:

(Cisco Controller) > config interface address virtual 192.0.2.1

config interface address redundancy-management

To configure the management interface IP address, subnet and gateway of the controller, use the config interface address redundancy-management command.

config interface address redundancy-management IP_address netmask gateway

Syntax Description

IP_address

Management interface IP address of the active controller.

netmask

Network mask.

gateway

IP address of the gateway.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You can use this command to check the Active-Standby reachability when the keep-alive fails.

Examples

The following example shows how to configure the management IP addresses of the controller:

 
(Cisco Controller) > config interface address redundancy-management 209.165.201.31 255.255.0.0 209.165.201.30

config interface ap-manager

To enable or disable access point manager features on the management or dynamic interface, use the config interface ap-manager command.

config interface ap-manager { management | interface_name} { enable | disable}

Syntax Description

management

Specifies the management interface.

interface_name

Dynamic interface name.

enable

Enables access point manager features on a dynamic interface.

disable

Disables access point manager features on a dynamic interface.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Use the management option to enable or disable dynamic AP management for the management interface. For Cisco 5500 Series Controllers, the management interface acts like an AP-manager interface by default. If desired, you can disable the management interface as an AP-manager interface and create another dynamic interface as an AP manager.

When you enable this feature for a dynamic interface, the dynamic interface is configured as an AP-manager interface (only one AP-manager interface is allowed per physical port). A dynamic interface that is marked as an AP-manager interface cannot be used as a WLAN interface.

Examples

The following example shows how to disable an access point manager myinterface:


(Cisco Controller) > config interface ap-manager myinterface disable

config interface create

To create a dynamic interface (VLAN) for wired guest user access, use the config interface create command.

config interface create interface_name vlan-id

Syntax Description

interface_name

Interface name.

vlan-id

VLAN identifier.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to create a dynamic interface with the interface named lab2 and VLAN ID 6:


(Cisco Controller) > config interface create lab2 6

config interface delete

To delete a dynamic interface, use the config interface delete command.

config interface delete interface-name

Syntax Description

interface-name

interface-name Interface name.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to delete a dynamic interface named VLAN501:


(Cisco Controller) > config interface delete VLAN501

config interface dhcp management

To configure DHCP options on a mangament interface, use the config interface dhcp management command.

config interface dhcp management 
{ option-82 { bridge-mode-insertion { enable | disable} | enable | disable | linksel { enable | disable | relaysrc interface-name} | vpnsel { enable | disable | vpnid vpn-id | vrfname vrf-name}} | primary primary-dhcp_server [ secondary secondary-dhcp_server ] | proxy-mode { enable | disable | global} }

Syntax Description

option-82

Configures DHCP Option 82 on the interface.

bridge-mode-insertion

Configures DHCP option 82 insertion in bridge mode.

disable

Disables the feature.

enable

Enables the feature.

linksel

Configures link select suboption 5 on a dynamic or management interface.

relaysrc

Configures Link select suboption 5 on relay source.

interface-name

Name of an existing WLC interface reachable from the DHCP server.

vpnid

Configures VPN select suboption 151 VPN Id.

vpn-id

VPN Id in oui:vpn-index format xxxxxx:xxxxxxxx.

vrfname

Configures VPN select suboption 151 VRF name.

vrf-name

VRF name as string of length 7.

primary

Specifies the primary DHCP server.

primary-dhcp-server

IP address of the server.

secondary

(Optional) Specifies the secondary DHCP server.

secondary-dhcp-server

IP address of the server.

proxy-mode

Configures the DHCP proxy mode on the interface.

global

Uses the global DHCP proxy mode on the interface.

disable

(Optional) Disables the DHCP proxy mode on the interface.

global

(Optional) Uses the global DHCP proxy mode on the interface.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.0

The new keywords linksel and vpnsel are added.

This command supports IPv6 from this release.

Usage Guidelines

DHCP proxy is not supported for IPv6 and it works in disabled mode.

Examples

The following example shows how to configure option 82 on a management interface.


(Cisco Controller) > config interface dhcp management option-82 enable 

config interface dhcp

Configure DHCP Option 82 insertion in Bridge mode on either management interface or dynamic interface by entering the config interface dhcp command:

config interface dhcp { management | dynamic-interface dynamic-interface-name} option-82 bridge-mode-insertion { enable | disable}

Syntax Description

management

Management interface

dynamic-interface

Dynamic interface

dynamic-interface-name

Dynamic interface name

option-82

DHCP Option 82 on the interface

bridge-mode-insertion

To configure Bridge mode insertion

Command Default

DHCP option 82 insertion in Bridge mode is disabled.

Command History

Release Modification
8.0

The Bridge mode insertion parameter was introduced in this release.

config interface address

To configure interface addresses, use the config interface address command.

config interface address { dynamic-interface dynamic_interface netmask gateway | management | redundancy-management IP_address peer-redundancy-management | service-port netmask | virtual} IP_address

Syntax Description

dynamic-interface

Configures the dynamic interface of the controller.

dynamic_interface

Dynamic interface of the controller.

IP_address

IP address of the interface.

netmask

Netmask of the interface.

gateway

Gateway of the interface.

management

Configures the management interface IP address.

redundancy-management

Configures redundancy management interface IP address.

peer-redundancy-management

Configures the peer redundancy management interface IP address.

service-port

Configures the out-of-band service port.

virtual

Configures the virtual gateway interface.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Ensure that the management interfaces of both controllers are in the same subnet. Ensure that the redundant management IP address for both controllers is the same and that the peer redundant management IP address for both the controllers is the same.

Examples

The following example shows how to configure a redundancy management interface on the controller:

 (Cisco Controller) >config interface address redundancy-management 209.4.120.5 peer-redundancy-management 209.4.120.6

The following example shows how to configure a virtual interface:

(Cisco Controller) > config interface address virtual 10.10.10.1

config interface group failure-detect

To configure failure detection mode for an interface group, use the config interface group failure-detect command.

config interface group failure-detect interface group name { aggressive | non-aggressive }

Syntax Description

interface-group-name

Name of the interface group to enable the failure-detect mode. The interface group name can be up to 32 case-sensitive, alphanumeric characters.

aggressive

The interface is marked as dirty if a client fails to get an IP from the DHCP server on this VLAN.

non-aggressive

The interface is marked as dirty if a minimum of 3 different clients fail to get an IP on this VLAN.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

None

Examples

The following example shows how to enable failure-detect, aggressive mode for an interface group floor1:

(Cisco Controller) > config interface group failure-detect floor1 aggressive

config interface group mdns-profile

To configure an mDNS (multicast DNS) profile for an interface group, use the config interface group mdns-profile command.

config interface group mdns-profile { all | interface-group-name} { profile-name | none}

Syntax Description

all

Configures an mDNS profile for all interface groups.

interface-group-name

Name of the interface group to which the mDNS profile has to be associated. The interface group name can be up to 32 case-sensitive, alphanumeric characters.

profile-name

Name of the mDNS profile.

none

Removes all existing mDNS profiles from the interface group. You cannot configure mDNS profiles on the interface group.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If the mDNS profile is associated to a WLAN, an error appears.

Examples

The following example shows how to configure an mDNS profile for an interface group floor1:

(Cisco Controller) > config interface group mdns-profile floor1 profile1

config interface guest-lan

To enable or disable the guest LAN VLAN, use the config interface guest-lan command.

config interface guest-lan interface_name { enable | disable}

Syntax Description

interface_name

Interface name.

enable

Enables the guest LAN.

disable

Disables the guest LAN.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable the guest LAN feature on the interface named myinterface:


(Cisco Controller) > config interface guest-lan myinterface enable

config interface hostname

To configure the Domain Name System (DNS) hostname of the virtual gateway interface, use the config interface hostname command.

config interface hostname virtual DNS_host

Syntax Description

virtual

Specifies the virtual gateway interface to use the specified virtual address of the fully qualified DNS name.

The virtual gateway IP address is any fictitious, unassigned IP address, such as 192.0.2.1, to be used by Layer 3 security and mobility managers.

DNS_host

DNS hostname.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure virtual gateway interface to use the specified virtual address of the fully qualified DNS hostname DNS_Host:


(Cisco Controller) > config interface hostname virtual DNS_Host

config interface nasid

To configure the Network Access Server identifier (NAS-ID) for the interface, use the config interface nasid command.

config interface nasid { NAS-ID | none} interface_name

Syntax Description

NAS-ID

Network Access Server identifier (NAS-ID) for the interface. The NAS-ID is sent to the RADIUS server by the controller (as a RADIUS client) using the authentication request, which is used to classify users to different groups. You can enter up to 32 alphanumeric characters.

can configure the NAS-ID on the interface, WLAN, or an access point group. The order of priority is AP group NAS-ID > WLAN NAS-ID > Interface NAS-ID.

none

Configures the controller system name as the NAS-ID.

interface_name

Interface name up to 32 alphanumeric characters.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The NAS-ID configured on the controller for AP group or WLAN or interface is used for authentication. The NAS-ID is not propagated across controllers.

Examples

The following example shows how to configure the NAS-ID for the interface:

(Cisco Controller) > config interface nasid

config interface nat-address

To deploy your Cisco 5500 Series Controller behind a router or other gateway device that is using one-to-one mapping network address translation (NAT), use the config interface nat-address command.

config interface nat-address { management | dynamic-interface interface_name} {{ enable | disable} | { set public_IP_address}}

Syntax Description

management

Specifies the management interface.

dynamic-interface interface_name

Specifies the dynamic interface name.

enable

Enables one-to-one mapping NAT on the interface.

disable

Disables one-to-one mapping NAT on the interface.

public_IP_address

External NAT IP address.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

These NAT commands can be used only on Cisco 5500 Series Controllers and only if the management interface is configured for dynamic AP management.

These commands are supported for use only with one-to-one-mapping NAT, where each private client has a direct and fixed mapping to a global address. They do not support one-to-many NAT, which uses source port mapping to enable a group of clients to be represented by a single IP address.

Examples

The following example shows how to enable one-to-one mapping NAT on the management interface:


(Cisco Controller) > config interface nat-address management enable

The following example shows how to set the external NAP IP address 10.10.10.10 on the management interface:


(Cisco Controller) > config interface nat-address management set 10.10.10.10

config interface port

To map a physical port to the interface (if a link aggregation trunk is not configured), use the config interface port command.

config interface port { management | interface_name | redundancy-management} primary_port [ secondary_port]

Syntax Description

management

Specifies the management interface.

interface_name

Interface name.

redundancy-management

Specifies the redundancy management interface.

primary_port

Primary physical port number.

secondary_port

(Optional) Secondary physical port number.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You can use the management option for all controllers except the Cisco 5500 Series Controllers.

Examples

The following example shows how to configure the primary port number of the LAb02 interface to 3:


(Cisco Controller) > config interface port lab02 3

config interface quarantine vlan

To configure a quarantine VLAN on any dynamic interface, use the config interface quarantine vlan command.

config interface quarantine vlan interface-name vlan_id

Syntax Description

interface-name

Interface’s name.

vlan_id

VLAN identifier.

Note 

Enter 0 to disable quarantine processing.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure a quarantine VLAN on the quarantine interface with the VLAN ID 10:


(Cisco Controller) > config interface quarantine vlan quarantine 10

config interface vlan

To configure an interface VLAN identifier, use the config interface vlan command.

config interface vlan { ap-manager | management | interface-name | redundancy-management} vlan

Syntax Description

ap-manager

Configures the access point manager interface.

management

Configures the management interface.

interface_name

Interface name.

vlan

VLAN identifier.

redundancy-management

Specifies the redundancy management interface.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You cannot change the redundancy management VLAN when the system redundancy management interface is mapped to the redundancy port. You must configure the redundancy management port first.

Examples

The following example shows how to configure VLAN ID 10 on the management interface:


(Cisco Controller) > config interface vlan management 10

config interface mdns-profile

To configure an mDNS (multicast DNS) profile for an interface, use the config interface mdns-profile command.

config interface mdns-profile { management | all interface-name} { profile-name | none}

Syntax Description

management

Configures an mDNS profile for the management interface.

all

Configures an mDNS profile for all interfaces.

interface-name

Name of the interface on which the mDNS profile has to be configured. The interface name can be up to 32 case-sensitive, alphanumeric characters.

profile-name

Name of the mDNS profile.

none

Removes all existing mDNS profiles from the interface. You cannot configure mDNS profiles on the interface.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

If the mDNS profile is associated to a WLAN, an error appears.

Examples

The following example shows how to configure an mDNS profile for an interface lab1:

(Cisco Controller) > config interface mdns-profile lab1 profile1

config icons delete

To delete an icon or icons from flash, use the config icons delete command in the WLAN configuration mode.

config icons delete{ filename | all }

Syntax Description

filename

Name of the icon to be deleted.

all

Deletes all the icon files from the system.

Command Default

None

Command Modes

WLAN configuration

Command History

Release Modification

Release 8.2

This command was introduced.

Examples

The following example shows how to delete an icon from flash:

Cisco Controller > config icons delete image-1

config icons file-info

To configure an icon parameter, use the config icons file-info command in WLAN configuration mode.

config icons file-info filename file-type lang-code width height

Syntax Description

filename

Icon filename. It can be up to 32 characters long.

file-type

Icon filename type or extension. It can be up to 32 characters long.

lang-code

Language code of the icon. Enter 2 or 3 letters from ISO-639, for example: eng for English.

width

Icon width. The range is from 1 to 65535.

height

Icon height. The range is from 1 to 65535.

Command Default

None

Command Modes

WLAN configuration

Command History

Release Modification

Release 8.2

This command was introduced.

Examples

This example shows how to configure icon parameters:

Cisco Controller > config icons file-info ima png eng 300 200

config ipv6 disable

To disable IPv6 globally on the Cisco WLC, use the config ipv6 disable command .

config ipv6 disable

Syntax Description

This command has no arguments or keywords.

Command Default

By default, the IPv6 configuration is enabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

When you use this command, the controller drops all IPv6 packets and the clients will not receive any IPv6 address.

Examples

The following example shows how to disable IPv6 on the controller:

(Cisco Controller) >config ipv6 disable

config ipv6 enable

To enable IPv6 globally on the Cisco WLC, use the config ipv6 enable command.

config ipv6 enable

Syntax Description

This command has no arguments or keywords.

Command Default

By default, the IPv6 configuration is enabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable IPv6 on the Cisco WLC:

(Cisco Controller) >config ipv6 enable

config ipv6 acl

To create or delete an IPv6 ACL on the Cisco wireless LAN controller, apply ACL to data path, and configure rules in the IPv6 ACL, use the config ipv6 acl command.

config ipv6 acl [ apply | cpu | create | delete | rule]

config ipv6 acl apply name

config ipv6 acl cpu { name | none}

config ipv6 acl create name

config ipv6 acl delete name

config ipv6 acl rule [ action | add | change | delete | destination | direction | dscp | protocol | source | swap ]

config ipv6 acl rule action name index { permit | deny}

config ipv6 acl rule add name index

config ipv6 acl rule change index name old_index new_index

config ipv6 acl rule delete name index

config ipv6 acl rule destination { address name index ip_address prefix-len | port range name index }

config ipv6 acl rule direction name index { in | out | any}

config ipv6 acl rule dscp name dscp

config ipv6 acl rule protocol name index protocol

config ipv6 acl rule source { address name index ip_address prefix-len | port range name index start_port end_port}

config ipv6 acl rule swap index name index_1index_2

Syntax Description

apply name

Applies an IPv6 ACL. An IPv6 ACL can contain up to 32 alphanumeric characters.

cpu name

Applies the IPv6 ACL to the CPU.

cpu none

Configure none if you wish not to have a IPV6 ACL.

create

Creates an IPv6 ACL.

delete

Deletes an IPv6 ACL.

rule ( action) ( name) ( index)

Configures rules in the IPv6 ACL to either permit or deny access. IPv6 ACL name can contains up to 32 alphanumeric characters and IPv6 ACL rule index can be between 1 and 32.

{ permit| deny}

Permit or deny the IPv6 rule action.

add name index

Adds a new rule and rule index.

change name old_index new_index

Changes a rule’s index.

delete name index

Deletes a rule and rule index.

destination address name index ip_addr prefix-len

Configures a rule’s destination IP address and prefix length (between 0 and 128).

destination port name index

Configure a rule's destination port range. Enter IPv6 ACL name and set an rule index for it.

direction name index { in| out| any}

Configures a rule’s direction to in, out, or any.

dscp name index dscp

Configures a rule’s DSCP. For rule index of DSCP, select a number between 0 and 63, or any .

protocol name index protocol

Configures a rule’s protocol. Enter a name and set an index between 0 and 255 or any

source address name index ip_address prefix-len

Configures a rule’s source IP address and netmask.

source port range name index start_port end_port

Configures a rule’s source port range.

swap index name index_1 index_2

Swap’s two rules’ indices.

Command Default

After adding an ACL, the config ipv6 acl cpu is by default configured as enabled.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6..
8.0 This command was updated by adding cpu and none keywords and the ipv6_acl_name variable.

Usage Guidelines

For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series Wireless LAN Controllers.

Examples

The following example shows how to configure an IPv6 ACL to permit access:

(Cisco Controller) >config ipv6 acl rule action lab1 4 permit

Examples

The following example shows how to configure an interface ACL:

(Cisco Controller) > config ipv6 interface acl management IPv6-Acl

config ipv6 capwap

To enable or disable an IPv6 CAPWAP UDPLite for CAPWAP AP on the Cisco Wireless LAN Controller, use the config ipv6 capwap command.

config ipv6 capwap udplite { enable| disable} [ all| <Cisco AP>]

Syntax Description

udplite

Configure IPv6 for CAPWAP UDP Lite.

enable

Enables IPv6 CAPWAP UDP Lite.

disable

Disables IPv6 CAPWAP UDP Lite.

all

Enables or disables IPv6 CAPWAP UDP Lite on all Cisco APs.

<Cisco AP>

Enables or disables IPv6 CAPWAP UDP Lite on the user defined Cisco AP.

Command Default

The config ipv6 capwap udplite command is by default configured as enabled.

Command History

Release Modification
8.0 This command was introduced in Release 8.0

Usage Guidelines

  • IPv6 CAPWAP UDP Lite configuration applies only to APs that are connected to controller using IPv6 tunnel.
  • For APs connected to WLC using IPv4 Tunnel, IPv6 CAPWAP UDPLite command will not apply on either global configuration or on Per AP.
  • IPv6 mandates complete payload checksum for UDP and this will have performance implications. To minimize the impact, UDPLite (mandates only header checksum) will be used for data traffic and UDP for control traffic.
  • Usage UDP Lite will have an impact on the firewall. Intermediate firewall must be configured to allow UDP Lite protocol (protocol ID of 136) packets.
  • Turning off UDP Lite will cause performance issues on packet handling.
  • Changing from UDP to UDPLite or vice-versa will enforce the AP to dis-join and re-join.

Examples

The following example shows how to configure an IPv6 CAPWAP UDP Lite on All Cisco APs or on a particular Cisco AP:
(Cisco Controller) >config ipv6 capwap udplite enable all
Changing AP's IPv6 Capwap UDP Lite mode will cause the AP to rejoin.
Are you sure you want to continue? (y/n)

config ipv6 interface

To configure IPv6 system interfaces, use the config ipv6 interface command.

config ipv6 interface { acl| address| slaac}

config ipv6 interface acl management acl_name

config ipv6 interface address { management primary ipv6_address prefix_length ipv6_gateway_address | service-port ipv6_address prefix-length}

config ipv6 interface slacc service-port [ enable| disable]

Syntax Description

acl

Configures IPv6 on an interface's Access Control List.

management

Configures the management interface.

acl_name

Enter IPv6 ACL name for the management ACL. It supports up to 32 alphanumeric characters.

address

Configures IPv6 on an interface's address information.

management

Configures the management interface.

primary

Configures the primary IPv6 Address for an interface

ipv6_address

Configures an interface with IPv6 address information.

prefix_length

Configures IPv6 Prefix length. The range for prefix length is 1 to 127.

ipv6_gateway_address

Configures the Link Layer IPv6 gateway Address.

service-port

Configures IPv6 on the out-of-band service Port.

ipv6_address

Configures an interface with IPv6 address information.

prefix_length

Configures IPv6 Prefix length. The range for prefix length is 1 to 127.

slacc

Configures SLAAC options on an interface.

service-port

Configures IPv6 on the out-of-band service Port.

enable

Enables SLAAC Option

disable

Disables SLAAC Option

Command Default

None.

Command History

Release Modification
8.0 This command was introduced in Release 8.0.

Examples

The following example shows how to configure an IPv6 ACL management interface:
(Cisco Controller) >config ipv6 interface acl management Test_ACL

Examples

The following example shows how to configure an IPv6 address and primary interface:

(Cisco Controller) > config ipv6 interface address management primary 2001:9:10:56::44 64 fe80::aea0:16ff:fe4f:2244

config ipv6 multicast

To configure IPv6 multicast, use the config ipv6 multicast command.

config ipv6 multicast mode { unicast| multicast ipv6_address}

Syntax Description

mode

Configure the controller to AP Multicast or Broadcast IPv6 traffic forwarding mode.

unicast

Multicast/Broadcasted IPv6 packets are encapsulated in unicast CAPWAP tunnel to AP.

multicast

Multicast/Broadcasted IPv6 packets are encapsulated in multicast CAPWAP tunnel to AP.

ipv6_address

Configures IPv6 multicast address.

Command Default

  • By default, multicast is enabled on Cisco WLC 8500 and Cisco WLC 2500.

  • By default, unicast is enabled on Cisco WLC 5500.

Command History

Release Modification
8.0 This command was introduced in Release 8.0.

Usage Guidelines

none...

Examples

The following example shows how to configure an IPv6 multicast on Cisco WLC, to permit access:
(Cisco Controller) >config ipv6 multicast 2001:DB8:0000:0000:0000:0000:0000:0001

Examples

The following example shows how to configure an IPv6 unicast on Cisco WLC, to permit access:
(Cisco Controller) > config ipv6 multicast mode unicast

config ipv6 neighbor-binding

To configure the Neighbor Binding table on the Cisco wireless LAN controller, use the config ipv6 neighbor-binding command.

config ipv6 neighbor-binding { timers { down-lifetime down_time | reachable-lifetime reachable_time | stale-lifetime stale_time } | { ra-throttle { allow at-least at_least_value} | enable | disable | interval-option { ignore | passthrough | throttle } | max-through { no_mcast_RA | no-limit} | throttle-period throttle_period}}

Syntax Description

timers

Configures the neighbor binding table timeout timers.

down-lifetime

Configures the down lifetime.

down_time

Down lifetime in seconds. The range is from 0 to 86400. The default is 30 seconds.

reachable-lifetime

Configures the reachable lifetime.

reachable_time

Reachable lifetime in seconds. The range is from 0 to 86400. The default is 300 seconds.

stale-lifetime

Configures the stale lifetime.

stale_time

Stale lifetime in seconds. The range is from 0 to 86400. The default is 86400 seconds.

ra-throttle

Configures IPv6 RA throttling options.

allow

Specifies the number of multicast RAs per router per throttle period.

at_least_value

Number of multicast RAs from router before throttling. The range is from 0 to 32. The default is 1.

enable

Enables IPv6 RA throttling.

disable

Disables IPv6 RA throttling.

interval-option

Adjusts the behavior on RA with RFC3775 interval option.

ignore

Indicates interval option has no influence on throttling.

passthrough

Indicates all RAs with RFC3775 interval option will be forwarded (default).

throttle

Indicates all RAs with RFC3775 interval option will be throttled.

max-through

Specifies unthrottled multicast RAs per VLAN per throttle period.

no_mcast_RA

Number of multicast RAs on VLAN by which throttling is enforced. The default multicast RAs on vlan is 10.

no-limit

Configures no upper bound at the VLAN level.

throttle-period

Configures the throttle period.

throttle_period

Duration of the throttle period in seconds. The range is from 10 to 86400 seconds. The default is 600 seconds.

Command Default

This command is disabled by default.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the Neighbor Binding table:

(Cisco Controller) >config ipv6 neighbor-binding ra-throttle enable

config ipv6 na-mcast-fwd

To configure the Neighbor Advertisement multicast forwarding, use the config ipv6 na-mcast-fwd command.

config ipv6 na-mcast-fwd { enable | disable}

Syntax Description

enable

Enables Neighbor Advertisement multicast forwarding.

disable

Disables Neighbor Advertisement multicast forwarding.

Command Default

None

Command History

Release Modification

7.5

This command was introduced.

Usage Guidelines

If you enable Neighbor Advertisement multicast forwarding, all the unsolicited multicast Neighbor Advertisement from wired or wireless is not forwarded to wireless.

If you disable Neighbor Advertisement multicast forwarding, IPv6 Duplicate Address Detection (DAD) of the controller is affected.

Examples

The following example shows how to configure an Neighbor Advertisement multicast forwarding:


(Cisco Controller) >config ipv6 na-mcast-fwd enable

config ipv6 ns-mcast-fwd

To configure the nonstop multicast cache miss forwarding, use the config ipv6 ns-mcast-fwd command.

config ipv6 ns-mcast-fwd { enable | disable}

Syntax Description

enable

Enables nonstop multicast forwarding on a cache miss.

disable

Disables nonstop multicast forwarding on a cache miss.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure an nonstop multicast forwarding:

(Cisco Controller) >config ipv6 ns-mcast-fwd enable

config ipv6 ra-guard

To configure the filter for Router Advertisement (RA) packets that originate from a client on an AP, use the config ipv6 ra-guard command.

config ipv6 ra-guard ap { enable | disable}

Syntax Description

enable

Enables RA guard on an AP.

disable

Disables RA guard on an AP.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable IPv6 RA guard:


(Cisco Controller) >config ipv6 ra-guard enable

config ipv6 route

To add or delete an IPv6 network route, use the config ipv6 route command.

config ipv6 route { add network_ipv6_addr prefix-len ipv6_gw_addr | delete network _ipv6 addr }

Syntax Description

add

Adds an IPv6 network route.

network_ipv6_addr

Enter the networks IPv6 address.

prefix-len

Enter the prefix length for the network.

ipv6_gw_addr

Configures the system interfaces.

delete

Deletes an IPv6 network route.

network_ipv6_addr

Enter the networks IPv6 address.

Command Default

None

Command History

Release Modification
8.0 This command was introduced in Release 8.0.

Usage Guidelines

  • This command is used to add and delete an IPv6 network route to access service interface over IPv6 from different network.

  • While adding IPv6 route, IPv6 Gateway Address must be a link local scope (FE80::/64).

Examples

The following example shows how to add an IPv6 route:
(Cisco Controller) > config ipv6 route add 3010:1111:2222:abcd:abcd:abcd:abcd:1111 64 fe80::6616:8dff:fed3:c0cf

Examples

The following example shows how to delete an IPv6 route:
(Cisco Controller) > config ipv6 route delete 2001:9:5:90::115