Configuration Commands: a to f

aaa accounting identity

To enable authentication, authorization, and accounting (AAA) for IEEE 802.1x, MAC authentication bypass (MAB), and web authentication sessions, use the aaa accounting identity command in global configuration mode. To disable IEEE 802.1x accounting, use the no form of this command.

aaa accounting identity { name | default } start-stop { broadcast group { name | radius | tacacs+} [ group { name | radius | tacacs+} ... ] | group { name | radius | tacacs+} [ group { name | radius | tacacs+} ... ]}

no aaa accounting identity { name | default }

Syntax Description

name

Name of a server group. This is optional when you enter it after the broadcast group and group keywords.

default

Uses the accounting methods that follow as the default list for accounting services.

start-stop

Sends a start accounting notice at the beginning of a process and a stop accounting notice at the end of a process. The start accounting record is sent in the background. The requested-user process begins regardless of whether or not the start accounting notice was received by the accounting server.

broadcast

Enables accounting records to be sent to multiple AAA servers and send accounting records to the first server in each group. If the first server is unavailable, the uses the list of backup servers to identify the first server.

group

Specifies the server group to be used for accounting services. These are valid server group names:

  • name — Name of a server group.

  • radius — Lists of all RADIUS hosts.

  • tacacs+ — Lists of all TACACS+ hosts.

The group keyword is optional when you enter it after the broadcast group and group keywords. You can enter more than optional group keyword.

radius

(Optional) Enables RADIUS authorization.

tacacs+

(Optional) Enables TACACS+ accounting.

Command Default

AAA accounting is disabled.

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

To enable AAA accounting identity, you need to enable policy mode. To enable policy mode, enter the authentication display new-style command in privileged EXEC mode.

Examples

This example shows how to configure IEEE 802.1x accounting identity:


Device# authentication display new-style

Please note that while you can revert to legacy style
configuration at any time unless you have explicitly
entered new-style configuration, the following caveats
should be carefully read and understood.

(1) If you save the config in this mode, it will be written
    to NVRAM in NEW-style config, and if you subsequently
    reload the router without reverting to legacy config and
    saving that, you will no longer be able to revert.

(2) In this and legacy mode, Webauth is not IPv6-capable. It
    will only become IPv6-capable once you have entered new-
    style config manually, or have reloaded with config saved
    in 'authentication display new' mode.

Device# configure terminal
Device(config)# aaa accounting identity default start-stop group radius

aaa accounting update periodic interval-in-minutes

To configure accounting update records intervals, use the aaa accounting update periodic command.

aaa accounting update periodic interval-in-minutes [ jitter maximum jitter-max-value]

Syntax Description

periodic

Send accounting update records at regular intervals.

<1-71582>

Periodic intervals to send accounting update records(in minutes)

jitter

Set jitter parameters for periodic interval

maximum

Set maximum jitter value for periodic interval (in seconds)

<0-2147483>

Maximum jitter value for periodic interval(in seconds). Default is 300 seconds.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure the interval to five minutes at which the accounting records are updated:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# aaa accounting update periodic 5

aaa authentication dot1x

To specify the authentication, authorization, and accounting (AAA) method to use on ports complying with the IEEE 802.1x authentication, use the aaa authentication dot1x command in global configuration mode . To disable authentication, use the no form of this command.

aaa authentication dot1x { default} method1

no aaa authentication dot1x { default} method1

Syntax Description

default

The default method when a user logs in. Use the listed authentication method that follows this argument.

method1

Specifies the server authentication. Enter the group radius keywords to use the list of all RADIUS servers for authentication.

Note 

Though other keywords are visible in the command-line help strings, only the default and group radius keywords are supported.

Command Default

No authentication is performed.

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

The method argument identifies the method that the authentication algorithm tries in the specified sequence to validate the password provided by the client. The only method that is IEEE 802.1x-compliant is the group radius method, in which the client data is validated against a RADIUS authentication server.

If you specify group radius , you must configure the RADIUS server by entering the radius-server host global configuration command.

Use the show running-config privileged EXEC command to display the configured lists of authentication methods.

Examples

This example shows how to enable AAA and how to create an IEEE 802.1x-compliant authentication list. This authentication first tries to contact a RADIUS server. If this action returns an error, the user is not allowed access to the network.


Device(config)# aaa new-model
Device(config)# aaa authentication dot1x default group radius

aaa authentication login

To set authentication, authorization, and accounting (AAA) at login, use the aaa authentication login command in global configuration mode.

aaa authentication login authentication-list-name { group } group-name

Syntax Description

authentication-list-name

Character string used to name the list of authentication methods activated when a user logs in.

group

Uses a subset of RADIUS servers for authentication as defined by the server group group-name .

group-name

Server group name.

Command Default

None

Command Modes

Global Configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.2s Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

The following example shows how to set an authentication method list named local_webauth to the group type named local in local web authentication:

Device(config)# aaa authentication login local_webauth local

The following example shows how to set an authentication method to RADIUS server group in local web authentication:

Device(config)# aaa authentication login webauth_radius group ISE_group

aaa authorization

To set the parameters that restrict user access to a network, use the aaa authorization command in global configuration mode. To remove the parameters, use the no form of this command.

aaa authorization { auth-proxy | cache | commands level | config-commands | configuration | console | credential-download | exec | multicast | network | onep | policy-if | prepaid | radius-proxy | reverse-access | subscriber-service | template} { default | list_name } [ method1 [ method2 ...]]

Syntax Description

auth-proxy

Runs authorization for authentication proxy services.

cache

Configures the authentication, authorization, and accounting (AAA) server.

commands

Runs authorization for all commands at the specified privilege level.

level

Specific command level that should be authorized. Valid entries are 0 through 15.

config-commands

Runs authorization to determine whether commands entered in configuration mode are authorized.

configuration

Downloads the configuration from the AAA server.

console

Enables the console authorization for the AAA server.

credential-download

Downloads EAP credential from Local/RADIUS/LDAP.

exec

Enables the console authorization for the AAA server.

multicast

Downloads the multicast configuration from the AAA server.

network

Runs authorization for all network-related service requests, including Serial Line Internet Protocol (SLIP), PPP, PPP Network Control Programs (NCPs), and AppleTalk Remote Access (ARA).

onep

Runs authorization for the ONEP service.

reverse-access

Runs authorization for reverse access connections, such as reverse Telnet.

template

Enables template authorization for the AAA server.

default

Uses the listed authorization methods that follow this keyword as the default list of methods for authorization.

list_name

Character string used to name the list of authorization methods.

method1 [ method2...]

(Optional) An authorization method or multiple authorization methods to be used for authorization. A method may be any one of the keywords listed in the table below.

Command Default

Authorization is disabled for all actions (equivalent to the method keyword none ).

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

Use the aaa authorization command to enable authorization and to create named methods lists, which define authorization methods that can be used when a user accesses the specified function. Method lists for authorization define the ways in which authorization will be performed and the sequence in which these methods will be performed. A method list is a named list that describes the authorization methods (such as RADIUS or TACACS+) that must be used in sequence. Method lists enable you to designate one or more security protocols to be used for authorization, which ensures a backup system in case the initial method fails. Cisco IOS software uses the first method listed to authorize users for specific network services; if that method fails to respond, the Cisco IOS software selects the next method listed in the method list. This process continues until there is successful communication with a listed authorization method, or until all the defined methods are exhausted.


Note

The Cisco IOS software attempts authorization with the next listed method only when there is no response from the previous method. If authorization fails at any point in this cycle--meaning that the security server or the local username database responds by denying the user services--the authorization process stops and no other authorization methods are attempted.


If the aaa authorization command for a particular authorization type is issued without a specified named method list, the default method list is automatically applied to all interfaces or lines (where this authorization type applies) except those that have a named method list explicitly defined. (A defined method list overrides the default method list.) If no default method list is defined, then no authorization takes place. The default authorization method list must be used to perform outbound authorization, such as authorizing the download of IP pools from the RADIUS server.

Use the aaa authorization command to create a list by entering the values for the list-name and the method arguments, where list-name is any character string used to name this list (excluding all method names) and method identifies the list of authorization methods tried in the given sequence.


Note

In the table that follows, the group group-name , group ldap , group radius , and group tacacs+ methods refer to a set of previously defined RADIUS or TACACS+ servers. Use the radius server and tacacs server commands to configure the host servers. Use the aaa group server radius , aaa group server ldap , and aaa group server tacacs+ commands to create a named group of servers.


This table describes the method keywords.

Table 1. aaa authorization Methods

Keyword

Description

cache group-name

Uses a cache server group for authorization.

group group-name

Uses a subset of RADIUS or TACACS+ servers for accounting as defined by the server group group-name command.

group ldap

Uses the list of all Lightweight Directory Access Protocol (LDAP) servers for authentication.

group radius

Uses the list of all RADIUS servers for authentication as defined by the aaa group server radius command.

grouptacacs+

Uses the list of all TACACS+ servers for authentication as defined by the aaa group server tacacs+ command.

if-authenticated

Allows the user to access the requested function if the user is authenticated.
Note 

The if-authenticated method is a terminating method. Therefore, if it is listed as a method, any methods listed after it will never be evaluated.

local

Uses the local database for authorization.

none

Indicates that no authorization is performed.

Cisco IOS software supports the following methods for authorization:
  • Cache Server Groups—The router consults its cache server groups to authorize specific rights for users.

  • If-Authenticated—The user is allowed to access the requested function provided the user has been authenticated successfully.

  • Local—The router or access server consults its local database, as defined by the username command, to authorize specific rights for users. Only a limited set of functions can be controlled through the local database.

  • None—The network access server does not request authorization information; authorization is not performed over this line or interface.

  • RADIUS—The network access server requests authorization information from the RADIUS security server group. RADIUS authorization defines specific rights for users by associating attributes, which are stored in a database on the RADIUS server, with the appropriate user.

  • TACACS+—The network access server exchanges authorization information with the TACACS+ security daemon. TACACS+ authorization defines specific rights for users by associating attribute-value (AV) pairs, which are stored in a database on the TACACS+ security server, with the appropriate user.

Method lists are specific to the type of authorization being requested. AAA supports five different types of authorization:

  • Commands—Applies to the EXEC mode commands a user issues. Command authorization attempts authorization for all EXEC mode commands, including global configuration commands, associated with a specific privilege level.

  • EXEC—Applies to the attributes associated with a user EXEC terminal session.

  • Network—Applies to network connections. The network connections can include a PPP, SLIP, or ARA connection.


    Note

    You must configure the aaa authorization config-commands command to authorize global configuration commands, including EXEC commands prepended by the do command.


  • Reverse Access—Applies to reverse Telnet sessions.

  • Configuration—Applies to the configuration downloaded from the AAA server.

When you create a named method list, you are defining a particular list of authorization methods for the indicated authorization type.

Once defined, the method lists must be applied to specific lines or interfaces before any of the defined methods are performed.

The authorization command causes a request packet containing a series of AV pairs to be sent to the RADIUS or TACACS daemon as part of the authorization process. The daemon can do one of the following:

  • Accept the request as is.

  • Make changes to the request.

  • Refuse the request and authorization.

For a list of supported RADIUS attributes, see the module RADIUS Attributes. For a list of supported TACACS+ AV pairs, see the module TACACS+ Attribute-Value Pairs.

Note

Five commands are associated with privilege level 0: disable , enable , exit , help , and logout . If you configure AAA authorization for a privilege level greater than 0, these five commands will not be included in the privilege level command set.


Examples

The following example shows how to define the network authorization method list named mygroup, which specifies that RADIUS authorization will be used on serial lines using PPP. If the RADIUS server fails to respond, local network authorization will be performed.


Device(config)#  aaa authorization network mygroup group radius local

aaa authorization credential download default

To set an authorization method list to use local credentials, use the aaa authorization credential download default command in global configuration mode.

aaa authorization credential download default group-name

Syntax Description

group-name

Server group name.

Command Default

None

Command Modes

Global Configuration

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to set an authorization method list to use local credentials:

Device(config)# aaa authorization credential-download default local

aaa group server ldap

To configure a AAA server group, use the aaa group server ldap command.

aaa group server ldap group-name

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

This example shows how to configure a AAA server group:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# aaa new-model
Device(config)# aaa group server ldap name1
Device(config-ldap-sg)# server server1
Device(config-ldap-sg)# exit

aaa group server radius

To group different RADIUS server hosts into distinct lists and distinct methods, use the aaa group server radius command in global configuration mode.

aaa group server radius group-name

Syntax Description

group-name

Character string used to name the group of servers.

Command Default

None

Command Modes

Global configuration

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

The authentication, authorization, and accounting (AAA) server-group feature introduces a way to group existing server hosts. The feature enables you to select a subset of the configured server hosts and use them for a particular service.

A group server is a list of server hosts of a particular type. Currently supported server host types are RADIUS server hosts. A group server is used in conjunction with a global server host list. The group server lists the IP addresses of the selected server hosts.

Examples

The following example shows how to configure an AAA group server named ISE_Group that comprises three member servers:

Device(config)# aaa group server radius ISE_Group

aaa local authentication default authorization

To configure local authentication method list, use the aaa local authentication default authorization command.

aaa local authentication default authorization [ method-list-name | default]

Syntax Description

method-list-name

Name of the method list.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure local authentication method list to the default list:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# aaa local authentication default authorization default

aaa new-model

To enable the authentication, authorization, and accounting (AAA) access control model, issue the aaa new-model command in global configuration mode. To disable the AAA access control model, use the no form of this command.

aaa new-model

no aaa new-model

Syntax Description

This command has no arguments or keywords.

Command Default

AAA is not enabled.

Command Modes

Global configuration (config)

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

This command enables the AAA access control system.

If the login local command is configured for a virtual terminal line (VTY), and the aaa new-model command is removed, you must reload the to get the default configuration or the login command. If the is not reloaded, the defaults to the login local command under the VTY.


Note

We do not recommend removing the aaa new-model command.
The following example shows this restriction:
Device(config)# aaa new-model
Device(config)# line vty 0 15
Device(config-line)# login local
Device(config-line)# exit
Device(config)# no aaa new-model
Device(config)# exit 
Device# show running-config | b line vty

line vty 0 4
 login local  !<=== Login local instead of "login"
line vty 5 15
 login local
!

Examples

The following example initializes AAA:


Device(config)# aaa new-model
Device(config)# 

aaa server radius dynamic-author

To configure a device as an authentication, authorization, and accounting (AAA) server to facilitate interaction with an external policy server, use the aaa server radius dynamic-author command in global configuration mode. To remove this configuration, use the no form of this command.

aaa server radius dynamic-author

no aaa server radius dynamic-author

Syntax Description

This command has no arguments or keywords.

Command Default

The device will not function as a server when interacting with external policy servers.

Command Modes

Global configuration

Command History

Release

Modification

12.2(28)SB

This command was introduced.

12.4

This command was integrated into Cisco IOS Release 12.4.

Cisco IOS XE Release 2.6

This command was integrated into Cisco IOS XE Release 2.6.

12.2(5)SXI

This command was integrated into Cisco IOS Release 12.2(5)SXI.

15.2(2)T

This command was integrated into Cisco IOS Release 15.2(2)T.

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Dynamic authorization allows an external policy server to dynamically send updates to a device. Once the aaa server radius dynamic-author command is configured, dynamic authorization local server configuration mode is entered. Once in this mode, the RADIUS application commands can be configured.

Dynamic Authorization for the Intelligent Services Gateway (ISG)

ISG works with external devices, referred to as policy servers, that store per-subscriber and per-service information. ISG supports two models of interaction between the ISG device and external policy servers: initial authorization and dynamic authorization.

The dynamic authorization model allows an external policy server to dynamically send policies to the ISG. These operations can be initiated in-band by subscribers (through service selection) or through the actions of an administrator, or applications can change policies on the basis of an algorithm (for example, change session quality of service (QoS) at a certain time of day). This model is facilitated by the Change of Authorization (CoA) RADIUS extension. CoA introduced peer-to-peer capability to RADIUS, enabling ISG and the external policy server each to act as a RADIUS client and server.

Examples

The following example configures the ISG to act as a AAA server when interacting with the client at IP address 10.12.12.12:


aaa server radius dynamic-author
 client 10.12.12.12 key cisco
 message-authenticator ignore

aaa session-id

To specify whether the same session ID will be used for each authentication, authorization, and accounting (AAA) accounting service type within a call or whether a different session ID will be assigned to each accounting service type, use the aaa session-id command in global configuration mode. To restore the default behavior after the unique keyword is enabled, use the no form of this command.

aaa session-id [common | unique]

no aaa session-id [unique]

Syntax Description

common

(Optional) Ensures that all session identification (ID) information that is sent out for a given call will be made identical. The default behavior is common .

unique

(Optional) Ensures that only the corresponding service access-requests and accounting-requests will maintain a common session ID. Accounting-requests for each service will have a different session ID.

Command Default

The common keyword is enabled.

Command Modes


Global configuration

Command History

Release

Modification

12.2(4)B

This command was introduced.

12.2(8)T

This command was integrated into Cisco IOS Release 12.2(8)T.

12.2(33)SRA

This command was integrated into Cisco IOS Release 12.2(33)SRA

12.2SX

This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.

Cisco IOS XE 16.12.1

This command was integrated in Cisco IOS XE 16.12.1.

Usage Guidelines

The common keyword behavior allows the first session ID request of the call to be stored in a common database; all proceeding session ID requests will retrieve the value of the first session ID. Because a common session ID is the default behavior, this functionality is written to the system configuration after the aaa new-model command is configured.


Note

The router configuration will always have either the aaa session-id common or the aaa session-id unique command enabled; it is not possible to have neither of the two enabled. Thus, the no aaa session-id unique command will revert to the default functionality, but the no aaa session-id common command will not have any effect because it is the default functionality.


The unique keyword behavior assigns a different session ID for each accounting type (Auth-Proxy, Exec, Network, Command, System, Connection, and Resource) during a call. To specify this behavior, the unique keyword must be specified. The session ID may be included in RADIUS access requests by configuring the radius-server attribute 44 include-in-access-req command. The session ID in the access-request will be the same as the session ID in the accounting request for the same service; all other services will provide unique session IDs for the same call.

Examples

The following example shows how to configure unique session IDs:


aaa new-model
aaa authentication ppp default group radius
radius-server host 10.100.1.34
radius-server attribute 44 include-in-access-req
aaa session-id unique

aaa-override

To enable AAA override, use the aaa-override command. To disable AAA override, use the no form of this command.

aaa-override

no aaa-override

Syntax Description

This command has no keywords or arguments.

Command Default

AAA is disabled by default.

Command Modes

Wireless policy configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

This example shows how to enable AAA:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile policy policy-test
Device(config-wireless-policy)# aaa-override

aaa-policy

To map a AAA policy in a WLAN policy profile, use the aaa-policy command.

aaa-policy aaa-policy-name

Syntax Description

aaa-policy-name

Name of the AAA policy.

Command Default

None

Command Modes

config-wireless-policy

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to map a AAA policy in a WLAN policy profile:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile policy policy-name
Device(config-wireless-policy)# aaa-policy aaa-policy-name

aaa-realm enable

To enable AAA RADUIS selection by realm, use the aaa-realm enable command.

aaa-realm enable

Command Default

None

Command Modes

config-aaa-policy

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to enable AAA RADIUS section by realm:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless aaa policy aaa-profile-name
Device (config-aaa-policy)#  aaa-realm enable

absolute-timer

To enable an absolute timeout for subscriber sessions, use the absolute-timer command in service template configuration mode. To disable the timer, use the no form of this command.

absolute-timer minutes

no absolute-timer

Syntax Description

minutes

Maximum session duration, in minutes. Range: 1 to 65535. Default: 0, which disables the timer.

Command Default

Disabled (the absolute timeout is 0).

Command Modes

Service template configuration (config-service-template)

Command History

Release

Modification

Cisco IOS XE Release 3.2SE

This command was introduced.

Usage Guidelines

Use the absolute-timer command to limit the number of minutes that a subscriber session can remain active. After this timer expires, a session must repeat the process of establishing its connection as if it were a new request.

Examples

The following example shows how to set the absolute timeout to 15 minutes in the service template named SVC_3:

service-template SVC_3
 description sample
 access-group ACL_2
 vlan 113
 inactivity-timer 15
 absolute-timer 15

access-list

To add an access list entry, use the access-list command.

access-list {1-99 | 100-199 | 1300-1999 | 2000-2699 }[ sequence-number] { deny | permit } { hostname-or-ip-addr [wildcard-bits | log] | any [ log] | host hostname-or-ip-addr log} | { remark [ line]}

Syntax Description

1-99

Configures IP standard access list.

100-199

Configures IP extended access list.

1300-1999

Configures IP standard access list (expanded range).

2000-2699

Configures IP extended access list (expanded range).

sequence-number

Sequence number of the ACL entry. Valid range is 1 to 2147483647.

deny

Configures packets to be rejected.

permit

Configures packets to be forwarded.

hostname-or-ip-addr

Hostname or the IP address to match.

wildcard-bits

Wildcard bits to match the IP address.

log

Configures log matches against this entry.

any

Any source host.

host

A single host address.

remark

Configures ACL entry comment.

line

The ACL entry comment.

Command Default

None

Command Modes

Global Config

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to add an access list entry:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# access-list 1 permit any

access-list acl-ace-limit

To set the maximum configurable ace limit for all ACLs, use the access-list acl-ace-limit command.

access-list acl-ace-limit max-ace-limit

Syntax Description

max-ace-limit

Maximum number of ace limit for all ACLs. Valid range is 1 to 4294967295.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to set the maximum configurable ace limit for all ACLs to 100:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# access-list acl-ace-limit 100

accounting-list

To configure RADIUS accounting servers on , use the accounting-list command. To disable RADIUS server accounting, use the no form of this command.

accounting-list radius-server-acct

no accounting-list

Syntax Description

radius-server-acct

Accounting RADIUS server name.

Command Default

RADIUS server accounting is disabled by default.

Command Modes

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

You must disable the WLAN before using this command. See Related Commands section for more information on how to disable a WLAN.

Examples

This example shows how to configure RADIUS server accounting on :

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# 
Deviceaccounting-list test
Device

This example shows how to disable RADIUS server accounting on :

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# 
Deviceno accounting-list test
Device

acl-policy

To configure an access control list (ACL) policy, use the acl-policy command.

acl-policy acl-policy-name

Syntax Description

acl-policy-name

Name of the ACL policy.

Command Default

None

Command Modes

config-wireless-flex-profile

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure an ACL policy name:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile flex default-flex-profile
Device(config-wireless-flex-profile)# acl-policy my-acl-policy

active-query timer

To configure mDNS global active query, use the active-query timer command. To disable the command use the no form of this command.

active-query timer 15 - 120

no active-query timer 15 - 120

Syntax Description

active-query timer

Configures the mDNS global active query timer.

15 - 120

Specifies the active query periodicity in minutes. The default is 30 minutes.

Command Default

None

Command Modes

Global configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.3.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows how to configure mDNS global active query:

Device(config-mdns-sd)# active-query timer 60

address

To specify the IP address of the Rivest, Shamir, and Adelman (RSA) public key of the remote peer that you will manually configure in the keyring, use the address command in rsa-pubkey configuration mode. To remove the IP address, use the no form of this command.

address ip-address

no address ip-address

Syntax Description

ip-address

IP address of the remote peer.

Command Default

No default behavior or values

Command Modes


Rsa-pubkey configuration

Command History

Release

Modification

11.3 T

This command was introduced.

12.2(33)SRA

This command was integrated into Cisco IOS Release 12.2(33)SRA.

12.2SX

This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.

Cisco IOS XE Release 2.6

This command was integrated into Cisco IOS XE Release 2.6.

Cisco IOS XE 16.12.1

This command was integrated into Cisco ISO XE 16.12.1

Usage Guidelines

Before you can use this command, you must enter the rsa-pubkey command in the crypto keyring mode.

Examples

The following example specifies the RSA public key of an IP Security (IPSec) peer:


Router(config)# crypto keyring vpnkeyring
Router(conf-keyring)# rsa-pubkey name host.vpn.com
Router(config-pubkey-key)# address 10.5.5.1
Router(config-pubkey)# key-string
Router(config-pubkey)# 00302017 4A7D385B 1234EF29 335FC973
Router(config-pubkey)# 2DD50A37 C4F4B0FD 9DADE748 429618D5
Router(config-pubkey)# 18242BA3 2EDFBDD3 4296142A DDF7D3D8
Router(config-pubkey)# 08407685 2F2190A0 0B43F1BD 9A8A26DB
Router(config-pubkey)# 07953829 791FCDE9 A98420F0 6A82045B
Router(config-pubkey)# 90288A26 DBC64468 7789F76E EE21
Router(config-pubkey)# quit
Router(config-pubkey-key)# exit
Router(conf-keyring)# exit

address prefix

To specify an address prefix for address assignment, use the address prefix command in interface configuration mode. To remove the address prefix, use the no form of this command.

address prefix ipv6-prefix [lifetime {valid-lifetime preferred-lifetime | infinite}]

no address prefix

Syntax Description

ipv6-prefix

IPv6 address prefix.

lifetime {valid-lifetime preferred-lifetime | infinite}]

(Optional) Specifies a time interval (in seconds) that an IPv6 address prefix remains in the valid state. If the infinite keyword is specified, the time interval does not expire.

Command Default

No IPv6 address prefix is assigned.

Command Modes


DHCP pool configuration (config-dhcpv6)

Command History

Release

Modification

12.4(24)T

This command was introduced.

Usage Guidelines

You can use the address prefix command to configure one or several address prefixes in an IPv6 DHCP pool configuration. Each time the IPv6 DHCP address pool is used, an address will be allocated from each of the address prefixes associated with the IPv6 DHCP pool.

Examples

The following example shows how to configure a pool called engineering with an IPv6 address prefix:


Router(config)# ipv6 dhcp pool engineering
Router(config-dhcpv6)# address prefix 2001:1000::0/64 lifetime infinite

allow at-least min-number at-most max-number

To limit the number of multicast RAs per device per throttle period in an RA throttler policy, use the allow at-least min-number at-most max-number command.

allow at-least min-number at-most {max-number | no-limit}

Syntax Description

at-least min-number

Enter the minimum guaranteed number of multicast RAs per router before throttling can be enforced. Valid range is 0 to 32.

at-most max-number

Enter the maximum number of multicast RAs from router by which throttling is enforced. Valid range is 0 to 256.

at-most no-limit

No upper bound at the router level.

Command Default

None

Command Modes

config-nd-ra-throttle

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to limit the number of multicast RAs per device per throttle period in an RA throttler policy:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ipv6 nd ra-throttler policy ra-throttler-policy-name
Device(config-nd-ra-throttle)# allow at-least 5 at-most 10

ap

To configure cisco APs, use the ap command.

ap mac-address

Syntax Description

mac-address

Ethernet MAC address of the AP.

Command Default

None

Command Modes

config

Command History

Release Modification
Cisco IOS XE Everest 16.6.1

This command was introduced.

Usage Guidelines

none.

Examples

The following example shows how to configure a Cisco AP:

Device(config)# ap F866.F267.7DFB

ap auth-list

To configure the AP authorization list, use the ap auth-list command in the global configuration mode. To disable the AP authorization list, use the no form of this command.

ap auth-list { authorize-mac | authorize-serialNum | method-list method-list-name}

no ap auth-list { authorize-mac | authorize-serialNum | method-list method-list-name}

Syntax Description

authorize-mac

Configures the AP authorization policy with MAC.

auhorize-serialNum

Configures the AP authorization policy with the serial number.

method-list

Configures the AP authorization method list.

method-list-name

Indicates the method list name.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.11.1

This command was introduced.

Examples

The following example shows how to configure the AP authorization policy with serial number:

Device(config) #ap auth-list authorize-serialNum

ap auth-list ap-cert-policy allow-mic-ap

To enable the AP certificate policy during CAPWAP-DTLS handshake, use the ap auth-list ap-cert-policy allow-mic-ap command, in the global configuration mode. To disable the AP certificate policy during CAPWAP-DTLS handshake, use the no form of this command.

ap auth-list ap-cert-policy allow-mic-ap

no ap auth-list ap-cert-policy allow-mic-ap

Syntax Description

This command has no arguments or keywords.

Command Modes

Global configuration (config)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Examples

The following example shows how to configure AP certificate policy during CAPWAP-DTLS handshake:

Device# configure terminal
Device(config)# ap auth-list ap-cert-policy 
Device(config)# ap auth-list ap-cert-policy allow-mic-ap  

ap auth-list ap-cert-policy allow-mic-ap trustpoint

To configure the trustpoint name for the controller certificate chain, use the ap auth-list ap-cert-policy allow-mic-ap trustpoint command, in the global configuration mode. To disable the feature, use the no form of the command.

ap auth-list ap-cert-policy allow-mic-ap trustpoint

no ap auth-list ap-cert-policy allow-mic-ap trustpoint

Syntax Description

trustpoint-name

Specifies the trustpoint name for the wireless controller certificate chain.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Examples

The following example shows how to the trustpoint name for the controller certificate chain:

Device# configure terminal
Device(config)# ap auth-list ap-cert-policy 
Device(config)# ap auth-list ap-cert-policy allow-mic-ap trustpoint trustpoint-name  

ap auth-list ap-cert-policy mac-address MAC-address | serial-number AP-serial-number policy-type mic

To configure the AP certificate policy based on the Ethernet MAC address or based on the assembly serial number of the AP, use the ap auth-list ap-cert-policy {mac-address H.H.H | serial-number AP-serial-number} policy-type mic command. Use the no form of this command to disable the feature.

ap auth-list ap-cert-policy { mac-address H.H.H | serial-number AP-serial-number } policy-type mic

no ap auth-list ap-cert-policy { mac-address H.H.H | serial-number AP-serial-number } policy-type mic

Syntax Description

ap auth-list Configure the authorization list of the Access Point.
ap-cert-policy

Specifies the AP Certificate Policy during CAPWAP DTLS.

mac-address MAC-address

Configures AP cert policy based on Ethernet MAC.

serial-number AP-serial-number

Configure AP cert policy based on Serial Number.

policy-type

Configures AP certificate policy type.

mic

Selects MIC AP policy.

Command Modes

Global configuration (config)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Examples

The following example shows how to configure the AP certificate policy based on the Ethernet MAC address or based on the assembly serial number of the AP:

Device# configure terminal
Device(config)# ap auth-list ap-cert-policy mac-address 10.1.1 policy-type mic
 
Device(config)# ap auth-list ap-cert-policy serial-number ap-serial-number policy-type mic 

ap auth-list ap-policy

To configure authorization policy for all Cisco lightweight access points joined to the device, use the ap auth-list ap-policy command. To disable authorization policy for all Cisco lightweight access points joined to the device, use the no form of this command.

ap auth-list ap-policy {authorize-ap | lsc | mic | ssc}

no ap auth-list ap-policy {authorize-ap | lsc | mic | ssc}

Syntax Description

authorize-ap

Enables the authorization policy.

lsc

Enables access points with locally significant certificates to connect.

mic

Enables access points with manufacture-installed certificates to connect.

ssc

Enables access points with self signed certificates to connect.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to enable the access point authorization policy:

Device(config)# ap auth-list ap-policy authorize-ap

This example shows how to enable access points with locally significant certificates to connect:

Device(config)# ap auth-list ap-policy lsc

This example shows how to enable access points with manufacture-installed certificates to connect:

Device(config)# ap auth-list ap-policy mic

This example shows how to enable access points with self-signed certificates to connect:

Device(config)# ap auth-list ap-policy ssc

ap capwap retransmit

To configure Control and Provisioning of Wireless Access Points (CAPWAP) control packet retransmit count and control packet retransmit interval under the AP profile, use the ap capwap retransmit command.

ap profile default-ap-profile

ap capwap retransmit {count retransmit-count | interval retransmit-interval}

Syntax Description

count retransmit-count

Specifies the access point CAPWAP control packet retransmit count.

Note 

The count is from 3 to 8 seconds.

interval retransmit-interval

Specifies the access point CAPWAP control packet retransmit interval.

Note 

The interval is from 2 to 5 seconds.

Command Default

None

Command Modes

AP profile configuration (config-ap-profile)

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

This example shows how to configure the CAPWAP control packet retransmit count for an access point:

Device(config)# ap profile default-ap-profile

This example shows how to configure the CAPWAP control packet retransmit interval for an access point:

Device(config-ap-profile)# capwap retransmit count 3


ap capwap timers

To configure advanced timer settings under the AP profile mode, use the ap capwap timers command.

ap profile default-ap-profile

ap capwap timers {discovery-timeout seconds | fast-heartbeat-timeout local seconds | heartbeat-timeout seconds | primary-discovery-timeout seconds | primed-join-timeout seconds}

Syntax Description

discovery-timeout

Specifies the Cisco lightweight access point discovery timeout.

Note 

The Cisco lightweight access point discovery timeout is how long a Cisco device waits for an unresponsive access point to answer before considering that the access point failed to respond.

seconds

Cisco lightweight access point discovery timeout from 1 to 10 seconds.

Note 

The default is 10 seconds.

fast-heartbeat-timeout local

Enables the fast heartbeat timer that reduces the amount of time it takes to detect a device failure for local or all access points.

seconds

Small heartbeat interval (from 1 to 10 seconds) that reduces the amount of time it takes to detect a device failure.

Note 

The fast heartbeat time-out interval is disabled by default.

heartbeat-timeout

Specifies the Cisco lightweight access point heartbeat timeout.

Note 

The Cisco lightweight access point heartbeat timeout controls how often the Cisco lightweight access point sends a heartbeat keep-alive signal to the Cisco device.

This value should be at least three times larger than the fast heartbeat timer.

seconds

Cisco lightweight access point heartbeat timeout value from 1 to 30 seconds.

Note 

The default is 30 seconds.

primary-discovery-timeout

Specifies the access point primary discovery request timer. The timer determines the amount of time taken by an access point to discovery the configured primary, secondary, or tertiary device.

seconds

Access point primary discovery request timer from 30 to 3600 seconds.

Note 

The default is 120 seconds.

primed-join-timeout

Specifies the authentication timeout. Determines the time taken by an access point to determine that the primary device has become unresponsive. The access point makes no further attempts to join the device until the connection to the device is restored.

seconds

Authentication response timeout from 120 to 43200 seconds.

Note 

The default is 120 seconds.

Command Default

None

Command Modes

AP profile mode (config-ap-profile)

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

This example shows how to configure an access point discovery timeout with the timeout value of 7:

Device(config)# ap profile default-ap-profile

Device(config-ap-profile)# ap capwap timers discovery-timeout 7

This example shows how to enable the fast heartbeat interval for all access points:

Device(config)# ap profile default-ap-profile

Device(config-ap-profile)# ap capwap timers fast-heartbeat-timeout 6

This example shows how to configure an access point heartbeat timeout to 20:

Device(config)# ap profile default-ap-profile

Device(config-ap-profile)# ap capwap timers heartbeat-timeout 20

This example shows how to configure the access point primary discovery request timer to 1200 seconds:

Device(config)# ap profile default-ap-profile

Device(config-ap-profile)# ap capwap timers primary-discovery-timeout 1200

This example shows how to configure the authentication timeout to 360 seconds:

Device(config)# ap profile default-ap-profile

Device(config-ap-profile)# ap capwap timers primed-join-timeout 360

ap country

To configure one or more country codes for a device, use the ap country command.

ap country country-code

Syntax Description

country-code

Two-letter or three-letter country code or several country codes separated by a comma.

Command Default

US (country code of the United States of America).

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Cisco IOS XE Amsterdam 17.3.1

This command has been deprecated.

Note 

From Cisco IOS XE Amsterdam 17.3.1 onwards, the command ap country is deprecated and renamed as wireless country <1 country code>, where you can enter country codes for more than 20 countries. Although the existing command ap country is still functional, it is recommended that you use the wireless country <1 country code> command.

Usage Guidelines

The Cisco device must be installed by a network administrator or qualified IT professional and the installer must select the proper country code. Following installation, access to the unit should be password protected by the installer to maintain compliance with regulatory requirements and to ensure proper unit functionality. See the related product guide for the most recent country codes and regulatory domains.

Examples

This example shows how to configure country codes on the device to IN (India) and FR (France):

Device(config)# ap country IN,FR

ap dot11

To configure Spectrum Intelligence (SI) on Qualcomm based 2.4 GHz or 5 GHz radios, use the ap dot11 SI command.

ap dot11 {24ghz | 5ghz } SI

Syntax Description

24ghz

2.4 GHz radio

5ghz

5 GHz radio

SI

Enable Spectrum Intelligence (SI). [no] in the command disasbles SI.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to enable SI on 5GHz radio:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 5ghz SI

ap dot11 24ghz | 5ghz rrm ndp-mode

To configure the operating mode for 802.11a neighbor discovery, use the ap dot11 { 24ghz | 5ghz} rrm ndp-mode command.

ap dot11 { 24ghz | 5ghz } rrm ndp-mode { auto | off-channel }

Syntax Description

auto

Enables the auto mode.

off-channel

Enables NDP packets on RF ASIC radio.

Command Modes

Global configuration (config)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Examples

The following example shows how to configure the operating mode for 802.11a neighbor discovery:

Device# configure terminal
Device(config)# ap dot11 24ghz or 5ghz rrm ndp-mode auto

ap dot11 24ghz cleanair

To enable CleanAir for detecting 2.4-GHz devices, use the ap dot11 24ghz cleanair command in global configuration mode. To disable CleanAir for detecting 2.4-GHz devices, use the no form of this command.

ap dot11 24ghz cleanair

Syntax Description

This command has no arguments or keywords.

Command Default

Disabled.

Command Modes

Global configuration (config).

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

You must enable this CleanAir command before you configure other CleanAir commands.

Examples

This example shows how to enable CleanAir for 2.4-GHz devices:


Device(config)# ap dot11 24ghz cleanair

ap dot11 24ghz dot11g

To enable the Cisco wireless LAN solution 802.11g network, use the ap dot11 24ghz dot11g command. To disable the Cisco wireless LAN solution 802.11g network, use the no form of this command.

ap dot11 24ghz dot11g

no ap dot11 24ghz dot11g

Syntax Description

This command has no keywords and arguments.

Command Default

Enabled

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Before you enter the ap dot11 24ghz dot11g command, disable the 802.11 Cisco radio with the ap dot11 24ghz shutdown command.

After you configure the support for the 802.11g network, use the no ap dot11 24ghz shutdown command to enable the 802.11 2.4 Ghz radio.

Examples

This example shows how to enable the 802.11g network:

Device(config)# ap dot11 24ghz dot11g

ap dot11 24ghz rate

To configure 802.11b operational rates, use the ap dot11 24ghz rate command.

ap dot11 24ghz rate {RATE_11M | RATE_12M | RATE_18M | RATE_1M | RATE_24M | RATE_2M | RATE_36M | RATE_48M | RATE_54M | RATE_5_5M | RATE_6M | RATE_9M} {disable | mandatory | supported}

Syntax Description

RATE_11M

Configures the data to be transmitted at the rate of 11 Mbps

RATE_12M

Configures the data to be transmitted at the rate of 12 Mbps

RATE_18M

Configures the data to be transmitted at the rate of 18 Mbps

RATE_1M

Configures the data to be transmitted at the rate of 1 Mbps

RATE_24M

Configures the data to be transmitted at the rate of 24 Mbps

RATE_2M

Configures the data to be transmitted at the rate of 2 Mbps

RATE_36M

Configures the data to be transmitted at the rate of 36 Mbps

RATE_48M

Configures the data to be transmitted at the rate of 48 Mbps

RATE_54M

Configures the data to be transmitted at the rate of 54 Mbps

RATE_5_5M

Configures the data to be transmitted at the rate of 5.5 Mbps

RATE_6M

Configures the data to be transmitted at the rate of 6 Mbps

RATE_9M

Configures the data to be transmitted at the rate of 9 Mbps

disable

Disables the data rate that you specify. Also defines that the clients specify the data rates used for communication.

mandatory

Defines that the clients support this data rate in order to associate with an AP.

supported

Any associated clients support this data rate can communicate with the AP using this rate. However, the clients are not required to use this rate to associate with the AP.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure 802.11b operational rate to 9 Mbps and make it mandatory:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 24ghz rate RATE_9M mandatory

ap dot11 rrm channel cleanair-event

To configure CleanAir event-driven Radio Resource Management (RRM) parameters for all 802.11 Cisco lightweight access points, use the ap dot11 rrm channel cleanair-event command. When this parameter is configured, CleanAir access points can change their channel when a source of interference degrades the operations, even if the RRM interval has not expired yet.

ap dot11 {24ghz | 5ghz} rrm channel {cleanair-event sensitivity value}

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

sensitivity

Sets the sensitivity for CleanAir event-driven RRM.

value
Sensitivity value. You can specify any one of the following three optional sensitivity values:
  • low—Specifies low sensitivity.

  • medium—Specifies medium sensitivity.

  • high—Specifies high sensitivity.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to set the high sensitivity for CleanAir event-driven RRM:

Device(config)# ap dot11 24ghz rrm channel cleanair-event sensitivity high

default ap dot11 24ghz cleanair device

To configure the default state of report generation for 2.4-GHz interference devices, use the default ap dot11 24ghz cleanair device command in global configuration mode.

Syntax Description

canopy

Configures the alarm for canopy interference devices.

cont-tx

Configures the alarm for continuous transmitters.

dect-like

Configures the alarm for Digital Enhanced Cordless Communication (DECT)-like phones.

inv

Configures the alarm for devices using spectrally inverted Wi-Fi signals.

jammer

Configures the alarm for jammer interference devices.

nonstd

Configures the alarm for devices using nonstandard Wi-Fi channels.

superag

Configures the alarm for 802.11 SuperAG interference devices.

tdd-tx

Configures the alarm for Time Division Duplex (TDD) transmitters.

video

Configures the alarm for video cameras.

wimax-fixed

Configures the alarm for WiMax fixed interference devices.

wimax-mobile

Configures the alarm for WiMax mobile interference devices.

report

Displays the device alarm report.

si_fhss

Specifies the QCA SI FHSS.

Command Default

The alarm for Wi-Fi inverted devices is enabled. The alarm for all other devices is disabled.

Command Modes

Global configuration (config).

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

You must enable CleanAir using the ap dot11 24ghz cleanair command before you configure this command.

Examples

This example shows how to enable CleanAir to report when a video camera interferes:


Device(config)# default ap dot11 24ghz cleanair device video

ap dot11 24ghz rrm channel cleanair-event

To enable Event-Driven RRM (EDRRM) and the sensitivity for 2.4-GHz devices, use the ap dot11 24ghz rrm channel cleanair-event command in global configuration mode. To disable EDRRM, use the no form of this command.

ap dot11 24ghz rrm channel cleanair-event sensitivity {high | low | medium}

no ap dot11 24ghz rrm channel cleanair-event [ sensitivity{ high | low | medium}]

Syntax Description

sensitivity

(Optional) Configures the EDRRM sensitivity of the CleanAir event.

high

(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as indicated by the air quality (AQ) value.

low

(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated by the AQ value.

medium

(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated by the AQ value.

Command Default

EDRRM is disabled and the sensitivity is low.

Command Modes

Global configuration (config).

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

You must enable EDRRM using the ap dot11 24ghz rrm channel cleanair-event command before you configure the sensitivity.

Examples

This example shows how to enable EDRRM and set the EDRRM sensitivity to low:

Device(config)# ap dot11 24ghz rrm channel cleanair-event 
Device(config)# ap dot11 24ghz rrm channel cleanair-event sensitivity low

ap dot11 24ghz rrm channel device

To configure persistent non-Wi-Fi device avoidance in the 802.11b channel, use the ap dot11 24ghz rrm channel device command in global configuration mode. To disable persistent device avoidance, use the no form of this command.

ap dot11 24ghz rrm channel device

no ap dot11 24ghz rrm channel device

Syntax Description

This command has no arguments or keywords.

Command Default

Persistent device avoidance is disabled.

Command Modes

Global configuration (config).

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

CleanAir-capable monitor mode access points collect information about persistent devices on all configured channels and stores the information in the device. Local and bridge mode access points detect interference devices on the serving channels only.

Examples

This example shows how to enable persistent device avoidance:

Device(config)# ap dot11 24ghz rrm channel device

ap dot11 24ghz rrm optimized-roam

To configure optimized roaming for 802.11b network, use the ap dot11 24ghz rrm optimized-roam command.

ap dot11 24ghz rrm optimized-roam [ data-rate-threshold {11M | 12M | 18M | 1M | 24M | 2M | 36M | 48M | 54M | 5_5M | 6M | 9M | disable}]

Syntax Description

data-rate-threshold

Configures the data rate threshold for 802.11b optimized roaming.

11M

Sets the data rate threshold for 802.11b optimized roaming to 11 Mbps

12M

Sets the data rate threshold for 802.11b optimized roaming to of 12 Mbps

18M

Sets the data rate threshold for 802.11b optimized roaming to of 18 Mbps

1M

Sets the data rate threshold for 802.11b optimized roaming to of 1 Mbps

24M

Sets the data rate threshold for 802.11b optimized roaming to of 24 Mbps

2M

Sets the data rate threshold for 802.11b optimized roaming to of 2 Mbps

36M

Sets the data rate threshold for 802.11b optimized roaming to of 36 Mbps

48M

Sets the data rate threshold for 802.11b optimized roaming to of 48 Mbps

54M

Sets the data rate threshold for 802.11b optimized roaming to of 54 Mbps

5_5M

Sets the data rate threshold for 802.11b optimized roaming to of 5.5 Mbps

6M

Sets the data rate threshold for 802.11b optimized roaming to of 6 Mbps

9M

Sets the data rate threshold for 802.11b optimized roaming to of 9 Mbps

disable

Disables the data rate threshold.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure optimized roaming for 802.11b network:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 24ghz rrm optimized-roam

ap dot11 24ghz rx-sop threshold

To configure 802.11b radio receiver start-of-packet (RxSOP), use the ap dot11 24ghz rx-sop threshold command.

ap dot11 24ghz rx-sop threshold {auto | high | low | medium | custom rxsop-value}

Syntax Description

auto

Reverts RxSOP value to the default value.

high

Sets the RxSOP value to high threshold (–79 dBm).

medium

Sets the RxSOP value to medium threshold (–82 dBm).

low

Sets the RxSOP value to low threshold (–85 dBm).

custom rxsop-value

Sets the RxSOP value to custom threshold (–85 dBm to –60 dBm)

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Usage Guidelines

RxSOP determines the Wi-Fi signal level in dBm at which an access point's radio demodulates and decodes a packet. Higher the level, less sensitive the radio is and smaller the receiver cell size. The table below shows the RxSOP threshold values for high, medium, low, and custom levels for 2.4-GHz band.

Table 2. RxSOP Thresholds for 2.4-GHz Band
High Threshold Medium Threshold Low Threshold Custom Threshold

–79 dBm

–82 dBm

–85 dBm

–85 dBm to –60 dBm

Examples

The following example shows how to configure 802.11b radio receiver start-of-packet (RxSOP) value to auto:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 24ghz rx-sop threshold auto

ap dot11 24ghz shutdown

To disable 802.11a network, use the ap dot11 24ghz shutdown command.

ap dot11 24ghz shutdown

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to disable the 802.11a network:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 24ghz shutdown

ap dot11 5ghz channelswitch quiet

To configure the 802.11h channel switch quiet mode, use the ap dot11 5ghz channelswitch quiet command.

ap dot11 5ghz channelswitch quiet

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure the 802.11h channel switch quiet mode:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 5ghz channelswitch quiet

ap dot11 5ghz cleanair

To enable CleanAir for detecting 5-GHz devices, use the ap dot11 5ghz cleanair command in global configuration mode.

ap dot11 5ghz cleanair

Command Default

Disabled.

Command Modes

Global configuration.

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

You must enable this CleanAir command before you configure other CleanAir commands.

Examples

This example shows how to enable CleanAir for 5-GHz devices:


Device(config)# ap dot11 5ghz cleanair

default ap dot11 5ghz cleanair device

To configure the default state of the alarm for 5-GHz interference devices, use the default ap dot11 5ghz cleanair device command in global configuration mode.

default ap dot11 5ghz cleanair device {canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile}

Syntax Description

canopy

Configures the alarm for canopy interference devices.

cont-tx

Configures the alarm for continuous transmitters.

dect-like

Configures the alarm for Digital Enhanced Cordless Communication (DECT)-like phones.

inv

Configures the alarm for devices using spectrally inverted Wi-Fi signals.

jammer

Configures the alarm for jammer interference devices.

nonstd

Configures the alarm for devices using nonstandard Wi-Fi channels.

radar

Configures the alarm for radars.

report

Enables interference device reports.

superag

Configures the alarm for 802.11 SuperAG interference devices.

tdd-tx

Configures the alarm for Time Division Duplex (TDD) transmitters.

video

Configures the alarm for video cameras.

wimax-fixed

Configures the alarm for WiMax fixed interference devices.

wimax-mobile

Configures the alarm for WiMax mobile interference devices.

Command Default

The alarm for Wi-Fi inverted devices is enabled. The alarm for all other interference devices is disabled.

Command Modes

Global configuration (config).

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

You must enable CleanAir using the ap dot11 5ghz cleanair command before you configure this command.

Examples

This example shows how to enable CleanAir to report when a video camera interferes:


Device(config)# default ap dot11 5ghz cleanair device video

ap dot11 5ghz power-constraint

To configure the 802.11h power constraint value, use the ap dot11 5ghz power-constraint command. To remove the 802.11h power constraint value, use the no form of this command.

ap dot11 5ghz power-constraint value

no ap dot11 5ghz power-constraint

Syntax Description

value

802.11h power constraint value.

Note 

The range is from 0 to 30 dBm.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

This example shows how to configure the 802.11h power constraint to 5 dBm:


Device(config)# ap dot11 5ghz power-constraint 5

ap dot11 5ghz rate

To configure 802.11a operational rates, use the ap dot11 5ghz rate command.

ap dot11 5ghz rate {RATE_12M | RATE_18M | RATE_24M | RATE_36M | RATE_48M | RATE_54M | RATE_6M | RATE_9M} {disable | mandatory | supported}

Syntax Description

RATE_12M

Configures the data to be transmitted at the rate of 12 Mbps

RATE_18M

Configures the data to be transmitted at the rate of 18 Mbps

RATE_24M

Configures the data to be transmitted at the rate of 24 Mbps

RATE_36M

Configures the data to be transmitted at the rate of 36 Mbps

RATE_48M

Configures the data to be transmitted at the rate of 48 Mbps

RATE_54M

Configures the data to be transmitted at the rate of 54 Mbps

RATE_6M

Configures the data to be transmitted at the rate of 6 Mbps

RATE_9M

Configures the data to be transmitted at the rate of 9 Mbps

disable

Disables the data rate that you specify. Also defines that the clients specify the data rates used for communication.

mandatory

Defines that the clients support this data rate in order to associate with an AP.

supported

Any associated clients support this data rate can communicate with the AP using this rate. However, the clients are not required to use this rate to associate with the AP.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure 802.11a operational rate to 24 Mbps and make it supported:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 5ghz rate RATE_24M supported

ap dot11 5ghz rrm channel cleanair-event

To enable Event-Driven RRM (EDRRM) and configure the sensitivity for 5-GHz devices, use the ap dot11 5ghz rrm channel cleanair-event command in global configuration mode. To disable EDRRM, use the no form of the command.

ap dot11 5ghz rrm channel cleanair-event [ sensitivity {high | low | medium}]

no ap dot11 5ghz rrm channel cleanair-event [ sensitivity {high | low | medium}]

Syntax Description

sensitivity

(Optional) Configures the EDRRM sensitivity of the CleanAir event.

high

(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as indicated by the air quality (AQ) value.

low

(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated by the AQ value.

medium

(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated by the AQ value.

Command Default

EDRRM is disabled and the EDRRM sensitivity is low.

Command Modes

Global configuration (config).

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

You must enable EDRRM using the ap dot11 5ghz rrm channel cleanair-event command before you configure the sensitivity.

Examples

This example shows how to enable EDRRM and set the EDRRM sensitivity to high:

Device(config)# ap dot11 5ghz rrm channel cleanair-event 
Device(config)# ap dot11 5ghz rrm channel cleanair-event sensitivity high

ap dot11 5ghz rrm channel device

To configure persistent non-Wi-Fi device avoidance in the 802.11a channel, use the ap dot11 5ghz rrm channel device command in global configuration mode. To disable persistent device avoidance, use the no form of this command.

ap dot11 5ghz rrm channel device

no ap dot11 5ghz rrm channel device

Syntax Description

This command has no arguments or keywords.

Command Default

The CleanAir persistent device state is disabled.

Command Modes

Global configuration (config)

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

CleanAir-capable monitor mode access points collect information about persistent devices on all configured channels and stores the information in the device. Local and bridge mode access points detect interference devices on the serving channels only.

Examples

This example shows how to enable persistent device avoidance on 802.11a devices:

Device(config)# ap dot11 5ghz rrm channel device

ap dot11 5ghz rx-sop threshold

To configure 802.11a radio receiver start-of-packet (RxSOP), use the ap dot11 5ghz rx-sop threshold command.

ap dot11 5ghz rx-sop threshold {auto | high | low | medium | custom rxsop-value}

Syntax Description

auto

Reverts RxSOP value to the default value.

high

Sets the RxSOP value to high threshold (–76 dBm).

medium

Sets the RxSOP value to medium threshold (–78 dBm).

low

Sets the RxSOP value to low threshold (–80 dBm).

custom rxsop-value

Sets the RxSOP value to custom threshold (–85 dBm to –60 dBm)

Command Default

None

Command Modes

config

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

RxSOP determines the Wi-Fi signal level in dBm at which an access point's radio demodulates and decodes a packet. Higher the level, less sensitive the radio is and smaller the receiver cell size. The table below shows the RxSOP threshold values for high, medium, low, and custom levels for 5-GHz band.

Table 3. RxSOP Thresholds for 5-GHz Band
High Threshold Medium Threshold Low Threshold Custom Threshold

–76 dBm

–78 dBm

–80 dBm

–85 dBm to –60 dBm

Examples

The following example shows how to configure 802.11b radio receiver start-of-packet (RxSOP) value to a custom value of –70 dBm:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 24ghz rx-sop threshold custom -70

ap dot11 5ghz shutdown

To disable 802.11a network, use the ap dot11 5ghz shutdown command.

ap dot11 5ghz shutdown

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to disable the 802.11a network:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 5ghz shutdown

ap dot11 5ghz smart-dfs

To configure to use nonoccupancy time for radar interference channel, use the ap dot11 5ghz smart-dfs command.

ap dot11 5ghz smart-dfs

Command Default

None

Command Modes

config

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure to use nonoccupancy time for radar interference channel:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap dot11 5ghz smart-dfs

ap dot11 beaconperiod

To change the beacon period globally for 2.4 GHz or 5 GHz bands, use the ap dot11 beaconperiod command.


Note

Disable the 802.11 network before using this command. See the “Usage Guidelines” section.


ap dot11 {24ghz | 5ghz} beaconperiod time

Syntax Description

24ghz

Specifies the settings for 2.4 GHz band.

5ghz

Specifies the settings for 5 GHz band.

beaconperiod

Specifies the beacon for a network globally.

time

Beacon interval in time units (TU). One TU is 1024 microseconds. The range is from 20 to 1000.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

In Cisco wireless LAN 802.11 networks, all Cisco lightweight access point wireless LANs broadcast a beacon at regular intervals. This beacon notifies clients that the wireless service is available and allows the clients to synchronize with the lightweight access point.

Before you change the beacon period, make sure that you have disabled the 802.11 network by using the ap dot11 {24ghz | 5ghz} shutdown command. After changing the beacon period, enable the 802.11 network by using the no ap dot11 {24ghz | 5ghz} shutdown command.

Examples

This example shows how to configure the 5 GHZ band for a beacon period of 120 time units:

Device(config)# ap dot11 5ghz beaconperiod 120

ap dot11 cac media-stream

To configure media stream Call Admission Control (CAC) voice and video quality parameters for 2.4 GHz and 5 GHz bands, use the ap dot11 cac media-stream command.

ap dot11 {24ghz | 5ghz} cac media-stream multicast-direct {max-retry-percent retryPercent | min-client-rate {eighteen | eleven | fiftyFour | fivePointFive | fortyEight | nine | oneFifty | oneFortyFourPointFour | oneThirty | oneThirtyFive | seventyTwoPointTwo | six | sixtyFive | thirtySix | threeHundred | twelve | twentyFour | two | twoSeventy}}

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

multicast-direct

Specifies CAC parameters for multicast-direct media streams.

max-retry-percent

Specifies the percentage of maximum retries that are allowed for multicast-direct media streams.

retryPercent

Percentage of maximum retries that are allowed for multicast-direct media streams.

Note 

The range is from 0 to 100.

min-client-rate

Specifies the minimum transmission data rate to the client for multicast-direct media streams (rate at which the client must transmit in order to receive multicast-direct unicast streams).

If the transmission rate is below this rate, either the video will not start or the client may be classified as a bad client. The bad client video can be demoted for better effort QoS or subject to denial.

min-client-rate

You can choose the following rates:

  • eighteen

  • eleven

  • fiftyFour

  • fivePointFive

  • fortyEight

  • nine

  • one

  • oneFifty

  • oneFortyFourPointFour

  • oneThirty

  • oneThirtyFive

  • seventyTwoPointTwo

  • six

  • sixtyFive

  • thirtySix

  • threeHundred

  • twelve

  • twentyFour

  • two

  • twoSeventy

Command Default

The default value for the maximum retry percent is 80. If it exceeds 80, either the video will not start or the client might be classified as a bad client. The bad client video will be demoted for better effort QoS or is subject to denial.

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol.

Before you can configure CAC parameters on a network, you must complete the following prerequisites:

  • Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.

  • Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown command.

  • Save the new configuration.

  • Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz | 5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.

Examples

This example shows how to configure the maximum retry percent for multicast-direct media streams as 90 on a 802.11a network:

Device(config)# ap dot11 5ghz cac media-stream multicast max-retry-percent 90

ap dot11 cac multimedia

To configure multimedia Call Admission Control (CAC) voice and video quality parameters for 2.4 GHz and 5 GHz bands, use the ap dot11 cac multimedia command.

ap dot11 {24ghz | 5ghz} cac multimedia max-bandwidth bandwidth

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

max-bandwidth

Specifies the percentage of maximum bandwidth allocated to Wi-Fi Multimedia (WMM) clients for voice and video applications on the 2.4 GHz or 5 GHz band.

bandwidth

Percentage of the maximum bandwidth allocated to WMM clients for voice and video applications on the 802.11a or 802.11b/g network. Once the client reaches the specified value, the access point rejects new multimedia flows this radio band. The range is from 5 to 85%.

Command Default

The default value is 75%.

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol.

Before you can configure CAC parameters on a network, you must complete the following prerequisites:

  • Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.

  • Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown command.

  • Save the new configuration.

  • Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz | 5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.

Examples

This example shows how to configure the percentage of the maximum bandwidth allocated to WMM clients for voice and video applications on the 5 GHz band:

Device(config)# ap dot11 5ghz cac multimedia max-bandwidth 5

ap dot11 cac voice

To configure Call Admission Control (CAC) parameters for the voice category, use the ap dot11 cac voice command.

ap dot11 {24ghz | 5ghz} cac voice {acm | load-based | max-bandwidth value | roam-bandwidth value | sip [bandwidth bw] sample-interval value | stream-size x max-streams y | tspec-inactivity-timeout {enable | ignore}}

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

acm

Enables bandwidth-based voice CAC for the 2.4 GHz or 5 GHz band.

Note 

To disable bandwidth-based voice CAC for the 2.4 GHz or 5 GHz band, use the no ap dot11 {24ghz | 5ghz} cac voice acm command.

load-based

Enable load-based CAC on voice access category.

Note 

To disable load-based CAC on voice access category for the 2.4 GHz or 5 GHz band, use the no ap dot11 {24ghz | 5ghz} cac voice load-based command.

max-bandwidth

Sets the percentage of the maximum bandwidth allocated to clients for voice applications on the 2.4 GHz or 5 GHz band.

value

Bandwidth percentage value from 5 to 85%.

roam-bandwidth

Sets the percentage of the CAC maximum allocated bandwidth reserved for roaming voice clients on the 2.4 GHz or 5 GHz band.

value

Bandwidth percentage value from 0 to 85%.

sip

Specifies the CAC codec name and sample interval as parameters and calculates the required bandwidth per call for the 802.11 networks.

bw
Bandwidth in kbps. The following bandwidth values specify parameters for the SIP codecs:
  • 64kbps—Specifies CAC parameters for the SIP G711 codec.

  • 8kbps—Specifies CAC parameters for the SIP G729 codec.
Note 

The default value is 64 Kbps.

sample-interval

Specifies the packetization interval for SIP codec.

value

Packetization interval in msecs. The sample interval for SIP codec value is 20 seconds.

stream-size

Specifies the number of aggregated voice Wi-Fi Multimedia (WMM) traffic specification (TSPEC) streams at a specified data rate for the 2.4 GHz or 5 GHz band.

x

Stream size. The range of the stream size is from 84000 to 92100.

max-streams

Specifies the maximum number of streams per TSPEC.

y

Number (1 to 5) of voice streams.

Note 

The default number of streams is 2 and the mean data rate of a stream is 84 kbps.

tspec-inactivity-timeout
Specifies TSPEC inactivity timeout processing mode.
Note 

Use this keyword to process or ignore the Wi-Fi Multimedia (WMM) traffic specifications (TSPEC) inactivity timeout received from an access point. When the inactivity timeout is ignored, a client TSPEC is not deleted even if the access point reports an inactivity timeout for that client.

enable

Processes the TSPEC inactivity timeout messages.

ignore

Ignores the TSPEC inactivity timeout messages.

Note 

The default is ignore (disabled).

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.

Before you can configure CAC parameters on a network, you must complete the following prerequisites:

  • Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.

  • Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown command.

  • Save the new configuration.

  • Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz | 5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.

Examples

This example shows how to enable the bandwidth-based CAC:

Device(config)# ap dot11 24ghz cac voice acm

This example shows how to enable the load-based CAC on the voice access category:

Device(config)# ap dot11 24ghz cac voice load-based

This example shows how to specify the percentage of the maximum allocated bandwidth for voice applications on the selected radio band:

Device(config)# ap dot11 24ghz cac voice max-bandwidth 50

This example shows how to configure the percentage of the maximum allocated bandwidth reserved for roaming voice clients on the selected radio band:

Device(config)# ap dot11 24ghz cac voice roam-bandwidth 10

This example shows how to configure the bandwidth and voice packetization interval for the G729 SIP codec on a 2.4 GHz band:

Device(config)# ap dot11 24ghz cac voice sip bandwidth 8 sample-interval 40

This example shows how to configure the number of aggregated voice traffic specifications stream with a stream size of 85000 and with a maximum of 5 streams:

Device(config)# ap dot11 24ghz cac voice stream-size 85000 max-streams 5

This example shows how to enable the voice TSPEC inactivity timeout messages received from an access point:

Device(config)# ap dot11 24ghz cac voice tspec-inactivity-timeout enable

ap dot11 cleanair

To configure CleanAir on 802.11 networks, use the ap dot11 cleanair command. To disable CleanAir on 802.11 networks, use the no form of this command.

ap dot11 {24ghz | 5ghz} cleanair

no ap dot11 {24ghz | 5ghz} cleanair

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

cleanair

Specifies CleanAir on the 2.4 GHz or 5 GHz band.

Command Default

Disabled

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to enable the CleanAir settings on the 2.4 GHz band:


Device(config)# ap dot11 24ghz cleanair

ap dot11 cleanair device

To configure CleanAir interference device types, use the ap dot11 cleanair device command.

ap dot11 24ghz cleanair device [canopy | cont-tx | dect-like | inv | jammer | nonstd | report | si_fhss | superag | tdd-tx | video | wimax-fixed | wimax-mobile]

Syntax Description

canopy

Specifies the Canopy devices.

cont-tx

Specifies the continuous transmitter.

dect-like

Specifies a Digital Enhanced Cordless Communication (DECT)-like phone.

inv

Specifies the devices using spectrally inverted Wi-Fi signals.

jammer

Specifies the jammer.

nonstd

Specifies the devices using nonstandard Wi-Fi channels.

superag

Specifies 802.11 SuperAG devices.

tdd-tx

Specifies the TDD transmitter.

video

Specifies video cameras.

wimax-fixed

Specifies a WiMax fixed device.

wimax-mobile

Specifies a WiMax mobile device.

report

Displays the device alarm report.

si_fhss

Specifies the QCA SI FHSS.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

This example shows how to configure the device to monitor ZigBee interferences:

Device(config)# ap dot11 24ghz cleanair device report

ap dot11 dot11n

To configure settings for an 802.11n network, use the ap dot11 dot11n command.

ap dot11 {24ghz | 5ghz} dot11n {a-mpdu tx priority { priority_value all } | scheduler timeout rt scheduler_value} | a-msdu tx priority {priority_value | all} | guard-interval {any | long} | mcs tx rate | rifs rx}

Syntax Description

24ghz

Specifies the 2.4-GHz band.

5ghz

Specifies the 5-GHz band.

dot11n

Enables 802.11n support.

a-mpdu tx priority

Specifies the traffic that is associated with the priority level that uses Aggregated MAC Protocol Data Unit (A-MPDU) transmission.

priority_value

Aggregated MAC protocol data unit priority level from 0 to 7.

all

Specifies all of the priority levels at once.

a-msdu tx priority

Specifies the traffic that is associated with the priority level that uses Aggregated MAC Service Data Unit (A-MSDU) transmission.

priority_value

Aggregated MAC protocol data unit priority level from 0 to 7.

all

Specifies all of the priority levels at once.

scheduler_value

The 802.11n A-MPDU transmit aggregation scheduler timeout value from 1 to 10000 milliseconds.

guard-interval

Specifies the guard interval.

any

Enables either a short or a long guard interval.

long

Enables only a long guard interval.

mcs tx rate

Specifies the modulation and coding scheme (MCS) rates at which data can be transmitted between the access point and the client.

rate

Specifies the modulation and coding scheme data rates.

Note 

The range is from 0 to 23.

rifs rx

Specifies the Reduced Interframe Space (RIFS) between data frames.

Command Default

By default, priority 0 is enabled.

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Aggregation is the process of grouping packet data frames together rather than transmitting them separately. The two aggregation methods available are:
  • A-MPDU—This aggregation is performed in the software.
  • A-MSDU—This aggregation is performed in the hardware

Aggregated MAC Protocol Data Unit priority levels assigned per traffic type are as follows:

  • 0—Best effort

  • 1—Background

  • 2—Spare

  • 3—Excellent effort

  • 4—Controlled load

  • 5—Video, less than 100-ms latency and jitter

  • 6—Voice, less than 10-ms latency and jitter

  • 7—Network control

  • all—Configure all of the priority levels at once.


Note

Configure the priority levels to match the aggregation method used by the clients.


Examples

This example shows how to enable 802.11n support on a 2.4-GHz band:


Device(config)# ap dot11 24ghz dot11n

This example shows how to configure all the priority levels at once so that the traffic that is associated with the priority level uses A-MSDU transmission:


Device(config)# ap dot11 24ghz dot11n a-msdu tx priority all

This example shows how to enable only long guard intervals:


Device(config)# ap dot11 24ghz dot11n guard-interval long

This example shows how to specify MCS rates:


Device(config)# ap dot11 24ghz dot11n mcs tx 5

This example shows how to enable RIFS:


Device(config)# ap dot11 24ghz dot11n rifs rx

ap dot11 dtpc

To configure Dynamic Transmit Power Control (DTPC) settings, Cisco Client eXtension (CCX) version 5 expedited bandwidth request feature, and the fragmentation threshold on an 802.11 network, use the ap dot11 dtpc command.

ap dot11 {24ghz | 5ghz} {dtpc | exp-bwreq | fragmentation threshold}

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

dtpc

Specifies Dynamic Transport Power Control (DTPC) settings.

Note 

This option is enabled by default.

exp-bwreq

Specifies Cisco Client eXtension (CCX) version 5 expedited bandwidth request feature.

Note 

The expedited bandwidth request feature is disabled by default.

fragmentation threshold

Specifies the fragmentation threshold.

Note 

This option can only used be when the network is disabled using the ap dot11 {24ghz | 5ghz} shutdown command.

threshold

Threshold. The range is from 256 to 2346 bytes (inclusive).

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

When the CCX version 5 expedited bandwidth request feature is enabled, the device configures all joining access points for this feature.

Examples

This example shows how to enable DTPC for the 5 GHz band:

Device(config)# ap dot11 5ghz dtpc

This example shows how to enable the CCX expedited bandwidth settings:

Device(config)# ap dot11 5ghz exp-bwrep

This example shows how to configure the fragmentation threshold on the 5 GHz band with the threshold number of 1500 bytes:

Device(config)# ap dot11 5ghz fragmentation 1500

ap dot11 edca-parameters

To enable a specific enhanced distributed channel access (EDCA) profile on the 2.4 GHz or 5 GHz bands, use the ap dot11 edca-parameters command. To disable an EDCA profile on the 2.4 GHz or 5 GHz bands, use the no form of this command.

ap dot11 { 24ghz | 5ghz } edca-parameters { client-load-based | custom-voice | optimized-video-voice | optimized-voice | svp-voice | wmm-default }

no ap dot11 { 24ghz | 5ghz } edca-parameters { client-load-based | custom-voice | fastlane | optimized-video-voice | optimized-voice | svp-voice | wmm-default }

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

edca-parameters

Specifies a specific enhanced distributed channel access (EDCA) profile on the 802.11 networks.

fastlane

Enables Fastlane parameters for 24GHz.

client-load-based

Enables client load-based EDCA configuration for 802.11 radios.

custom-voice

Enables custom voice EDCA parameters.

optimized-video-voice

Enables EDCA voice- and video-optimized profile parameters. Choose this option when both voice and video services are deployed on your network.

optimized-voice

Enables EDCA voice-optimized profile parameters. Choose this option when voice services other than SpectraLink are deployed on your network.

svp-voice

Enables SpectraLink voice priority parameters. Choose this option if SpectraLink phones are deployed on your network to improve the quality of calls.

wmm-default

Enables the Wi-Fi Multimedia (WMM) default parameters. Choose this option when voice or video services are not deployed on your network.

Command Default

wmm-default

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

10.3

The custom-voice keyword was removed for Cisco 5700 Series WLC.

Cisco IOS XE Bengaluru 17.5.1

The client-load-based keyword was added.

Examples

This example shows how to enable SpectraLink voice priority parameters:


Device(config)# ap dot11 24ghz edca-parameters svp-voice

ap dot11 load-balancing denial

To configure the load balancing denial count, use the ap dot11 load-balancingdenial command. To disable load balancing denial count, use the no form of the command.

ap dot11 { 24ghz| 5ghz} load-balancingdenial count

Syntax Description

count

Load balancing denial count.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

The following example shows how to configure the load balancing denial count:

Device# configure terminal
Device(config)# ap dot11 5ghz load-balancing denial 10

ap dot11 load-balancing window

To configure the number of clients for the aggressive load balancing client window, use the ap dot11 load-balancingwindow command. To disable the client count, use the no form of the command.

ap dot11 { 24ghz| 5ghz} load-balancingwindow clients

Syntax Description

clients

Number of clients. Valid range is from 0 to 20.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

The following example shows how to configure the number of clients for the aggressive load balancing client window:

Device# configure terminal
Device(config)# ap dot11 5ghz load-balancing window 10

ap dot11 rf-profile

To configure an RF-Profile for a selected band, use the ap dot11 rf-profile command. To delete an RF-Profile, use the no form of this command.

ap dot11 { 24ghz | 5ghz } rf-profile profile name

Syntax Description

24ghz

Displays the 2.4-GHz band

5ghz

Displays the 5-GHz band

profile name

Name of the RF profile

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Denali 16.3.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows how to configure an RF profile for a selected band.

Device#ap dot11 24GHz rf-profile doctest

ap dot11 rrm

To configure basic and advanced radio resource management settings for 802.11 devices, use the ap dot11 rrm command.

ap dot11 {24ghz | 5ghz} rrm {ccx location-measurement sec | channel {cleanair-event | dca | device | foreign | load | noise | outdoor-ap-dca} | coverage {data fail-percentage pct | data packet-count count | data rssi-threshold threshold} | exception global percentage | level global number | voice {fail-percentage percentage | packet-count number | rssi-threshold threshold}}

Syntax Description

ccx

Configures Advanced (RRM) 802.11 CCX options.

location-measurement

Specifies 802.11 CCX Client Location Measurements in seconds. The range is between 10 and 32400 seconds.

channel

Configure advanced 802.11-channel assignment parameters.

cleanair-event

Configures cleanair event-driven RRM parameters.

dca

Configures 802.11-dynamic channel assignment algorithm parameters.

device

Configures persistent non-WiFi device avoidance in the 802.11-channel assignment.

foreign

Enables foreign AP 802.11-interference avoidance in the channel assignment.

load

Enables Cisco AP 802.11-load avoidance in the channel assignment.

noise

Enables non-802.11-noise avoidance in the channel assignment.

outdoor-ap-dca

Configures 802.11 DCA list option for outdoor AP.

coverage

Configures 802.11 coverage Hole-Detection.

data fail-percentage pct

Configures 802.11 coverage failure-rate threshold for uplink data packets. The range is between 1 and 100

data packet-count count

Configures 802.11 coverage minimum-failure-count threshold for uplinkdata packets.

data rssi-threshold threshold

Configures 802.11 minimum-receive-coverage level for voice packets.

exception global percentage

Configures 802.11 Cisco APs coverage-exception level. The range is between 0 and 100 percent.

level global number

Configures 802.11 Cisco AP client-minimum-exception level between 1 and 75 clients.

voice

Configures 802.11 coverage Hole-Detection for voice packets.

fail-percentage percentage

Configures 802.11 coverage failure rate threshold for uplink voice packets.

packet-count number

Configures 802.11 coverage minimum-uplink-failure count threshold for voice packets.

rssi-threshold threshold

Configures 802.11 minimum receive coverage level for voice packets.

Command Default

Disabled

Command Modes

Interface configuration

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

This command applies for both 802.11a and 802.11b bands. But the appropriate commands must be chosen for configuring the parameter.

Examples

This example shows how to configure various RRM settings.


Device#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)#ap dot11 5ghz rrm ?
  ccx            Configure Advanced(RRM) 802.11a CCX options
  channel        Configure advanced 802.11a channel assignment parameters
  coverage       802.11a Coverage Hole Detection
  group-member   Configure members in 802.11a static RF group
  group-mode     802.11a RF group selection mode
  logging        802.11a event logging
  monitor        802.11a statistics monitoring
  ndp-type       Neighbor discovery type Protected/Transparent
  profile        802.11a performance profile
  tpc-threshold  Configures the Tx Power Control Threshold used by RRM for auto
                 power assignment
  txpower        Configures the 802.11a Tx Power Level

ap dot11 rrm channel

To enable radio resource management channel for 2.4 GHz and 5GHz devices, use the ap dot11 rrm channel command. To disable the radio resource mangement for 2.4 GHz and 5 GHz devices, use the no form of the command.

ap dot11 {24ghz | 5ghz} rrm channel {cleanair-event | dca | device | foreign | load | noise}

no ap dot11 {24ghz | 5ghz} rrm channel {cleanair-event | dca | device | foreign | load | noise}

Syntax Description

cleanair-event

Specifies the cleanair event-driven RRM parameters

dca

Specifies the 802.11 dynamic channel assignment algorithm parameters

device

Specifies the persistent non-WiFi device avoidance in the 802.11-channel assignment.

foreign

Enables foreign AP 802.11-interference avoidance in the channel assignment.

load

Enables Cisco AP 802.11-load avoidance in the channel assignment.

noise

Enables non-802.11-noise avoidance in the channel assignment.

Command Default

None.

Command Modes

Interface configuration.

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

None.

Examples

This example shows all the parameters available for Channel.


Device#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)#ap dot11 24ghz rrm channel ?
  cleanair-event  Configure cleanair event-driven RRM parameters
  dca             Config 802.11b dynamic channel assignment algorithm
                  parameters
  device          Configure persistent non-WiFi device avoidance in the 802.11b
                  channel assignment
  foreign         Configure foreign AP 802.11b interference avoidance in the
                  channel assignment
  load            Configure Cisco AP 802.11b load avoidance in the channel
                  assignment
  noise           Configure 802.11b noise avoidance in the channel assignment

ap dot11 rrm channel dca

To configure Dynamic Channel Assignment (DCA) algorithm parameters on 802.11 networks, use the ap dot11 rrm channel dca command.

ap dot11 {24ghz | 5ghz} rrm channel dca {add value <1-14> | anchor-time value | global {auto | once} | interval value | min-metric value | remove value <1-14> | sensitivity {high | low | medium}}

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

add

Adds the 802.11b DCA channels to RRM allowed channel list

anchor-time

Specifies the anchor time for DCA.

value

Hour of time between 0 and 23. These values represent the hour from 12:00 a.m. to 11:00 p.m.

global

Specifies the global DCA mode for the access points in the 802.11 networks.

auto

Enables auto-RF.

once

Enables one-time auto-RF.

interval

Specifies how often the DCA is allowed to run.

value

Interval between the times when DCA is allowed to run. Valid values are 0, 1, 2, 3, 4, 6, 8, 12, or 24 hours. 0 is 10 minutes (600 seconds). Default value is 0 (10 minutes).

min-metric

Specifies the DCA minimum RSSI energy metric.

value

Minimum RSSI energy metric value from –100 to –60.

remove

Removes the 802.11b DCA channels from RRM allowed channel list.

sensitivity

Specifies how sensitive the DCA algorithm is to environmental changes (for example, signal, load, noise, and interference) when determining whether or not to change channels.

high

Specifies that the DCA algorithm is not particularly sensitive to environmental changes. See the “Usage Guidelines” section for more information.

low

Specifies that the DCA algorithm is moderately sensitive to environmental changes. See the “Usage Guidelines” section for more information.

medium

Specifies that the DCA algorithm is highly sensitive to environmental changes. See the “Usage Guidelines” section for more information.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

The DCA sensitivity thresholds vary by radio band as shown in the table below.

To aid in troubleshooting, the output of this command shows an error code for any failed calls. The table below explains the possible error codes for failed calls.

Table 4. DCA Sensitivity Threshold
Sensitivity 2.4 Ghz DCA Sensitivity Threshold 5 Ghz DCA Sensitivity Threshold
High 5 dB 5 dB
Medium 15 dB 20 dB
Low 30 dB 35 dB

Examples

This example shows how to configure the device to start running DCA at 5 pm for the 2.4 GHz band:


Device(config)# ap dot11 24ghz rrm channel dca anchor-time 17

This example shows how to set the DCA algorithm to run every 10 minutes for the 2.4 GHz band:


Device(config)# ap dot11 24ghz rrm channel dca interval 0

This example shows how to configure the value of DCA algorithm’s sensitivity to low on the 2.4 GHz band:


Device(config)# ap dot11 24ghz rrm channel dca sensitivity low

ap dot11 rrm coverage

To enable 802.11 coverage hole detection, use the ap dot11 rrm coverage command.

ap dot11 {24ghz | 5ghz} rrm coverage [data {fail-percentage percentage | packet-count count | rssi-threshold threshold} | exceptional global value | level global value | voice {fail-percentage percentage | packet-count packet-count | rssi-threshold threshold}]

Syntax Description

data

Specifies 802.11 coverage hole-detection data packets.

fail-percentage percentage

Specifies 802.11 coverage failure-rate threshold for uplink data packets. The range is between 1 and 100

packet-count count

Specifies 802.11 coverage minimum-failure-count threshold for uplink data packets.

rssi-threshold threshold

Specifies 802.11 minimum-receive-coverage level for voice packets.

exceptional global value

Specifies 802.11 Cisco APs coverage-exception level. The range is between 0 and 100 percent.

level global value

Specifies 802.11 Cisco AP client-minimum-exception level between 1 and 75 clients.

voice

Specifies 802.11 coverage Hole-Detection for voice packets.

fail-percentage percentage

Specifies 802.11 coverage failure rate threshold for uplink voice packets.

packet-count packet-count

Specifies 802.11 coverage minimum-uplink-failure count threshold for voice packets.

rssi-threshold threshold

Specifies 802.11 minimum receive coverage level for voice packets.

Command Default

None.

Command Modes

Interface configuration.

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

If you enable coverage hole-detection, the device automatically determines, based on data that is received from the access points, whether any access points have clients that are potentially located in areas with poor coverage.

If both the number and percentage of failed packets exceed the values that you entered in the ap dot11 {24ghz | 5ghz} rrm coverage packet-count and ap dot11 {24ghz | 5ghz} rrm coverage fail-percentage commands for a 5-second period, the client is considered to be in a pre-alarm condition. The device uses this information to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the ap dot11 {24ghz | 5ghz} rrm coverage level-global and ap dot11 {24ghz | 5ghz} rrm coverage exceptional-global commands over a 90-second period. The device determines whether the coverage hole can be corrected and, if appropriate, mitigate the coverage hole by increasing the transmit power level for that specific access point.

Examples

This example shows how to set the RSSI-threshold for data in 5-GHz band.


Device#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)#ap dot11 5ghz rrm coverage data rssi-threshold -80

ap dot11 rrm group-member

To configure members in an 802.11 static RF group, use the ap dot11 rrm group-member command. To remove members from 802.11 RF group, use the no form of this command.

ap dot11 {24ghz | 5ghz} rrm group-member controller-name controller-ip

no ap dot11 {24ghz | 5ghz} rrm group-member controller-name controller-ip

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

controller-name

Name of the device to be added.

controller-ip

IP address of the device to be added.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to add a device in the 5 GHz band RF group:


Device(config)# ap dot11 5ghz rrm group-member cisco-controller 192.0.2.54

ap dot11 rrm group-mode

To set the 802.11 automatic RF group selection mode on, use the ap dot11 rrm group-mode command. To set the 802.11 automatic RF group selection mode off, use the no form of this command.

ap dot11 { 5ghz | 24ghz } rrm group-mode { auto | leader | off }

no ap dot11 {5ghz | 24ghz} rrm group-mode

Syntax Description

5ghz

Specifies the 2.4-GHz band.

24ghz

Specifies the 5-GHz band.

auto

Sets the 802.11 RF group selection to automatic update mode.

leader

Sets the 802.11 RF group selection to static mode, and sets this device as the group leader.

off

Sets the 802.11 RF group selection to off.

Command Default

auto

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to turn the auto RF group selection mode on the 5 GHz band:

Device(config)# ap dot11 5ghz rrm group-mode auto

ap dot11 rrm logging

To configure report log settings on supported 802.11 networks, use the ap dot11 rrm logging command.

ap dot11 {24ghz | 5ghz} rrm logging {channel | coverage | foreign | load | noise | performance | txpower}

Syntax Description

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

channel

Turns the channel change logging mode on or off. The default mode is off (Disabled).

coverage

Turns the coverage profile logging mode on or off. The default mode is off (Disabled).

foreign

Turns the foreign interference profile logging mode on or off. The default mode is off (Disabled).

load

Turns the load profile logging mode on or off. The default mode is off (Disabled).

noise

Turns the noise profile logging mode on or off. The default mode is off (Disabled).

performance

Turns the performance profile logging mode on or off. The default mode is off (Disabled).

txpower

Turns the transit power change logging mode on or off. The default mode is off (Disabled).

Command Default

Disabled

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to turn the 5 GHz logging channel selection mode on:

Device(config)# ap dot11 5ghz rrm logging channel

This example shows how to turn the 5 GHz coverage profile violation logging selection mode on:

Device(config)# ap dot11 5ghz rrm logging coverage

This example shows how to turn the 5 GHz foreign interference profile violation logging selection mode on:

Device(config)# ap dot11 5ghz rrm logging foreign

This example shows how to turn the 5 GHz load profile logging mode on:

Device(config)# ap dot11 5ghz rrm logging load

This example shows how to turn the 5 GHz noise profile logging mode on:

Device(config)# ap dot11 5ghz rrm logging noise

This example shows how to turn the 5 GHz performance profile logging mode on:

Device(config)# ap dot11 5ghz rrm logging performance

This example shows how to turn the 5 GHz transmit power change mode on:

Device(config)# ap dot11 5ghz rrm logging txpower

ap dot11 rrm monitor

To Configure monitor settings on the 802.11 networks, use the ap dot11 rrm monitor command.

ap dot11 {24ghz | 5ghz} rrm monitor {channel-list | {all | country | dca} | coverage | load | noise | signal} seconds

Syntax Description

24ghz

Specifies the 802.11b parameters.

5ghz

Specifies the 802.11a parameters.

channel-list all

Monitors the noise, interference, and rogue monitoring channel list for all channels.

channel-list country

Monitors the noise, interference, and rogue monitoring channel list for the channels used in the configured country code.

channel-list dca

Monitors the noise, interference, and rogue monitoring channel list for the channels used by automatic channel assignment.

coverage

Specifies the coverage measurement interval.

load

Specifies the load measurement interval.

noise

Specifies the noise measurement interval.

signal

Specifies the signal measurement interval.

rssi-normalization

Configure RRM Neighbor Discovery RSSI Normalization.

seconds

Measurement interval time from 60 to 3600 seconds.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to monitor the channels used in the configured country:


Device(config)# ap dot11 24ghz rrm monitor channel-list country

This example shows how to set the coverage measurement interval to 60 seconds:


Device(config)# ap dot11 24ghz rrm monitor coverage 60

ap dot11 rrm ndp-type

To configure the 802.11 access point radio resource management neighbor discovery protocol type, use the ap dot11 rrm ndp-type command.

ap dot11 { 24ghz | 5ghz } rrm ndp-type { protected | transparent }

Syntax Description

24ghz

Specifies the 2.4-GHz band.

5ghz

Specifies the 5-GHz band.

6ghz

Specifies the 6-GHz band.

protected

Specifies the Tx RRM protected (encrypted) neighbor discovery protocol.

transparent

Specifies the Tx RRM transparent (not encrypted) neighbor discovery protocol.

Command Default

None

Command Modes

Global configuration

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Cisco IOS XE Cupertino 17.7.1

This command was modified with the introduction of the 6-GHz band.

Usage Guidelines

Before you configure the 802.11 access point RRM neighbor discovery protocol type, ensure that you have disabled the network by entering the ap dot11 {24ghz | 5ghz } shutdown command.

Examples

This example shows how to enable the 802.11a access point RRM neighbor discovery protocol type as protected:


Device(config)# ap dot11 5ghz rrm ndp-type protected

ap dot11 24ghz rrm tpc

To configure the tx-power control threshold used by RRM for auto power assignment, use the ap dot11 rrm tpc command. To disable, use the no form of the command.

ap dot11 {24ghz | 5ghz} rrm tpc{threshold | tpcv1-chan-aware}

Syntax Description

tpc threshold

Configures the Tx-Power Control threshold used by RRM..

tpcv1-chan-aware

Configures the Tx-Power Control to be channel aware.

Command Default

None.

Command Modes

Interface configuration.

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

None.

Examples

This example shows how to configure the tx-power control threshold used by RRM for auto power assignment.


Device#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)#ap dot11 24ghz rrm tpc

ap dot11 rrm txpower

To configure the 802.11 tx-power level, use the ap dot11 rrm txpower command. To disable the 802.11 tx-power level, use the no form of the command.

ap dot11 {24ghz | 5ghz} rrm txpower {powerLevel <1-5> | auto | max powerLevel | min powerLevel | once | power-level}

Syntax Description

powerLevel Configures the transmit power level.
auto

Enables auto-RF.

max powerLevel

Configures maximum auto-RF tx power. The range is between -10 to -30.

min powerLevel

Configures minimum auto-RF tx power. The range is between -10 to -30.

once

Enables one-time auto-RF.

Command Default

None.

Command Modes

Interface configuration.

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

None.

Examples

This example shows how to enables auto-RF once.


Device#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)#ap dot11 5ghz rrm txpower once

ap dot11 rrm txpower

To configure the 802.11 tx-power level, use the ap dot11 rrm txpower command. To disable the 802.11 tx-power level, use the no form of the command.

ap dot11 {24ghz | 5ghz} rrm txpower {powerLevel <1-5> | auto | max powerLevel | min powerLevel | once | power-level}

Syntax Description

powerLevel Configures the transmit power level.
auto

Enables auto-RF.

max powerLevel

Configures maximum auto-RF tx power. The range is between -10 to -30.

min powerLevel

Configures minimum auto-RF tx power. The range is between -10 to -30.

once

Enables one-time auto-RF.

Command Default

None.

Command Modes

Interface configuration.

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

None.

Examples

This example shows how to enables auto-RF once.


Device#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)#ap dot11 5ghz rrm txpower once

ap filter

To configure the AP filter and set the priority, use the ap filter command.

ap filter { { name | filter-name } type { priming | | | tag } | { priority | priority-number | filter-name | filter-name } }

Syntax Description

Parameter

Description

priority

Set the priority for a named filter.

priority-number

The valid AP filter priority range is 0 to 127.

filter-name

Enter the name for the ap filter.

type

Type of filter.

priming

Filter to prime APs. This filter is always persistent on the AP.

tag

Filter to assign AP Tags. Tag filter may be persistent based on tag persistence on the global configuration.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Cisco IOS XE Dublin 17.10.1

This command was modified. The priming keyword was introduced.

Examples

The following example shows how to create a ap filter and set the priority to this filter:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap filter name test-filter 
Device(config)# ap filter name test-filter type priming 
Device(config)# ap filter priority 12 filter-name test-filter

ap fra

To configure flexible radio assignment (FRA) and its parameters, use the ap fra command.

ap fra [interval no-of-hours | sensitivity {high | low | medium } | sensor-threshold {balanced | client-preferred | client-priority | sensor-preferred | sensor-priority } | service-priority {coverage | service-assurance}]

Syntax Description

interval no-of-hours

Enter the number of hours for the FRA interval. Valid range is 1 to 24 hours.

sensitivity {high | low | medium}

Configures the FRA coverage overlap sensitivity as high, low, or medium.

sensor-threshold {balanced | client-preferred | client-priority | sensor-preferred | sensor-priority}

Configures FRA sensor threshold to one of the available options.

service-priority {coverage | service-assurance}

Configures FRA service priority to Coverage or Service Assurance.

Command Default

None

Command Modes

config

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Ensure that the RF group leader for 802.11b/g and 802.11a bands are same across RF domain and make sure that the RF group leader has FRA enabled.

Examples

The following example show how to configure the FRA interval to 8 hours:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap fra interval 8

ap fra 5-6ghz interval

To configure the Flexible Radio Assignment (FRA) 5/6-GHz interval in hours, use the ap fra 5-6ghz interval command.

ap fra 5-6ghz interval number-of-hours

Syntax Description

number-of-hours

Specifies the FRA 5/6-GHz interval in hours. The value range is between 1 to 24 hours.

Command Default

None

Command Modes

Global Configuration

Command History

Release Modification
Cisco IOS XE Cupertino 17.9.1

This command was introduced.

Examples

This example shows how to configure the Flexible Radio Assignment (FRA) 5/6-GHz interval in hours:

Device(config)# ap fra 5-6ghz interval 12

ap image predownload

To instruct all APs to start image predownload, use the ap image predownload command.

ap image predownload { abort | site-tag site-tag-name start}

Syntax Description

abort

Instructs all the APs to abort image predownload.

site-tag

Initiates image predownload parameters.

site-tag-name

Specifies the site-tag name.

start

Starts image predownload.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Amsterdam 17.1.1s

This command was introduced.

Examples

This example shows how the APs are instructed to start image predownload:

Device#ap image download site-tag site-tag-name start

ap name antenna band mode

To configure the antenna mode, use the ap nameap- name antenna-band-mode{ single | dual } command.

ap nameap-name antenna-band-mode {single | dual}

Syntax Description

ap- name

Name of the Cisco lightweight access point.

antenna-band-mode

Instructs the access point to enable the band mode of antenna.

Command Default

None

Examples

This example shows how to configure the antenna band mode of access point.

Deviceap name <ap-name> antenna-band-mode single

ap name ble

To enable the able ltx state on the AP, use the ap name ap name ble command.

ap name ap_name antena-band-mode {admin | ibeacon | interval | no-advertisement | sync | vibeacon}

Syntax Description

ap name

AP Name

admin

Enables the ble ltx admin state.

ibeacon

Enables the BLE LTX iBeacon configuration.

interval

Enables the BLE LTX scan configuration interval.

no-advertisement

Enables the BLE LTX No Advertisement.

Sync

Enables the BLE LTX synchronize.

vibeacon

Enables the BLE LTX viBeacon configuration.

Command Default

Disabled

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to enable ble on the AP:


Device# ap name test ble 

ap name clear-personal-ssid

To clear the personal SSID from a Cisco OfficeExtend Access Point (OEAP), use the ap name clear-personal-ssid command.

ap name ap-name clear-personal-ssid

Syntax Description

ap-name

AP name.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to clear the personal SSID from a Cisco OEAP:

Device# ap name my-oeap clear-personal-ssid

ap name controller

To configure the controller on the AP, use the ap name ap name controller command.

ap name ap_name controller {primary | secondary | tertiary} name {A.B.C.D | X:X:X::XX}

Syntax Description

ap name

AP Name

controller

Configures the controller.

primary

Configures the primary controller.

secondary

Configures the secondary controller.

tertiary

Configures the tertiary controller.

name

Specifies the name of the primary controller, secondary controller, or tertiary controller.

A.B.C.D

Specifies theIPv4 address of the primary controller, secondary controller, or tertiary controller.

X:X:X::XX

Specifies theIPv6 address of the primary controller, secondary controller, or tertiary controller.

Command Default

Disabled

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to configure the controller on the AP:


Device# ap name cisco-ap controller primary cisco-primary-controller 10.1.1.1 

ap name country

To configure the country of operation for a Cisco lightweight access point, use the ap name country command.

ap name ap-name country country-code

Syntax Description

ap-name

Name of the Cisco lightweight access point.

country-code

Two-letter or three-letter country code.

Command Default

None

Command History

Release

Modification

This command was introduced.

Usage Guidelines

Cisco devices must be installed by a network administrator or qualified IT professional and the installer must select the proper country code. Following installation, access to the unit should be password protected by the installer to maintain compliance with regulatory requirements and to ensure proper unit functionality. See the related product guide for the most recent country codes and regulatory domains. Also, access point regulatory domains are defined during the access point manufacturing process. You can change the access point country code if the new country code matches a country that is valid within the access point regulatory domain. If you try to enter a country that is not valid to the access point regulatory domain, the command fails.

Examples

This example shows how to configure the Cisco lightweight access point's country code to DE:

Device# ap name AP2 country JP

ap name crash-file

To manage crash data and radio core files for the Cisco access point, use the ap name crash-file command.

ap name ap-name crash-file {get-crash-data | get-radio-core-dump {slot 0 | slot 1}}

Syntax Description

ap-name

Name of the Cisco lightweight access point.

get-crash-data

Collects the latest crash data for a Cisco lightweight access point.

get-radio-core-dump

Gets a Cisco lightweight access point’s radio core dump

slot

Slot ID for Cisco access point.

0

Specifies Slot 0.

1

Specifies Slot 1.

Command Default

None

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to collect the latest crash data for access point AP3:

Device# ap name AP3 crash-file get-crash-data

This example shows how to collect the radio core dump for access point AP02 and slot 0:

Device# ap name AP02 crash-file get-radio-core-dump slot 0

ap name dot11 24ghz slot 0 SI

To enable Spectrum Intelligence (SI) for the dedicated 2.4-GHz radio hosted on slot 0 for a specific access point, use the ap name dot11 24ghz slot 0 SI command.

ap name ap-namedot11{ 24ghz| 5ghz| dual-band| rx-dual-band} slotslot IDSI

Syntax Description

ap_name

Name of the Cisco Access Point.

slot 0

Enables Spectrum Intelligence (SI) for the dedicated 2.4-GHz radio hosted on slot 0 for a specific access point.

Here, 0 refers to the Slot ID.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure Spectrum Intelligence of an AP.

Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 SI

ap name dot11 24ghz slot antenna

To configure the 802.11b antenna hosted on slot 0, use the ap name dot11 24ghz slot antenna command.

ap name ap-namedot1124ghzslot 0antenna{ ext-ant-gain antenna-gain-value | selection [ internal | external}

Syntax Description

ap-name

Name of the AP.

24ghz

Configures 802.11b parameters.

slot

Sets the slot ID for the Cisco Access Point.

antenna

Configures the 802.11b Antenna.

ext-ant-gain

Configures the 802.11b External Antenna Gain. The value range is 0 - 4294967295.

Enter External Antenna Gain value in multiple of .5 dBi units (i.e. An integer value 4 means 4 x 0.5 = 2 dBi of gain)

selection

Configure the 802.11b Antenna selection (internal/external)

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Examples

The following example shows how to configure the channel width of an AP.

Device# ap name ax1 dot11 24ghz slot 0 antenna selection external

ap name dot11 24ghz slot beamforming

To configures beamforming for the 2.4-GHz radio hosted on slot 0 for a specific access point, use the ap name dot11 24ghz slot beamforming command.

ap name ap-namedot1124ghzslot 0beamforming

Syntax Description

beamforming

Enable 802.11b tx beamforming - 5 GHz

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Examples

The following example shows how to configure beamforming of an AP.

Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 beamforming

ap name dot11 24ghz slot channel

To configure advanced 802.11 channel assignment parameters for Cisco AP, use the ap name dot11 24ghz slot channel command.

ap name ap-name dot11 24ghz slot 0 channel { channel_number | auto }

Syntax Description

channel_number

Advanced 802.11 channel assignment parameters for Cisco AP. Enter a channel number from 1 - 14.

auto

Enables auto RF.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Examples

The following example shows how to configure the channel of an AP.

Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 channel auto

ap name dot11 24ghz slot cleanair

To enable CleanAir for 802.11b radio hosted on slot 0 for a specific access point, use the ap name dot11 24ghz slot cleanair command.

ap name ap-name dot11 24ghz slot 0 cleanair

Syntax Description

cleanair

Enables 802.11b cleanair management

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure the cleanair of an AP.

Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 cleanair

ap name dot11 24ghz slot dot11n antenna

To configure 802.11n antenna for 2.4-GHz radio hosted on slot 0 for a specific access point, use the ap name dot11 24ghz slot dot11n antenna command.

ap name ap-name dot11 24ghz slot 0 dot11n antenna { A | B | C | D }

Syntax Description

dot11n

Configures 802.11n antenna for 2.4-GHz radio hosted on slot 0 for a specific access point.

antenna

Configures the 802.11n - 2.4 GHz antenna selection from antenna ports A, B, C, and D.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure the channel width of an AP.

Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 dot11n antenna A

ap name dot11 24ghz slot dot11ax bss-color

To set the BSS color on the 2.4 GHz, 5 GHz, or dual-band radio, for a specific access point, use the ap name dot11 24ghz slot dot11ax bss-color command.

ap name ap-name dot11 24ghz slot 0 dot11ax bss-color <1-63>

Syntax Description

bss-color

Configures 802.11ax-2.4GHz BSS color

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to disable 802.11b radio on Cisco AP.

Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 dot11ax bss-color 3

ap name dot11 24ghz slot shutdown

To disable 802.11b radio hosted on slot 0 for a specific access point, use the ap name dot11 24ghz slot shutdown command.

ap name ap-name dot11 24ghz slot 0 shutdown

Syntax Description

shutdown

Disables 802.11b radio on Cisco AP

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to disable 802.11b radio on Cisco AP.

Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 shutdown

ap name dot11 dual-band cleanair

To configure CleanAir for a dual band radio, use the ap name dot11 dual-band cleanair command.

ap name ap-name dot11 dual-band cleanair

ap name ap-name no dot11 dual-band cleanair

Syntax Description

ap-name

Name of the Cisco AP.

cleanair

Specifies the CleanAir feature.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

This example shows how to enable CleanAir for a dual band radio of the access point AP01:

Device# ap name AP01 dot11 dual-band cleanair

ap name dot11 dual-band shutdown

To disable dual band radio on a Cisco AP, use the ap name dot11 dual-band shutdown command.

ap name ap-name dot11 dual-band shutdown

ap name ap-name no dot11 dual-band shutdown

Syntax Description

ap-name

Name of the Cisco AP.

shutdown

Disables the dual band radio on the Cisco AP.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification
Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Examples

This example shows how to disable dual band radio on the Cisco access point AP01:

Device# ap name AP01 dot11 dual-band shutdown

ap name dot11 rrm profile

To configure Radio Resource Management (RRM) performance profile settings for a Cisco lightweight access point, use the ap name dot11 rrm profile command.

ap name ap-name dot11 {24ghz | 5ghz} rrm profile {clients value | customize | foreign value | noise value | throughput value | utilization value}

Syntax Description

ap-name

Name of the Cisco lightweight access point.

24ghz

Specifies the 2.4 GHz band.

5ghz

Specifies the 5 GHz band.

clients

Sets the access point client threshold.

value

Access point client threshold from 1 to 75 clients.

Note 

The default client threshold is 12.

customize

Turns on performance profile customization for an access point.

Note 

Performance profile customization is off by default.

foreign

Sets the foreign 802.11 transmitter interference threshold.

value

Foreign 802.11 transmitter interference threshold from 0 to 100 percent.

Note 

The default is 10 percent.

noise

Sets the 802.11 foreign noise threshold.

value

802.11 foreign noise threshold between –127 and 0 dBm.

Note 

The default is —70 dBm.

throughput

Sets the data-rate throughput threshold.

value

802.11 throughput threshold from 1000 to 10000000 bytes per second.

Note 

The default is 1,000,000 bytes per second.

utilization

Sets the RF utilization threshold.

Note 

The operating system generates a trap when this threshold is exceeded.

value

802.11 RF utilization threshold from 0 to 100 percent.

Note 

The default is 80 percent.

Command Default

None

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to set the AP1 clients threshold to 75 clients:

Device# ap name AP1 dot11 24ghz rrm profile clients 75

This example shows how to turn performance profile customization on for 802.11a Cisco lightweight access point AP1:

Device# ap name AP1 dot11 5ghz rrm profile customize

This example shows how to set the foreign 802.11a transmitter interference threshold for AP1 to 0 percent:

Device# ap name AP1 dot11 5ghz rrm profile foreign 0

This example shows how to set the 802.11a foreign noise threshold for AP1 to 0 dBm:

Device# ap name AP1 dot11 5ghz rrm profile noise 0

This example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:

Device# ap name AP1 dot11 5ghz rrm profile throughput 10000000

This example shows how to set the RF utilization threshold for AP1 to 100 percent:

Device# ap name AP1 dot11 5ghz rrm profile utilization 100

ap name image

To configure an image on a specific access point, use the ap name image command.

ap name ap-name image {predownload | swap}

Syntax Description

ap-name

Name of the Cisco lightweight access point.

predownload

Instructs the access point to start the image predownload.

swap

Instructs the access point to swap the image.

Command Default

None

Command History

Release

Modification

This command was introduced.

Examples

This example shows how to predownload an image to an access point:

Device# ap name AP2 image predownload

This example shows how to swap an access point’s primary and secondary images:

Device# ap name AP2 image swap

ap name indoor

To enable the access point in the indoor mode, use the ap name ap name indoor command.

ap name ap_name indoor

Syntax Description

ap name

AP Name

indoor

Enables the access point in the indoor mode.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to enable the access point in the indoor mode:


Device# ap name test indoor 

ap name ipsla

To configure ipsla on the AP, use the ap name ap name ipsla command.

ap name ap_name ipsla

Syntax Description

ap name

AP Name

ipsla

Enables the ipsla on the access point.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to configure ipsla on the access point:


Device# ap name test ipsla

ap name keepalive

To enable the keepalive option on the AP, use the ap name ap name keepalive command.

ap name ap_name keepalive

Syntax Description

This command has no arguments or keywords.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 17.03.1

This command was introduced.

Examples

The following example shows how to enable the keepalive option on the AP:


Device# ap name test keepalive 

ap name lan

To configure LAN port configurations for APs, use the ap name lan command. To remove LAN port configurations for APs, use theap name no lan command.

ap name ap-name [ no ]lan port-id port-id { shutdown| vlan-access}

Syntax Description

no

Removes LAN port configurations.

port-id

Configures the port.

port-id

The ID of the port. The range is 1-4

shotdown

Disables the Port.

vlan-access

Enables VLAN access to Port.

Command Default

None

Command Modes

Privileged EXEC(#)

Examples

This example shows how to enable VLAN access to port:

Device# ap name AP1 lan port-id 1 vlan-access

ap name led

To enable the LED state for an access point, use the ap name led command. To disable the LED state for an access point, use the no form of this command.

ap name ap-name led

no ap name ap-name [ led] led

Syntax Description

ap-name

Name of the Cisco lightweight access point.

led

Enables the access point’s LED state.

Command Default

None

Command History

Release

Modification

This command was introduced.

Examples

This example shows how to enable the LED state for an access point:

Device# ap name AP2 led

This example shows how to disable the LED state for an access point:

Device# ap name AP2 no led

ap name led-brightness-level

To configure the LED brightness level on the AP, use the ap name ap name led-brightness-level command.

ap name ap_name led-brightness-level {1–8}

Syntax Description

ap name

AP Name

led brightness level

Configures the led brightness level.

Note 

Valid led brightness level is from 1 to 8.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows the LED brightness level on the access point:


Device# ap name cisco-ap led-brightness-level2 

ap name location

To modify the descriptive location of a Cisco lightweight access point, use the ap name location command.

ap name ap-name location location

Syntax Description

ap-name

Name of the Cisco lightweight access point.

location

Location name of the access point (enclosed by double quotation marks).

Command Default

None

Command History

Release

Modification

This command was introduced.

Usage Guidelines

The Cisco lightweight access point must be disabled before changing this parameter.

Examples

This example shows how to configure the descriptive location for access point AP1:

Device# ap name AP1 location Building1

ap name mesh backhaul rate dot11abg

To set the mesh backhaul dot11abg rate, use the ap name ap-name mesh backhaul rate dot11abg command.

ap name ap-name mesh backhaul rate dot11abg { RATE_11M | RATE_12M | RATE_18M | RATE_1M | RATE_24M | RATE_2M | RATE_36M | RATE_48M | RATE_54M | RATE_5DOT5M | RATE_6M | RATE_9M }

Syntax Description

RATE_11M | RATE_12M | RATE_18M | RATE_1M | RATE_24M | RATE_2M | RATE_36M | RATE_48M | RATE_54M | RATE_5DOT5M | RATE_6M | RATE_9M

Sets the mesh backhaul rates.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.6.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to configure the AP mesh backhaul dot11abg rate:

Device# ap name cisco-ap mesh backhaul rate dot11abg RATE_11M 

ap name mdsn-ap

To configure mdsn-ap on the AP, use the ap name ap name mdsn-ap command.

ap name ap_name mdsn-ap {disable | enable | vlan} add delete

Syntax Description

ap name

AP Name

disable

Disables the mDNS access point.

enable

Enables the mDNS access point.

vlan

Adds or deletes the VLAN from mDNS access point.

add

Adds vlan to mDNS AP.

add

Deletes vlan from the mDNS AP.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to enable mdns on the AP:

Device# Device# ap name test mdns enable

ap name mesh backhaul rate dot11ac

To set the mesh backhaul dot11ac rate, use the ap name ap-name mesh backhaul rate dot11ac command.

ap name ap-name mesh backhaul rate dot11ac mcs 0-9 ss 1-4

Syntax Description

mcs 0-9

Sets the mesh backhaul 11ac MCS rate.

0-9

Indicates the mesh backhaul rate 11ac mcs index .

ss

Sets the mesh backhaul 11ac spatial stream.

1-4

Indicates the mesh backhaul 11ac spatial stream value.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification
Cisco IOS XE Bengaluru 17.6.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to configure the AP mesh backhaul dot11ac rate:

Device# ap name cisco-ap mesh backhaul rate dot11ac mcs 5 ss 3

ap name name mesh backhaul rate dot11ax

To set the mesh backhaul dot11ax rate, use the ap name ap-name mesh backhaul rate dot11ax command.

ap name ap-name mesh backhaul rate dot11ax mcs 0-11 ss 1-8

Syntax Description

mcs

Sets the mesh backhaul 11ax MCS rate.

0-11

Indicates the mesh backhaul 11ax MCS index.

ss

Sets the mesh backhaul 11ax spatial stream.

1-8

Indicates the mesh backhaul 11ax spatial stream value. Range 1-4 indicates the range for 2.4-Ghz, and range 1 - 8 indicates the range for 5-Ghz backhaul.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.6.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to configure the AP mesh backhaul dot11ax rate:

Device# ap name cisco-ap mesh backhaul rate dot11ax mcs 6 ss 5

ap name name new-ap-name

To configure the new Cisco AP name, use the ap name ap name name new-ap-name command.

ap name ap_name name new-ap-name

Syntax Description

ap name

AP Name

name

Specifies the new Cisco AP name.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to configure the new Cisco AP:


Device# ap name test name test2

ap name no

To negate a command or set its defaults on the AP, use the no command.

ap name ap_name no

Syntax Description

ap name

AP Name

no

Negate a command or set its defaults.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to negate a command or set its defaults on the AP:


Device# ap name test no

ap name mesh backhaul rate

To configure the AP mesh backhaul rate, use the ap name ap-name mesh backhaul rate command.

ap name ap-name mesh backhaul rate { auto | dot11abg | dot11ac | dot11ax | dot11n }

Syntax Description

auto

Configures the mesh backhaul rate as auto.

dot11abg

Configures the mesh backhaul dot11abg rate.

dot11ac

Configures the mesh backhaul dot11ac rate.

dot11ax

Configures the mesh backhaul dot11ax rate.

dot11n

Configures the mesh backhaul dot11n rate.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.6.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to configure the AP mesh backhaul rate as auto:

Device# ap name cisco-ap mesh backhaul rate auto 

ap name mesh backhaul rate dot11n

To set the mesh backhaul dot11n rate, use the ap name ap-name mesh backhaul rate dot11n command.

ap name ap-name mesh backhaul rate dot11n mcs 0-31

Syntax Description

mcs 0-31

Sets the mesh backhaul 11n MCS rate.

0-31

Indicates the mesh backhaul rate dot11n mcs index.s

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.6.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to configure the AP mesh backhaul dot11n rate:

Device# ap name cisco-ap mesh backhaul rate dot11n mcs 20

ap name mesh block-child

To set mesh block-child state for a mesh AP, use the ap name mesh block-child command.

ap name ap-name mesh block-child

Syntax Description

ap-name

Name of the mesh AP.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure the mesh block-child state for a mesh AP:

Device# ap name mymeshap mesh block-child

ap name mesh daisy-chaining

To configure daisy-chain mode for a mesh AP, use the ap name ap-name mesh daisy-chaining command.

ap name ap-name mesh daisy-chaining [strict-rap]

Syntax Description

ap-name

Name of the mesh AP.

strict-rap

Configures to allow only the Ethernet interface as mesh uplink.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure daisy-chaining mode for a mesh AP:

Device# ap name mymeshap mesh daisy-chaining

ap name mesh ethernet mode access

To configure the mode of Ethernet interface as access for a mesh AP, use the ap name ap-name mesh ethernet port-no mode access command.

ap name ap-name mesh ethernet port-no mode access vlan-id

Syntax Description

ap-name

Name of the mesh AP.

port-no

Port number of the AP. Valid options are 1, 2, 3, and 4.

vlan-id

VLAN ID. Valid range is from 0 to 4095.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure the mode of Ethernet interface as access for a mesh AP:

Device# ap name mymeshap mesh ethernet 0 mode access 10

ap name mesh ethernet mode trunk

To configure the mode of Ethernet interface as trunk for a mesh AP, use the ap name ap-name mesh ethernet port-no mode trunk command.

ap name ap-name mesh ethernet port-no mode trunk vlan {allowed | native}vlan-id

Syntax Description

ap-name

Name of the mesh AP.

port-no

Port number of the AP. Valid options are 1, 2, 3, and 4.

allowed

Configures allowed VLANs for the trunk port.

native

Configures native VLAN for the trunk port.

vlan-id

VLAN ID. Valid range for allowed VLANs is from 0 to 4095. Valid range for native VLANs is 1 to 4095.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure the mode of Ethernet interface as trunk for a mesh AP and also configure allowed VLANs for the trunk port:

Device# ap name mymeshap mesh ethernet 0 mode trunk vlan allowed 10

ap name mesh linktest

To perform a link test with a mesh AP, use the ap name ap-namemesh linktest command.

ap name ap-name mesh linktest dest-ap-mac data-rate pkts-per-sec pkt-size test-duration

Syntax Description

ap-name

Name of the mesh AP.

dest-ap-mac

MAC address of the destination mesh AP.

data-rate

Data rate in Mbps (1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 53, m0-m15)

pkts-per-sec

Packets to be sent per second. Valid range is from 1 to 25000.

pkt-size

Packet size. Valid range is from 1 to 1500.

test-duration

Test duration. Valid range is from 10 to 300 seconds.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure a link test for a mesh AP:

Device# ap name mymeshap mesh linktest 00c0.00a0.03fa.0000.0000.0000 
 9 100 10 180

ap name mesh parent preferred

To configure preferred parent for a mesh AP, use the ap name mesh parent preferred command.

ap name ap-name mesh parent preferred mac-address

Syntax Description

ap-name

Name of the mesh AP.

mac-address

Radio MAC address of the parent AP.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to preferred parent for a mesh AP:

Device # ap name mymeshap mesh parent preferred dc:5f:be:f5:fd:84

ap name mesh security psk provisioning delete

To delete PSK-provisioned key from a mesh AP, use the ap name mesh security psk provisioning delete command.

ap name ap-name mesh security psk provisioning delete

Syntax Description

ap-name

Name of the mesh AP.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to delete PSK-provisioned key from a mesh AP:

Device# ap name mymeshap mesh security psk provisioning delete

ap name mesh vlan-trunking native

To configure native VLAN for mesh AP, use the ap name mesh vlan-trunking native command.

ap name name-of-rap vlan-trunking native vlan-id

Syntax Description

name-of-rap

Name of the root access point.

vlan-id

VLAN ID.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to configure native VLAN for mesh AP:

Device # ap name mesh vlan-trunking native 12 

ap name monitor-mode dot11b

To configures 802.11b scanning channels for a monitor-mode access point, use the ap name monitor-mode dot11b command.

ap name ap-name monitor-mode dot11b fast-channel channel1 [ channel2] [ channel3] [ channel4]

Syntax Description

ap-name

Name of the access point.

fast-channel

Specifies the 2.4 GHz band scanning channel (or channels) for a monitor-mode access point.

channel1

Scanning channel1.

channel2

(Optional) Scanning channel2.

channel3

(Optional) Scanning channel3.

channel4

(Optional) Scanning channel4.

Command Default

None

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to configure an access point in tracking optimized mode to listen to channels 1, 6, and 11:

Device# ap name AP01 monitor-mode dot11b fast-channel 1 6 11

ap name name

To modify the name of a Cisco lightweight access point, use the ap name name command.

ap name ap-name name new-name

Syntax Description

ap-name

Current Cisco lightweight access point name.

new-name

Desired Cisco lightweight access point name.

Command Default

None

Command History

Release

Modification

This command was introduced.

Examples

This example shows how to modify the name of access point AP1 to AP2:

Device# ap name AP1 name AP2

ap name network-diagnostics

To trigger network diagnostics on an OfficeExtend AP, use the ap name network-diagnostics command.

ap name ap-name network-diagnostics

Syntax Description

ap-name

Name of the access point.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Examples

This following example shows how to trigger network diagnostics on an OfficeExtend AP.

Device# ap name ap18 network-diagnostic

ap name priority

To configure the priority of an access point, use the ap name priority command.

ap name ap-name priority priority-value

Syntax Description

priority-value

Priority value for the AP. Valid range is 1 to 4.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure the priority for an access point:

Device# ap name my-ap priority 1

ap name reset

To reset a specific Cisco lightweight access point, use the ap name reset command.

ap name ap-name reset

Syntax Description

ap-name

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification

This command was introduced.

Examples

This example shows how to reset a Cisco lightweight access point named AP2:

Device# ap name AP2 reset

ap name reset-button

To configure the Reset button for an access point, use the ap name reset-button command.

ap name ap-name reset-button

Syntax Description

ap-name

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification

This command was introduced.

Examples

This example shows how to enable the Reset button for access point AP03:

Device# ap name AP03 reset-button

ap name role

To configure the role of operation for an AP, use the ap name role command.

ap name ap-name role {mesh-ap | root-ap}

Syntax Description

ap-name

Name of the AP.

mesh-ap

Configures mesh AP role for the AP.

root-ap

Configures root AP role for the AP.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure the role of operation as mesh AP for an AP:

Device# ap name mymeshap role mesh-ap

ap name slot

To configure various slot parameters, use the ap name slot command. To disable a slot on a Cisco lightweight access point, use the no form of this command.

ap name ap-name slot slot-number {channel {global | number channel-number | width channel-width} | rtsthreshold value | shutdown | txpower {global | channel-level}}

ap name ap-name no slot {0 | 1 | 2 | 3} shutdown

Syntax Description

ap-name

Name of the Cisco access point.

slot-number

Slot downlink radio to which the channel is assigned. You can specify the following slot numbers:

  • 0—Enables slot number 0 on a Cisco lightweight access point.

  • 1—Enables slot number 1 on a Cisco lightweight access point.

  • 2—Enables slot number 2 on a Cisco lightweight access point.

  • 3—Enables slot number 3 on a Cisco lightweight access point.

channel

Specifies the channel for the slot.

global

Specifies channel global properties for the slot.

number

Specifies the channel number for the slot.

channel-number

Channel number from 1 to 169.

width

Specifies the channel width for the slot.

channel-width

Channel width from 20 to 40.

rtsthreshold

Specifies the RTS/CTS threshold for an access point.

value

RTS/CTS threshold value from 0 to 65535.

shutdown

Shuts down the slot.

txpower

Specifies Tx power for the slot.

global

Specifies auto-RF for the slot.

channel-level

Transmit power level for the slot from 1 to 7.

Command Default

None

Command History

Release Modification

This command was introduced.

Examples

This example shows how to enable slot 3 for the access point abc:

Device# ap name abc slot 3

This example shows how to configure RTS for the access point abc:

Device# ap name abc slot 3 rtsthreshold 54

ap name static-ip

ap name Cisco-ap-namestatic-ipip-address{ A.B.C.Dnetmasknetmask | X:X:X:X::Xprefixprefix-length} gatewaygateway

Syntax Description

ap name

Name of the Cisco access point.

static-ip

Sets the Cisco AP static IP address configuration.

ip-address

Adds the Cisco AP static IP address.

A.B.C.D

Indicates the IPv4 address.

X:X:X:X::X

Indicates the IPv6 address.

netmasknetmask

Specifies the Cisco AP static-IP netmask.

prefixprefix-length

Specifies the Cisco AP static-IP prefix length.

gatewaygateway

Specifies the Cisco AP static-IP gateway.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to enable or disable static-ip for an access point:

Device#ap name cisco-ap-name static-ip ip-address 9.9.9.2 netmask 255.0.0.0 gateway 9.9.9.2

ap name static-ip

To configure lightweight access point static IP settings, use the ap name static-ip command. To disable the Cisco lightweight access point static IP address, use the no form of this command.

ap name ap-name static-ip {domain domain-name | ip-address ip-address netmask netmask gateway gateway | nameserver ip-address}

ap name ap-name no static-ip

Syntax Description

ap-name

Name of the access point.

domain

Specifies the Cisco access point domain name.

domain-name

Domain to which a specific access point belongs.

ip-address

Specifies the Cisco access point static IP address.

ip-address

Cisco access point static IP address.

netmask

Specifies the Cisco access point static IP netmask.

netmask

Cisco access point static IP netmask.

gateway

Specifies the Cisco access point gateway.

gateway

IP address of the Cisco access point gateway.

nameserver

Specifies a DNS server so that a specific access point can discover the device using DNS resolution.

ip-address

IP address of the DNS server.

Command Default

None

Command History

Release Modification

This command was introduced.

Usage Guidelines

An access point cannot discover the device using Domain Name System (DNS) resolution if a static IP address is configured for the access point unless you specify a DNS server and the domain to which the access point belongs.

Examples

This example shows how to configure an access point static IP address:

Device# ap name AP2 static-ip ip-address 192.0.2.54 netmask 255.255.255.0 gateway 192.0.2.1

ap name shutdown

To disable a Cisco lightweight access point, use the ap name shutdown command. To enable a Cisco lightweight access point, use the no form of this command.

ap name ap-name shutdown

ap name ap-name no shutdown

Syntax Description

ap-name

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release

Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example how to disable a specific Cisco lightweight access point:

Device# ap name AP2 shutdown

ap name usb-module

To enable the USB port on the access point (AP), use the ap name ap-name usb-module . To disable the feature, use the no form of this command.

ap name ap-name usb-module

no ap name ap-name usb-module

Syntax Description

usb-module

Enables the USB port on the AP.

Command Default

None

Command Modes

Privileged EXEC mode

Command History

Release Modification
Cisco IOS XE Bengaluru 17.4.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows you how to enable the USB port on the AP:

Device# ap name ap-name usb-module

ap name usb-module override

To enable access point (AP) USB override, use the ap name ap-name usb-module override command. To disable the feature, use the no form of this command.

ap name ap-name usb-module override

no ap name ap-name usb-module override

Syntax Description

usb-module override

Overrides USB status of the AP profile and considers the local AP configuration.

You can configure the USB status for an AP only if you enable USB override for it.

Command Default

None

Command Modes

Privileged EXEC mode

Command History

Release Modification
Cisco IOS XE Bengaluru 17.4.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows you how to override USB status of the AP:

Device# ap name ap-name usb-module override

ap name vlan-tag

To configure VLAN tagging for a nonbridge AP, use the ap name vlan-tag command.

ap name ap-name vlan-tag vlan-id

Syntax Description

ap-name

Access point name.

vlan-id

VLAN identifier.

Command Default

VLAN tagging is not enabled.

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure VLAN tagging for a nonbridge AP:

Device# ap name AP1 vlan-tag 12

ap name write tag-config

To write the existing configuration to an AP, use the ap name write tag-config command in privileged EXEC mode

ap name ap-name write tag-config

Syntax Description

ap-name

Name of the access point.

Command Default

None

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Usage Guidelines

Use this command to write the existing configuration to an AP.

Examples

This example shows how to write the existing configuration to an AP:

Device# ap name AP40CE.2485.D594 write tag-config 

ap name-regex

To configure filter based on AP name regular expression to match with, use the ap name-regex command.

ap name-regex regular-expression

Syntax Description

regular-expression

Enter the filter string.

Command Default

None

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure filter based on AP name regular expression match with:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap filter name filter--name
Device(config-ap-filter)# ap name-regex regular-expression-string

ap profile

To configure access point profile, use the ap profile command.

ap profile profile-name

Syntax Description

profile-name

Enter the name of the AP profile.

Command Default

By default, the AP profile name is default-ap-profile.

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure AP profile name:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap profile my-ap-profile

ap remote-lan profile-name

To configure remote LAN profile, use the ap remote-lan profile-name command.

ap remote-lan profile-name remote-lan-profile-name rlan-id

Syntax Description

remote-lan-profile-name

Is the remote LAN profile name. Range is from 1 to 32 alphanumeric characters.

rlan-id

Is the remote LAN identifier. Range is from 1 to 128.

Note 

You can create a maximum of 128 RLANs. You cannot use the rlan-id of an existing RLAN while creating another RLAN.

Both RLAN and WLAN profile cannot have the same names. Similarly, RLAN and WLAN policy profile cannot have the same names.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to configure remote LAN profile:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap remote-lan profile-name rlan_profile_name 3

ap remote-lan shutdown

To enable or disable all RLANs, use the ap remote-lan shutdown command.

ap remote-lan shutdown

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to enable or disable all RLANs:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# [no] ap remote-lan shutdown
Device(config)# end

ap remote-lan-policy policy-name

To configure RLAN policy profile, use the ap remote-lan-policy policy-name command.

ap remote-lan-policy policy-name profile-name

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to configure RLAN policy profile:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap remote-lan-policy policy-name rlan_policy_prof_name

ap tag persistency enable

To configure AP tag persistency settings, use the ap tag persistency enable command, in the global configuration mode. To disable the AP tag persistency settings, use the no form of this command.

ap tag persistency enable

no ap tag persistency enable

Syntax Description

This command has no arguments or keywords.

Command Default

None

Command Modes

Global configuration mode

Command History

Release Modification

Cisco IOS XE Bengaluru 17.6.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows how to enable tag persistency for an AP:

Device(config)# ap tag persistency enable

ap upgrade staggered iteration timeout

To configure the maximum time allowed per iteration during an access point (AP) upgrade, use the ap upgrade staggered iteration timeout command.

ap upgrade staggered iteration timeout timeout-duration

Syntax Description

timeout-duration

Time allowed per iteration, in minutes.

Valid values range from 9 to 60.

Command Default

Iteration timeout is not configured.

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Cupertino 17.9.1

This command was introduced.

Usage Guidelines

If an AP upgrade iteration is not completed during the specified duration, the error action that is set using the ap upgrade staggered iteration error command is taken.

Examples

The following example shows how to configure the maximum time allowed per iteration:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap upgrade staggered iteration timeout 40

ap tag-source-priority

To configure ap tag source priority, use the ap tag-source-priority command.

ap tag-source-priority source-priority source { filter | ap }

Syntax Description

source-priority

Enter the ap tag source priority. Valid range is 2 to 3.

source

Specifiy the source for which priority is been set.

filter

AP filter as tag source.

ap

AP as tag source.

Command Default

None

Command Modes

config

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to set AP as a tag source:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap tag-source-priority priority-value source ap

ap tag-sources revalidate

To revalidate the access point tag sources, use the ap tag-sources revalidate command.

ap tag-sources revalidate

Syntax Description

tag-sources

Tag Sources.

revalidate

Revalidate access point tag sources.

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to revalidate the access point tag sources:

Device# ap tag-sources revalidate

ap vlan-tag

To configure VLAN tagging for all nonbridge APs, use the ap vlan-tag command.

ap vlan-tag vlan-id

Syntax Description

vlan-id

VLAN identifier.

Command Default

VLAN tagging is not enabled for nonbridge APs.

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure VLAN tagging for all non-bridge APs:

Device# ap vlan-tag 1000

assisted-roaming

To configure assisted roaming using 802.11k on a WLAN, use the assisted-roaming command. To disable assisted roaming, use the no form of this command.

assisted-roaming {dual-list | neighbor-list | prediction}

no assisted-roaming {dual-list | neighbor-list | prediction}

Syntax Description

dual-list

Configures a dual band 802.11k neighbor list for a WLAN. The default is the band that the client is currently associated with.

neighbor-list

Configures an 802.11k neighbor list for a WLAN.

prediction

Configures assisted roaming optimization prediction for a WLAN.

Command Default

Neighbor list and dual band support are enabled by default. The default is the band that the client is currently associated with.

Command Modes

WLAN configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

When you enable the assisted roaming prediction list, a warning appears and load balancing is disabled for the WLAN if load balancing is already enabled on the WLAN. To make changes to the WLAN, the WLAN must be in disabled state.

Examples

The following example shows how to configure a 802.11k neighbor list on a WLAN:

Device(config-wlan)#assisted-roaming neighbor-list 

The following example shows the warning message when load balancing is enabled on a WLAN. Load balancing must be disabled if it is already enabled when configuring assisted roaming:


Device(config)#wlan test-prediction 2 test-prediction
Device(config-wlan)#client vlan 43
Device(config-wlan)#no security wpa
Device(config-wlan)#load-balance
Device(config-wlan)#assisted-roaming prediction
WARNING: Enabling neighbor list prediction optimization may slow association and impact VOICE client perform.
Are you sure you want to continue? (y/n)[y]: y
% Request aborted - Must first disable Load Balancing before enabling Assisted Roaming Prediction Optimization on this WLAN.

avg-packet-size packetsize

To configure the wireless media-stream's average packet size, use the avg-packet-size command.

avg-packet-size packetsize-value

Syntax Description

packetsize-value

Average Packet Size. Valid range is 100 to 1500.

Command Default

None

Command Modes

media-stream

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure wireless media-stream's average packet size:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless media-stream group doc-grp 224.0.0.0 224.0.0.223 
Device(config-media-stream)# avg-packet-size500

band-select client

To configure the client threshold minimum dB for the selected band, use the band-select client command. To reset the client threshold minimum dB for the selected band, use the no form of this command.

band-select client { mid-rssi | rssi } dBm value

Syntax Description

mid-rssi

Minimum dBm of a client RSSI start to respond to probe

rssi

Minimum dBm of a client RSSI to respond to probe

dBm value

Minimum dBm of a client RSSI to respond to probe. Valid range is between –90 and –20 dBm.

Command Default

None

Command Modes

config-rf-profile

Command History

Release Modification

Cisco IOS XE Denali 16.3.1

This command was introduced.

Usage Guidelines

This command is enabled only for 2.4-GHz band.

Examples

This example shows how to set the client threshold to minimum dB for a selected band.

Device(config-rf-profile)#band-select client rssi -50

band-select cycle

To configure the band cycle parameters, use the band-select cycle command. To reset the threshold value, use the no form of this command.

band-select cycle { count | threshold } value

Syntax Description

count

Sets the Band Select probe cycle count.

value

Maximum number of cycles not responding. The range is between 1 and 10.

threshold

Sets the time threshold for a new scanning cycle.

value

Set the threshold value in milliseconds. The valid is between 1and 1000.

Command Default

None

Command Modes

config-rf-profile

Command History

Release Modification

Cisco IOS XE Denali 16.3.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows how to configure the probe cycle count in an RF profile for a selected band.

Device(config-rf-profile)#band-select cycle count 5

band-select expire

To configure the expiry time for the RF profile for the selected band, use the band-select expire command. To reset the value, use the no form of this command.

band-select expire { dual-band | suppression } value

no band-select expire { dual-band | suppression }

Syntax Description

dual-band

Configures the RF Profile Band Select Expire Dual Band.

value

Setting the time to expire for pruning previously known dual-band clients. The range is between 10 and 300.

suppression

Configures the RF Profile Band Select Expire Suppression.

value

Setting the time to expire for pruning previously known 802.11b/g clients. The range is between 10 and 200.

Command Default

None

Command Modes

config-rf-profile

Command History

Release Modification

Cisco IOS XE Denali 16.3.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows how to configure the time to expire for a dual-band of an RF profile in a selected band.

Device(config-rf-profile)#band-select expire dual-band 15

band-select probe-response

To configure the probe responses to the clients for a selected band, use the band-select probe-response command. To disable the probe-response, use the no form of this command.

band-select probe-response

Syntax Description

probe-response

Probe responses to clients.

Command Default

None

Command Modes

config-rf-profile

Command History

Release Modification

Cisco IOS XE Denali 16.3.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows how to enable probe response to the clients.

Device(config-rf-profile)#band-select probe-response

bss-transition

To configure BSS transition per WLAN, use the bss-transition command.

bss-transition [ disassociation-imminent]

Syntax Description

disassociation-imminent

BSS transition disassociation Imminent per WLAN.

Command Default

None

Command Modes

config-wlan

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to configure BSS transition per WLAN:

Device(config-wlan)# bss-transition 

call-snoop

call-snoop

no call-snoop

Syntax Description

This command has no keywords or arguments.

Command Default

VoIP snooping is disabled by default.

Command Modes

WLAN configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

You must disable the WLAN before using this command. The WLAN on which call snooping is configured must be configured with Platinum QoS. You must disable quality of service before using this command.

Examples

This example shows how to enable VoIP on a WLAN:

Device# configure terminal
Device(config)# wireless profile policy policy-name
Device(config-wireless-policy)#service-policy input platinum-up
Device(config-wireless-policy)#service-policy output platinum
Device(config-wireless-policy)#call-snoop
Device(config-wireless-policy)#no shutdown
Device(config-wireless-policy)#end

captive-bypass-portal

To configure captive bypassing, use the captive-bypass-portal command.

captive-bypass-portal

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to configure captive bypassing for WLAN in LWA and CWA:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# parameter-map type webauth WLAN1_MAP
Device(config)# captive-bypass-portal
Device(config)# wlan WLAN1_NAME 4 WLAN1_NAME
Device(config-wlan)# security web-auth
Device(config-wlan)# security web-auth parameter-map WLAN1_MAP
Device(config-wlan)# end

capwap-discovery

To set CAPWAP discovery response method as to whether a capwap-discovery response contains the public or private IP of the controller, use the capwap-discovery command.

capwap-discovery{ private | public}

Syntax Description

private

Includes private IP in CAPWAP discovery response.

public

Includes public IP in CAPWAP discovery response.

Command Default

None

Command Modes

Management Interface Configuration(config-mgmt-interface)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Usage Guidelines

Examples

The following example shows how to configure a CAPWAP discovery response method:

Device# configure terminal
Device(config)# wireless management interface Vlan1
Device(config-mgmt-interface)# capwap-discovery public 

capwap backup

To configure a primary or secondary backup device for all access points that are joined to a specific device, use the capwap backup command.

capwap backup {primary primary-controller-name primary-controller-ip-address | secondary secondary-controller-name secondary-controller-ip-address}

Syntax Description

primary

Specifies the primary backup device.

primary-controller-name

Primary backup device name.

primary-controller-ip-address

Primary backup device IP address.

secondary

Specifies the secondary backup device.

secondary-controller-name

Secondary backup device name.

secondary-controller-ip-address

Secondary backup device IP address.

Command Default

None

Command Modes

AP profile configuration (config-ap-profile)

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

This example shows how to configure a primary backup device for all access points that are joined to a specific device:


Device(config)# ap profile default-ap-profile
Device(config-ap-profile)# capwap backup primary controller1 192.0.2.51

This example shows how to configure a secondary backup device for all access points that are joined to a specific device:


Device(config)# ap profile default-ap-profile
Device(config-ap-profile)# capwap backup secondary controller1 192.0.2.52

cco-password (image-download-mode cco)

To configure the CCO server password for image dowload, use the cco-password command. Use the no form of this command to negate the configuration or to set the command to its default.

cco-password { 0| 8} <Enter password> <Re-enter password>
no cco-password { 0 | 8} <Enter password> <Re-enter password>

Syntax Description

0

Specifies that an unencrypted password will follow.

8

Specifies that an AES encrypted password will follow.

password

Specifies the CCO server password.

re-enter password

Indicates that the user must re-enter the CCO server password.

Command Default

None

Command Modes

Wireless image download profile CCO configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.1.1s This command was introduced.

Examples

Device(config)# wireless profile image-download default
Device(config-wireless-image-download-profile)# image-download-mode cco
Device(config-wireless-image-download-profile-cco)# cco-password 0 xxxxxxxx  

cco-username (image-download-mode cco)

To configure the CCO username for image download, use the cco-username command. Use the no form of this command to negate the configuration or to set the command to its default.

cco-username Username
no cco-username Username

Syntax Description

username

Specifies the CCO username.

Command Default

None

Command Modes

Wireless image download profile CCO configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.1.1s This command was introduced.

Examples

Device(config)# wireless profile image-download default
Device(config-wireless-image-download-profile)# image-download-mode cco
Device(config-wireless-image-download-profile-cco)# cco-username cco-server-username

cco-version (image-download-mode cco)

To configure and download the latest or the suggested version of the software image from CCO, use the cco-version command. Use the no form of this command to negate the configuration or to set the command to its default.

cco-version { latest| suggested}
no cco-version { latest| suggested}

Syntax Description

latest

Configures and downloads the latest version of software image from CCO.

suggested

Configures and downloads the suggested version of software image from CCO. By default suggested version is selected.

Command Default

None

Command Modes

Wireless image download profile CCO configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.1.1s This command was introduced.

Examples

Device(config)# wireless profile image-download default
Device(config-wireless-image-download-profile)# image-download-mode cco
Device(config-wireless-image-download-profile-cco)# cco-version suggested  

cco-auto-check (image-download-mode cco)

To enable automatic check of the new software version on CCO, use the cco-auto-check command. Use the no form of this command to negate the configuration or to set the command to its default.

cco-auto-check
no cco-auto-check

Syntax Description

cco-auto-check

Enables the automatic check of the new software version at CCO every 30 days. This is applicable to Image Upgrade or Predownload only. By default the command is enabled.

Command Default

None

Command Modes

Wireless image download profile CCO configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.1.1s This command was introduced.

Examples

Device(config)# wireless profile image-download default
Device(config-wireless-image-download-profile)# image-download-mode cco
Device(config-wireless-image-download-profile-cco)# cco-auto-check  

ccx aironet-iesupport

To configure the support of Aironet IE CCX option, use the following command:

ccx aironet-iesupport

Syntax Description

ccx

Configures the Cisco Client Extension options.

aironet-iesupport

Sets the support of Aironet IE on WLAN.

Command Default

None

Command Modes

WLAN configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.2.1

This command was introduced.

Examples

This example shows how to configure Aironet IE support:

Device(config-wlan)#ccx aironet-iesupport 

cdp

To enable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point under the AP profile, use the cdp command. To disable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the no form of this command.

ap profile default-ap-profile cdp

no cdp

Command Default

Disabled on all access points.

Command Modes

AP profile mode (config-ap-profile)

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

The no cdp command disables CDP on all access points that are joined to the device and all access points that join in the future. CDP remains disabled on both current and future access points even after the device or access point reboots. To enable CDP, enter the cdp command.


Note

CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all access points joined to the device, you can disable and then reenable CDP on individual access points using the ap name Cisco-AP cdp command. After you disable CDP on all access points joined to the device, you can enable and then disable CDP on individual access points.


Examples

This example shows how to enable CDP on all access points:


Device(config)# ap profile default-ap-profile


Device(config-ap-profile)# cdp

central association

To enable central association for locally switched clients, use the central association command.

central association

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

config-wireless-policy

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to enable enable central association for locally switched clients:

Device(config-wireless-policy)# central association 

central authentication

To enable or disable central authentication, use the central authentication command.

central authentication

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

config-wireless-policy

Command History

Release Modification

Cisco IOS XE 16.12.1

This command was introduced.

Examples

The following example shows how to enable central authentication:

Device(config-wireless-policy)# central authentication 

central dhcp

To enable central dhcp for locally switched clients, use the central dhcp command.

central dhcp

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

config-wireless-policy

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to enable central dhcp for locally switched clients:

Device(config-wireless-policy)# central dhcp 

central-webauth

To configure central-webauth for an ACL, use the central-webauth command.

central-webauth

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

config-wireless-policy

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

The following example shows how to configure central-webauth for an ACL:

Device(config-wireless-policy)# central-webauth 

chassis redundancy keep-alive

To configure peer keep-alive retries and time interval before claiming peer is down, use the chassis redundancy keep-alive command.

chassis redundancy keep-alive{ retries retries | timer timer }

Syntax Description

retries

Chassis peer keep-alive retries before claiming peer is down.

Valid values range from 5 to 10, enter 5 for default.

timer

Chassis peer keep-alive time interval in multiple of 100 ms.

Valid values range from 1 to 10, enter 1 for default.

Command Default

None

Command Modes

Privileged EXEC(#)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure peer keep-alive retries and time interval:

Device# chassis redundancy keep-alive retries 6 
Device# chassis redundancy keep-alive timer 6 

chassis renumber

To renumber the local chassis id assignment, use the chassis renumber command.

chassis chassis-num renumber renumber-id

Syntax Description

chassis-num

Chassis number.

renumber-id

Local chassis id.

Command Default

None

Command Modes

Privileged EXEC(#)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to renumber the local chassis id assignment:

Device# chassis 1 renumber 1 

chassis transport

To enable or disable chassis transport, use the chassis transport command.

chassis chassis-num transport { enable | disable}

Syntax Description

chassis-num

Chassis number.

Command Default

None

Command Modes

Privileged EXEC(#)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to enable chassis transport:

Device# chassis 1 transport enable   

class

To define a traffic classification match criteria for the specified class-map name, use the class command in policy-map configuration mode. Use the no form of this command to delete an existing class map.

class {class-map-name | class-default}

no class {class-map-name | class-default}

Syntax Description

class-map-name

The class map name.

class-default

Refers to a system default class that matches unclassified packets.

Command Default

No policy map class-maps are defined.

Command Modes

Policy-map configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

Before using the class command, you must use the policy-map global configuration command to identify the policy map and enter policy-map configuration mode. After specifying a policy map, you can configure a policy for new classes or modify a policy for any existing classes in that policy map. You attach the policy map to a port by using the service-policy interface configuration command.

After entering the class command, you enter the policy-map class configuration mode. These configuration commands are available:

  • exit —Exits the policy-map class configuration mode and returns to policy-map configuration mode.

  • no —Returns a command to its default setting.

  • police —Defines a policer or aggregate policer for the classified traffic. The policer specifies the bandwidth limitations and the action to take when the limits are exceeded. For more information about this command, see Cisco IOS Quality of Service Solutions Command Reference available on Cisco.com.

  • set —Specifies a value to be assigned to the classified traffic. For more information, see set

To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.

The class command performs the same function as the class-map global configuration command. Use the class command when a new classification, which is not shared with any other ports, is needed. Use the class-map command when the map is shared among many ports.

You can configure a default class by using the class class-default policy-map configuration command. Unclassified traffic (traffic that does not meet the match criteria specified in the traffic classes) is treated as default traffic.

You can verify your settings by entering the show policy-map privileged EXEC command.

Examples

This example shows how to create a policy map called policy1. When attached to the ingress direction, it matches all the incoming traffic defined in class1, sets the IP Differentiated Services Code Point (DSCP) to 10, and polices the traffic at an average rate of 1 Mb/s and bursts at 20 KB. Traffic exceeding the profile is marked down to a DSCP value gotten from the policed-DSCP map and then sent.

Device(config)# policy-map policy1
Device(config-pmap)# class class1
Device(config-pmap-c)# set dscp 10
Device(config-pmap-c)# police 1000000 20000 conform-action
Device(config-pmap-c)# police 1000000 20000 exceed-action
Device(config-pmap-c)# exit

This example shows how to configure a default traffic class to a policy map. It also shows how the default traffic class is automatically placed at the end of policy-map pm3 even though class-default was configured first:

Device# configure terminal 
Device(config)# class-map cm-3
Device(config-cmap)# match ip dscp 30
Device(config-cmap)# exit

Device(config)# class-map cm-4
Device(config-cmap)# match ip dscp 40
Device(config-cmap)# exit

Device(config)# policy-map pm3
Device(config-pmap)# class class-default
Device(config-pmap-c)# set dscp 10
Device(config-pmap-c)# exit

Device(config-pmap)# class cm-3
Device(config-pmap-c)# set dscp 4
Device(config-pmap-c)# exit

Device(config-pmap)# class cm-4
Device(config-pmap-c)# set precedence 5
Device(config-pmap-c)# exit
Device(config-pmap)# exit

Device# show policy-map pm3
Policy Map pm3
  Class cm-3
    set dscp 4
  Class cm-4
    set precedence 5
  Class class-default
    set dscp af11


classify

To classify a rule for rogue devices, use the classify command.

classify {friendly | malicious | delete}

Syntax Description

friendly

Classifies devices matching this rule as friendly.

malicious

Classifies devices matching this rule as malicious.

delete

Devices matching this rule are ignored.

Command Default

None

Command Modes

config-rule

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to classify rogue devices as friendly:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless wps rogue rule my-rogue-rule priority 3
Device(config-rule)# classify friendly

class-map

To create a class map to be used for matching packets to the class whose name you specify and to enter class-map configuration mode, use the class-map command in global configuration mode. Use the no form of this command to delete an existing class map and to return to global or policy map configuration mode.

class-map [match-any | type] [match-all | type] class-map-name

no class-map [match-any | type] [match-all | type] class-map-name

Syntax Description

match-any

(Optional) Performs a logical-OR of the matching statements under this class map. One or more criteria must be matched.

match-all

(Optional) Performs a logical-AND all matching statements under this classmap.

type

(Optional) Configures the CPL class map.

class-map-name

The class map name.

Command Default

No class maps are defined.

Command Modes

Global configuration

Policy map configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

Use this command to specify the name of the class for which you want to create or modify class-map match criteria and to enter class-map configuration mode.

The class-map command and its subcommands are used to define packet classification, marking, and aggregate policing as part of a globally named service policy applied on a per-port basis.

After you are in quality of service (QoS) class-map configuration mode, these configuration commands are available:

  • description—Describes the class map (up to 200 characters). The show class-map privileged EXEC command displays the description and the name of the class map.

  • exit—Exits from QoS class-map configuration mode.

  • match—Configures classification criteria.

  • no—Removes a match statement from a class map.

If you enter the match-any keyword, you can only use it to specify an extended named access control list (ACL) with the match access-group class-map configuration command.

To define packet classification on a physical-port basis, only one match command per class map is supported.

The ACL can have multiple access control entries (ACEs).

Examples

This example shows how to configure the class map called class1 with one match criterion, which is an access list called 103:

Device(config)# access-list 103 permit ip any any dscp 10
Device(config)# class-map class1
Device(config-cmap)# match access-group 103
Device(config-cmap)# exit

This example shows how to delete the class map class1:

Device(config)# no class-map class1

You can verify your settings by entering the show class-map privileged EXEC command.

clear chassis redundancy

To clear high-availability (HA) configuration, use the clear chassis redundancy command.

clear chassis redundancy

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

Privileged EXEC(#)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to clear HA configuration:

Device# clear chassis redundancy

clear mdns-sd cache

To clear mDNS cache details, use the clear mdns-sd cache command.

clear mdns-sd cache { ap-mac mac-address (H.H.H) | client-mac client-mac-address (H.H.H) | detail | glan-id <1 - 5> | location-group <0 - 4096> | mdns-ap mdns-ap mac address (H.H.H) | rlan-id <1 - 128> | udn { <1 - 4294967295> | shared } | wired | wlan-id <0 - 4096> }

Syntax Description

ap-macmac-address (H.H.H)

Clears the AP Ethernet MAC address.

client-macclient-mac-address (H.H.H)

Clears the client MAC address.

detail

Clears the cache details.

glan-id <1 - 5>

Clears the GLAN ID. The value range is from 1 to 5.

location-group <0 - 4096>

Clears the location group. The value range is from 0 to 4096.

mdns-ap mdns-ap mac address (H.H.H)

Clears cached services from mDNS AP.

rlan-id <1 - 128>

Clears the RLAN ID. The value range is from 1 - 128.

udn <1 - 4294967295>

Clears the UDN ID. The value range is from 1 to 4294967295.

shared

Clears the UDN shared services.

wired

Clears the mDNS services from wired clients.

wlan-id <0 - 4096>

Clears the WLAN ID. The value range is from 1 to 4096.

Command Default

None

Command Modes

Privileged EXEC mode

Command History

Release Modification
Cisco IOS XE Amsterdam 17.3.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows how to clear the mDNS cache details:

Device# clear mdns-sd cache 

clear mdns-sd statistics

To clear mDNS statistics, use the clear mdns-sd statistics command.

clear mdns-sd statistics { debug | glan-id <1 - 5> | rlan-id <1 - 128> wired | wlan-id <1 - 4096> }

Syntax Description

debug

Clears the mDNS debug statistics.

glan-id<1 - 5>

Clears the GLAN ID. The value range is from 1 to 5.

rlan-id<1 - 128>

Clears the RLAN ID. The value range is from 1 to 128.

wired

Clears the mDNS wired statistics.

wlan-id<1 - 4096>

Clears the WLAN ID. The value range is from 1 to 4096.

Command Default

None

Command Modes

Privileged EXEC mode

Command History

Release Modification
Cisco IOS XE Amsterdam 17.3.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows how to clear the mDNS statistics:

Device# clear mdns-sd statistics 

clear platform condition all

To clear all conditional debug and packet-trace configuration and data, use the clear platform condition all command.

clear platform condition all

Command Default

None

Command Modes

Privileged EXEC

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to clear all conditional debug and packet-trace configuration and data:

Device# clear platform condition all

clear wireless wps rogue ap

To clear all rogue APs or rogue APs with specific MAC addresses, use the clear wireless wps rogue ap command.

clear wireless wps rogue ap { all | mac-address <MAC Address> }

Syntax Description

all

Clears all the rogue APs.

mac-address <MAC Address>

Clears the rogue APs with specific MAC addresses.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE Amsterdam 16.12.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to clear all rogue APs or rogue APs with specific MAC addresses:

Device# clear wireless wps rogue ap all 
Device# clear wireless wps rogue ap mac-address 10.10.1 

clear wireless wps rogue client

To clear all rogue clients or client with specific MAC addresses, use the clear wireless wps rogue client command.

clear wireless wps rogue client { all | mac-address <MAC Address> }

Syntax Description

all

Clears all the rogue clients.

mac-address <MAC Address>

Clears the rogue clients with specific MAC addresses.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE Amsterdam 16.12.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to clear all rogue clients or rogue clients with specific MAC addresses:

Device# clear wireless wps rogue client all 
Device# clear wireless wps rogue client mac-address 10.10.1 

clear wireless wps rogue stats

To clear rogue statistics, use the clear wireless wps rogue stats command.

clear wireless wps rogue stats

Syntax Description

This command has no arguments.

Command Default

None

Command Modes

Privileged EXEC (#)

Command History

Release Modification

Cisco IOS XE Amsterdam 16.12.1

This command was introduced.

Usage Guidelines

None

Examples

The following example shows you how to clear rogue statistics:

Device# clear wireless wps rogue stats

client association limit

To configure the maximum number of client connections on a WLAN, use the client association limit command. To disable clients association limit on the WLAN, use the no form of this command.

client association limit {association-limit}

no client association limit {association-limit}

Syntax Description

association-limit

Number of client connections to be accepted. The range is from 0 to . A value of zero (0) indicates no set limit.

Command Default

The maximum number of client connections is set to 0 (no limit).

Command Modes

WLAN configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

You must disable the WLAN before using this command. See Related Commands section for more information on how to disable a WLAN.

Examples

This example shows how to configure a client association limit on a WLAN and configure the client limit to 200:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wlan wlan1
Device(config-wlan)# shutdown
Device(config-wlan)# client association limit 200                            
Device(config-wlan)# no shutdown
Device(config-wlan)# end

This example shows how to disable a client association limit on a WLAN:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wlan wlan1
Device(config-wlan)# shutdown
Device(config-wlan)# no client association limit
Device(config-wlan)# no shutdown
Device(config-wlan)# end
This example shows how to configure a client association limit per radio on a WLAN and configure the client limit to 200:
Device# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)# wlan wlan1
Device(config-wlan)# client association limit radio 200
Device(config-wlan)# no shutdown
Device(config-wlan)# end
This example shows how to configure a client association limit per AP on a WLAN and configure the client limit to 300::
Device# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)# wlan wlan1
Device(config-wlan)# client association limit ap 300
Device(config-wlan)# no shutdown
Device(config-wlan)# end

channel foreign

To configure the RF Profile DCA foreign AP contribution, use the channel foreign command. To disable the DCA Foreign AP Contribution, use the no form of this command.

channel foreign

Syntax Description

foreign

Configures the RF Profile DCA foreign AP contribution.

Command Default

None

Command Modes

config-rf-profile

Command History

Release Modification

Cisco IOS XE Denali 16.3.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows how to configure the RF profile DCA foreign AP contribution.

Device(config-rf-profile)#channel foreign 

client-l2-vnid

To configure the client l2-vnid on a wireless fabric profile, use the client-l2-vnid command.

client-l2-vnid vnid

Syntax Description

vnid

Configures client l2-vnid. Valid range is 0 to 16777215.

Command Default

None

Command Modes

config-wireless-fabric

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure the client l2-vnid value on a wireless fabirc profile:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile fabric fabric-profile-name
Device(config-wireless-fabric)# client-l2-vnid 10

convergence

To configure mesh convergence method, use the convergence command.

convergence { fast | noise-tolerant-fast | standard | very-fast }

Syntax Description

fast

Configures fast convergence method.

noise-tolerant-fast

Configures noise-tolerant fast convergence method method to handle unstable RF environment.

standard

Configures standard convergence method.

very-fast

Configures very fast convergence method.

Command Default

Standard

Command Modes

config-wireless-mesh-profile

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure the fast convergence method for a mesh AP profile:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile mesh mesh-profile
Device(config-wireless-mesh-profile)# convergence fast

coverage

To configure the voice and data coverage, use the coverage command. To reset the minimum RSSI value use the no form of this command.

coverage {data | voice} rssi threshold value

Syntax Description

data

Configure Coverage Hole Detection for data packets.

voice

Configure Coverage Hole Detection for voice packets.

value

Minimum RSSI value for the packets received by the access point. The valid rage is between –90 and –60 dBm.

Command Default

None

Command Modes

config-rf-profile

Command History

Release Modification

Cisco IOS XE Denali 16.3.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows how to configure the coverage hole detection for data packets.

Device(config-rf-profile)#coverage data rssi threshold –85

crypto key generate rsa

To generate Rivest, Shamir, and Adelman (RSA) key pairs, use the crypto key generate rsa command in global configuration mode.

crypto key generate rsa [general-keys | usage-keys | signature | encryption] [label key-label] [exportable] [modulus modulus-size] [storage devicename :] [redundancy] [on devicename :]

Syntax Description

general-keys

(Optional) Specifies that a general-purpose key pair will be generated, which is the default.

usage-keys

(Optional) Specifies that two RSA special-usage key pairs, one encryption pair and one signature pair, will be generated.

signature

(Optional) Specifies that the RSA public key generated will be a signature special usage key.

encryption

(Optional) Specifies that the RSA public key generated will be an encryption special usage key.

label key-label

(Optional) Specifies the name that is used for an RSA key pair when they are being exported.

If a key label is not specified, the fully qualified domain name (FQDN) of the router is used.

exportable

(Optional) Specifies that the RSA key pair can be exported to another Cisco device, such as a router.

modulus modulus-size

(Optional) Specifies the IP size of the key modulus.

By default, the modulus of a certification authority (CA) key is 1024 bits. The recommended modulus for a CA key is 2048 bits. The range of a CA key modulus is from 350 to 4096 bits.

Note 

Effective with Cisco IOS XE Release 2.4 and Cisco IOS Release 15.1(1)T, the maximum key size was expanded to 4096 bits for private key operations. The maximum for private key operations prior to these releases was 2048 bits.

storage devicename :

(Optional) Specifies the key storage location. The name of the storage device is followed by a colon (:).

redundancy

(Optional) Specifies that the key should be synchronized to the standby CA.

on devicename :

(Optional) Specifies that the RSA key pair will be created on the specified device, including a Universal Serial Bus (USB) token, local disk, or NVRAM. The name of the device is followed by a colon (:).

Keys created on a USB token must be 2048 bits or less.

Command Default

RSA key pairs do not exist.

Command Modes


Global configuration

Command History

Release

Modification

11.3

This command was introduced.

12.2(8)T

The key-label argument was added.

12.2(15)T

The exportable keyword was added.

12.2(18)SXD

This command was integrated into Cisco IOS Release 12.2(18)SXD.

12.4(4)T

The storage keyword and devicename : argument were added.

12.2(33)SRA

This command was integrated into Cisco IOS Release 12.2(33)SRA.

12.4(11)T

The storage keyword and devicename : argument were implemented on the Cisco 7200VXR NPE-G2 platform.

The signature , encryption and on keywords and devicename : argument were added.

12.4(24)T

Support for IPv6 Secure Neighbor Discovery (SeND) was added.

XE 2.4

The maximum RSA key size was expanded from 2048 to 4096 bits for private key operations.

15.0(1)M

This command was modified. The redundancy keyword was introduced.

15.1(1)T

This command was modified. The range value for the modulus keyword value is extended from 360 to 2048 bits to 360 to 4096 bits.

15.2(2)SA2

This command was implemented on the Cisco ME 2600X Series Ethernet Access Switches.

Usage Guidelines


Note

Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper.


Use this command to generate RSA key pairs for your Cisco device (such as a router).

RSA keys are generated in pairs--one public RSA key and one private RSA key.

If your router already has RSA keys when you issue this command, you will be warned and prompted to replace the existing keys with new keys.


Note

Before issuing this command, ensure that your router has a hostname and IP domain name configured (with the hostname and ip domain-name commands). You will be unable to complete the crypto key generate rsa command without a hostname and IP domain name. (This situation is not true when you generate only a named key pair.)



Note

Secure Shell (SSH) may generate an additional RSA key pair if you generate a key pair on a router having no RSA keys. The additional key pair is used only by SSH and will have a name such as {router_FQDN }.server. For example, if a router name is “router1.cisco.com,” the key name is “router1.cisco.com.server.”


This command is not saved in the router configuration; however, the RSA keys generated by this command are saved in the private configuration in NVRAM (which is never displayed to the user or backed up to another device) the next time the configuration is written to NVRAM.


Note

If the configuration is not saved to NVRAM, the generated keys are lost on the next reload of the router.


There are two mutually exclusive types of RSA key pairs: special-usage keys and general-purpose keys. When you generate RSA key pairs, you will be prompted to select either special-usage keys or general-purpose keys.

Special-Usage Keys

If you generate special-usage keys, two pairs of RSA keys will be generated. One pair will be used with any Internet Key Exchange (IKE) policy that specifies RSA signatures as the authentication method, and the other pair will be used with any IKE policy that specifies RSA encrypted keys as the authentication method.

A CA is used only with IKE policies specifying RSA signatures, not with IKE policies specifying RSA-encrypted nonces. (However, you could specify more than one IKE policy and have RSA signatures specified in one policy and RSA-encrypted nonces in another policy.)

If you plan to have both types of RSA authentication methods in your IKE policies, you may prefer to generate special-usage keys. With special-usage keys, each key is not unnecessarily exposed. (Without special-usage keys, one key is used for both authentication methods, increasing the exposure of that key.)

General-Purpose Keys

If you generate general-purpose keys, only one pair of RSA keys will be generated. This pair will be used with IKE policies specifying either RSA signatures or RSA encrypted keys. Therefore, a general-purpose key pair might get used more frequently than a special-usage key pair.

Named Key Pairs

If you generate a named key pair using the key-label argument, you must also specify the usage-keys keyword or the general-keys keyword. Named key pairs allow you to have multiple RSA key pairs, enabling the Cisco IOS software to maintain a different key pair for each identity certificate.

Modulus Length

When you generate RSA keys, you will be prompted to enter a modulus length. The longer the modulus, the stronger the security. However a longer modules takes longer to generate (see the table below for sample times) and takes longer to use.

Table 5. Sample Times by Modulus Length to Generate RSA Keys

Router

360 bits

512 bits

1024 bits

2048 bits (maximum)

Cisco 2500

11 seconds

20 seconds

4 minutes, 38 seconds

More than 1 hour

Cisco 4700

Less than 1 second

1 second

4 seconds

50 seconds

Cisco IOS software does not support a modulus greater than 4096 bits. A length of less than 512 bits is normally not recommended. In certain situations, the shorter modulus may not function properly with IKE, so we recommend using a minimum modulus of 2048 bits.


Note

As of Cisco IOS Release 12.4(11)T, peer public RSA key modulus values up to 4096 bits are automatically supported. The largest private RSA key modulus is 4096 bits. Therefore, the largest RSA private key a router may generate or import is 4096 bits. However, RFC 2409 restricts the private key size to 2048 bits or less for RSA encryption. The recommended modulus for a CA is 2048 bits; the recommended modulus for a client is 2048 bits.


Additional limitations may apply when RSA keys are generated by cryptographic hardware. For example, when RSA keys are generated by the Cisco VPN Services Port Adapter (VSPA), the RSA key modulus must be a minimum of 384 bits and must be a multiple of 64.

Specifying a Storage Location for RSA Keys

When you issue the crypto key generate rsa command with the storage devicename : keyword and argument, the RSA keys will be stored on the specified device. This location will supersede any crypto key storage command settings.

Specifying a Device for RSA Key Generation

As of Cisco IOS Release 12.4(11)T and later releases, you may specify the device where RSA keys are generated. Devices supported include NVRAM, local disks, and USB tokens. If your router has a USB token configured and available, the USB token can be used as cryptographic device in addition to a storage device. Using a USB token as a cryptographic device allows RSA operations such as key generation, signing, and authentication of credentials to be performed on the token. The private key never leaves the USB token and is not exportable. The public key is exportable.

RSA keys may be generated on a configured and available USB token, by the use of the on devicename : keyword and argument. Keys that reside on a USB token are saved to persistent token storage when they are generated. The number of keys that can be generated on a USB token is limited by the space available. If you attempt to generate keys on a USB token and it is full you will receive the following message:


% Error in generating keys:no available resources 

Key deletion will remove the keys stored on the token from persistent storage immediately. (Keys that do not reside on a token are saved to or deleted from nontoken storage locations when the copy or similar command is issued.)

For information on configuring a USB token, see “ Storing PKI Credentials ” chapter in the Cisco IOS Security Configuration Guide, Release 12.4T. For information on using on-token RSA credentials, see the “ Configuring and Managing a Cisco IOS Certificate Server for PKI Deployment ” chapter in the Cisco IOS Security Configuration Guide , Release 12.4T.

Specifying RSA Key Redundancy Generation on a Device

You can specify redundancy for existing keys only if they are exportable.

Examples

The following example generates a general-usage 1024-bit RSA key pair on a USB token with the label “ms2” with crypto engine debugging messages shown:


Router(config)# crypto key generate rsa label ms2 modulus 2048 on usbtoken0:
The name for the keys will be: ms2 
% The key modulus size is 2048 bits 
% Generating 1024 bit RSA keys, keys will be on-token, non-exportable... 
Jan 7 02:41:40.895: crypto_engine: Generate public/private keypair [OK] 
Jan 7 02:44:09.623: crypto_engine: Create signature 
Jan 7 02:44:10.467: crypto_engine: Verify signature 
Jan 7 02:44:10.467: CryptoEngine0: CRYPTO_ISA_RSA_CREATE_PUBKEY(hw)(ipsec) 
Jan 7 02:44:10.467: CryptoEngine0: CRYPTO_ISA_RSA_PUB_DECRYPT(hw)(ipsec) 

Now, the on-token keys labeled “ms2” may be used for enrollment.

The following example generates special-usage RSA keys:


Router(config)# crypto key generate rsa usage-keys
The name for the keys will be: myrouter.example.com
Choose the size of the key modulus in the range of 360 to 2048 for your Signature Keys. Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus[512]? <return>
Generating RSA keys.... [OK].
Choose the size of the key modulus in the range of 360 to 2048 for your Encryption Keys. Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus[512]? <return>
Generating RSA keys.... [OK].

The following example generates general-purpose RSA keys:


Note

You cannot generate both special-usage and general-purpose keys; you can generate only one or the other.



Router(config)# crypto key generate rsa general-keys
The name for the keys will be: myrouter.example.com
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus[512]? <return>
Generating RSA keys.... [OK].

The following example generates the general-purpose RSA key pair “exampleCAkeys”:


crypto key generate rsa general-keys label exampleCAkeys
crypto ca trustpoint exampleCAkeys
 enroll url 
http://exampleCAkeys/certsrv/mscep/mscep.dll
 rsakeypair exampleCAkeys 1024 1024

The following example specifies the RSA key storage location of “usbtoken0:” for “tokenkey1”:

crypto key generate rsa general-keys label tokenkey1 storage usbtoken0:


The following example specifies the redundancy keyword:


Router(config)# crypto key generate rsa label MYKEYS redundancy

The name for the keys will be: MYKEYS

Choose the size of the key modulus in the range of 360 to 2048 for your

General Purpose Keys. Choosing a key modulus greater than 512 may take

a few minutes.

How many bits in the modulus [512]:

% Generating 512 bit RSA keys, keys will be non-exportable with redundancy...[OK]

crypto pki trustpoint

To create a new TrustPoint dedicated for a single CA certificate, use the crypto pki trustpoint command.

crypto pki trustpoint

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

Global Configuration

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Usage Guidelines

Examples

This example shows how to create a new TrustPoint dedicated for a single CA certificate:


Device# configure terminal
Device(config)# crypto pki trustpoint <tp_name>
Device(ca-trustpoint)# enrollment terminal
Device(ca-trustpoint)# exit
Device(config)# crypto pki authenticate <tp_name>
<<< PASTE CA-CERT in PEM format followed by quit >>>

crypto pki trust pool import terminal

To import the root certificate by pasting the CA certificate from the digicert.com, use the crypto pki trust pool import terminal command.

crypto pki trust pool import terminal

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

Global Configuration

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Usage Guidelines

Examples

This example shows how to import the root certificate by pasting the CA certificate from the digicert.com:


Device# configure terminal
Device(config)# crypto pki trust pool import terminal
Device(config)# end

crypto pki trustpool clean

To erase the downloaded CA certificate bundles, use the crypto pki trustpool clean command.

crypto pki trustpool clean

Syntax Description

This command has no keywords or arguments.

Command Default

None

Command Modes

Global Configuration

Command History

Release Modification
Cisco IOS XE Bengaluru 17.5.1

This command was introduced.

Usage Guidelines

Examples

This example shows how to erase the downloaded CA certificate bundles:


Device# configure terminal
Device(config)# crypto pki trustpool clean
Device(config)# end

cts inline-tagging

To configure Cisco TrustSec (CTS) inline tagging, use the cts inline-tagging command.

cts inline-tagging

Syntax Description

This command has no keywords or arguments.

Command Default

Inline tagging is not configured.

Command Modes

wireless policy configuration (config-wireless-policy)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

This example shows how to configure CTS inline tagging.

Device(config-wireless-policy)# cts inline-tagging 

cts role-based enforcement

To configure Cisco TrustSec (CTS) SGACL enforcement, use the cts role-based enforcement command.

cts role-based enforcement

Syntax Description

This command has no keywords or arguments.

Command Default

SGACL is not enforced.

Command Modes

wireless policy configuration (config-wireless-policy)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

This example shows how to configure CTS SGACL enforcement.

Device(config-wireless-policy)# cts role-based enforcement 

cts sgt

To set the Cisco TrustSec (CTS) default security group tag (SGT), use the cts sgt command.

cts sgt sgt-value

Syntax Description

sgt-value

Security group tag value.

Command Default

SGT tag is not set.

Command Modes

wireless policy configuration (config-wireless-policy)

Command History

Release Modification
Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

This example shows how to set the default SGT.

Device(config-wireless-policy)# cts sgt 100 

custom-page login device

To configure a customized login page, use the custom-page login device command.

custom-page login device html-filename

Syntax Description

html-filename

Enter the HTML filename of the login page.

Command Default

None

Command Modes

config-params-parameter-map

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure a customized login page:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# parameter-map type webauth parameter-map-name
Device(config-params-parameter-map)# custom-page login device bootflash:login.html

default

To set the parameters to their default values, use the default command.

default {aaa-override | accounting-list | band-select | broadcast-ssid | call-snoop | ccx | channel-scan | parameters | chd | client | datalink | diag-channel | dtim | exclusionlist | ip | ipv6 | load-balance | local-auth | mac-filtering | media-stream | mfp | mobility | nac | passive-client | peer-blocking | radio | roamed-voice-client | security | service-policy | session-timeout | shutdown | sip-cac | static-ip | uapsd | wgb | wmm}

Syntax Description

aaa-override

Sets the AAA override parameter to its default value.

accounting-list

Sets the accounting parameter and its attributes to their default values.

band-select

Sets the band selection parameter to its default values.

broadcast-ssid

Sets the broadcast Service Set Identifier (SSID) parameter to its default value.

call-snoop

Sets the call snoop parameter to its default value.

ccx

Sets the Cisco client extension (Cisco Aironet IE) parameters and attributes to their default values.

channel-scan

Sets the channel scan parameters and attributes to their default values.

chd

Sets the coverage hold detection parameter to its default value.

client

Sets the client parameters and attributes to their default values.

datalink

Sets the datalink parameters and attributes to their default values.

diag-channel

Sets the diagnostic channel parameters and attributes to their default values.

dtim

Sets the Delivery Traffic Indicator Message (DTIM) parameter to its default value.

exclusionlist

Sets the client exclusion timeout parameter to its default value.

ip

Sets the IP parameters to their default values.

ipv6

Sets the IPv6 parameters and attributes to their default values.

load-balance

Sets the load-balancing parameter to its default value.

local-auth

Sets the Extensible Authentication Protocol (EAP) profile parameters and attributes to their default values.

mac-filtering

Sets the MAC filtering parameters and attributes to their default values.

media-stream

Sets the media stream parameters and attributes to their default values.

mfp

Sets the Management Frame Protection (MPF) parameters and attributes to their default values.

mobility

Sets the mobility parameters and attributes to their default values.

nac

Sets the RADIUS Network Admission Control (NAC) parameter to its default value.

passive-client

Sets the passive client parameter to its default value.

peer-blocking

Sets the peer to peer blocking parameters and attributes to their default values.

radio

Sets the radio policy parameters and attributes to their default values.

roamed-voice-client

Sets the roamed voice client parameters and attributes to their default values.

security

Sets the security policy parameters and attributes to their default values.

service-policy

Sets the WLAN quality of service (QoS) policy parameters and attributes to their default values.

session-timeout

Sets the client session timeout parameter to its default value.

shutdown

Sets the shutdown parameter to its default value.

sip-cac

Sets the Session Initiation Protocol (SIP) Call Admission Control (CAC) parameters and attributes to their default values.

static-ip

Sets the static IP client tunneling parameters and their attributes to their default values.

uapsd

Sets the Wi-Fi Multimedia (WMM) Unscheduled Automatic Power Save Delivery (UAPSD) parameters and attributes to their default values.

wgb

Sets the Workgroup Bridges (WGB) parameter to its default value.

wmm

Sets the WMM parameters and attributes to their default values.

Command Default

None.

Command Modes

WLAN configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

You must disable the WLAN before using this command. See Related Commands section for more information on how to disable a WLAN.

Examples

This example shows how to set the Cisco Client Extension parameter to its default value:

Device(config-wlan)# default ccx aironet-iesupport

description

To configure a description for a flow monitor, flow exporter, or flow record, use the description command in the appropriate configuration mode. To remove a description, use the no form of this command.

description description

no description description

Syntax Description

description

Text string that describes the flow monitor, flow exporter, or flow record.

Command Default

The default description for a flow sampler, flow monitor, flow exporter, or flow record is "User defined."

Command Modes

The following command modes are supported:

Flow exporter configuration

Flow monitor configuration

Flow record configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

To return this command to its default setting, use the no description or default description command in the appropriate configuration mode.

Examples

The following example configures a description for a flow monitor:

Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)# description Monitors traffic to 172.16.0.1 255.255.0.0

destination

To configure an export destination for a flow exporter, use the destination command in flow exporter configuration mode. To remove an export destination for a flow exporter, use the no form of this command.

destination {hostname | ip-address}

no destination {hostname | ip-address}

Syntax Description

hostname

Hostname of the device to which you want to send the NetFlow information.

ip-address

IPv4 address of the workstation to which you want to send the NetFlow information.

Command Default

An export destination is not configured.

Command Modes

Flow exporter configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

Each flow exporter can have only one destination address or hostname.

When you configure a hostname instead of the IP address for the device, the hostname is resolved immediately and the IPv4 address is stored in the running configuration. If the hostname-to-IP-address mapping that was used for the original Domain Name System (DNS) name resolution changes dynamically on the DNS server, the device does not detect this, and the exported data continues to be sent to the original IP address, resulting in a loss of data.

To return this command to its default setting, use the no destination or default destination command in flow exporter configuration mode.

Examples

The following example shows how to configure the networking device to export the cache entry to a destination system:

Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# destination 10.0.0.4

destination stealthwatch-cloud

To configure the export destination as Cisco Stealthwatch Cloud, use the destination stealthwatch-cloud command. To disable the command, use the no form of this command.

destination stealthwatch-cloud

no destination stealthwatch-cloud

Syntax Description

destination

Configures the export destination.

stealthwatch-cloud

Configures export to Cisco Stealthwatch Cloud.

Command Default

None

Command Modes

Flow Exporter Configuration

Command History

Release Modification
Cisco IOS XE Bengaluru 17.4.1

This command was introduced.

Usage Guidelines

None

Examples

This example shows how to configure the export destination as Cisco Stealthwatch Cloud:

Device(config-flow-exporter)# destination stealthwatch-cloud

device-tracking binding vlan

To configure IPv4 or IPv6 static entry, use the device-tracking binding vlan command.

device-tracking binding vlan vlan-id {ipv4-addr | ipv6-addr }interface gigabitEthernet ge-intf-num hardware-or-mac-address

Syntax Description

vlan-id

VLAN ID. Valid range is 1 to 4096.

ipv4-addr

IPv4 address of the device.

interface gigabitEthernet

GigabitEthernet IEEE 802.3z.

ge-intf-num

GigabitEthernet interface number. Valid range is 1 to 32.

hardware-or-mac-address

The 48-bit hardware address or the MAC address of the device.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure IPv4 static entry:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# device-tracking binding vlan 20 20.20.20.5 interface gigabitEthernet 1 0000.1111.2222

dhcp-tlv-caching

To configure DHCP TLV caching on a WLAN, use the dhcp-tlv-caching command.

dhcp-tlv-caching

Command Default

None

Command Modes

config-wireless-policy

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

This example shows how to configure DHCP TLV caching on a WLAN:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile policy rr-xyz-policy-1
Device(config-wireless-policy)# dhcp-tlv-caching
Device(config-wireless-policy)# radius-profiling
Device(config-wireless-policy)# end

dnscrypt

To enable or disable DNScrypt, use the dnscrypt command.

dnscrypt

Command Default

None

Command Modes

config-profile

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Usage Guidelines

By default, the DNScrypt option is enabled.

Examples

This example shows how to enable or disable DNScrypt:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# parameter-map type umbrella global
Device(config-profile)# token 57CC80106C087FB1B2A7BAB4F2F4373C00247166
Device(config-profile)# local-domain dns_wl
Device(config-profile)# no dnscrypt
Device(config-profile)# end

domain-name (DHCP)

To specify the domain n ame for a Dynamic Host Configuration Protocol (DHCP) client, use the domain-name command in DHCP pool configuration mode. To remove the domain name, use the no form of this command.

domain-name domain

no domain-name

Syntax Description

domain

Specifies the domain name string of the client.

Command Default

No default behavior or values.

Command Modes

DHCP pool configuration

Command History

Release

Modification

12.0(1)T

This command was introduced.

12.2(33)SRA

This command was integrated into Cisco IOS Release 12.2(33)SRA.

12.2SX

This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.

Examples

The following example specifies cisco.com as the domain name of the client:


domain-name cisco.com

dot11ax twt-broadcast-support

To configure TWT broadcast support on WLAN, use the dot11ax twt-broadcast-support command. To disable the feature, use the no command of the command.

dot11ax twt-broadcast-support

[no] dot11ax twt-broadcast-support

Syntax Description

dot11ax twt-broadcast-support

Configures the TWT broadcast support on WLAN

Command Default

None

Command Modes

WLAN configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.2.1

This command was introduced.

Examples

This example shows how to configure target wakeup time on WLAN:

Device(config-wlan)# dot11ax twt-broadcast-support

dot11 5ghz reporting-interval

To configure the client report interval sent from AP for clients on 802.11a radio, use the dot11 5ghz reporting-interval command.

dot11 5ghz reporting-interval reporting-interval

Syntax Description

reporting-interval

Interval at which client report needs to be sent in seconds.

Command Default

None

Command Modes

config-ap-profile

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to set the client report interval in seconds:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# ap profile profile-name
Device(config-ap-profile)# dot11 5ghz reporting-interval 8

dot11 reporting-interval

To set the volume metering interval, use the dot11 reporting-interval command.

dot11 { 24ghz| 5ghz } reporting-interval

Syntax Description

reporting-interval

Interval to send client accounting statistics.

Command Default

Interval is configured at the default level of 90 seconds.

Command Modes

config-ap-profile

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Usage Guidelines

Though the CLI allows you to configure range from 5 to 90 seconds, we recommend that you use 60 to 90 seconds range for Volume Metering.

This CLI can also be used to configure the interval when smart roam is enabled, which has a range of 5 to 90 seconds.

Though you can set two different values for volume metering and smart roam, only one value takes effect based on the order of execution. So, we recommend that you use the same reporting interval for both.

Examples

The following example shows how to configure volume metering:

Device(config-ap-profile)# dot11 24ghz 60

dot1x system-auth-control

To globally enable 802.1X SystemAuthControl (port-based authentication), use the dot1x system-auth-control command in global configuration mode. To disable SystemAuthControl, use the no form of this command.

dot1x system-auth-control

no dot1x system-auth-control

Syntax Description

This command has no arguments or keywords.

Command Default

System authentication is disabled by default. If this command is disabled, all ports behave as if they are force authorized.

Command Modes


Global configuration (config)

Command History

Release

Modification

12.3(2)XA

This command was introduced.

12.2(14)SX

This command was implemented on the Supervisor Engine 720.

12.3(4)T

This command was integrated into Cisco IOS Release 12.3(4)T.

12.2(17d)SXB

Support for this command on the Supervisor Engine 2 was extended to 12.2(17d)SXB.

12.2(33)SRA

This command was integrated into Cisco IOS Release 12.2(33)SRA.

12.2(33)SXH

This command was integrated into Cisco IOS Release 12.2(33)SXH.

Usage Guidelines

The IEEE 802.1x standard defines a client-server-based access control and authentication protocol that restricts unauthorized devices from connecting to a LAN through publicly accessible ports. 802.1x controls network access by creating two distinct virtual access points at each port. One access point is an uncontrolled port; the other is a controlled port. All traffic through the single port is available to both access points. 802.1x authenticates each user device that is connected to a switch port and assigns the port to a VLAN before making available any services that are offered by the switch or the LAN. Until the device is authenticated, 802.1x access control allows only Extensible Authentication Protocol (EAP) over LAN (EAPOL) traffic through the port to which the device is connected. After authentication is successful, normal traffic can pass through the port.

The no form of the command removes any 802.1X-related configurations.

You must enable Authentication, Authorization, and Accounting (AAA) and specify the authentication method list before enabling 802.1X. A method list describes the sequence and authentication methods to be queried to authenticate a user.

Examples

The following example shows how to enable SystemAuthControl:


Router(config)# dot1x system-auth-control

eap profile

To configure an EAP profile, use the eap profile command.

eap profile profile-name

Syntax Description

profile-name

Name of the EAP profile. Maximum number of allowed characters is 63.

Command Default

None

Command Modes

Global configuration (config)

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure an EAP profile name:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# eap profile eap-profile-name

exclusionlist

To configure an exclusion list, use the exclusionlist command. To disable an exclusion list, use the no form of this command.

exclusionlist [ timeout seconds ]

no exclusionlist [timeout]

Syntax Description

timeout seconds

(Optional) Specifies an exclusion list timeout in seconds. The range is from 0 to 2147483647. A value of zero (0) specifies no timeout.

Command Default

The exclusion list is set to 60 seconds.

Command Modes

Wireless policy configuration

Command History

Release

Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced.

Examples

This example shows how to configure a client exclusion list:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile policy default-policy-profile
Device(config-wireless-policy)# exclusionlist timeout 5

exporter default-flow-exporter

To add an exporter to use to export records, use the exporter default-flow-exporter command. Use the no form of this command to disable the feature.

exporter default-flow-exporter

[no] exporter default-flow-exporter

Syntax Description

There are no arguments to this command.

Command Default

None

Command Modes

Flow monitor configuration

Command History

Release Modification
Cisco IOS XE Amsterdam 17.2.1

This command was introduced.

Examples

This example shows how to add an exporter to use to export records:

Device(config-flow-monitor)#exporter default-flow-exporter

fast-teardown

To enable fast teardown for a mesh access point (AP) profile and configure the feature's parameters, use the fast-teardown command.


Note

Fast Teardown for Mesh APs is not supported on Cisco Industrial Wireless (IW) 3702 Access Points.


fast-teardown {enabled | interval duration latency-exceeded-threshold | latency-threshold | uplink-recovery-interval duration | retries retry limit

Syntax Description

enabled

Enables the fast teardown feature.

interval

(optional) Configures the retry interval, in seconds. The valid values range between 1 and 10 seconds.

latency-exceeded-threshold

(optional) Specifies the latency interval in which at least one ping must succeed in less than threshold time. The valid values range between 1 and 30 seconds.

latency-threshold

(optional) Speficies the latency threshold. The valid values range between 1 and 500 milliseconds.

uplink-recovery-interval

(Optional) Specifies the time during which root acccess point uplink has to be stable to accept child connections. The valid values range between 1 and 3600 seconds.

retries

(optional) Specifies the maximum retries until the gateway is considered unreachable. The range is from 0 to 10.

Command Default

None

Command Modes

Fast Teardown configuration

Command History

Release Modification
Cisco IOS XE Cupertino 17.7.1

This command was introduced.

Examples

The following example shows how to enable the fast teardown feature for a mesh AP profile and configure its parameters:

Device# configure terminal
Device(config)# wireless mesh profile mesh-profile-name
Device(config-wireless-mesh-profile)# fast-teardown
Device(config-wireless-mesh-profile-fast-teardown)# interval 1  

fallback-radio-shut

To configure shutdown of the radio interface, use the fallback-radio-shut command.

fallback-radio-shut

Command Default

None

Command Modes

config-wireless-flex-profile

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure shutdown of the radio interface:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile flex flex-profile-name
Device(config-wireless-flex-profile)# fallback-radio-shut

flex

To configure flex related parameters, use the flex command.

flex {nat-pat | split-mac-acl split-mac-acl-name | vlan-central-switching }

Syntax Description

nat-pat

Enables NAT-PAT.

split-mac-acl

Configures split-mac-acl name.

split-mac-acl-name

Name of split MAC ACL.

vlan-central-switching

VLAN based central switching.

Command Default

None

Command Modes

config-wireless-policy

Command History

Release Modification

Cisco IOS XE Gibraltar 16.10.1

This command was introduced in a release earlier than Cisco IOS XE Gibraltar 16.10.1.

Examples

The following example shows how to configure flex related VLAN central-switching:

Device# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Device(config)# wireless profile policy profile-name
Device(config-wireless-policy)# flex vlan-central-switching

flow exporter

To create a flow exporter, or to modify an existing flow exporter, and enter flow exporter configuration mode, use the flow exporter command in global configuration mode. To remove a flow exporter, use the no form of this command.

flow exporter exporter-name

no flow exporter exporter-name

Syntax Description

exporter-name

Name of the flow exporter that is being created or modified.

Command Default

flow exporters are not present in the configuration.

Command Modes

Global configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

Flow exporters export the data in the flow monitor cache to a remote system, such as a server running NetFlow collector, for analysis and storage. Flow exporters are created as separate entities in the configuration. Flow exporters are assigned to flow monitors to provide data export capability for the flow monitors. You can create several flow exporters and assign them to one or more flow monitors to provide several export destinations. You can create one flow exporter and apply it to several flow monitors.

Examples

The following example creates a flow exporter named FLOW-EXPORTER-1 and enters flow exporter configuration mode:

Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)#

flow monitor

To create a flow monitor, or to modify an existing flow monitor, and enter flow monitor configuration mode, use the flow monitor command in global configuration mode. To remove a flow monitor, use the no form of this command.

flow monitor monitor-name

no flow monitor monitor-name

Syntax Description

monitor-name

Name of the flow monitor that is being created or modified.

Command Default

flow monitors are not present in the configuration.

Command Modes

Global configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

Flow monitors are the component that is applied to interfaces to perform network traffic monitoring. Flow monitors consist of a flow record and a cache. You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is applied to the first interface. Flow data is collected from the network traffic during the monitoring process based on the key and nonkey fields in the flow monitor's record and stored in the flow monitor cache.

Examples

The following example creates a flow monitor named FLOW-MONITOR-1 and enters flow monitor configuration mode:

Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)#

flow record

To create a flow record, or to modify an existing flow record, and enter flow record configuration mode, use the flow record command in global configuration mode. To remove a record, use the no form of this command.

flow record record-name

no flow record record-name

Syntax Description

record-name

Name of the flow record that is being created or modified.

Command Default

A flow record is not configured.

Command Modes

Global configuration

Command History

Release Modification

Cisco IOS XE Gibraltar 16.12.1

This command was introduced.

Usage Guidelines

A flow record defines the keys that uses to identify packets in the flow, as well as other fields of interest that gathers for the flow. You can define a flow record with any combination of keys and fields of interest. The supports a rich set of keys. A flow record also defines the types of counters gathered per flow. You can configure 64-bit packet or byte counters.

Examples

The following example creates a flow record named FLOW-RECORD-1, and enters flow record configuration mode:

Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)#

ftp-path

To configure the path at the FTP server for trace log export, use the ftp-path command. Use the no form of the command to negate the command or to set the command to its default.

ftp-path ftp-path
no ftp-path ftp-path

Syntax Description

ftp-path

Specifies the path at the FTP server.

Command Default

None

Command Modes

Wireless trace export profile FTP configuration

Command History

Release Modification
Cisco IOS XE Gibraltar 16.12.2s This command was introduced.

Examples

Device(config)# wireless profile transfer trace-export trace_export_name
Device(config-wireless-trace-export-profile)# log-export-mode ftp
Device(config-wireless-trace-export-profile-ftp)# ftp-path ip-address/download/object/stream/images/ap-images

ftp-password

To configure the FTP server password for trace export, use the ftp-password command. Use the no form of this command to negate the configuration or to set the command to its default.

ftp-password} <Enter password> <Re-enter password>
no ftp-password<Enter password> <Re-enter password>

Syntax Description

password

Specifies the FTP server password.

re-enter password

Indicates that the user must re-enter the FTP server password.

Command Default

None

Command Modes

Wireless trace export profile FTP configuration

Command History

Release Modification
Cisco IOS XE Gibraltar 16.12.2s This command was introduced.

Examples

Device(config)# wireless profile transfer trace-export trace_export_name
Device(config-wireless-trace-export-profile)# log-export-mode ftp
Device(config-wireless-trace-export-profile-ftp)# ftp-password xxxxxxxx xxxxxxxx 

ftp-server

To configure the FTP server address for trace export, use the ftp-server command. Use the no form of this command to negate the configuration or to set the command to its default.

ftp-server { A.B.C.D | X:X:X:X::X}
no ftp-server { A.B.C.D | X:X:X:X::X}

Syntax Description

A.B.C.D

Specifies the FTP IPv4 server address.

X:X:X:X::X

Specifies the FTP IPv6 server address.

Command Default

None

Command Modes

Wireless trace export profile FTP configuration

Command History

Release Modification
Cisco IOS XE Gibraltar 16.12.2s This command was introduced.

Examples

Device(config)# wireless profile transfer trace-export trace_export_name
Device(config-wireless-trace-export-profile)# log-export-mode ftp
Device(config-wireless-trace-export-profile-ftp)# ftp-server 10.1.1.1

ftp-username

To configure the FTP server username for trace export, use the ftp-username command. Use the no form of this command to negate the configuration or to set the command to its default.

ftp-username Username
no ftp-username Username

Syntax Description

username

Specifies the FTP server username.

Command Default

None

Command Modes

Wireless trace export profile FTP configuration

Command History

Release Modification
Cisco IOS XE Gibraltar 16.12.2s This command was introduced.

Examples

Device(config)# wireless profile transfer trace-export trace_export_name
Device(config-wireless-trace-export-profile)# log-export-mode ftp
Device(config-wireless-trace-export-profile-ftp)# ftp-username ftp-server-username