- Preface
- Chapter 1: Overview
- Chapter 2: Getting Started
- Chapter 3: Configuring Security Solutions
- Chapter 4: Performing System Tasks
- Chapter 5: Adding and Using Maps
- Chapter 6: Monitoring Wireless Devices
- Chapter 7: Managing WCS User Accounts
- Chapter 8: Configuring Mobility Groups
- Chapter 9: Configuring Access Points
- Chapter 10: Configuring Controllers and Switches
- Chapter 11: Managing Clients
- Chapter 12: Using Templates
- Chapter 13: Mobility Services
- Chapter 14: Performing Maintenance Operations
- Chapter 15: Configuring Hybrid REAP
- Chapter 16: Alarms and Events
- Chapter 17: Running Reports
- Chapter 18: Administrative Tasks
- Chapter 19: Tools Menu
- Chapter 20: Virtual Domains
- Chapter 21: Google Earth Maps
- Appendix A: Troubleshooting and Best Practices
- Appendix B: WCS and End User Licenses
- Appendix C: Conversion of a WLSE Autonomous Deployment to a WCS Controller Deployment
- Index
Tools Menu
Using Voice Audit
WCS provides an auditing mechanism to check the controller configuration and to ensure that any deviations from the deployment guidelines are highlighted as Audit Violation.
To access the Voice Audit feature, select Tools > Voice Audit.
The WCS Voice Audit has three tabs: Controllers, Rules, Reports.
Controller Tab
The Controllers tab allows you to choose the controller(s) on which to run the voice audit.
Note
To select the controller(s) for the voice audit, follow these steps:
Step 1 Choose Tools > Voice Audit.
Step 2 Click the Controllers tab.
Step 3 From the Run audit on drop-down list, select from All Controllers, a Floor Area, or a Single Controller.
•All Controllers—No additional Controller information necessary.
•A Floor Area—From the drop-down lists, select the applicable Campus, Building, Floor, and Controller.
•A Single Controller—Select the applicable controller from the drop-down list.
Step 4 Click the Rules tab to determine the rules for this voice audit. See Rules Tab for more information.
Rules Tab
The Rules tab allows you to indicate the applicable VoWLAN SSID and the applicable rules for this voice audit.
To indicate the rules for the voice audit, follow these steps:
Step 1 In the Tools > Voice Audit page, select the Rules tab.
Step 2 Type the applicable VoWLAN SSID in the VoWLAN SSID text box.
Step 3 From the Rules List, select the check boxes of the applicable rules for this voice audit (see Table 19-1).
Note The red circle indicates an invalid rule (due to insufficient data). The green circle indicates a valid rule.
Note Use the Reset button to reset the rules to the default configuration.
Step 4 When the rules are configured for this voice audit, click Save to save the current configuration or Save and Run to save the configuration and run the report.
Step 5 Click the Report tab to view the Report results. See Reports Tab for more information.
Reports Tab
The Voice Audit Report provides a summary of the voice audit details and report results.
Voice Audit Details
The Voice Audit details provides the following information:
•Audit Status—Indicates whether or not the audit is complete.
•Start Time and End Times—Indicates the time at which the voice audit began and ended.
•# Total Devices—Indicates the number of devices involved in the voice audit.
•# Completed Devices—Indicates the number of devices the tool attempted to audit.
Note If a controller is unreachable, the audit skips it. The Voice Audit will not complete any rule checks for that controllers.
•# Rules—Indicates the number of rules selected for the voice audit.
Voice Audit Report Results
The Voice Audit Report results include the following information:
•IP Address—Indicates the IP Address for the controller involved in the voice audit.
•Rule—Indicates the rule that was applied for this controller.
•Result—Indicates the result (Skipped, Violation, Unreachable) of the applied rule.
Note If there is no mismatch between the current configuration and a rule value, no results are displayed for that rule.
•Details—Defines an explanation for the rule results.
Note If the applied rule results in a Violation, the Details link provides additional information including Name, the Device Value, and the Rule Value. Hold your mouse cursor over the link to view the additional details.
•Time—Provides a timestamp for the voice audit.
Verifying Location Accuracy
By verifying for location accuracy, you are ensuring that the existing access point deployment can estimate the true location of an element within 10 meters at least 90% of the time.
You can analyze the location accuracy of non-rogue and rogue clients, asset tags, and interferers by using the Accuracy Tool.
The Accuracy Tool enables you to run either a scheduled or on-demand location accuracy test. Both tests are configured and executed through a single page.
Using the Location Accuracy Tool to Test Location Accuracy
There are two ways to test location accuracy:
•Scheduled Accuracy Testing-Employed when clients, tags and interferers are already deployed and associated to the wireless LAN infrastructure. Scheduled tests can be configured and saved when clients, tags and interferers are already pre-positioned so that the test can be run on a regularly scheduled basis.
•On-Demand Accuracy Testing-Employed when elements are associated but not pre-positioned. On demand testing allows you to test the location accuracy of clients, tags and interferers at a number of different locations. It is generally used to test the location accuracy for a small number of clients, tags and interferers.
Both are configured and executed through a single page.
Note You must enable the Advanced Debug option in Cisco WCS to use the Scheduled and On-demand location accuracy testing features. The Location Accuracy Tool does not appear as an option under the Tools menu when the Advanced Debug option is not enabled.
To enable the advanced debug option in Cisco WCS, follow these steps:
Step 1 In Cisco WCS, choose Monitor > Maps.
Step 2 Select Properties from the Select a command drop-down list, and click Go.
Step 3 In the page that appears, select Enabled for the Advanced Debug Mode option. Click OK.
Note If Advanced Debug is already enabled, you do not need to do anything further. Click Cancel.
You can now run location accuracy tests on the mobility services engine using the Location Accuracy Tool.
Proceed to either the "Using Scheduled Accuracy Testing to Verify Accuracy of Current Location" or "Using On-Demand Location Accuracy Testing" section.
Using Scheduled Accuracy Testing to Verify Accuracy of Current Location
To configure a scheduled accuracy test, follow these steps:
Step 1 Choose Tools > Location Accuracy Tool.
Step 2 Choose New Scheduled Accuracy Test from the Select a command drop-down list.
Step 3 Enter a test name.
Step 4 Select an area type from the drop-down list.
Step 5 Campus is configured as Root Area by default. There is no need to change this setting.
Step 6 Choose the building from the drop-down list.
Step 7 Choose the floor from the drop-down list.
Step 8 Choose the begin and end time of the test by entering the days, hours, and minutes. Hours are represented using a 24-hour clock.
Note When entering the test start time, be sure to allow enough time prior to the test start to position testpoints on the map.
Step 9 Choose the destination point for the test results. You can have the report emailed to you or you can download the test results from the Accuracy Tests > Results page. Reports are in PDF format.
Note If you select the email option, a SMTP Mail Server must first be defined for the target email address. Choose Administrator > Settings > Mail Server Configuration to enter the appropriate information.
Step 10 Click Position Testpoints. The floor map appears with a list of all clients, tags, and interferers on that floor with their MAC addresses.
Step 11 Click the check box next to each client, tag and interferer for which you want to check the location accuracy.
When you select the MAC address check box for a client or tag or interferer, two overlapping icons appear on the map for that element.
One icon represents the actual location and the other the reported location.
Note To enter a MAC address for a client or tag or interferer that is not listed, select the Add New MAC check box and enter the MAC address, and click Go. An icon for the element appears on the map. If the newly added element is on the mobility services engine but on a different floor, the icon appears in the left corner (0,0 position).
Step 12 If the actual location for an element is not the same as the reported location, drag the actual location icon for that element to the correct position on the map.
Note Only the actual location icon can be dragged.
Step 13 Click Save when all elements are positioned. A page appears confirming successful accuracy testing.
Step 14 Click OK to close the confirmation page. You are returned to the Accuracy Tests summary page.
Note The accuracy test status appears as Scheduled when the test is about to execute. A status of Running appears when the test is in progress and Idle when the test is complete. A Failure status appears when the test is not successful.
Step 15 To view the results of the location accuracy test, click Test name and then click Download on the page that appears.
The Scheduled Location Accuracy Report includes the following information:
•A summary location accuracy report that details the percentage of elements that fell within various error ranges
•An error distance histogram
•A cumulative error distribution graph
•An error distance over time graph
•A summary by each MAC address whose location accuracy was tested noting its actual location, error distance and a map showing its spatial accuracy (actual vs. calculated location) and error distance over time for each MAC.
Using On-Demand Location Accuracy Testing
An on-demand accuracy test is run when elements are associated but not pre-positioned. On-demand testing allows you to test the location accuracy of clients, tags, and interferers at a number of different locations. You generally use it to test the location accuracy for a small number of clients, tags, and interferers.
To run an on-demand accuracy test, follow these steps:
Step 1 Choose Tools > Location Accuracy Tool.
Step 2 Choose New On demand Accuracy Test from the Select a command drop-down list.
Step 3 Enter a test name.
Step 4 Select the area type from the drop-down list.
Step 5 Campus is configured as root area by default. There is no need to change this setting.
Step 6 Choose the building from the drop-down list.
Step 7 Choose the floor from the drop-down list.
Step 8 View test results in the Accuracy Tests > Results page. Reports are in PDF format.
Step 9 Click Position Testpoints. The floor map appears with a red cross hair at the (0,0) coordinate.
Step 10 To test the location accuracy and RSSI of a location, select either client or tag or interferer from the drop-down list on the left. A list of all MAC addresses for the selected option (client or tag or interferer) appear in a drop-down list to its right.
Step 11 Select a MAC address from the drop-down list, move the red cross hair to a map location, and click the mouse to place it.
Step 12 From the Zoom percentage drop-down list, choose the zoom percentage for the map.
The X and Y text boxes are populated with the coordinates based on the position of the red cross hair in the map.
Step 13 Click Start to begin collecting accuracy data.
Step 14 Click Stop to finish collecting data. You should allow the test to run for at least two minutes before clicking Stop.
Step 15 Repeat Step 10 to Step 14 for each testpoint that you want to plot on the map.
Step 16 Click Analyze when you are finished mapping the testpoints.
Step 17 Click the Results tab on the page that appears.
The on-demand accuracy report includes the following information:
•A summary location accuracy report that details the percentage of elements that fell within various error ranges
•An error distance histogram
•A cumulative error distribution graph
Step 18 To download accuracy test logs from the Accuracy Tests summary page:
a. Select the listed test check box and select either Download Logs or Download Logs for Last Run from the Select a command menu.
b. Click Go.
The Download Logs option downloads the logs for all accuracy tests for the selected test(s).
The Download Logs for Last Run option downloads logs for only the most recent test run for the selected test(s).
Viewing Configuration Audit Summary
Choose Tools > Config Audit to launch the Configuration Audit Summary page (see Figure 19-1).
Figure 19-1 Tools > Config Audit Summary Page
This page provides a summary of the following:
•Total Enforced Config Groups—Identifies the count of config group templates which are configured for Background Audit and enforcement enabled.
Click the link to launch the Config Group page to view config groups with Enforce Configuration enabled.
•Total Mismatched Controllers—Identifies the number of mismatched controllers. Mismatched controllers indicate that there were configuration differences found between the WCS and the controller during the last audit.
Click the link to launch the controller list sorted on the mismatched audit status column. Click an item in the Audit Status column to view the audit report for this controller.
•Total Config Audit Alarms—Identifies the number of alarms generated when audit discrepancies are enforced on config groups.
Click the link to view all config audit alarm details.
Note If enforcement fails, a critical alarm is generated on the config group. If enforcement succeeds, a minor alarm is generated on the config group. The alarms have links to the audit report where you can view list of discrepancies for each controller.
•Most recent 5 audit alarms—Lists the most recent configuration audit alarms including the object name, event type, and date and time for the audit alarm.
Click <View All> to view the applicable Alarm page which includes all configuration audit alarms.
Configuring Migration Analysis
Follow these steps to view the Migration Analysis Summary.
Note You can also access the migration analysis summary by choosing Configure > Migration Templates and selecting View Migration Analysis Summary from the Select a command drop-down list.
Step 1 Choose Tools > Migration Analysis.
The autonomous access points are eligible for migration only if all the criteria has a pass status. A red X designates ineligibility, and a green checkmark designates eligibility. These columns represent the following:
•Privilege 15 Criteria—The Telnet credential provided as part of the autonomous access point discovery must be privilege 15.
•Software Version—Conversion is supported only from 12.3(7)JA releases excluding 12.3(11)JA, 12.3(11)JA1, 12.3(11)JA2, and 12.3(11)JA3.
•Role Criteria—A wired connection between the access point and controller is required to send the association request; therefore, the following autonomous access point roles are required:
–root
–root access point
–root fallback repeater
–root fallback shutdown
–root access point only
•Radio Criteria—In dual-radio access points, the conversion can happen even if only one radio is of the supported type.
Upgrading Autonomous Access Points
You can choose to upgrade the autonomous access points manually or automatically. In the Migration Analysis page, you can select the access point with the software version listed as failed and choose Upgrade Firmware from the Select a command drop-down list. This process upgrades the autonomous firmware image of the Cisco IOS access point to a supported version.
WCS uses a Telnet-based connection to upgrade the access point firmware. If you choose the automatic option, the internal TFTP server is used with the default images present in WCS. The default images as per device type are as follows:
•ap801-k9w7-tar.124-10b.JA3.tar
•c1100-k9w7-tar.123-7.JA5.tar
•c1130-k9w7-tar.123-7.JA5.tar
•c1200-k9w7-tar.123-7.JA5.tar
•c1240-k9w7-tar.12307.JA5.tar
•c1250-k9w7-tar.124-10b.JA3.tar
•c1310-k9w7-tar.123-7.JA5.tar
If you choose the manual option, you are presented with an additional screen where TFTP server IP, file path, and file path name must be entered. The final page is the report page.
Viewing a Firmware Upgrade Report
Choose View Firmware Upgrade Report from the Select a command drop-down list to view a current report of the upgrade status for the selected access point.
The following information displays:
•AP Address—IP address of the access point.
•Status—Current status of the firmware upgrade.
•TimeStamp—Indicates the date and time of the upgrade.
•AP Logs
Click OK to return to the Migration Analysis Summary page.
See "Upgrading Autonomous Access Points" section for more information.
Changing Station Role to Root Mode
Because a wired connection between the access point and controller is required to send the association request, the autonomous access point must be assigned the appropriate role. If the role shows as ineligible, you can choose Change Station Role to Root Mode from the Select a command drop-down list.
Viewing a Role Change Report
Because a wired connection between the access point and controller is required to send the association request, the autonomous access point must be assigned the appropriate role.
To view a report of these role changes, choose View Role Change Report from the Select a command drop-down list. The following information displays:
•AP Address—IP address of the access point.
•Status—Current status of the role change.
•TimeStamp—Indicates the date and time of the upgrade.
•AP Logs
Click OK to return to the Migration Analysis Summary page.
Running Migration Analysis
You can choose Run Migration Analysis from the Select a command drop-down list of the Migration Analysis Summary page. The resulting migration analysis summary shows the current status of different criteria. Initially, migration analysis is run automatically when the access point is discovered.
Viewing a Migration Analysis Report
You can choose View Migration Analysis Report from the Select a command drop-down list of the Migration Analysis Summary page to generate a report. The report includes the following:
•Access point address
•Status
•Timestamp
•Access point logs