- Preface
- Chapter 1: Overview
- Chapter 2: Getting Started
- Chapter 3: Configuring Security Solutions
- Chapter 4: Performing System Tasks
- Chapter 5: Adding and Using Maps
- Chapter 6: Monitoring Wireless Devices
- Chapter 7: Managing WCS User Accounts
- Chapter 8: Configuring Mobility Groups
- Chapter 9: Configuring Access Points
- Chapter 10: Configuring Controllers and Switches
- Chapter 11: Managing Clients
- Chapter 12: Using Templates
- Chapter 13: Mobility Services
- Chapter 14: Performing Maintenance Operations
- Chapter 15: Configuring Hybrid REAP
- Chapter 16: Alarms and Events
- Chapter 17: Running Reports
- Chapter 18: Administrative Tasks
- Chapter 19: Tools Menu
- Chapter 20: Virtual Domains
- Chapter 21: Google Earth Maps
- Appendix A: Troubleshooting and Best Practices
- Appendix B: WCS and End User Licenses
- Appendix C: Conversion of a WLSE Autonomous Deployment to a WCS Controller Deployment
- Index
Getting Started
This chapter describes how to prepare Cisco WCS for operation. It contains these sections:
•Logging into the WCS User Interface
•Using the Cisco WCS User Interface
Prerequisites
Before installing the Cisco WCS, ensure that you have completed the following:
•Meet the necessary hardware and software requirements as listed in the "System Requirements" section for Cisco WCS.
•Update your system with the necessary critical updates and service packs.
Note See the latest release notes for information on the service packs and patches required for correct operation of Cisco WCS.
•To receive the expected results, you should run no more than 3 concurrent WCS setups for standard server use (4 GB memory and 3 GHz CPU speed) and no more than 5 concurrent WCS setups for high-end server use (8 GB memory and 3 GHz CPU speed).
•Verify that the following ports are open during installation and startup:
–HTTP: configurable during install (80 by default)
–HTTPS: configurable during install (443 by default)
–1315
–1299
–6789
–8009
–8456
–8005
–69
–21
–162
–8457
Note Make sure your firewall rules are not restrictive. You can check the current rules on Linux with the built-in iptables -L command or on Windows with the Control Panel > Windows Firewall option.
System Requirements
Cisco WCS can be run on a workstation/server class system and access points can be distributed unevenly across controllers. The following requirements must be met for the different components.
High-End Server
•Supports up to 3000 Cisco Aironet lightweight access points, 1250 standalone access points, and 750 Cisco wireless LAN controllers.
•3.16 GHz Intel Xeon Quad processor X5406 or better.
•8-GB RAM.
•200 GB minimum free disk space is needed on your hard drive.
Note If you choose a CPU configuration that is different from what is provided above as a guidance, you may use a website like the following to perform the benchmark tests and assess whether the alternate CPU meets the WCS minimum requirements:
http://www.cpubenchmark.net
Note If you use multiple CPU configurations, the benchmarking sites (like the above website) also allow you to make comparisons based on the number of cores that are being selected per CPU.
Note The free disk space listed is a minimum requirement but may be different for your system, depending on the number of backups.
Unified Computing System
The following Cisco Unified Computing System(UCS) C-Series servers provide guidance to plan your system requirements for either UCS or equivalent hardware platform. Any server can be used if it meets the minimum requirements.
Cisco UCS C-Series M1 Server
The following are the recommended specifications for the Cisco UCS C-Series M1 Server, but you can choose higher processing capabilities:
•One Intel Xeon 5500 series processor X5570 (4-core 2.93-GHz).
Note If your processor speed is less than the one mentioned above, we recommend you to use two processors.
•8-GB RAM.
•200-GB minimum free disk space on your hard drive.
Cisco UCS C-Series M2 Server
The following are the recommended specifications for the Cisco UCS C-Series M2 Server, but you can choose higher processing capabilities:
•One Intel Xeon 5600 series processor X5680 (6-core 3.33-GHz) or one Intel Xeon 5600 series processor X5670 (6-core 2.93-GHz).
•8-GB RAM.
•200-GB minimum free disk space on your hard drive.
Standard Server
•Up to 2000 Cisco Aironet lightweight access points, 1000 standalone access points, and 450 wireless LAN controllers.
•3.2-GHz Intel Dual Core processor or better.
•2.13-GHz Intel Quad Core X3210 processor.
•4 GB of RAM.
•80-GB minimum free disk space on your hard drive.
Note If you choose a CPU configuration that is different from what is provided above as a guidance, you may use a website like the following to perform the benchmark tests and assess whether the alternate CPU meets the WCS minimum requirements:
http://www.cpubenchmark.net
Unified Computing System
The following Cisco Unified Computing System(UCS) C-Series servers provide guidance to plan your system requirements for either UCS or equivalent hardware platform. Any server can be used if it meets the minimum requirements.
Cisco UCS C-Series M1 Server
The following are the recommended specifications for the Cisco UCS C-Series M1 Server, but you can choose higher processing capabilities:
•One Intel Xeon 5500 series processor X5570 (4-core 2.93-GHz) or one Intel Xeon 5500 series processor X5550 (4-core 2.66-GHz) or one Intel Xeon 5500 series processor E5540 (4-core 2.53-GHz).
•4 GB of RAM.
•80-GB minimum free disk space on your hard drive.
Cisco UCS C-Series M2 Server
The following are the recommended specifications for the Cisco UCS C-Series M2 Server, but you can choose higher processing capabilities:
•One Intel Xeon 5600 series processor X5650 (6-core 2.66-GHz) or one Intel Xeon 5600 series processor X5670 (6-core 2.93-GHz).
•4 GB of RAM.
•80-GB minimum free disk space on your hard drive.
Low-End Server
•Up to 500 Cisco Aironet lightweight access points, 200 standalone access points, and 125 Cisco wireless LAN controllers.
•3.06-GHz Intel processor or better.
•1.86-GHz Intel Dual core processor.
•2 GB of RAM.
•50-GB minimum free disk space on your hard drive.
Note If you choose a CPU configuration that is different from what is provided above as a guidance, you may use a website like the following to perform the benchmark tests and assess whether the alternate CPU meets the WCS minimum requirements:
http://www.cpubenchmark.net
Unified Computing System
The following Cisco Unified Computing System(UCS) C-Series servers provide guidance to plan your system requirements for either UCS or equivalent hardware platform. Any server can be used if it meets the minimum requirements.
Cisco UCS C-Series M1 Server
The following are the recommended specifications for the Cisco UCS C-Series M1 Server, but you can choose higher processing capabilities:
•One Intel Xeon 5500 series processor X5550 (4-core 2.66-GHz).
•2 GB of RAM.
•50-GB minimum free disk space on your hard drive.
Cisco UCS C-Series M2 Server
The following are the recommended specifications for the Cisco UCS C-Series M2 Server, but you can choose higher processing capabilities:
•One Intel Xeon 5600 series processor X5650 (6-core 2.66-GHz).
•2 GB of RAM.
•50-GB minimum free disk space on your hard drive.
Supported Operating Systems
The following operating systems are supported:
•Windows 2003/SP2 and Windows 2003 R2/SP2 32-bit installations with all critical and security Windows updates installed.
Windows 2003/SP2 64-bit installations are not supported.
Windows 2003 32-bit installations provide support for up to 64 GB of RAM provided Physical Address Extension (PAE) is enabled. See Windows documentation for instructions on enabling this mode.
•Red Hat Linux Enterprise Server 5.X 32-bit operating system installations.
Red Hat Linux Enterprise Server 5.X 64-bit operating system installations are not supported.
•Microsoft Windows Server 2003 and Red Hat Linux version support on VMware ESX version 3.0.1 and above with either local storage or SAN over fiber channel.
Note Individual operating systems running WCS in VMware must follow the specifications for the size of WCS you intend to use.
Client Requirements
The Cisco WCS user interface requires Internet Explorer 7.0 or later with the 9.0.X or later Flash plugin, or Mozilla Firefox 3 or 3.5. Cisco recommends Mozilla Firefox 3.5 for best performance.
Browsing on Windows 2003 Cisco WCS servers is not recommended because recommended Windows 2003 security settings cause browsing problems.
The client running the browser must have a minimum of 1 GB of RAM and a 2-GHz processor. The client device should not be running any CPU or memory-intensive applications.
Note The screen resolution should be set to 1024 x 768 pixels for both WCS and Navigator.
Supported WLC Releases
Cisco WCS 7.0 can manage the following releases of the WLC as found on various controllers (such as 2106, 4400 series, WiSM, and so on):
•4.2
•5.2
•6.0
•7.0
Note See the release notes (http://www.cisco.com/en/US/products/ps6305/prod_release_notes_list.html) for the exact version numbers.
WCS on WLSE
•Up to 1500 Cisco Aironet lightweight access points and 100/375 Cisco wireless LAN controllers.
•3-GHz Intel Pentium4 processor with 3 GB of RAM.
•38 GB of free space on your hard drive.
WCS Navigator
•Up to 20 WCSs
•Up to 30,000 access points
Installing WCS for Windows
Before installing Cisco WCS, refer to the "Prerequisites" section and the "System Requirements" section. You must have administrator privileges on Windows. If you receive a message that a previous version of WCS was detected, you must continue with one of two upgrade options. See the "Upgrading WCS" section.
If installing WCS for Linux, see the "Installing WCS for Linux" section.
Before You Begin
•You cannot install the WCS software if the username used to log into the server contains special characters such as exclamation marks (!). To ensure successful installation, log into the server using a username with no special characters before installing the software.
•Cisco WCS does not support the underscore character (_) in the name of the Windows server running the WCS software. If the server name contains an underscore, you can install the WCS software, but WCS fails to start.
•You must install WCS on a dedicated Windows server with no other services running (including those running as primary or secondary domain controllers) to avoid conflict with WCS.
•No hard-coded limits exist regarding the number of users or the type of user activities, but a heavy memory and CPU load on the server may affect functionality.
To install Cisco WCS, follow these steps:
Step 1 Insert the Windows Cisco WCS CD into the CD-ROM drive and double-click the WCS-STANDARD-K9-7.0.XX.Y.exe file where 7.0.XX.Y is the software build. If you received the installer from Cisco.com, double-click the WCS-STANDARD-K9.7-0.XX.Y.exe file that you downloaded to your local drive.
Step 2 The Install Anywhere page appears and prepares the system for installation. After a few seconds, the Introduction window appears, followed by the license agreement window (see Figure 2-1). You must select the "I accept the terms of the License Agreement" radio button to continue.
Figure 2-1 License Agreement Page
Step 3 If the install wizard detects a previous version of WCS, you see a window similar to Figure 2-2 or Figure 2-3. If a previous version is detected, you must proceed as an upgrade and refer to the "Upgrading WCS" section. For a first-time installation, continue to Step 4.
Figure 2-2 Ineligible for Automated Upgrade
Figure 2-3 Previous Installation Detected
Step 4 The Check Ports window appears (see Figure 2-4). In the Check Ports window, change the default HTTP and HTTPS ports if necessary. The default ports for HTTP and HTTPS are 80 and 443, respectively. HTTP Enabled is selected by default.
Figure 2-4 Check Ports Window
Step 5 Enter a Health Monitor Port. Click Next. The Select High Availability Mode window appears (see Figure 2-5).
Figure 2-5 Select HA Mode Window
Step 6 Determine if this is a secondary, high availability WCS installation to support your primary WCS controller. The secondary WCS installation question refers to high availability only. You cannot install two different versions of WCS on the same server. If you are not enabling high availability, choose No (the default) and continue with Step 7. If this is a secondary installation for high availability purposes, choose Yes and follow Steps a through c.
a. Enter an authentication key for the primary WCS device and click Next.
b. Choose a folder in which to install the secondary WCS in the Choose Install Folder window. Click Next to continue.
c. Choose a shortcut location for the secondary WCS.
Step 7 Enter and then re-enter the root password. The rules for a strong password are as follows:
•The minimum password length is 8 characters.
•No character can be used more than three times consecutively in the password.
•The password must contain three of the four following character classes: uppercase, lowercase, numbers, and special characters.
Step 8 Enter the root FTP password.
Step 9 In the FTP Server File page, choose a folder in which to store the FTP server files and click Next to open the TFTP File Server window.
Note Store the FTP server files in a folder outside the main installation folder. This ensures that the FTP server files are not deleted if WCS is uninstalled.
Step 10 In the TFTP Server File window, choose a folder in which to store the TFTP server files and click Next.
Note If you want to use a network-mounted drive for the TFTP root, you must configure WCS to run as a domain user (see the"Installing WCS for Windows" section) and then configure the TFTP root (see the "Configuring TFTP as a Network Drive" section).
Note Store the TFTP server files in a folder outside the main installation folder. This ensures that the TFTP server files are not deleted if WCS is uninstalled.
Step 11 If you are installing Cisco WCS on a multi-homed server (a server having multiple interfaces), the installer automatically detects the presence of multiple interfaces. The Select Local Interfaces window appears (see Figure 2-6). Choose the interfaces to be used by the server for communicating with controllers, MSEs and remote FTP servers, and clients. Click Next.
Figure 2-6 Select Local Interfaces Window
Step 12 Choose a folder in which to install the Cisco WCS at the Choose Install Folder window (see Figure 2-7). Click Next to continue.
Figure 2-7 Choose Install Folder
Step 13 Follow the prompts that appear in the window to complete the installation. After the installation is complete, the Install Complete window appears. Click Done to complete the installation.
Note Look at the installation log to verify that nothing went wrong during the installation. The install log resides in the installation root directory if the installation completes. If the installation did not complete, the install log resides in the directory from which the installer was run or the install root directory.
Configuring WCS to Run as a Domain User
To configure WCS to run as a domain user, follow these steps:
Step 1 Stop WCS.
Step 2 Add the domain user that will be used to run the service to the Administrators group of the local machine.
a. Choose Administrative Tools > Computer Management> Users and Groups > Groups.
b. Double-click the Administrators group.
c. Add the domain user.
Step 3 Install WCS as instructed in the "Installing WCS for Windows" section.
WCS consists of two services: Cisco Wireless Control System (A.B.C.D) and Nms_Apache_A_B_C_D, where A.B.C.D represents the current release number.
Step 4 Set the WCS service to run as the domain user:
a. Choose Administrative Tools > Services.
b. Right-click Cisco Wireless Control System (A.B.C.D) and choose Properties.
c. Click the Log On tab.
d. Click This Account.
e. Enter the domain user with "domain" before the name (such as DOMAIN\username), and the domain user password.
f. Click OK.
Step 5 Set the Apache service to run as the domain user:
a. Choose Administrative Tools > Services.
b. Right click Nms_Apache_A_B_C_D and choose Properties.
c. Click the Log On tab.
d. Click This Account.
e. Enter the domain user with "domain" before the name (such as DOMAIN\username), and the domain user password.
f. Click OK.
Step 6 Start WCS.
Installing WCS for Linux
You must have root privileges on Linux to install WCS.
Step 1 If not already done, log in as root. If you are using the GUI, open a terminal window.
Step 2 Using the command line, perform one of the following:
a. If you are installing from a CD, switch to the /media/cdrom directory. Skip to Step 4.
b. If you are installing from Cisco.com, switch to the directory that the install file was downloaded to. For example, if the install file was placed in /root/Desktop, enter cd /root/Desktop. Continue to Step 3.
Step 3 If you downloaded the file from Cisco.com, you need to make it executable using the following command:
chmod +x WCS-STANDARD-K9-7.0.XX.Y.bin where xx.y represents the current release number.
Step 4 Enter ./WCS-STANDARD-K9-7.0.XX.Y.bin to start the install script.
The install script prepares the install environment and displays the license agreement. You are asked to accept the terms of the license agreement.
Step 5 If the install wizard detects a previous version of WCS, you see a message that states whether the detected version is eligible for an automated upgrade or not. If a previous version is detected, you must proceed as an upgrade and refer to the "Upgrading WCS" section. For a first-time installation, continue to Step 6.
Step 6 Determine if this is a secondary, high availability WCS installation to support your primary WCS controller. Choose 1 for No (the default) or 2 for Yes. You cannot install two different versions of WCS on the same server. If you are not enabling high availability, choose 1 (No). If you are installing a secondary WCS for high availability mode and choose 2 (Yes), you will be prompted for an authentication key and a location for installing the secondary WCS.
Step 7 The Check HTTP Port prompt appears. In the Check HTTP Port window, change the default HTTP and HTTPS ports if necessary. The default ports for HTTP and HTTPS are 80 and 443, respectively.
Step 8 Specify whether you want to enable HTTP redirect. If HTTP redirect is enabled, any requests received on the HTTP port are redirected to the HTTPS port. If it is not enabled, the HTTP port is disabled.
Step 9 Determine whether you want the default Health Monitor port of 8082 or you need to change the port.
Step 10 Enter and then re-enter the root password. The rules for a strong password are as follows:
•The minimum password length is 8 characters.
•The password cannot contain the username or the reverse of the username.
•The password cannot be Cisco or ocsic (Cisco reversed).
•The root password cannot be public.
•No character can be used more than three times consecutively in the password.
•The password must contain three of the four character classes: uppercase, lowercase, numbers, and special characters.
Step 11 Enter the root FTP password.
Note WCS has a built-in ftp server. The functionality of this ftp server is used to perform routine management tasks, such as backing-up of data, or to send upgrade media to a local directory. You must not use this ftp server for tasks outside the scope of WCS and you must not install any other instances of an ftp server on your WCS server to avoid any port utilization conflicts.
Step 12 Choose a folder in which to store the FTP server files.
Note If the folder does not already exist, you must enter mkdir and create it.
Step 13 Choose a folder in which to store the TFTP server files.
Note Store the TFTP server files in a folder outside the main installation folder. This ensures that the TFTP server files are not deleted if Cisco WCS is uninstalled.
Step 14 If you are installing Cisco WCS on a multi-homed server (a server having multiple interfaces), the installer automatically detects the presence of multiple interfaces. Choose the interfaces to be used by the server for communicating with controllers, MSEs and remote FTP servers, and clients.
Step 15 Choose a folder in which to install the Cisco WCS.
Step 16 Choose to create links from the default location (/opt/WCS5.2.98.0), from your home folder, or another location.
Step 17 Follow the prompts that appear to complete the installation. After the installation is complete, the Install Complete statement appears.
Note Look at the installation log to verify that nothing went wrong during the installation. The install log is located in the installation root directory if the installation completes. If the installation did not complete, the install log resides in the directory from which the installer was run or the install root directory.
Configuring TFTP as a Network Drive
To configure TFTP as a network drive, you must have completed the steps in the "Installing WCS for Linux" section. The desired drive must also be accessible from that domain.
Step 1 Make a backup of installDir/webnms/classes/com/cisco/packaging/PackagingResources.properties.
Step 2 Edit the following line:
TftpRoot=\\\\servername\\resourcename
where your particular servername and resourcename are entered.
Choose Administration > ServerSettings.
At the TFTP Root setting, enter the desired network resource using the appropriate UNC format (such as \\servername\\resourcename) where your particular servername and resourcename are entered with only one set of backslashes.
Step 3 Restart WCS.
Starting WCS
This section provides instructions for starting WCS on either a Windows or Linux server.
In Windows and Linux, Cisco WCS is installed as a service. The service runs continuously and resumes after a reboot.
Note You can check the status of WCS at any time. To do so, follow the instructions in the "Verifying the Status of WCS" section.
This section includes the following topics:
Starting WCS on Windows
Follow these steps to start WCS when it is installed on Windows.
Note When WCS is installed as a Windows service, WCS runs automatically upon system bootup.
Step 1 Log into the system as administrator.
Step 2 Perform one of the following:
•From the shortcut location (defaulted to Windows Start menu > Programs > Wireless Control System A.B.C.D) > StartWCS.
•From the command prompt, navigate to the WCS installation bin directory (the default is C:\Program Files\WCSA.B.C.D\bin) and enter StartWCS.
The WCS Admin window appears and displays messages indicating that WCS is starting.
Note If WCS is installed as a service, messages also appear to indicate that the Nms_Server service is starting.
Step 3 Close the WCSAdmin window when the Close button becomes active.
Step 4 WCS is ready to host WCS user interfaces (clients). Go to the "Logging into the WCS User Interface" section to use a web browser to connect to the WCS user interface.
Starting WCS on Linux
Follow these steps to start WCS when it is installed on Linux.
Note To see the version of WCS you currently have installed, enter nmsadmin.sh version.
Note When WCS is installed as a Linux service, WCS runs automatically upon system bootup.
Step 1 Log into the system as root.
Step 2 Using the Linux command-line interface (CLI), perform one of the following:
•Navigate to the shortcut location (defaulted to /opt/WCSA.B.C.D directory) and enter ./StartWCS.
•Navigate to the installation bin directory (the default is opt/WCSA.B.C.D/bin) and enter ./Start WCS.
The CLI displays messages indicating that WCS is starting.
Step 3 WCS is ready to host WCS user interfaces (clients). Go to the "Logging into the WCS User Interface" section to use a web browser to connect to the WCS user interface.
Logging into the WCS User Interface
Follow these steps to log into the WCS user interface through a web browser.
Step 1 Launch Internet Explorer 7.0 or later or Mozilla Firefox 3.5 or later on a different computer than the one on which you installed and started WCS.
Note Some WCS features may not function properly if a browser and WCS are running on the same Windows workstation.
Step 2 In the browser's address line, enter https://wcs-ip-address, where wcs-ip-address is the IP address of the computer on which you installed and started WCS.
Step 3 When the WCS user interface displays the Login page, enter the root password you created during installation.
Note If any licensing problems occur, a message appears in an alert box. If you have an evaluation license, the number of days until the license expires is shown. You are also alerted to any expired licenses. You have the option to go directly to the licensing page to address these problems.
Step 4 Click Submit to log into WCS. The WCS user interface is now active and available for use. The WCS home page appears. You can predefine what appears on the home page by choosing the monitoring components that are critical for your network. For example, you may want different monitoring components for a mesh network so that you can create a customized tab for a mesh dashboard.
Note If the database or Apache web server does not start, check the launchout.txt file in Linux or the wrapper.log file in Windows. You will see a generic "failed to start database" or "failed to start the Apache web server" message.
Note When the WCS database is restarted after a crash or any other severe condition, the full roll-forward recovery process is initiated automatically. You must either wait for the WCS database to finish the recovery process or delete the transaction logs to terminate the recovery process, and then restart the database.
This page enables you to choose the information that you want to see. You can organize the information in user-defined tabs. The default view comes with default tabs and pre-selected components for each, and you can arrange them as you like.
Note When an upgrade occurs, the user-defined tabs arranged by the previous user in the previous version are maintained. Therefore, the latest components may not show. Look at the Edit Components link to find what new components are added.
This page provides a summary of the Cisco Unified Wireless Network Solution, including coverage areas, the most recently detected rogue access points, access point operational data, reported coverage holes, and client distribution over time. Figure 2-8 shows a typical WCS home page.
You should see four tabs on the WCS home page: General, Client, Security, and Mesh.
Note When you use WCS for the first time, the network summary pages show that the Controllers, Coverage Areas, Most Recent Rogue APs, Top 5 APs, and Most Recent Coverage Holes databases are empty. It also shows that no client devices are connected to the system. After you configure the WCS database with one or more controllers, the WCS home page provides updated information.
Figure 2-8 WCS Home
To exit the WCS user interface, close the browser page or click Logout in the upper right corner of the page. Exiting a WCS user interface session does not shut down WCS on the server.
When a system administrator stops the WCS server during your WCS session, your session ends, and the web browser displays this message: "The page cannot be displayed." Your session does not reassociate to WCS when the server restarts. You must restart the WCS session.
General Tab
The following are factory default components for the General tab.
Client Tab
When you click the Client tab from the WCS home page, you see the following factory default components (see Table 2-2).
Additionally, refer to "Troubleshooting from the Client Tab Dashboard" section which describes the Client Troubleshooting portion of the Client tab.
Security Tab
When you click the Security tab from the WCS home page, you see the following factory default components:
Mesh Tab
If you click the Mesh tab from the WCS home page, you see the following factory default components:
CleanAir Tab
Note To enable CleanAir on WCS, you need to have WCS Plus License installed.
The following factory default components appear on the CleanAir tab:
•802.11a/n Avg Air Quality—Provides a line chart representing the average air quality for the entire network over a set period of time. Displays the average air quality on the 802.11 a/n band. Data includes time and the average air quality.
•802.11b/g/n Avg Air Quality—Provides a line chart representing the average air quality for the entire network over a set period of time. Displays the average air quality on the 802.11 b/g/n band. Data includes time and the average air quality.
•802.11a/n Min Air Quality—Provides a line chart representing the minimum air quality for the entire network over a set period of time. Displays the minimum air quality on the 802.11 a/n band. Data includes time and the minimum air quality.
•802.11b/g/n Min Air Quality—Provides a line chart representing the minimum air quality for the entire network over a set period of time. Displays the minimum air quality on the 802.11 b/g/n band. Data includes time and minimum air quality.
•Worst 802.11a/n Interferers—Provides a list of active interferers with the worst severity level for the 802.11 a/n band. The graph displays the the top ten worst interferers that are currently active. Data includes InterfererID, Type, Status, Severity, Affected Channels, Duty Cycle(%), Discovered, Last Updated, and Floor.
•Worst 802.11b/g/n Interferers—Provides a list of active interferers with the worst severity level for 802.11 b/g/n band. The graph displays the top ten worst interferers that are currently active. Data includes InterfererID, Type, Status, Severity, Affected Channels, Duty Cycle(%), Discovered, Last Updated, and Floor.
•802.11a/n Interferer Count—Provides a line chart representing the total number of interferers on all channels over the selected period of time. Displays the number of devices interfering in the 802.11 a/n band. Data includes time and interferer count.
Note The air quality is calculated for all controllers in your network that have CleanAir-enabled access points. The report includes aggregated air quality data across your network.
•802.11b/g/n Interferer Count—Provides a line chart representing the total number of interferers on all channels over the selected period of time. Displays the number of devices interfering in the 802.11 b/g/n band. Data includes time and interferer count.
Note The information in the worst interferer and interferer count charts is collected from Mobility Services Engines (MSE). If MSEs are not available, this chart will not show any results.
•Recent Security-risk Interferers—Provides a list of active interferers with the worst severity level for each band. Displays the recent security risk interferers on your wireless network. Data includes Type, Severity, Affected Channels, Last Detected, Detected AP.
Note This chart includes information for the interferers for which security alarms are enabled.
You can also view the data presented on this tab in different formats.
Customizing Home Page Tabs
You can customize the predefined set of components depending on your network management needs. This page enables you to choose the displayed information. You can organize the information in user-defined tabs. The default view comes with default tabs and pre-selected components for each. When you click the Edit Tabs link in the WCS home page, the Edit Tabs page appears in which customization can begin (see Figure 2-9).
Note When an upgrade occurs, the arrangement of components in a previous version is maintained. Because of this, components or features added in a new release are not displayed. Click the Edit Contents link to discover new components. See the "Customizing Home Page Tabs" section for more information.
Creating a New Tab
Follow these steps to create a new tab.
Step 1 Click Edit Tabs from the WCS home page. The Edit Tabs page appears (see Figure 2-9).
Figure 2-9 WCS Home > Edit Tabs
Step 2 Enter the name of the new tab you are creating and click Add. The tab name you add appears in the Tab Order page.
Note Add is the only function that does not require a Save after its operation. If you click Delete, Rename, Move Up, or Move Down, you must click Save for the changes to be applied.
Step 3 Click the tab names in the Tab Order page and assign placement by clicking Move Up or Move Down.
Note If you want to return to the restored factory defaults as shown in Figure 2-8, click Reset to Factory Default.
Customizing Home Page Content
Follow these steps to customize WCS home page components. You can add or delete components by selecting from the predefined list.
Also part of the customizable home page are time-based or non-time-based interactive graphs which you can display in graphical or chart form (by clicking the appropriate icon). (Interactive graphs also appear in Monitor > Clients.) These graphs refresh automatically within a predetermined time based on the default polling cycles of dependent tasks, or you can click the Refresh Component icon to get the most current status. When a graph is time based, an additional link bar at the top of the graph page displays the options as follows:
•6h—the last six hours of data from the current time and current database table
•1d—the last day of data from the current time and current database table
•1w—the last week of data from the current time and the hourly aggregated table
•2w—the last two weeks of data from the current time and hourly aggregated table
•4w—the last four weeks of data from the current time and hourly aggregated table
•3m—the last three months of data from the current time and daily aggregated table
•6m—the last six months of data from the current time and the weekly aggregated table
•1y—the last year of data from the current time and weekly aggregated table
•custom—the user can set both the days and hours for the start and end date. The appropriate aggregated source (either current, hourly, or daily) is chosen based on the starting date.
After you specify the timeframe, the data for that timeframe is retrieved and the corresponding graph is displayed. The link for which the graph is drawn is shown in a different color (orange) than the other links. The interactive graphs that are available within WCS include line graphs, area graphs, pie graphs, and stacked bar graphs.
You can click Enlarge Chart icon to enlarge the graph in a separate page.
Editing Content
Follow these steps to customize WCS home page components:
Step 1 On the WCS home page, click Edit Contents. The Edit Content page appears (see Figure 2-10).
Figure 2-10 Edit Content Page
Step 2 In the Available Components drop-down list, highlight the desired component and choose to add it to the left column or add it to the right column. The component moves to the appropriate column.
Step 3 Click the component in the Left Side or Right Side Column page and move it up, down, or to the right or left.
Note To remove a component, choose it from the Left or Right Column list and click Remove.
Step 4 Click Save.
Additional Edit Content Page Components
The WCS > Edit Content page lists the following available components:
•AP Join Taken Time—Displays the access point name and the amount of time (in days, minutes, and seconds) that it took for the access point to join.
•AP Threats/Attacks—Displays various types of access point threats and attacks and indicates how many of each type have occurred.
•AP Uptime—Displays each access point name and amount of time it has been associated.
•Ad hoc Rogues—Displays ad hoc rogues for the previous hour, previous 24 hours, and total active.
•Attacks Detected
•Cisco Wired IPS Events—Displays wired IPS events for the previous hour, previous 24 hours, and total active.
•Client Alarm Summary—Displays the five most recent client alarms with client association failures, client authentication failures, client WEP key decryption errors, client WPA MIC errors, and client exclusions.
•Client Authentication Type—Displays the number of clients for each authentication type.
•Client Count—Displays the trend of associated and authenticated client counts in a given period of time.
•Client Distribution—Displays how clients are distributed by protocol, EAP type, and authentication type.
•Client EAP Type Distribution
•Client Protocol Distribution—Displays the current client count distribution by protocols.
•Client Security Events—Displays client security events within the previous 24 hours including excluded client events, WEP decrypt errors, WPA MIC errors, shunned clients, and IPSEC failures.
•Client Traffic—Displays the trend of client traffic in a given time period.
•Client Troubleshooting—Allows you to enter a MAC address of a client and retrieve information for diagnosing the client in the network.
•Clients Detected by Context Aware Service—Displays the client count detected by the context aware service within the previous 15 minutes.
•Controller CPU Utilization (%)— Displays the average, maximum, and minimum CPU usage.
•Controller Memory Utilization—Displays the average, maximum, and minimum memory usage as a percentage for the controllers.
•Coverage Areas
•Friendly Rogue APs—Displays friendly rogue access points for the previous hour, previous 24 hours, and total active.
•Guest Users Count
•Inventory Detail Status
•Inventory Status—Displays the total number of client controllers and the number of unreachable controllers.
•LWAPP Uptime—Displays the access point name and the amount of its uptime in days, minutes, and seconds.
•Latest 5 Logged in Guest Users
•MFP Attacks
•Malicious Rogue APs
•Mesh AP by Hop Count
•Mesh AP Queue Based on QoS
•Mesh Parent Changing AP—Displays the access point name, the parent name, and the number of changes made per minute.
•Mesh Top Over Subscribed AP
•Mesh Worst Node Hop Count
•Mesh Worst Packet Error Rate
•Mesh Worst SNR Link
•Most Recent AP Alarms—Displays the five most recent access point alarms. Click the number in parentheses to open the Alarms page which shows all alarms.
•Most Recent Client Alarms
•Most Recent Mesh Alarms
•Most Recent Security Alarms—Displays the five most recent security alarms. Click the number in parentheses to open the Alarms page.
•Recent 5 Guest User Accounts
•Recent Alarms—Displays the five most recent alarms by default. Click the number in parentheses to open the Alarms page.
•Recent Coverage Holes
•Recent Malicious Rogue AP Alarms
•Recent Rogue Alarms—Displays the five most recent rogue alarms. Click the number in parentheses to open the Alarms page which shows alarms.
•Security Index
•Top APs by Client Count
•Unclassified Rogue APs—Displays unclassified rogue access points for the previous hour, previous 24 hours, and total active.
Guest Components for WCS Home Page
The following guest user components are also available for the WCS home page General tab using the Edit Contents feature:
Using the Cisco WCS User Interface
A typical Cisco WCS user interface page consists of these elements:
Icons
The icons on the WCS home page and within the General, Client, Security, and Mesh tabs have the following functions.
Menu Bar
There are seven menus on each page: Monitor, Reports, Configure, Services, Administration, Tools, and Help. When you move the mouse over any of the heading, a drop-down list appears.
Monitor Menu
The Monitor menu provides you with a top-level description of the devices on your network. You can monitor your network, maps, Google Earth maps, various devices (controllers, access points, clients, tags, chokepoints, Wi-Fi TDOA receivers), RRM, alarms, and events.
Configure Menu
The Configure menu enables you to configure templates, controllers, access points, Ethernet switches, chokepoints, Wi-Fi TDOA receivers, config groups, auto provisioning, scheduled configuration tasks, profiles, ACS view servers, and TFTP servers on your network.
Administration Menu
The Administration menu enables you to schedule tasks like making a backup, checking a device status, auditing your network, synchronizing the MSE, and so on. It also contains Logging to enable various logging modules and specify restart requirements. For user administration such as changing passwords, establishing groups, setting application security settings, and so on, choose AAA. From the Administration Menu, you can also access the licensing information, set user preferences, and establish high availability (a secondary backup device running WCS).
Tools Menu
The Tools Menu covers voice audit, location accuracy, config audit, and migration analysis.
Help Menu
Clicking Help > Online Help enables you to view online help. The online help is context sensitive and will open to documentation for the WCS window that you currently have open.
Clicking Help > Learning Modules allows you to access short video clips of certain WCS features.
Clicking Help > Submit Feedback allows you to access a page where you can enter feedback on the WCS product.
Clicking Help > About WCS allows you to verify the version of WCS that you are running. It provides the version, host name, feature, AP limit, and type.
Sidebar Area
The sidebar area enables you to choose a new configuration page under the currently selected menu area. You may choose to display or configure any of the available data. The selector area options vary based on which menu you have chosen.
Some pages contain a group of menus in this area. Click the menu item to reveal a submenu and then click the item to choose it.
Command Buttons
The Cisco WCS user interface uses a number of command buttons throughout its pages. The most common of these are as follows:
•Apply to Controllers: Applies the selected information to the controllers
•Delete: Deletes the selected information
•Cancel: Cancels new information entered on the current page and returns to the previous page
•Save: Saves the current settings
•Audit: Discovers the present status of this access point
•Place AP: Audits the configuration of the selected entity by flagging the differences between WCS database device configurations
Alarm Summary
When WCS receives an alarm message from a controller, it displays an alarm indicator at the top of the WCS window (see Figure 2-11).
Note The Administration > Settings > Alarms page has a Hide Acknowledged Alarms check box. You must unselect it if you want acknowledged alarms to appear in the WCS Alarm Summary and alarms lists page. By default, acknowledged alarms are not shown.
Critical (red), Major (orange) and Minor (yellow) alarms appear in the alarm dashboard, left to right.
Figure 2-11 WCS Alarm Summary
Alarms indicate the current fault or state of an element that needs attention, and they are usually generated by one or more events. The alarm can be cleared but the event remains.
Note Alarm counts are refreshed every 15 seconds.
Main Data Page
The main data page is determined by the required parameter information. Active areas on the data pages include the following:
•Text boxes into which data may be entered using the keyboard
•Pull-downs from which one of several options may be chosen
•Check boxes in lists allow you to choose one or more items from the displayed list
•Radio buttons allow you to turn a parameter on or off
•Hyperlinks take you to other pages in the Cisco WCS user interface
Input text boxes are black text on a white background. When data is entered or selected, it is not sent to the controller, but it is saved in the text box until you click Go.
Administrative Tools
This area provides shortcuts to administration functions (such as logged in as, logout, refresh, and help) that you use regularly when configuring a controller through the web user interface.
Using the Search Feature
The enhanced WCS Search feature (see Figure 2-12) provides easy access to advanced search options and saved searches. You can access the search options from any page within WCS making it easy to search for a device or SSID (Service Set IDentifier).
Figure 2-12 WCS Search Feature
Quick Search
For a quick search, you can enter a partial or complete IP address, MAC address, name, or SSID for clients, alarms, access points, controllers, maps, tags, or rogue clients (see Figure 2-12).
Note You can also enter a username if you are searching for a client.
To quickly search for a device, follow these steps:
Step 1 Enter the complete or partial IP address, device name, SSID, or MAC address of the device in the quick Search text box (see Figure 2-13).
Figure 2-13 Quick Search with Partial IP Address
Step 2 Click Search to display all devices that match the Quick Search parameter.
The search results display the matching item type, the number of items that match your search parameter, and links to the list of matching results (see Figure 2-14). Click View List to view the matching devices from the Monitor or Configuration pages.
Figure 2-14 Quick Search Results Advanced Search
Advanced Search
To perform a more specific search for a device in WCS, follow these steps:
Step 1 Click Advanced Search located in the top right corner of WCS (see Figure 2-12).
Step 2 In the New Search page, select a category from the Search Category drop-down list (see Figure 2-15).
Figure 2-15 Search Category Drop-Down List
Note Click each of the following category for more information.
Search categories include:
•Maps
•Tags
Step 3 Select all applicable filters or parameters for your search (see Figure 2-16).
Note Search parameters change depending on the selected category. The following pre-defined search filters have been added in release 6.0: Associated Clients, Authenticated Clients, Excluded Clients, Probing Clients, All Clients, New Clients detected in last 24 hours, unauthenticated clients, 2.4 GHz clients, and 5 GHz clients.
Figure 2-16 New Search Parameters
Step 4 Choose the number of items to display on the results page.
Step 5 To save this search, select the Save Search check box and enter a name for the search in the text box.
Step 6 When all filters and parameters are set, click Go.
Alarms
You can configure the following parameters when performing an advanced search for alarms (see Table 2-6):
Note You can decide what information displays on the alarm search results page. See the "Configuring the Search Results Display" section for more information.
See the "Monitoring Alarms" section for more information on alarms.
Access Points
You can configure the following parameters when performing an advanced search for access points (see Table 2-7):
Note You can decide what information displays on the access points search results page. See the "Configuring the Search Results Display" section for more information.
Controllers
You can configure the following parameters when performing an advanced search for controllers (see Table 2-8):
Note You can decide what information displays on the controllers search results page. See the "Configuring the Search Results Display" section for more information.
Clients
You can configure the following parameters when performing an advanced search for clients (see Table 2-9):
Table 2-9 Search Clients Parameters
Note You can decide what information displays on the client search results page. See the "Configuring the Search Results Display" section for more information.
Chokepoints
You can configure the following parameters when performing an advanced search for chokepoints (see Table 2-10):
Table 2-10 Search Chokepoint Parameters
Events
You can configure the following parameters when performing an advanced search for events (see Table 2-11):
Table 2-11 Search Events Parameters
See the "Monitoring Rogue Alarm Events" section for more information on events.
SE-Detected Interferers
You can configure the following parameters when performing an advanced search for interferers detected by access points (see Table 2-12):
Table 2-12 Search SE-Detected Interferers Parameters
You can decide what information displays on the SE-detected interferers search results page. See the "Configuring the Search Results Display" section for more information.
AP-Detected Interferers
You can configure the following parameters when performing an advanced search for interferers detected by access points (see Table 2-13):
Table 2-13 Search AP-Detected Interferers Parameters
Note You can decide what information displays on the AP-detected interferers search results page. See the "Configuring the Search Results Display" section for more information.
Wi-Fi TDOA Receivers
You can configure the following parameters when performing an advanced search for Wi-Fi TDOA receivers (see Table 2-14):
Table 2-14 Search Wi-Fi TDOA Receivers Parameters
Maps
You can configure the following parameters when performing an advanced search for maps (see Table 2-15):
Table 2-15 Search Map Parameters
|
|
---|---|
Search for |
Choose All Maps, Campuses, Buildings, Floor Areas, or Outdoor Areas. |
Map Name |
Search by Map Name. Enter map name in the text box. |
Note You can decide what information displays on the maps search results page. See the "Configuring the Search Results Display" section for more information.
See the "Monitoring Maps Overview" section for more information on maps.
Rogue Clients
You can configure the following parameters when performing an advanced search for rogue clients (see Table 2-16):
Table 2-16 Search Rogue Client Parameters
See the "Monitoring Rogue Access Points, Ad hoc Events, and Clients" section for more information on rogue clients.
Shunned Clients
Note When a Cisco IPS sensor on the wired network detects a suspicious or threatening client, it alerts the controller to shun this client.
You can configure the following parameters when performing an advanced search for shunned clients (see Table 2-17):
Table 2-17 Search Shunned Client Parameters
Tags
You can configure the following parameters when performing an advanced search for tags (see Table 2-18):
Table 2-18 Search Tags Parameters
Controller Licenses
You can configure the following parameters when performing an advanced search for controller licenses (see Table 2-19):
Table 2-19 Search Controller Licenses Parameters
See the "Accessing the License Center" section for more information on licenses and the License Center.
Saved Searches
The Saved Search feature enables you to access and run any previously saved search (see Figure 2-17).
Note When saving a search, you must assign a unique name to the search.
Note Saved searches apply only to the current partition.
Figure 2-17 Saved Search Page
To access and run a saved search, follow these steps:
Step 1 Click Saved Search.
Step 2 Select a category from the Search Category drop-down list.
Step 3 Select a saved search from the Saved Search List drop-down list.
Step 4 If necessary, change the current parameters for the saved search.
Step 5 Click Go.
Configuring the Search Results Display
The Edit View page (see Figure 2-18) enables you to choose which columns appear in the Search Results page.
Figure 2-18 Edit View Page
Column names appear in one of the following lists:
•Hide Information—Lists columns that do not appear in the table. The Hide button points to this list.
•View Information—Lists columns that do appear in the table. The Show button points to this list.
To display a column in a table, click it in the Hide Information list, then click Show. To remove a column from a table, click it in the View Information list, then click Hide. You can select more than one column by holding down the shift or control key.
To change the position of a column in the View Information list, click it, then click Up or Down. The higher a column is in the list, the farther left it appears in the table.
Command Buttons
The following command buttons appear in the Edit View page:
•Reset—Sets the table to the default display.
•Show—Moves the highlighted columns from the Hide Information list to the View Information list.
•Hide—Moves the highlighted columns from the View Information list to the Hide Information list.
•Up—Moves the highlighted columns upward in the list (further to the left in the table).
•Down—Moves the highlighted columns downward in the list (further to the right in the table).
•Submit—Saves the changes to the table columns and returns to the previous page.
•Cancel—Undoes the changes to the table columns and returns to the previous page.