Table of Contents
Wireless Device Profiling and Policy Classification Engine on WLC
Scope, Objectives, and Expectations
Profiling and Policy Configuration
Creating Policies on WLAN from WLC GUI
Mapping the Policy to an AP Group
Example of Policy Enforcement on Other Device Types
Commands to Configure Profiling through CLI
Commands to Configure Policy through CLI
WLAN Configuration for Sleeping Client
Native Profiling and Policy in CUWN Release 8.0
AVC/mDNS Profiles Attached to Local Policies
Profiling and Policy Engine on WLC
Profiling and Policy Configuration
Creating Policies on WLAN from the WLC GUI
Dynamic MAC OUI and Device Profile Up date
Downloading MAC-OUI Th rough the WLC GUI
Downloading MAC-OUI Th rough the WLC CLI
Updating Device Profile Th rough the GUI
Updating Device Profile Th rough the CLI
Overview
Cisco currently offers a rich set of features which provides device identification, onboarding, posture, and policy, through ISE. WLC has been enhanced with some of these capabilities. This document deals with basic configuration of device profiling and policy implementation through Cisco WLC.
This new feature (Profiling and Policy) on WLC does the profiling of devices based on protocols like HTTP and DHCP to identify the end devices on the network. Users can configure device based policies and enforce per user or per device policy on the network. The WLC will also display statistics based on per user or per device end points and policies applicable per device.
Wireless device profiling and policy classification engine enables simple BYOD deployments with visibility and user/wireless device policy integrated into the wireless controller.
Scope, Objectives, and Expectations
Profiling and policy enforcement allows profiling of mobile devices and basic onboarding of the profiled devices to a specific VLAN assigns ACL and QOS, or configures session timeout. It can be configured as two separate components. The configuration on the WLC is based on defined parameters specific to clients joining the network. The policy attributes which are of interest are:
a. Role – Defines the user type or the user group the user belongs to, for example, student or employee.
b. Device – Defines the type of device, for example, Windows machine, Smart phone, Apple device such as iPad, iPhone and so on.
c. Location – Defines where the end point is connected on the network. Location represents AP group. APs can be divided or grouped according to the location and policy can be applied per AP group.
d. Time of day – Allows configuration to be defined at what time of the day end-points are allowed on the network.
e. EAP Type - Checks what EAP method the client is getting connected to.
The above parameters are configurable as policy match attributes. Once WLC has a match corresponding to the above parameters per end-point, policy enforcement comes into picture. Policy enforcement allows basic device on-boarding of mobile devices based on session attributes such as:
e. Sleeping Client–Timeout duration for a specific sleeping client (in hours)
The user can configure these policies and enforce end-points with specified policies. The wireless clients will be profiled based on MAC OUI, DHCP, HTTP user agent (valid Internet is required for successful HTTP profiling). The WLC uses these attributes and predefined classification profiles to identify devices.
Profiling and Policy Configuration
In 7.5 release, only embedded or built-in profiles are available on the WLC through which it can identify devices.
In later releases, it should be possible to create user-defined profiles, which will take precedence over the embedded profiles. Currently there are 88 built-in profiles and can be viewed through WLC CLI prompt.
Go to WLC and run
show profiling policy summary
. For the purpose of this document we just displayed the first 6 profile.To configure device profiling on a WLAN through GUI, go to the WLAN (here we created WLAN Demo-Employee) and click Advance, then enable DHCP by checking the Required check box. After enabling the DHCP required option, scroll down and under Local Client Profiling enable DHCP Profiling and HTTP Profiling by checking the respective check boxes and click Apply.
NoteTo configure profiling through ISE use Radius Client Profiling.
Now, try associating a client to the WLAN on which profiling is enabled. In our setup we associated an Apple iPad, an Android device and a Windows machine.
From the WLC main menu bar, navigate to Monitor > Clients and under Device Type column, notice that there are three devices associated to the WLAN and all of them are being profiled. See the below figure – Windows PC as Microsoft-Workstation, iPad as an Apple-iPad and Motorola Zoom as an Android device.
The same can be viewed from CLI as well, run a command
show client summary devicetype
to see the clients being profiled.We clearly see that the client devices are classified under Device Type.
Creating Policies on WLAN from WLC GUI
Once the policy has been configured you can create policies and apply them on the WLAN. On WLC menu bar, go to Security > Local Policies which will navigate you to the Policy List.
In Policy List page, click New to create a Policy Name. In our set up we are using “Employee-iPad” as a policy-name but you can use any name to define your own policy.
Once the Policy Name is created, click that policy name to configure the rules.
Under Policy Name, you can create policies to match a Role, EAP Type and Device Type. You can also define what actions to take related to the Match criteria. In our setup we used Device Type for the Match Criteria but if required, you can use Role or EAP type as well.
To apply the policy based on a user device, go to Device Type and scroll down to select the device type from the drop down menu on which you want to enforce policy and then click Add.
Here we used Apple-iPad as a device type for Match Criteria.
The device type will appear under the Device List section.
NoteThere are 88 device profiles listed under Device Type, but you can add/list only 16 devices per policy.
Now to apply the appropriate action, choose from the parameters under the Action menu to enforce the Policy. There are five attributes ACL, VLAN ID, QoS Policy, Session Timeout and Sleeping Client Timeout. You can configure these attributes and enforce clients with specified policies. By default the Session timeout is 1800 seconds and Sleeping client timeout is 12 Hrs.
The Sleeping Client refers to the clients already in RUN state after successful web authentication and are allowed to sleep and wakeup without the need to re-authenticate through the login page. The sleep client’s duration for which client needs to be remembered for re-authentication is based on user configuration.
The Sleeping Client timeout configuration set in policy overrides the global sleeping client timeout configuration set on WLAN. These configurations and details are discussed later in this document, refer Appendix-A.
Active Hours menu allows configuration to be defined/set for what time of the day clients are allowed on the network.
NoteFor the purpose of ease and demonstration only device parameters and VLAN attributes are used to do profiling and policy enforcement in our setup.
Now Assign a VLAN ID and click Apply.
As discussed in previous sections, we created a separate interface on the WLC when enforcing policy through VLAN attributes. We have VLAN 20 for management and VLAN 22 for Employees iPads and Apple devices. Any iPad or Apple device connecting to a policy enforced WLAN will be redirected to a different VLAN. In the case of the given example, it is VLAN 22.
Mapping a Policy on WLAN
Go to WLANs from WLC menu and click the WLAN ID on which you want the policy to be implemented. As you can see in the WLAN> General tab, Interface/Interface Group is tied to management interface which is on VLAN 20.
From the WLAN edit menu choose the Policy-Mapping tab.
Set the Priority index to any value from 1-16. Then select the policy which you already created, from the Local Policy drop down menu. To Apply the policy on WLAN click Add. The policy will be mapped to WLAN and can be seen under Policy Name.
Now when an iPad associates to a policy enforced WLAN it is redirected to a VLAN tied to that policy. Scrolling down to Security Information will show you the local policy applied.
Mapping the Policy to an AP Group
Disable the WLAN on which you want to configure the policy.
To apply the policy on an AP group we assume that you already have AP Groups configured on the WLC. If AP Groups has already been configured in your setup, please skip Step1 to 3.
If not, create an AP Group by going to WLC menu.
Step 1 Navigate to WLANs > Advanced> AP Groups and click Add Group.
Then type in the name to define your AP Group Name and click Add button.
Step 2 Now click on the AP Group Name and then from the menu click WLANs and Add New
Step 3 From the drop down menu for WLAN SSID and Interface, select the required SSID and Interface respectively. Once selected click Add button to apply the selected WLAN on the AP Group.
Step 4 Hover your mouse over the blue drop-down arrow for the desired WLAN on which you want to configure the Policy. Then select Policy-Mapping from the drop-down menu.
Step 5 Set the Priority Index to any value from 1-16, and then select the policy which you already created from Local Policy drop down list. To apply the policy on AP Group click Add. The policy will be mapped to AP Group and can be seen under Policy Name.
Click Back to go to the AP Group menu.
Step 6 If the APs are not added to group go ahead and add them by selecting the AP and clicking the Add APs button. Here we added AP2600 to the AP Group.
Once the AP has joined the specific AP group then Enable the WLAN on which the policy is enforced.
Test the policy enforcement by associating an iPad/Client to the WLAN. Once the device is associated and profiled, it gets redirected to the VLAN matching the policy.
NoteIf your device is not being profiled correctly then the policy would not be enforced.
Example of Policy Enforcement on Other Device Types
Policies were created for different device types (Android, Macbook, and Windows) coming into our network to be redirected to particular VLANs once they get profiled and policies are being enforced.
For this, dynamic interfaces such as “android” mapped to VLAN 23, Interface “apple” mapped to VLAN 22 and interface “dynamic” mapped to VLAN 21 was created.
In the following example, we are demonstrating profiling and policy implementation for Android and MAC devices.
For Employee MacBooks we created a policy name Employee-Mac-Device and added the Profiles from the WLC predefined profile list from the Device Type drop down menu.
Once the profile is matched, the policy enforcement is based on VLAN attribute. Here, the device should be redirected to VLAN 22 if it is a MacBook and to VLAN 23 if it is an Android device.
These policies are mapped to the WLAN “Demo-Employee”
In the above example, an Android device and a Macbook is associated to SSID Demo-Employee and both the device is being redirected to the VLAN 23 and VLAN 22 respectively.
Client details for Android Device:
Client details for Apple MacBook:
Role Based Policy
Role is identified as a Cisco AV-pair from the AAA server and a user needs to configure the role as per user on the AAA server as:
Cisco:cisco-av-pair= role= <role-type>
The following example shows the role type “student” configured on ISE.
Example of similar role type configured on ACS:
Now, to apply the role based policy on WLC, navigate to Policy > Edit page and under Match Criteria define the Match Role String that the user created earlier on the AAA server. In the example, the Match Role String is configured as student. Once the policy is created, the user can tie the policy to a specific WLAN (with L2 Security set to 802.1x).
Flex-Connect Support
The following table explains the Policy application support matrix for FlexConnect mode.
Limitations
- When local profiling is enabled, radius profiling is not allowed on a particular WLAN, both configurations are mutually exclusive.
- If AAA override is enabled and you get any AAA attributes from AAA server other than role type, the configured policy action is not applied. The AAA override attributes will have higher precedence.
- Wired clients behind the WGB won’t be profiled and policy action will not be done.
- Only the first Policy rule which matches will be given precedence. Each policy profile will have an associated policy rule which will be used for matching the policies.
- Only sixteen policies per WLAN can be configured and globally sixty four policies will be allowed.
- Policy action will be done after L2 authentication is complete or after L3 authentication or when device sends http traffic and gets the device profiled. Due to which certain scenarios profiling and policy actions will happen more than once per client.
- This release will support only IPv4 clients to be profiled.
- No support for WGB wired clients for profiling as http profiling is not supported on WGB wired clients
Summary
- By default profiling is disabled on all WLANs.
- Each WLAN can have mapped profiling policies configured.
- Each Policy can have matching Role Type, Device Type, EAP type configured and an associated policy index mapped.
- The policy index signifies which policy needs to be matched first.
- The corresponding policy name will be deduced from the policy Index.
- The policy matching will exit at the first policy match and the corresponding policy action attributes will be set per client.
- The order of applying the policies per client will be based on security type.
- If a device is profiled once, the client is stored and the corresponding policy actions is applied.
NoteSeeCisco Wireless Device Profiling and Policy video for more information on setup and configuration.
Debug Commands
debug policy [events|errors] <enable|disables>
Debugs for profiler will be enabled by the existing "debug profiling <enable | disable>" CLI
Commands to Configure Profiling through CLI
config wlan profiling <radius/local> <all/dhcp/http> enable <wlan-id>
Commands to Configure Policy through CLI
config policy <policy-name> create
config policy <policy-name> match device-type add <device name>
config policy <policy-name>action vlan <enable|disable> <vlan #>
config wlan policy add <policy index number> <policy-name> <WLAN Id>
To configure the policy and match it to a corresponding AP group, we need the policy Index also, which signifies which policies need to be matched first. The CLI command will be:
config wlan apgroup policy add <policy index number> <policy-name> <apgroup name> <WLAN Id>
To configure the policy and match it with time of day, the CLI command will be:
config policy <policy-name>active add hours <08:00 – 17:00> days <Mon | Tue | Wed | Thurs | Fri | Daily | Weekdays >
To configure the policy match with EAP type, the CLI command will be:
config policy <policy-name> match eap-type add <peap | leap | eap-fast | eap-tls>
For policy action as ACL, the CLI command will be:
config policy <policy-name> action acl <acl-name> <enable/disable>
For policy action as QoS, the CLI command will be:
config policy<policy-name> action qos <bronze | gold | platinum | silver> <enable|disable>
For policy action as Session-Timeout, the CLI command will be:
config policy <policy-name> action session-timeout <timeout in sec> <enable|disable>
For policy action as Sleeping Client Timeout, the CLI command will be:
config policy <policy-name> action sleeping-client-timeout <enable|disable><timeout in hours>
Appendix-A
Sleeping Client Support
Currently in 7.4 release, guest client devices connected to the WLC on web-auth enabled WLANs have to enter login credentials every time the client goes to sleep and wakes up.
From 7.5 release, clients already in RUN state after successful web authentication are allowed to sleep and wakeup without the need to re-authenticate through the login page. The sleep client duration for which client needs to be remembered for re-authentication is based on the configuration.
Other salient features are as follows:
- Feature is configurable per wlan.
- Supported only for L3 security enabled WLANs. Not applicable to Guest LAN or Remote LAN.
- Sleep client duration is configurable for 1hrs to 30days (720 Hrs) with a default value set to 12 hours. This duration is configurable on WLAN as well as on the policy mapped to the WLAN. The policy mapped configuration takes precedence over WLAN configuration.
- The maximum number of sleeping clients supported is based on the platform.
WLAN Configuration for Sleeping Client
As sleeping client is only supported for L3 security WLANs, navigate to the particular WLAN on which you want to enable the sleeping client feature. Navigate to Security > Layer 3 and select Web Policy from the Layer 3 Security drop-down list.
Select the radio button Authentication and enable Sleeping Client by checking the box as shown in the image below.
Navigate to Advanced tab and make sure that the session timeout is greater than the client idle timeout, otherwise the sleeping client entry would not be created.
Now connect a client to the WLAN on which sleeping client feature is enabled. Then navigate to Monitor > Clients, the status of the client shows that it is in Associated state but Not Authenticated as username/password required for web-auth.
Under Client Properties menu, it is seen that the client is in Web-auth required state.
After entering the appropriate login credentials for web-auth, the client get authenticated and moves to RUN state.
After successful web-auth, the user is successfully authenticated.
Now if the client configured is idle for 300 seconds (default idle timeout value) or disconnects from the WLAN it is connected to, then the client will move to sleeping clients. Click Sleeping Clients option to check if the client entry exists.
Once the client is moved to the Sleeping Clients, the timeout session starts and the remaining time before the client entry is deleted/cleared is displayed.
If the client wakes up or joins back to the same WLAN, it doesn’t require re-authentication.
Sleeping Client CLI commands
To enable the sleeping-client feature on wlan:
(controller) >config wlan custom-web sleep-client enable/disable <wlan-id>
To configure sleeping-client interval on wlan:
(controller) > config wlan custom-web sleep-client timeout <1- 720hours> <wlan-id>
To check sleep client configuration on wlan:
(controller) > show wlan <wlan-id>
To delete any unwanted sleeping-client entries:
(controller) > config custom-web sleep-client delete <mac-addr>
To show summary of all the sleeping-client entries:
(controller) > show custom-web sleep-client summary
To show the details of sleeping-client entry based on mac address:
(controller) > show custom-web sleep-client detail <mac-addr>
Native Profiling and Policy in CUWN Release 8.0
In release 8.0, two major enhancements were introduced related to Native Profiling and Policy classification feature on WLC:
AVC/mDNS Profiles Attached to Local Policies
Prior to release 8.0, all clients associated with a WLAN/SSID pick the same AVC/mDNS profile mapped to the WLAN and allow the services configured for the profile. In release 8.0, a AVC/mDNS profile can be mapped to a local policy for a client with a particular device type. This ensures that each Local policy can be configured with a different AVC/mDNS profile name based on AAA override, to restrict the policy from being able to use the services not allowed by the profile on the same WLAN.
Profiling and Policy Engine on WLC
In this section, you will configure and implement Profiling and Policy on a Cisco WLC running AireOS 8.0 code.
The profiling and policy enforcement are configured as two separate components. The configuration on the WLC is based on defined parameters specific to clients joining the network. The policy attributes which are of interest are:
a. Role—Defines the user type or the user group the user belongs to, for example, student or employee.
b. Device—Device defines the type of device, for example, Windows machine, Smart phone, Apple devices such as iPad, iPhone, and so on.
c. Time of day—Allows configuration to be defined at what time of the day, the end-points are allowed on the network.
d. EAP Type—Checks what EAP method the client is getting connected to.
The above parameters are configurable as policy match attributes. Once WLC has a match corresponding to the above parameters per end-point, policy enforcement comes into picture. Policy enforcement is based on session attributes such as:
- VLAN
- IPv4 ACL
- Session Timeout
- QoS
- Sleeping Client Timeout
- Flexconnect ACL
- AVC Profile (added in release8.0)
- mDNS Profile (added in release 8.0)
- Avg.Data Rate (added in release 8.0)
- Avg. Real Time Data Rate (added in release 8.0)
- Burst Data Rate (added in release 8.0)
You can configure these policies and enforce end-points with specified policies. The wireless clients will be profiled based on the MAC OUI, DHCP, HTTP user agent (valid Internet required for successful HTTP profiling). The WLC uses these attributes and predefined classification profiles to identify devices.
Profiling and Policy Configuration
Step 1 To configure device profiling on a WLAN, go to the specific WLAN (with 802.1x security configured) on which you want to implement Native profiling and policy and click the Advanced tab. In the Allow AAA Override field, uncheck the Enabled check box if it is checked. In the DHCP area, in the DHCP Addr. Assignment field, check the Required check box.
Step 2 In the Local Client Profiling area, check the check boxes corresponding to DHCP Profiling and HTTP Profiling if they are not checked and click Apply.
Now, associate a client to the WLAN on which profiling is enabled.
From the WLC main menu, go to Monitor > Clients. The profiled devices are listed under the Device Type column.
Notice that there are three devices associated to the WLAN, and all of them are being profiled in the following example.
Also, the Local Profiling option under the Monitor page provides the administrator a better understanding of the kind of devices that exists in the network. The local profiling option, which was introduced in CUWN 7.6 release, enables viewing the basic device statuses.
Creating Policies on WLAN from the WLC GUI
Step 3 Once profiling is configured, you can create Local policies and apply them on the WLAN. From the WLC main menu, go to Security > Local Policies.
Step 4 When in the Local Policy List, click New to create a Policy Name. In this example, teacher-LP is used as a policy name, but you can use any name to define your own policy.
Once Policy Name is configured, you can create policies to match a Role, EAP Type, and Device Type. Also, you can define the required actions related to the Match criteria. In this example, we use User Role and Device Type to Match Criteria, but you can use any other type if required.
Note Ensure that the Match Role string is the same as AAA defined role name. In this example, it is configured as teacher.
Step 5 In the Match Role String text box, enter a user role, for example, teacher. From the Match EAP Type drop-down list, choose the EAP type that you want to match the clients to, else, leave as is and click Apply.
Step 6 To apply the policy based on a user device, in the Device List area, from the Device Type drop-down list, choose the device type on which you want to enforce the policy and then click Add. In this example, Apple-iPad is used as a device type for Match Criteria. You can add other devices as well from the Device Type drop-down list.
Note If you do not want to match any device type, then do not configure the Device Type option. There are 156 default device profiles that the users can choose from the Device Type drop-down list, but only 16 can be applied per policy.
Step 7 To apply the appropriate action, choose from the parameters under the Action area to enforce the policy. In the following example, only the AVC Profile attribute is selected, but you can select other attributes as well according to your network requirement and then click Apply.
In this example, two AVC profiles (teacher-AVC and student-AVC) are created. The teacher-AVC profile is configured to just mark some applications, while the student-AVC profile is configured to drop applications such as YouTube, BitTorrent and so on.
If there are no AVC profiles configured on the WLC, go ahead and create them.
See the Application Visibility and Control Feature Deployment Guide for AVC configuration.
Step 8 You can have multiple policies with different role types and different AVC Profiles set on the same WLAN. In this example, we created one more local policy for student role as student-LP.
Note Ensure that the Match Role string is the same with Radius Server defined role name (student).
To apply the policy based on a user device, in the Device List area, from the Device Type drop-down list, choose the device type (Apple-iPad) on which you want to enforce the policy and then click Add.
To apply the appropriate action, choose from the parameters under the Action area to enforce the policy. Select an AVC profile from the AVC Profile drop-down list. In this example, the AVC profile (student-AVC) is already created. Click Apply.
Step 9 Create a default local policy for any other device.
– If no other ACL is applied in the Local policy, then any other device, other than Apple-iPad, will be able to access the applications because the final filter function of all policies is Allow all. In order to block all applications on all devices except Apple-iPad, create a deny all ACL and apply it on the Local Policy and then apply that policy on the WLAN as the last resort. See the configuration examples in the following screenshots.
– On the WLC, create an ACL to deny all IPv4 flow.
– Create a Local Policy Block-all and apply the deny all ACL to it, do not choose any device roles or profiles.
Mapping Policy on WLAN
Step 1 Go to WLANs from the WLC menu and click the WLAN ID on which you want the policy to be implemented. From the WLAN edit menu, click the Policy-Mapping tab.
Set the Priority index to any value from 1-16. From the Local Policy drop-down list, choose the policy which you have already created. To apply the policy on the WLAN, click Add. The policy is mapped to the WLAN and can be seen under Policy Name.
Step 2 Add the appropriate policies to Policy-Mapping under WLAN.
Step 3 In the Advanced tab, in the Allow AAA Override field, uncheck the enabled check box if it is checked.
Step 4 Check if the AAA role is configured properly, and applied on the Radius Server (in this example, it is Cisco ISE). The AAA role name on the ISE must match the role string defined in the local policy. See the ISE settings below.
Once the client associates to SSID with teacher credentials through Apple iPad, it should be able to access the Internet and different applications per its AVC profile (teacher-AVC) configuration. If the user tries to connect from any device other than Apple iPad, then it will not be able to access the Internet.
To verify if the policy (teacher-LP) is applied, from the WLC GUI, go to Monitor > Clients, and then click the Client MAC address. In the Security Information area, you should see the policy in the Local Policy Applied text box.
To verify if the policy is applied, from WLC CLI prompt, run the following command—
show client detail <mac_address> and then scroll down to the end to see the applied profile.To verify if the policy is applied from the WLC:
AVC Profile Name:............................................... teacher-AVC
Similarly, try to connect to the same WLAN/SSID using student credentials with the user role student, you should see another policy applied (student-AVC).
To verify if the policy (student-LP) is applied, from WLC GUI, go to Monitor > Clients and then click the Client MAC address. In the Security Information area, you should see the policy in the Local Policy Applied text box.
To verify if the policy is applied, from WLC CLI prompt, run the following command—
show client detail <mac_address> and then scroll down to the end to see the applied profile.Dynamic MAC OUI and Device Profile Update
In CUWN release 8.0, the WLC administrator can update the MAC OUIs and device profiles on the WLC. The IEEE file containing the OUIs must be downloaded and saved as a .txt file from the following location: http://standards.ieee.org/develop/regauth/oui/oui.txt . Download the .txt file to the WLC, using tftp/ftp.
Apart from the OUI update, the WLC also has a mechanism to update the device profiles. Device profiles refers to the different types of devices that the WLC can profile. In release 8.0, the WLC supports profiling 156 types of devices, by default. When a new device profile is updated by the ISE team, the WLC must integrate the new profile to be on par with the ISE. This feature is implemented to take care of both the OUI updates as well as the device profile updates.
Downloading MAC-OUI Through the WLC GUI
Step 1 From WLC main menu, go to Commands > Download File.
Step 2 From the File Type drop-down list, choose OUI Update.
Step 3 From the Transfer Mode drop-down list, choose TFTP or FTP.
Step 4 Provide the appropriate information under Server Details and click Download.
Note The WLC is not required to reboot after the download. This is a cosmetic error which will be corrected in the next update. The bug ID is CSCup84476.
Downloading MAC-OUI Through the WLC CLI
The following CLI command downloads the IEEE oui.txt file to the WLC:
<WLC> transfer download datatype oui-update
Updating Device Profile Through the GUI
Step 1 From the WLC main menu, go to Commands > Download File.
Step 2 From the File Type drop-down list, choose Device Profile.
Step 3 From the Transfer Mode drop-down list, choose TFTP or FTP.
Step 4 Provide the appropriate information under Server Details and then click Download.
Note The Profile update file is an XML file containing the device profiles. A new GUI option is added to enable you to download the device profiles file to the WLC.
Note The WLC is not required to reboot after the download. This is a cosmetic error which will be corrected in the next update. The bug ID is CSCup84476.
Updating Device Profile Through the CLI
The following CLI command is used to enable downloading device profiles to the WLC:
<WLC> transfer download datatype device-profile
Note Both the OUI file and device profiles file are independent of each other, and even if one of them needs to be updated, the other will still work.
For example, if the customers want to update only the OUIs, they must download only the OUI file to the WLC. The existing device profiles will remain as it is, and only the OUIs will get updated.
The new CLI command— show profiling oui-string summary , can be executed to check the updated MAC OUIs, if any.
The existing CLI command— show profiling policy summary , can be executed to check the updated profiles, if any.
Limitations
- Wired clients behind the WGB will not be profiled and policy action will not be done.
- Only 16 policies per WLAN can be configured, and globally 64 policies will be allowed.
- Only 16 device profiles (device types) can be added per policy.
- Policy action will be done after L2 authentication or L3 authentication is complete or when the device sends HTTP traffic and gets the device profiled. Thus, certain scenarios such as profiling and policy actions will happen more than once per client.
- This release will support only IPv4 clients to be profiled.
- No support for WGB wired clients for profiling because HTTP profiling is not supported on WGB wired clients.
Summary
- By default, profiling is disabled on all WLANs.
- Each WLAN can have mapped profiling policies configured.
- Each Policy can have matching Role Type, Device Type, and EAP type configured and an associated policy index mapped.
- The policy index signifies which policy needs to be matched first.
- The corresponding policy name will be deduced from the policy Index.
- The policy matching will exit at the first policy match and the corresponding policy action attributes will be set per client.
- The order of applying the policies per client will be based on the security type.