<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">Cisco Wireless</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/cisco/cisco-wireless.feed</id>
	<updated>2026-04-11T12:42:17+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/cisco/cisco-wireless.feed?type=atom"/>
	<entry>
		<title>Complete Guide: How to Download &amp; Deploy The Cisco 9800-CL Virtual Wireless Controller on VMware ESXi</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html"/>
		<published>2024-08-02T15:52:03+10:00</published>
		<updated>2024-08-02T15:52:03+10:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/cisco/wireless/wlc-9800cl-download-deploy/cisco-wlc-9800-cl-deployment-intro.webp&quot; alt=&quot;Cisco WLC 9800-CL Download and Deployment Models&quot; width=&quot;500&quot; height=&quot;300&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-9800cl-download-deploy/01-cisco-9800-cl-wlc-esxi-introduction.webp&quot; alt=&quot;Introduction to Cisco 9800-CL Cloud-based wireless controller&quot; width=&quot;250&quot; height=&quot;144&quot; style=&quot;margin: 7px; border: #000000; float: left;&quot; title=&quot;Introduction to Cisco 9800-CL Cloud-based wireless controller&quot; data-alt=&quot;Downloaded Cisco WLC 9800 OVA File&quot; /&gt;This article covers the &lt;strong&gt;deployment&lt;/strong&gt; of the &lt;strong&gt;Cisco WLC 9800-CL cloud-based controller&lt;/strong&gt; on the &lt;strong&gt;VMware ESXi platform&lt;/strong&gt;. We explain the CPU, RAM and storage requirements, provide URLs to easily &lt;strong&gt;download&lt;/strong&gt; and &lt;strong&gt;install&lt;/strong&gt; the &lt;strong&gt;WLC controller&lt;/strong&gt; using the &lt;strong&gt;OVA template&lt;/strong&gt;, select the appropriate WLC 9800 deployment size (small, medium, large) and help you &lt;strong&gt;understand&lt;/strong&gt; and &lt;strong&gt;configure&lt;/strong&gt; the different &lt;strong&gt;WLC VM network interfaces&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#introduction&quot; title=&quot;Introduction to the Cisco 9800 WLC Virtual Controller&quot;&gt;Introduction to the Cisco 9800 WLC Virtual Controller&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#requirements&quot; title=&quot;Cisco 9800 WLC Virtual Controller VMware ESXi Requirements&quot;&gt;Cisco 9800 WLC Virtual Controller VMware ESXi Requirements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#deployment-models&quot; title=&quot;Cisco 9800 WLC Virtual Controller Deployment Models&quot;&gt;Cisco 9800 WLC Virtual Controller Deployment Models&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#software-download&quot; title=&quot;How to Download the Cisco 9800-CL Software&quot;&gt;How to Download the Cisco 9800-CL Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#esxi-installation&quot; title=&quot;Installing the Cisco 9800 WLC Virtual Controller in VMware ESXi&quot;&gt;Installing the Cisco 9800 WLC Virtual Controller in VMware ESXi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#vm-network&quot; title=&quot;Critical VMware Network Information on the Cisco 9800-CL – vNICs, vSwitch etc.&quot;&gt;Critical VMware Network Information on the Cisco 9800-CL – vNICs, vSwitch etc.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#vmware-port-group-trunking&quot; title=&quot;Configure a VMware Port Group to Allow Trunking or Single VLAN&quot;&gt;Configure a VMware Port Group to Allow Trunking or Single VLAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;introduction&quot;&gt;Introduction to the Cisco 9800 WLC Virtual Controller&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Cisco released their next-generation 9800 series Wireless Controllers back in 2018, also offering a cloud-based version that supports &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup.html&quot; target=&quot;_blank&quot; title=&quot;VMware ESXi&quot;&gt;VMware ESXi&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/operating-systems/microsoft/windows-servers.html&quot; target=&quot;_blank&quot; title=&quot;Microsoft Hyper-V&quot;&gt;Microsoft Hyper-V&lt;/a&gt;, Amazon AWS, Microsoft Azure, Google Cloud Platform (GCP), &lt;a href=&quot;https://www.firewall.cx/operating-systems/linux-unix.html&quot; target=&quot;_blank&quot; title=&quot;Ubuntu/Red Hat Enterprise Linux using KVM&quot;&gt;Ubuntu/Red Hat Enterprise Linux using KVM&lt;/a&gt;, and Cisco NFVIS environments.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The virtualized version of the WLC controller offers great flexibility for organizations while at the same time provides considerable savings thanks to its zero-price tag. Customers are able to freely download and deploy the appliance, with the only restriction being the AP licenses that need to be purchased as an ongoing subscription.&lt;/p&gt;
&lt;p&gt;Virtualization offers additional benefits which include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hardware independence&lt;/strong&gt;. Not hardware involved. Lead times for the hardware-based controllers can sometimes exceed 6-9 months depending on the market demand and other circumstances.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Decreased cost&lt;/strong&gt;. The VM option means organizations are saving 6-figure amounts for every 9800-40 or greater model they require. If you’re considering introducing &lt;strong&gt;High-Availability&lt;/strong&gt; (&lt;strong&gt;HA&lt;/strong&gt;), then the Cloud-based controller becomes a much cheaper architecture. Additional savings are added since Smartnet contracts for the hardware are not required.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Better utilization of virtualization infrastructure&lt;/strong&gt;. Utilizing the existing virtualization platform increases its ROI.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Greater Deployment Flexibility&lt;/strong&gt;. VMs allow you to easily move them from one physical server to another, even between different datacenters or physical locations.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Increased Redundancy &amp;amp; Backups&lt;/strong&gt;. Backing up a VM is an easy and simple process. You can even use specialized &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html&quot; target=&quot;_blank&quot; title=&quot;free VM Backup tools&quot;&gt;free VM Backup tools&lt;/a&gt; for this process.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;requirements&quot;&gt;Cisco 9800 WLC Virtual Controller VMware ESXi Requirements&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Deploying the &lt;strong&gt;WLC 9800-CL&lt;/strong&gt; in an &lt;strong&gt;ESXi environment&lt;/strong&gt; is, as you’ll discover, a simple process. Cisco provides a single &lt;strong&gt;OVA&lt;/strong&gt; file package, roughly around &lt;strong&gt;1.25GB&lt;/strong&gt; in size:&lt;/p&gt;
</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/cisco/wireless/wlc-9800cl-download-deploy/cisco-wlc-9800-cl-deployment-intro.webp&quot; alt=&quot;Cisco WLC 9800-CL Download and Deployment Models&quot; width=&quot;500&quot; height=&quot;300&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-9800cl-download-deploy/01-cisco-9800-cl-wlc-esxi-introduction.webp&quot; alt=&quot;Introduction to Cisco 9800-CL Cloud-based wireless controller&quot; width=&quot;250&quot; height=&quot;144&quot; style=&quot;margin: 7px; border: #000000; float: left;&quot; title=&quot;Introduction to Cisco 9800-CL Cloud-based wireless controller&quot; data-alt=&quot;Downloaded Cisco WLC 9800 OVA File&quot; /&gt;This article covers the &lt;strong&gt;deployment&lt;/strong&gt; of the &lt;strong&gt;Cisco WLC 9800-CL cloud-based controller&lt;/strong&gt; on the &lt;strong&gt;VMware ESXi platform&lt;/strong&gt;. We explain the CPU, RAM and storage requirements, provide URLs to easily &lt;strong&gt;download&lt;/strong&gt; and &lt;strong&gt;install&lt;/strong&gt; the &lt;strong&gt;WLC controller&lt;/strong&gt; using the &lt;strong&gt;OVA template&lt;/strong&gt;, select the appropriate WLC 9800 deployment size (small, medium, large) and help you &lt;strong&gt;understand&lt;/strong&gt; and &lt;strong&gt;configure&lt;/strong&gt; the different &lt;strong&gt;WLC VM network interfaces&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#introduction&quot; title=&quot;Introduction to the Cisco 9800 WLC Virtual Controller&quot;&gt;Introduction to the Cisco 9800 WLC Virtual Controller&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#requirements&quot; title=&quot;Cisco 9800 WLC Virtual Controller VMware ESXi Requirements&quot;&gt;Cisco 9800 WLC Virtual Controller VMware ESXi Requirements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#deployment-models&quot; title=&quot;Cisco 9800 WLC Virtual Controller Deployment Models&quot;&gt;Cisco 9800 WLC Virtual Controller Deployment Models&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#software-download&quot; title=&quot;How to Download the Cisco 9800-CL Software&quot;&gt;How to Download the Cisco 9800-CL Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#esxi-installation&quot; title=&quot;Installing the Cisco 9800 WLC Virtual Controller in VMware ESXi&quot;&gt;Installing the Cisco 9800 WLC Virtual Controller in VMware ESXi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#vm-network&quot; title=&quot;Critical VMware Network Information on the Cisco 9800-CL – vNICs, vSwitch etc.&quot;&gt;Critical VMware Network Information on the Cisco 9800-CL – vNICs, vSwitch etc.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#vmware-port-group-trunking&quot; title=&quot;Configure a VMware Port Group to Allow Trunking or Single VLAN&quot;&gt;Configure a VMware Port Group to Allow Trunking or Single VLAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-9800cl-cloud-wlc-download-deployment.html#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;introduction&quot;&gt;Introduction to the Cisco 9800 WLC Virtual Controller&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Cisco released their next-generation 9800 series Wireless Controllers back in 2018, also offering a cloud-based version that supports &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup.html&quot; target=&quot;_blank&quot; title=&quot;VMware ESXi&quot;&gt;VMware ESXi&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/operating-systems/microsoft/windows-servers.html&quot; target=&quot;_blank&quot; title=&quot;Microsoft Hyper-V&quot;&gt;Microsoft Hyper-V&lt;/a&gt;, Amazon AWS, Microsoft Azure, Google Cloud Platform (GCP), &lt;a href=&quot;https://www.firewall.cx/operating-systems/linux-unix.html&quot; target=&quot;_blank&quot; title=&quot;Ubuntu/Red Hat Enterprise Linux using KVM&quot;&gt;Ubuntu/Red Hat Enterprise Linux using KVM&lt;/a&gt;, and Cisco NFVIS environments.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The virtualized version of the WLC controller offers great flexibility for organizations while at the same time provides considerable savings thanks to its zero-price tag. Customers are able to freely download and deploy the appliance, with the only restriction being the AP licenses that need to be purchased as an ongoing subscription.&lt;/p&gt;
&lt;p&gt;Virtualization offers additional benefits which include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hardware independence&lt;/strong&gt;. Not hardware involved. Lead times for the hardware-based controllers can sometimes exceed 6-9 months depending on the market demand and other circumstances.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Decreased cost&lt;/strong&gt;. The VM option means organizations are saving 6-figure amounts for every 9800-40 or greater model they require. If you’re considering introducing &lt;strong&gt;High-Availability&lt;/strong&gt; (&lt;strong&gt;HA&lt;/strong&gt;), then the Cloud-based controller becomes a much cheaper architecture. Additional savings are added since Smartnet contracts for the hardware are not required.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Better utilization of virtualization infrastructure&lt;/strong&gt;. Utilizing the existing virtualization platform increases its ROI.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Greater Deployment Flexibility&lt;/strong&gt;. VMs allow you to easily move them from one physical server to another, even between different datacenters or physical locations.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Increased Redundancy &amp;amp; Backups&lt;/strong&gt;. Backing up a VM is an easy and simple process. You can even use specialized &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html&quot; target=&quot;_blank&quot; title=&quot;free VM Backup tools&quot;&gt;free VM Backup tools&lt;/a&gt; for this process.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;requirements&quot;&gt;Cisco 9800 WLC Virtual Controller VMware ESXi Requirements&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Deploying the &lt;strong&gt;WLC 9800-CL&lt;/strong&gt; in an &lt;strong&gt;ESXi environment&lt;/strong&gt; is, as you’ll discover, a simple process. Cisco provides a single &lt;strong&gt;OVA&lt;/strong&gt; file package, roughly around &lt;strong&gt;1.25GB&lt;/strong&gt; in size:&lt;/p&gt;
</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Easily Convert Cisco Autonomous - Standalone AP to Lightweight Mode &amp; Register it to a Cisco WLC Controller</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/converting-cisco-autonomous-access-point-to-lightweight-mode.html"/>
		<published>2018-10-12T20:07:52+11:00</published>
		<updated>2018-10-12T20:07:52+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/converting-cisco-autonomous-access-point-to-lightweight-mode.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-wireless-controller-ap-conversion.png&quot; alt=&quot;cisco wireless controller ap conversion&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;cisco wireless controller ap conversion&quot; /&gt;This article explains how &lt;strong&gt;to convert a local or remote Autonomous&lt;/strong&gt; / &lt;strong&gt;Standalone Cisco Aironet Access Point&lt;/strong&gt; to &lt;strong&gt;Lightweight&lt;/strong&gt; and &lt;strong&gt;register it&lt;/strong&gt; to a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Controller Basics&quot;&gt;&lt;strong&gt;Cisco WLC Controller&lt;/strong&gt;&lt;/a&gt;. Included are detailed steps, &lt;strong&gt;commands, full text logs &lt;/strong&gt;of the conversion process and &lt;strong&gt;screenshots&lt;/strong&gt; to ensure an easy and &lt;strong&gt;successful upgrade&lt;/strong&gt; &lt;strong&gt;- WLC registration&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#restrictions-considerations-autonomous-ap-conversion&quot; title=&quot;Restrictions &amp;amp; Considerations when Converting Autonomous APs to Lightweight Mode&quot;&gt;Restrictions &amp;amp; Considerations when Converting Autonomous APs to Lightweight Mode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#different-type-of-AP-image-files&quot; title=&quot;The Different Type of Access Point Image Files (k9w8 &amp;amp; rcvk9w8)&quot;&gt;The Different Type of Access Point Image Files (k9w8 &amp;amp; rcvk9w8)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#cisco-ap-conversion-process&quot; title=&quot;Cisco AP Autonomous to Lightweight Conversion Process&quot;&gt;Cisco AP Autonomous to Lightweight Conversion Process&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#registering-ap-to-the-wlc-controller&quot; title=&quot;Registering Cisco Lightweight AP to WLC Controller&quot;&gt;Registering Cisco Lightweight AP to WLC Controller&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Related Articles&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts – WLC Models, Benefits &amp;amp; Their Friendly GUI Interface&quot;&gt;Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts – WLC Models, Benefits &amp;amp; Their Friendly GUI Interface&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-radio-settings.html&quot; target=&quot;_blank&quot; title=&quot;Understanding, Configuring &amp;amp; Tweaking Web-based Cisco Aironet Access Point. Network Interface Radio0 802.11a/b/g Settings&quot;&gt;Understanding, Configuring &amp;amp; Tweaking Web-based Cisco Aironet Access Point. Network Interface Radio0 802.11a/b/g Settings&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;restrictions-considerations-autonomous-ap-conversion&quot;&gt;Restrictions &amp;amp; Considerations when Converting Autonomous APs to Lightweight Mode&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Converting an Autonomous AP to Lightweight Mode&lt;/strong&gt; is a straight forward process however it is important to keep a few things in mind before performing the conversion procedure as there are some restrictions users should be aware of.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Depending on the level of experience some of these notes/restrictions might be considered basic or redundant knowledge. For sake of simplicity we are presenting them in bullet format:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Cisco lightweight access points are capable of supporting up to &lt;strong&gt;16 BSSIDs per radio&lt;/strong&gt; and a total of &lt;strong&gt;16 WLANs per access point&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Access points converted to &lt;strong&gt;lightweight mode&lt;/strong&gt; require a &lt;strong&gt;DHCP server&lt;/strong&gt; to obtain an IP address and &lt;strong&gt;discover the WLC&lt;/strong&gt; via &lt;strong&gt;DNS&lt;/strong&gt; or &lt;strong&gt;IP broadcast&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Lightweight access points do not support Wireless Domain Services (WDS). All lightweight APs communicate with the WLC.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lightweight AP console port&lt;/strong&gt; provides &lt;strong&gt;read-only access&lt;/strong&gt; to the AP.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;different-type-of-AP-image-files&quot;&gt;The Different Type of Access Point Image Files (k9w8 &amp;amp; rcvk9w8)&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Before we begin the conversion process it is necessary to &lt;strong&gt;download the CAPWAP software&lt;/strong&gt; file that matches the &lt;strong&gt;Access Point&lt;/strong&gt; to be converted. These files can be downloaded from Cisco’s website and usually require an active Smartnet contract. Alternatively, a search on the web might reveal other sources from which they can be downloaded.&lt;/p&gt;
&lt;p&gt;There are &lt;strong&gt;two type of AP CAPWAP software files&lt;/strong&gt; we can download and install:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fully functional CAPWAP Image file&lt;/strong&gt; (full image) – Identified by the &lt;strong&gt;&lt;em&gt;k9w8&lt;/em&gt;&lt;/strong&gt; string in their filename and are usually large in size (10-20Mb). Once loaded, the AP is able to join the WLC and download its configuration. Example file name: ap3g1-k9w8-tar.152-4.JB6.tar&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Recovery mode CAPWAP Image file &lt;/strong&gt;– Identified by the &lt;strong&gt;&lt;em&gt;rcvk9w8&lt;/em&gt;&lt;/strong&gt; string in their filename. These are smaller in size (5-8Mb) and used to &lt;strong&gt;help the AP boot&lt;/strong&gt; and &lt;strong&gt;join the controller&lt;/strong&gt; so it can then &lt;strong&gt;download the full image&lt;/strong&gt; from the &lt;strong&gt;WLC&lt;/strong&gt;. Example filename: ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-hint&quot; style=&quot;text-align: justify;&quot;&gt;Regardless of the type of image loaded during the conversion process, the AP will always download the &lt;strong&gt;full image&lt;/strong&gt; from the WLC as soon as it joins. The only exception to this rule is when the &lt;strong&gt;fully functional CAPWAP image file&lt;/strong&gt; loaded on the AP is the &lt;strong&gt;same version&lt;/strong&gt; as the one contained &lt;strong&gt;in the WLC&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;cisco-ap-conversion-process&quot;&gt;Cisco AP Autonomous to Lightweight Conversion Process&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;First download a &lt;strong&gt;fully functional&lt;/strong&gt; or &lt;strong&gt;recovery mode CAPWAP file&lt;/strong&gt; suitable for the AP model. In our example we will be &lt;strong&gt;converting a Cisco 3502 AP&lt;/strong&gt; and decided to download the appropriate &lt;strong&gt;recovery mode file&lt;/strong&gt;: &lt;strong&gt;ap3g1-rcvk9w8-tar.152-4.JB6.tar.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Since the AP will automatically download the full image from the WLC once it joins, using the recovery mode file will speed up the conversion process.&lt;/p&gt;
&lt;p&gt;We’ll need to have a FTP server running so we can configure the AP to download the file from it.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;STEP 1:&lt;/strong&gt; Power up the Autonomous AP &amp;amp; Configure a &lt;a href=&quot;https://www.firewall.cx/downloads/freeware-security-a-free-trials.html&quot; target=&quot;_blank&quot; title=&quot;FTP - TFTP Servers - Firewall.cx Download Section&quot;&gt;FTP server&lt;/a&gt; form where the AP will download the image&lt;/h4&gt;
&lt;h4&gt;&lt;strong&gt;STEP 2:&lt;/strong&gt; Connect the Autonomous AP to a network switch or directly to the workstation serving the AP image via a FTP server.&lt;/h4&gt;
&lt;h4&gt;&lt;strong&gt;STEP 3:&lt;/strong&gt; Configure the AP with an IP address appropriate for the network or set it to DHCP&lt;/h4&gt;
&lt;p&gt;In our example we configure the AP to obtain its IP address from a DHCP server:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;ap(config)# &lt;strong&gt;interface bvi1&lt;/strong&gt;
&lt;div&gt;ap(config-if)# &lt;strong&gt;ip address dhcp&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:27:53.248: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.2.83, mask 255.255.255.0, hostname ap&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;The AP confirms once it has successfully obtained an IP address from the DHCP server.&lt;/p&gt;
&lt;p&gt;Note: &lt;strong&gt;BVI interface&lt;/strong&gt; indicates that the &lt;strong&gt;Radio interface&lt;/strong&gt; (e.g Dot11Radio0) and &lt;strong&gt;Ethernet interface&lt;/strong&gt; (e.g GigabitEthernet0) are &lt;strong&gt;bridged&lt;/strong&gt; (&lt;strong&gt;bridge-group x)&lt;/strong&gt;. If this is not your case, apply the configuration to the AP’s Ethernet interface.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;STEP 4:&lt;/strong&gt; Configure the AP with the FTP user account credentials as configured on the FTP server. This will allow the AP to access and download the image file. Once configured, begin the software download procedure using the &lt;strong&gt;archive download-sw&lt;/strong&gt; command.&lt;/h4&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-autonomous-ap-to-lightweight-conversion.png&quot; alt=&quot;cisco autonomous ap to lightweight conversion&quot; title=&quot;cisco autonomous ap to lightweight conversion&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Here is the complete text log of the procedure:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;ap# &lt;strong&gt;configure terminal&lt;/strong&gt;
&lt;div&gt;ap(config)# &lt;strong&gt;ip ftp username admin&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;ap(config)# &lt;strong&gt;ip ftp password cisco1234&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;ap(config)# &lt;strong&gt;exit&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;ap# &lt;strong&gt;archive download-sw /force-reload /overwrite ftp://192.168.2.61/ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Mar&amp;nbsp; 1 00:30:46.348: %SYS-5-CONFIG_I: Configured from console&lt;/div&gt;
&lt;div&gt;Mar&amp;nbsp; 1 00:30:50.563: Loading ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/div&gt;
&lt;div&gt;extracting info (264 bytes)!&lt;/div&gt;
&lt;div&gt;Image info:&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Suffix: rcvk9w8-&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Name: ap3g1-rcvk9w8-mx&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Directory: ap3g1-rcvk9w8-mx&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ios Image Size: 123392&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Image Size: 7936512&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Feature: WIRELESS LAN|LWAPP&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Family: AP3G1&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Wireless Switch Management Version: 7.6.100.0&lt;/div&gt;
&lt;div&gt;MwarVersion:07066400.First AP Supported Version:07000000.&lt;/div&gt;
&lt;div&gt;Image version check passed&amp;nbsp;&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:30:46.348: Loading ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/div&gt;
&lt;div&gt;Extracting files...&lt;/div&gt;
&lt;div&gt;ap3g1-rcvk9w8-mx/ (directory) 0 (bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/ap3g1-rcvk9w8-mx (121199 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/ap3g1-boot-m_upg (393216 bytes)!!&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/u-boot.bin (393216 bytes)!&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/ap3g1-rcvk9w8-xx (7016987 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/info (264 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/file_hashes (712 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/final_hash (141 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/img_sign_rel.cert (1375 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/img_sign_rel_sha2.cert (1371 bytes)!&lt;/div&gt;
&lt;div&gt;extracting info.ver (264 bytes)&lt;/div&gt;
&lt;div&gt;[OK - 7946240/4096 bytes]&lt;/div&gt;
&lt;div&gt;Deleting target version: flash:/ap3g1-rcvk9w8-mx...done.&lt;/div&gt;
&lt;div&gt;Deleting current version: flash:/ap3g1-k9w7-mx.153-3.JF5...&lt;/div&gt;
&lt;div&gt;Set booting path to recovery image: ''...done.&lt;/div&gt;
&lt;div&gt;New software image installed in&lt;/div&gt;
&lt;div&gt;Writing out the event log to flash:/event.log ...&lt;/div&gt;
&lt;div&gt;flash:/ap3g1-rcvk9w8-mx&lt;/div&gt;
&lt;div&gt;Configuring system to use new image...done.&lt;/div&gt;
&lt;div&gt;Requested system reload in progress...&lt;/div&gt;
&lt;div&gt;archive download: takes 221 seconds&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:34:31.088: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to IOS reload&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:34:31.088: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to IOS reload&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:34:31.094: %SYS-5-RELOAD: Reload requested by Exec. Reload Reason: Reason unspecified.&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;/force-reload&lt;/strong&gt; parameter will automatically &lt;strong&gt;reload&lt;/strong&gt; the AP as soon as the new software image is installed while the &lt;strong&gt;/overwrite&lt;/strong&gt; parameter is required to replace the &lt;strong&gt;autonomous image&lt;/strong&gt; with the &lt;strong&gt;CAPWAP image&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Console cable can be used for the conversion process of local APs. Alternatively SSH/Telnet can be used for the conversion of both local and remote APs.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;registering-ap-to-the-wlc-controller&quot;&gt;Registering Cisco Lightweight AP to WLC Controller&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the CAPWAP image has been successfully loaded on the AP it reload and begin searching to register with a WLC Controller. As soon as the AP successfully registers with the WLC it will compare its image with that of the controller and if found different begin to download and install it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to ensure there is an &lt;strong&gt;active DHCP server&lt;/strong&gt; on the same VLAN/network as the AP to provide it with an IP address, subnetmask, gateway and DNS parameters. DNS parameters are not mandatory but will speed up the &lt;strong&gt;WLC discovery processes&lt;/strong&gt; if the DNS server contains an “&lt;strong&gt;A Type&lt;/strong&gt;” &lt;strong&gt;resource record&lt;/strong&gt; &amp;nbsp;of “&lt;strong&gt;CISCO-CAPWAP-CONTROLLER&lt;/strong&gt;” pointing to the WLC’s IP address.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the logs below we can see our AP searching for the WLC (Translating &quot;CISCO-CAPWAP-CONTROLLER&quot;...domain server) after its initial &lt;strong&gt;reload&lt;/strong&gt; (we’ve just installed &lt;strong&gt;recovery mode image&lt;/strong&gt;). It then &lt;strong&gt;discovers the WLC&lt;/strong&gt; (both WLC and AP are on the same VLAN), &lt;strong&gt;registers&lt;/strong&gt; and &lt;strong&gt;downloads&lt;/strong&gt; the &lt;strong&gt;WLC full CAPWAP image&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-lightweight-ap-downloading-firmware-large.png&quot; class=&quot;jcepopup&quot; title=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-lightweight-ap-downloading-firmware-small.png&quot; alt=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot; title=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Click to enlarge&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;Mar&amp;nbsp; 1 00:00:41.806: %CDP_PD-2-POWER_LOW: All radios disabled - NEGOTIATED WS-C3560CX-12PC-S (0076.8697.b603)
&lt;div&gt;*Mar&amp;nbsp; 1 00:00:46.122: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.50.12, mask 255.255.255.0, hostname APe05f.b9a7.e290&lt;/div&gt;
&lt;div&gt;Translating &quot;CISCO-CAPWAP-CONTROLLER&quot;...domain server (8.8.8.8)&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:00:57.113: %CAPWAP-3-ERRORLOG: Did not get log server settings from DHCP. (8.8.4.4)&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:01:15.119: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:01:25.120: %CAPWAP-3-ERRORLOG: Go join a capwap controller&lt;/div&gt;
&lt;div&gt;*Sep&amp;nbsp; 6 09:54:05.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.50.5 peer_port: 5246&lt;/div&gt;
&lt;div&gt;examining image...&lt;/div&gt;
&lt;div&gt;extracting info (287 bytes)&lt;/div&gt;
&lt;div&gt;Image info:&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Suffix: k9w8-.153-3.JD4&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Name: ap3g1-k9w8-mx.153-3.JD4&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Directory: ap3g1-k9w8-mx.153-3.JD4&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ios Image Size: 9042432&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Image Size: 10138112&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Feature: WIRELESS LAN|LWAPP&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Family: AP3G1&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Wireless Switch Management Version: 8.3.112.0&lt;/div&gt;
&lt;div&gt;Extracting files...&lt;/div&gt;
&lt;div&gt;ap3g1-k9w8-mx.153-3.JD4/ (directory) 0 (bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-k9w8-mx.153-3.JD4/u-boot.bin (393216 bytes)&lt;/div&gt;
&lt;div&gt;*Sep&amp;nbsp; 6 09:54:07.258: %CAPWAP-5-DTLSREQSUCC: DTLS connection created successfully peer_ip: 192.168.50.5 peer_port: 5246&lt;/div&gt;
&lt;div&gt;&amp;lt;output omitted&amp;gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following screenshot was taken after the AP joined the WLC and begun automatically downloading the new image:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As soon as the AP downloads and installs the new image, it will automatically reload and register with the WLC again. At this point the AP is ready to be configured and used as required.&lt;/p&gt;
&lt;p&gt;Finally notice the &lt;strong&gt;date/time correction&lt;/strong&gt; (&lt;strong&gt;*Sep&amp;nbsp; 6 09:54:05.000&lt;/strong&gt;&lt;samp&gt;&lt;/samp&gt;) as soon as the AP registers with the WLC controller. This is the first indication its registered correctly with the WLC at IP address 192.168.50.5&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article showed how to convert an &lt;strong&gt;Autonomous&lt;/strong&gt; or &lt;strong&gt;Standalone Cisco Access Point&lt;/strong&gt; to &lt;strong&gt;Lightweight mode&lt;/strong&gt; and join it to a &lt;strong&gt;Cisco WLC Controller&lt;/strong&gt;. We covered the different &lt;strong&gt;restrictions&lt;/strong&gt; and &lt;strong&gt;considerations&lt;/strong&gt; during the &lt;strong&gt;AP conversion process&lt;/strong&gt;, explained the difference between the &lt;strong&gt;fully functional CAPWAP&lt;/strong&gt; (&lt;strong&gt;k9w8&lt;/strong&gt;) and &lt;strong&gt;recovery mode CAPWAP&lt;/strong&gt; (&lt;strong&gt;rcvk9w8&lt;/strong&gt;) image files. Finally we provided the necessary &lt;strong&gt;commands &amp;amp; tips&lt;/strong&gt; to &lt;strong&gt;configure the AP&lt;/strong&gt;, transfer the image and &lt;strong&gt;register it with the WLC&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-wireless-controller-ap-conversion.png&quot; alt=&quot;cisco wireless controller ap conversion&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;cisco wireless controller ap conversion&quot; /&gt;This article explains how &lt;strong&gt;to convert a local or remote Autonomous&lt;/strong&gt; / &lt;strong&gt;Standalone Cisco Aironet Access Point&lt;/strong&gt; to &lt;strong&gt;Lightweight&lt;/strong&gt; and &lt;strong&gt;register it&lt;/strong&gt; to a &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Controller Basics&quot;&gt;&lt;strong&gt;Cisco WLC Controller&lt;/strong&gt;&lt;/a&gt;. Included are detailed steps, &lt;strong&gt;commands, full text logs &lt;/strong&gt;of the conversion process and &lt;strong&gt;screenshots&lt;/strong&gt; to ensure an easy and &lt;strong&gt;successful upgrade&lt;/strong&gt; &lt;strong&gt;- WLC registration&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#restrictions-considerations-autonomous-ap-conversion&quot; title=&quot;Restrictions &amp;amp; Considerations when Converting Autonomous APs to Lightweight Mode&quot;&gt;Restrictions &amp;amp; Considerations when Converting Autonomous APs to Lightweight Mode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#different-type-of-AP-image-files&quot; title=&quot;The Different Type of Access Point Image Files (k9w8 &amp;amp; rcvk9w8)&quot;&gt;The Different Type of Access Point Image Files (k9w8 &amp;amp; rcvk9w8)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#cisco-ap-conversion-process&quot; title=&quot;Cisco AP Autonomous to Lightweight Conversion Process&quot;&gt;Cisco AP Autonomous to Lightweight Conversion Process&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#registering-ap-to-the-wlc-controller&quot; title=&quot;Registering Cisco Lightweight AP to WLC Controller&quot;&gt;Registering Cisco Lightweight AP to WLC Controller&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Related Articles&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts – WLC Models, Benefits &amp;amp; Their Friendly GUI Interface&quot;&gt;Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts – WLC Models, Benefits &amp;amp; Their Friendly GUI Interface&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-radio-settings.html&quot; target=&quot;_blank&quot; title=&quot;Understanding, Configuring &amp;amp; Tweaking Web-based Cisco Aironet Access Point. Network Interface Radio0 802.11a/b/g Settings&quot;&gt;Understanding, Configuring &amp;amp; Tweaking Web-based Cisco Aironet Access Point. Network Interface Radio0 802.11a/b/g Settings&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;restrictions-considerations-autonomous-ap-conversion&quot;&gt;Restrictions &amp;amp; Considerations when Converting Autonomous APs to Lightweight Mode&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Converting an Autonomous AP to Lightweight Mode&lt;/strong&gt; is a straight forward process however it is important to keep a few things in mind before performing the conversion procedure as there are some restrictions users should be aware of.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Depending on the level of experience some of these notes/restrictions might be considered basic or redundant knowledge. For sake of simplicity we are presenting them in bullet format:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Cisco lightweight access points are capable of supporting up to &lt;strong&gt;16 BSSIDs per radio&lt;/strong&gt; and a total of &lt;strong&gt;16 WLANs per access point&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Access points converted to &lt;strong&gt;lightweight mode&lt;/strong&gt; require a &lt;strong&gt;DHCP server&lt;/strong&gt; to obtain an IP address and &lt;strong&gt;discover the WLC&lt;/strong&gt; via &lt;strong&gt;DNS&lt;/strong&gt; or &lt;strong&gt;IP broadcast&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Lightweight access points do not support Wireless Domain Services (WDS). All lightweight APs communicate with the WLC.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lightweight AP console port&lt;/strong&gt; provides &lt;strong&gt;read-only access&lt;/strong&gt; to the AP.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;different-type-of-AP-image-files&quot;&gt;The Different Type of Access Point Image Files (k9w8 &amp;amp; rcvk9w8)&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Before we begin the conversion process it is necessary to &lt;strong&gt;download the CAPWAP software&lt;/strong&gt; file that matches the &lt;strong&gt;Access Point&lt;/strong&gt; to be converted. These files can be downloaded from Cisco’s website and usually require an active Smartnet contract. Alternatively, a search on the web might reveal other sources from which they can be downloaded.&lt;/p&gt;
&lt;p&gt;There are &lt;strong&gt;two type of AP CAPWAP software files&lt;/strong&gt; we can download and install:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fully functional CAPWAP Image file&lt;/strong&gt; (full image) – Identified by the &lt;strong&gt;&lt;em&gt;k9w8&lt;/em&gt;&lt;/strong&gt; string in their filename and are usually large in size (10-20Mb). Once loaded, the AP is able to join the WLC and download its configuration. Example file name: ap3g1-k9w8-tar.152-4.JB6.tar&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Recovery mode CAPWAP Image file &lt;/strong&gt;– Identified by the &lt;strong&gt;&lt;em&gt;rcvk9w8&lt;/em&gt;&lt;/strong&gt; string in their filename. These are smaller in size (5-8Mb) and used to &lt;strong&gt;help the AP boot&lt;/strong&gt; and &lt;strong&gt;join the controller&lt;/strong&gt; so it can then &lt;strong&gt;download the full image&lt;/strong&gt; from the &lt;strong&gt;WLC&lt;/strong&gt;. Example filename: ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-hint&quot; style=&quot;text-align: justify;&quot;&gt;Regardless of the type of image loaded during the conversion process, the AP will always download the &lt;strong&gt;full image&lt;/strong&gt; from the WLC as soon as it joins. The only exception to this rule is when the &lt;strong&gt;fully functional CAPWAP image file&lt;/strong&gt; loaded on the AP is the &lt;strong&gt;same version&lt;/strong&gt; as the one contained &lt;strong&gt;in the WLC&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;cisco-ap-conversion-process&quot;&gt;Cisco AP Autonomous to Lightweight Conversion Process&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;First download a &lt;strong&gt;fully functional&lt;/strong&gt; or &lt;strong&gt;recovery mode CAPWAP file&lt;/strong&gt; suitable for the AP model. In our example we will be &lt;strong&gt;converting a Cisco 3502 AP&lt;/strong&gt; and decided to download the appropriate &lt;strong&gt;recovery mode file&lt;/strong&gt;: &lt;strong&gt;ap3g1-rcvk9w8-tar.152-4.JB6.tar.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Since the AP will automatically download the full image from the WLC once it joins, using the recovery mode file will speed up the conversion process.&lt;/p&gt;
&lt;p&gt;We’ll need to have a FTP server running so we can configure the AP to download the file from it.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;STEP 1:&lt;/strong&gt; Power up the Autonomous AP &amp;amp; Configure a &lt;a href=&quot;https://www.firewall.cx/downloads/freeware-security-a-free-trials.html&quot; target=&quot;_blank&quot; title=&quot;FTP - TFTP Servers - Firewall.cx Download Section&quot;&gt;FTP server&lt;/a&gt; form where the AP will download the image&lt;/h4&gt;
&lt;h4&gt;&lt;strong&gt;STEP 2:&lt;/strong&gt; Connect the Autonomous AP to a network switch or directly to the workstation serving the AP image via a FTP server.&lt;/h4&gt;
&lt;h4&gt;&lt;strong&gt;STEP 3:&lt;/strong&gt; Configure the AP with an IP address appropriate for the network or set it to DHCP&lt;/h4&gt;
&lt;p&gt;In our example we configure the AP to obtain its IP address from a DHCP server:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;ap(config)# &lt;strong&gt;interface bvi1&lt;/strong&gt;
&lt;div&gt;ap(config-if)# &lt;strong&gt;ip address dhcp&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:27:53.248: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.2.83, mask 255.255.255.0, hostname ap&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;The AP confirms once it has successfully obtained an IP address from the DHCP server.&lt;/p&gt;
&lt;p&gt;Note: &lt;strong&gt;BVI interface&lt;/strong&gt; indicates that the &lt;strong&gt;Radio interface&lt;/strong&gt; (e.g Dot11Radio0) and &lt;strong&gt;Ethernet interface&lt;/strong&gt; (e.g GigabitEthernet0) are &lt;strong&gt;bridged&lt;/strong&gt; (&lt;strong&gt;bridge-group x)&lt;/strong&gt;. If this is not your case, apply the configuration to the AP’s Ethernet interface.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;STEP 4:&lt;/strong&gt; Configure the AP with the FTP user account credentials as configured on the FTP server. This will allow the AP to access and download the image file. Once configured, begin the software download procedure using the &lt;strong&gt;archive download-sw&lt;/strong&gt; command.&lt;/h4&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-autonomous-ap-to-lightweight-conversion.png&quot; alt=&quot;cisco autonomous ap to lightweight conversion&quot; title=&quot;cisco autonomous ap to lightweight conversion&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Here is the complete text log of the procedure:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;ap# &lt;strong&gt;configure terminal&lt;/strong&gt;
&lt;div&gt;ap(config)# &lt;strong&gt;ip ftp username admin&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;ap(config)# &lt;strong&gt;ip ftp password cisco1234&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;ap(config)# &lt;strong&gt;exit&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;ap# &lt;strong&gt;archive download-sw /force-reload /overwrite ftp://192.168.2.61/ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Mar&amp;nbsp; 1 00:30:46.348: %SYS-5-CONFIG_I: Configured from console&lt;/div&gt;
&lt;div&gt;Mar&amp;nbsp; 1 00:30:50.563: Loading ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/div&gt;
&lt;div&gt;extracting info (264 bytes)!&lt;/div&gt;
&lt;div&gt;Image info:&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Suffix: rcvk9w8-&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Name: ap3g1-rcvk9w8-mx&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Directory: ap3g1-rcvk9w8-mx&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ios Image Size: 123392&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Image Size: 7936512&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Feature: WIRELESS LAN|LWAPP&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Family: AP3G1&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Wireless Switch Management Version: 7.6.100.0&lt;/div&gt;
&lt;div&gt;MwarVersion:07066400.First AP Supported Version:07000000.&lt;/div&gt;
&lt;div&gt;Image version check passed&amp;nbsp;&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:30:46.348: Loading ap3g1-rcvk9w8-tar.152-4.JB6.tar&lt;/div&gt;
&lt;div&gt;Extracting files...&lt;/div&gt;
&lt;div&gt;ap3g1-rcvk9w8-mx/ (directory) 0 (bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/ap3g1-rcvk9w8-mx (121199 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/ap3g1-boot-m_upg (393216 bytes)!!&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/u-boot.bin (393216 bytes)!&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/ap3g1-rcvk9w8-xx (7016987 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/info (264 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/file_hashes (712 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/final_hash (141 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/img_sign_rel.cert (1375 bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-rcvk9w8-mx/img_sign_rel_sha2.cert (1371 bytes)!&lt;/div&gt;
&lt;div&gt;extracting info.ver (264 bytes)&lt;/div&gt;
&lt;div&gt;[OK - 7946240/4096 bytes]&lt;/div&gt;
&lt;div&gt;Deleting target version: flash:/ap3g1-rcvk9w8-mx...done.&lt;/div&gt;
&lt;div&gt;Deleting current version: flash:/ap3g1-k9w7-mx.153-3.JF5...&lt;/div&gt;
&lt;div&gt;Set booting path to recovery image: ''...done.&lt;/div&gt;
&lt;div&gt;New software image installed in&lt;/div&gt;
&lt;div&gt;Writing out the event log to flash:/event.log ...&lt;/div&gt;
&lt;div&gt;flash:/ap3g1-rcvk9w8-mx&lt;/div&gt;
&lt;div&gt;Configuring system to use new image...done.&lt;/div&gt;
&lt;div&gt;Requested system reload in progress...&lt;/div&gt;
&lt;div&gt;archive download: takes 221 seconds&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:34:31.088: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to IOS reload&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:34:31.088: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to IOS reload&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:34:31.094: %SYS-5-RELOAD: Reload requested by Exec. Reload Reason: Reason unspecified.&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;/force-reload&lt;/strong&gt; parameter will automatically &lt;strong&gt;reload&lt;/strong&gt; the AP as soon as the new software image is installed while the &lt;strong&gt;/overwrite&lt;/strong&gt; parameter is required to replace the &lt;strong&gt;autonomous image&lt;/strong&gt; with the &lt;strong&gt;CAPWAP image&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Console cable can be used for the conversion process of local APs. Alternatively SSH/Telnet can be used for the conversion of both local and remote APs.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;registering-ap-to-the-wlc-controller&quot;&gt;Registering Cisco Lightweight AP to WLC Controller&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the CAPWAP image has been successfully loaded on the AP it reload and begin searching to register with a WLC Controller. As soon as the AP successfully registers with the WLC it will compare its image with that of the controller and if found different begin to download and install it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to ensure there is an &lt;strong&gt;active DHCP server&lt;/strong&gt; on the same VLAN/network as the AP to provide it with an IP address, subnetmask, gateway and DNS parameters. DNS parameters are not mandatory but will speed up the &lt;strong&gt;WLC discovery processes&lt;/strong&gt; if the DNS server contains an “&lt;strong&gt;A Type&lt;/strong&gt;” &lt;strong&gt;resource record&lt;/strong&gt; &amp;nbsp;of “&lt;strong&gt;CISCO-CAPWAP-CONTROLLER&lt;/strong&gt;” pointing to the WLC’s IP address.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the logs below we can see our AP searching for the WLC (Translating &quot;CISCO-CAPWAP-CONTROLLER&quot;...domain server) after its initial &lt;strong&gt;reload&lt;/strong&gt; (we’ve just installed &lt;strong&gt;recovery mode image&lt;/strong&gt;). It then &lt;strong&gt;discovers the WLC&lt;/strong&gt; (both WLC and AP are on the same VLAN), &lt;strong&gt;registers&lt;/strong&gt; and &lt;strong&gt;downloads&lt;/strong&gt; the &lt;strong&gt;WLC full CAPWAP image&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-lightweight-ap-downloading-firmware-large.png&quot; class=&quot;jcepopup&quot; title=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/autonomous-to-lightweight-conversion/cisco-lightweight-ap-downloading-firmware-small.png&quot; alt=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot; title=&quot;cisco autonomous ap to lightweight conversion - firmware download&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Click to enlarge&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;Mar&amp;nbsp; 1 00:00:41.806: %CDP_PD-2-POWER_LOW: All radios disabled - NEGOTIATED WS-C3560CX-12PC-S (0076.8697.b603)
&lt;div&gt;*Mar&amp;nbsp; 1 00:00:46.122: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.50.12, mask 255.255.255.0, hostname APe05f.b9a7.e290&lt;/div&gt;
&lt;div&gt;Translating &quot;CISCO-CAPWAP-CONTROLLER&quot;...domain server (8.8.8.8)&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:00:57.113: %CAPWAP-3-ERRORLOG: Did not get log server settings from DHCP. (8.8.4.4)&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:01:15.119: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER&lt;/div&gt;
&lt;div&gt;*Mar&amp;nbsp; 1 00:01:25.120: %CAPWAP-3-ERRORLOG: Go join a capwap controller&lt;/div&gt;
&lt;div&gt;*Sep&amp;nbsp; 6 09:54:05.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.50.5 peer_port: 5246&lt;/div&gt;
&lt;div&gt;examining image...&lt;/div&gt;
&lt;div&gt;extracting info (287 bytes)&lt;/div&gt;
&lt;div&gt;Image info:&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Suffix: k9w8-.153-3.JD4&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Name: ap3g1-k9w8-mx.153-3.JD4&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version Directory: ap3g1-k9w8-mx.153-3.JD4&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ios Image Size: 9042432&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Image Size: 10138112&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Feature: WIRELESS LAN|LWAPP&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image Family: AP3G1&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Wireless Switch Management Version: 8.3.112.0&lt;/div&gt;
&lt;div&gt;Extracting files...&lt;/div&gt;
&lt;div&gt;ap3g1-k9w8-mx.153-3.JD4/ (directory) 0 (bytes)&lt;/div&gt;
&lt;div&gt;extracting ap3g1-k9w8-mx.153-3.JD4/u-boot.bin (393216 bytes)&lt;/div&gt;
&lt;div&gt;*Sep&amp;nbsp; 6 09:54:07.258: %CAPWAP-5-DTLSREQSUCC: DTLS connection created successfully peer_ip: 192.168.50.5 peer_port: 5246&lt;/div&gt;
&lt;div&gt;&amp;lt;output omitted&amp;gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following screenshot was taken after the AP joined the WLC and begun automatically downloading the new image:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As soon as the AP downloads and installs the new image, it will automatically reload and register with the WLC again. At this point the AP is ready to be configured and used as required.&lt;/p&gt;
&lt;p&gt;Finally notice the &lt;strong&gt;date/time correction&lt;/strong&gt; (&lt;strong&gt;*Sep&amp;nbsp; 6 09:54:05.000&lt;/strong&gt;&lt;samp&gt;&lt;/samp&gt;) as soon as the AP registers with the WLC controller. This is the first indication its registered correctly with the WLC at IP address 192.168.50.5&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article showed how to convert an &lt;strong&gt;Autonomous&lt;/strong&gt; or &lt;strong&gt;Standalone Cisco Access Point&lt;/strong&gt; to &lt;strong&gt;Lightweight mode&lt;/strong&gt; and join it to a &lt;strong&gt;Cisco WLC Controller&lt;/strong&gt;. We covered the different &lt;strong&gt;restrictions&lt;/strong&gt; and &lt;strong&gt;considerations&lt;/strong&gt; during the &lt;strong&gt;AP conversion process&lt;/strong&gt;, explained the difference between the &lt;strong&gt;fully functional CAPWAP&lt;/strong&gt; (&lt;strong&gt;k9w8&lt;/strong&gt;) and &lt;strong&gt;recovery mode CAPWAP&lt;/strong&gt; (&lt;strong&gt;rcvk9w8&lt;/strong&gt;) image files. Finally we provided the necessary &lt;strong&gt;commands &amp;amp; tips&lt;/strong&gt; to &lt;strong&gt;configure the AP&lt;/strong&gt;, transfer the image and &lt;strong&gt;register it with the WLC&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Configuring Cisco WLC Link Aggregation (LAG) with Port-Channel EtherChannel. LAG Restrictions for WLC Models</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/how-to-configure-wlc-lag-and-port-channel-with-nexus-catalyst-switches.html"/>
		<published>2018-09-21T19:44:30+10:00</published>
		<updated>2018-09-21T19:44:30+10:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/how-to-configure-wlc-lag-and-port-channel-with-nexus-catalyst-switches.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Cisco Wireless Controllers&lt;/strong&gt; (&lt;strong&gt;WLC&lt;/strong&gt;) support the &lt;strong&gt;configuration&lt;/strong&gt; of &lt;strong&gt;Link Aggregation&lt;/strong&gt; (&lt;strong&gt;IEEE 802.3ad - LAG&lt;/strong&gt;) which &lt;strong&gt;bundles&lt;/strong&gt; the &lt;strong&gt;controller ports&lt;/strong&gt; into a &lt;strong&gt;single port channel&lt;/strong&gt;. This helps simplify the &lt;strong&gt;configuration&lt;/strong&gt; of the &lt;strong&gt;WLC interface ports&lt;/strong&gt;, &lt;strong&gt;increase available bandwidth&lt;/strong&gt; between the wireless and wired network, provide &lt;strong&gt;load-balancing&lt;/strong&gt; capabilities between &lt;strong&gt;physical WLC ports&lt;/strong&gt; and &lt;strong&gt;increase port redundancy&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-hint&quot;&gt;To learn more about WLC interfaces refer to our article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality article&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality article&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows an example of a &lt;strong&gt;WLC 2504&lt;/strong&gt; with ports &lt;strong&gt;P1&lt;/strong&gt; and &lt;strong&gt;P2&lt;/strong&gt; in a &lt;strong&gt;LAG configuration&lt;/strong&gt; connecting to a &lt;strong&gt;Cisco Catalyst&lt;/strong&gt; or &lt;strong&gt;Nexus switch&lt;/strong&gt;. In the configuration below WLC ports &lt;strong&gt;P1&lt;/strong&gt; and &lt;strong&gt;P2&lt;/strong&gt; are aggregated to provide a total of &lt;strong&gt;2Gbps bandwidth&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-to-catalyst-nexus-port-channel.png&quot; alt=&quot;WLC LAG Configuration with Cisco Nexus and Catalyst Switch&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WLC LAG Configuration with Cisco Nexus and Catalyst Switch&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#link-aggregation-restrictions&quot; title=&quot;Link Aggregation Restrictions and Considerations&quot;&gt;Link Aggregation Restrictions and Considerations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#wlc-lag-configuration&quot; title=&quot;Wireless Controller LAG Configuration – Enabling LAG&quot;&gt;Wireless Controller LAG Configuration – Enabling LAG&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#configuring-switch-port-channel&quot; title=&quot;Configuring Switch to Support Link Aggregation&quot;&gt;Configuring Switch to Support Link Aggregation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Related Articles&lt;/h2&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Basic Concepts, WLC Models, and GUI Interface&quot;&gt;Cisco WLC Basic Concepts, WLC Models, and GUI Interface&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;WLC Interfaces, Ports &amp;amp; Functionality. Understand how WLCs work, Wi-Fi SSID/VLAN Mappings&quot;&gt;WLC Interfaces, Ports &amp;amp; Functionality. Understand how WLCs work, Wi-Fi SSID/VLAN Mappings&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-downloads-wlc-datasheels.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Datasheets Download&quot;&gt;Cisco WLC Datasheets Download&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;link-aggregation-restrictions&quot;&gt;Link Aggregation Restrictions - Considerations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While &lt;strong&gt;LAG&lt;/strong&gt; is the preferred method of connecting the WLC to the network there however a number of restrictions we need to be aware of to ensure we don’t stumble into any unpleasant surprises.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On &lt;strong&gt;2504&lt;/strong&gt; and &lt;strong&gt;3504 WLCs&lt;/strong&gt; you can bundle all &lt;strong&gt;4 ports&lt;/strong&gt; into a &lt;strong&gt;single link&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;On &lt;strong&gt;5508 WLC&lt;/strong&gt; you can bundle &lt;strong&gt;up to 8 ports&lt;/strong&gt; into a &lt;strong&gt;single link&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link Aggregation Control Protocol&lt;/strong&gt; (&lt;strong&gt;LACP&lt;/strong&gt;) or Cisco proprietary &lt;strong&gt;Port Aggregation Protocol&lt;/strong&gt; (&lt;strong&gt;PAgP&lt;/strong&gt;) are not supported by the WLC. &lt;strong&gt;Port-Channel members&lt;/strong&gt; must be &lt;strong&gt;set unconditionally to LAG&lt;/strong&gt; (shown in the configuration below).&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Only &lt;strong&gt;one LAG Group&lt;/strong&gt; is supported &lt;strong&gt;per WLC&lt;/strong&gt;, you can therefore connect a WLC &lt;strong&gt;only to one switch&lt;/strong&gt; unless using &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-data-center/nexus-vpc-configuration-design-operation-troubleshooting.html#vpc_vs_vss&quot; target=&quot;_blank&quot; title=&quot;VSS (Catalyst) or vPC (Nexus) technologies&quot;&gt;VSS (Catalyst) or vPC (Nexus) technologies&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;When &lt;strong&gt;LAG&lt;/strong&gt; is &lt;strong&gt;enabled&lt;/strong&gt;, if a &lt;strong&gt;single link fails&lt;/strong&gt;, traffic is automatically switched to the other links.&lt;/li&gt;
&lt;li&gt;After &lt;strong&gt;enabling LAG&lt;/strong&gt; the WLC must be &lt;strong&gt;rebooted&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;When &lt;strong&gt;enabling LAG&lt;/strong&gt;, &lt;strong&gt;all dynamic AP manager interfaces&lt;/strong&gt; and &lt;strong&gt;untagged interfaces&lt;/strong&gt; will be &lt;strong&gt;deleted&lt;/strong&gt;. (See related article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;WLC Interfaces – Logical Interfaces&quot;&gt;WLC Interfaces – Logical Interfaces&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;After &lt;strong&gt;enabling LAG&lt;/strong&gt;, &lt;strong&gt;all Virtual Interfaces&lt;/strong&gt; use the &lt;strong&gt;LAG interface&lt;/strong&gt;. No backup port (under the Virtual Interface settings) is configurable:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-virtual-interfaces-with-and-without-lag-port-channel-large.png&quot; class=&quot;jcepopup&quot; title=&quot;wlc virtual interfaces with and without lag port channel&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WLC virtual interfaces with and without lag port channel&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-virtual-interfaces-with-and-without-lag-port-channel-small.png&quot; alt=&quot;wlc virtual interfaces with and without lag port channel&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;wlc virtual interfaces with and without lag port channel&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;wlc-lag-configuration&quot;&gt;Wireless Controller LAG Configuration – Enabling LAG&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First step is to enable LAG. Log into the &lt;strong&gt;WLC&lt;/strong&gt; and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Advanced menu option&lt;/strong&gt; (firmware v8 and above only). Next, select the &lt;strong&gt;Controller&lt;/strong&gt; menu option and set the &lt;strong&gt;LAG Mode on next reboot&lt;/strong&gt; option to &lt;strong&gt;Enabled&lt;/strong&gt; and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Apply&lt;/strong&gt; button:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-enable-lag.png&quot; alt=&quot;How to enable LAG on Cisco WLC&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;How to enable LAG on Cisco WLC&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point the WLC will pop up a warning window explaining the changes that are about to take place. As mentioned previously, &lt;strong&gt;all dynamic AP manager interfaces&lt;/strong&gt; and &lt;strong&gt;untagged interfaces&lt;/strong&gt; will be &lt;strong&gt;deleted&lt;/strong&gt;. (See related article &lt;a href=&quot;https://www.firewall.cx//cisco-technical-knowledgebase/cisco-wireless/1077-cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;WLC Interfaces – Logical Interfaces&quot;&gt;WLC Interfaces – Logical Interfaces&lt;/a&gt; to understand the implications):&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-enable-lag-confirmation.png&quot; alt=&quot;WLC Configuration to enable LAG Support&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;WLC Configuration to enable LAG Support&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once we &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; the WLC will proceed to &lt;strong&gt;enable LAG mode&lt;/strong&gt; and present us with another notification requesting that we &lt;strong&gt;save the configuration&lt;/strong&gt; and &lt;strong&gt;reboot the controller&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-lag-confirmation.png&quot; alt=&quot;WLC LAG Mode Confirmation&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;WLC LAG Mode Confirmation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Note: Ignore the DNS Server IP that was presented in our Lab environment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Save Configuration&lt;/strong&gt; button on the top right corner. To &lt;strong&gt;reboot the controller&lt;/strong&gt;, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Commands&lt;/strong&gt; menu, select &lt;strong&gt;Reboot&lt;/strong&gt; from the &lt;strong&gt;right menu column&lt;/strong&gt; and finally &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Reboot&lt;/strong&gt; button on the right:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-2504-reboot.png&quot; alt=&quot;wlc 2504 reboot process&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;wlc 2504 reboot process&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; in the popup message to confirm the reboot.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point the WLC will reboot and we won’t be able to ping or access the WLC web interface until we configure the switch. All access points and wireless networks will also be unavailable.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;configuring-switch-port-channel&quot;&gt;Configuring Switch Port-Channel to Support Link Aggregation&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Port-channel configuration&lt;/strong&gt; is a straight forward process. It’s best to ensure all interfaces participating in the &lt;strong&gt;Port-channel&lt;/strong&gt; are set to their &lt;strong&gt;default configuration&lt;/strong&gt;. This will remove any existing configuration, minimizing errors during the switchport configuration process.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First &lt;strong&gt;remove existing configuration&lt;/strong&gt; from the interfaces participating in the Port-channel (&lt;strong&gt;Gigabitethernet 0/6 &lt;/strong&gt;&amp;amp; &lt;strong&gt;0/7&lt;/strong&gt;), then make them &lt;strong&gt;members&lt;/strong&gt; of &lt;strong&gt;Port-channel 1&lt;/strong&gt;. If the Port-channel doesn’t exist, it will be automatically created:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;3560cx-HQ(config)# &lt;strong&gt;default interface range Gigabitethernet 0/6-7&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config)# &lt;strong&gt;interface range GigabitEthernet 0/6-7&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;channel-group 1 mode on&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Creating a port-channel interface Port-channel 1&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;description WLC2504&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)#&lt;strong&gt; switchport mode trunk&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;no shutdown&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;Below is the complete Port-channel and interface configuration:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;!&lt;br /&gt;interface Port-channel1&lt;br /&gt;description WLC2504&lt;br /&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;br /&gt;switchport mode trunk&lt;br /&gt;!&lt;br /&gt;interface GigabitEthernet0/6&lt;br /&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;br /&gt;switchport mode trunk&lt;br /&gt;channel-group 1 mode on&lt;br /&gt;!&lt;br /&gt;interface GigabitEthernet0/7&lt;br /&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;br /&gt;switchport mode trunk&lt;br /&gt;channel-group 1 mode on&lt;br /&gt;!&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that the &lt;strong&gt;channel-group mode&lt;/strong&gt; is set to &lt;strong&gt;on&lt;/strong&gt; which enables &lt;strong&gt;Etherchannel &lt;/strong&gt;without any &lt;strong&gt;LACP&lt;/strong&gt; or &lt;strong&gt;PAgP &lt;/strong&gt;support. This is because the &lt;strong&gt;WLC&lt;/strong&gt; &lt;strong&gt;doesn’t support&lt;/strong&gt; &lt;strong&gt;LACP&lt;/strong&gt; or &lt;strong&gt;PAgP&lt;/strong&gt; and requires a plain vanilla Etherchannel.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When connecting the &lt;strong&gt;WLC&lt;/strong&gt; to a &lt;strong&gt;modular Catalyst&lt;/strong&gt; or &lt;strong&gt;Nexus&lt;/strong&gt; switch its always advisable to use ports on &lt;strong&gt;different modules &lt;/strong&gt;as this will &lt;strong&gt;increase redundancy&lt;/strong&gt; in the event of a &lt;strong&gt;module failure&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Finally during the &lt;strong&gt;Port-channel configuration&lt;/strong&gt; process, ensure to allow all necessary VLANs used by the WLC controller and wireless network.&lt;/p&gt;
&lt;p&gt;Once the configuration is complete, we’ll should be able to ping and access the WLC again.&lt;/p&gt;
&lt;p&gt;A simple &lt;strong&gt;show interface port-channel 1&lt;/strong&gt; will also confirm both configured links are up and we have a total bandwidth of &lt;strong&gt;2Gbps&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;3560cx-HQ# &lt;strong&gt;show interface port-channel 1&lt;/strong&gt;
&lt;p&gt;Port-channel1 is up, line protocol is up (connected)&lt;br /&gt;Hardware is EtherChannel, address is 0076.8697.b607 (bia 0076.8697.b607)&lt;br /&gt;Description: WLC2504&lt;br /&gt;MTU 1500 bytes, BW 2000000 Kbit/sec, DLY 10 usec,&lt;br /&gt;reliability 255/255, txload 1/255, rxload 1/255&lt;br /&gt;Encapsulation ARPA, loopback not set&lt;br /&gt;Keepalive set (10 sec)&lt;br /&gt;Full-duplex, 1000Mb/s, link type is auto, media type is unknown&lt;br /&gt;input flow-control is off, output flow-control is unsupported&lt;br /&gt;Members in this channel: Gi0/6 Gi0/7&lt;br /&gt;ARP type: ARPA, ARP Timeout 04:00:00&lt;/p&gt;
&amp;lt;output ommited&amp;gt;&lt;/div&gt;
&lt;p&gt;Additional useful commands that can be used to obtain more information on the Etherchannel are:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 summary&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 status&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 port-channel&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 protocol &lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained the &lt;strong&gt;advantages&lt;/strong&gt; and showed &lt;strong&gt;how to configure Link Aggregation&lt;/strong&gt; (&lt;strong&gt;LAG&lt;/strong&gt;) on your &lt;strong&gt;Cisco WLC&lt;/strong&gt;. We included a number of &lt;strong&gt;important LAG restrictions&lt;/strong&gt; for &lt;strong&gt;WLCs&lt;/strong&gt; while noting restrictions for specific WLC models (2504, 5508 etc). &lt;strong&gt;Cisco switch port configuration&lt;/strong&gt; using &lt;strong&gt;Port-channel interfaces&lt;/strong&gt; was also included along side with an explanation on why &lt;strong&gt;Etherchannel&lt;/strong&gt; must be used as &lt;strong&gt;WLC LAG&lt;/strong&gt; does not support &lt;strong&gt;LACP&lt;/strong&gt; or &lt;strong&gt;PAgP&lt;/strong&gt;. Finally we included a number of &lt;strong&gt;useful commands&lt;/strong&gt; to &lt;strong&gt;verify and troubleshoot&lt;/strong&gt; &lt;strong&gt;Link Aggregation&lt;/strong&gt; or &lt;strong&gt;Port-channel interfaces&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Cisco Wireless Controllers&lt;/strong&gt; (&lt;strong&gt;WLC&lt;/strong&gt;) support the &lt;strong&gt;configuration&lt;/strong&gt; of &lt;strong&gt;Link Aggregation&lt;/strong&gt; (&lt;strong&gt;IEEE 802.3ad - LAG&lt;/strong&gt;) which &lt;strong&gt;bundles&lt;/strong&gt; the &lt;strong&gt;controller ports&lt;/strong&gt; into a &lt;strong&gt;single port channel&lt;/strong&gt;. This helps simplify the &lt;strong&gt;configuration&lt;/strong&gt; of the &lt;strong&gt;WLC interface ports&lt;/strong&gt;, &lt;strong&gt;increase available bandwidth&lt;/strong&gt; between the wireless and wired network, provide &lt;strong&gt;load-balancing&lt;/strong&gt; capabilities between &lt;strong&gt;physical WLC ports&lt;/strong&gt; and &lt;strong&gt;increase port redundancy&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-hint&quot;&gt;To learn more about WLC interfaces refer to our article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality article&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality article&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows an example of a &lt;strong&gt;WLC 2504&lt;/strong&gt; with ports &lt;strong&gt;P1&lt;/strong&gt; and &lt;strong&gt;P2&lt;/strong&gt; in a &lt;strong&gt;LAG configuration&lt;/strong&gt; connecting to a &lt;strong&gt;Cisco Catalyst&lt;/strong&gt; or &lt;strong&gt;Nexus switch&lt;/strong&gt;. In the configuration below WLC ports &lt;strong&gt;P1&lt;/strong&gt; and &lt;strong&gt;P2&lt;/strong&gt; are aggregated to provide a total of &lt;strong&gt;2Gbps bandwidth&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-to-catalyst-nexus-port-channel.png&quot; alt=&quot;WLC LAG Configuration with Cisco Nexus and Catalyst Switch&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WLC LAG Configuration with Cisco Nexus and Catalyst Switch&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#link-aggregation-restrictions&quot; title=&quot;Link Aggregation Restrictions and Considerations&quot;&gt;Link Aggregation Restrictions and Considerations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#wlc-lag-configuration&quot; title=&quot;Wireless Controller LAG Configuration – Enabling LAG&quot;&gt;Wireless Controller LAG Configuration – Enabling LAG&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#configuring-switch-port-channel&quot; title=&quot;Configuring Switch to Support Link Aggregation&quot;&gt;Configuring Switch to Support Link Aggregation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Related Articles&lt;/h2&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Basic Concepts, WLC Models, and GUI Interface&quot;&gt;Cisco WLC Basic Concepts, WLC Models, and GUI Interface&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;WLC Interfaces, Ports &amp;amp; Functionality. Understand how WLCs work, Wi-Fi SSID/VLAN Mappings&quot;&gt;WLC Interfaces, Ports &amp;amp; Functionality. Understand how WLCs work, Wi-Fi SSID/VLAN Mappings&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-downloads-wlc-datasheels.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Datasheets Download&quot;&gt;Cisco WLC Datasheets Download&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;link-aggregation-restrictions&quot;&gt;Link Aggregation Restrictions - Considerations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While &lt;strong&gt;LAG&lt;/strong&gt; is the preferred method of connecting the WLC to the network there however a number of restrictions we need to be aware of to ensure we don’t stumble into any unpleasant surprises.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On &lt;strong&gt;2504&lt;/strong&gt; and &lt;strong&gt;3504 WLCs&lt;/strong&gt; you can bundle all &lt;strong&gt;4 ports&lt;/strong&gt; into a &lt;strong&gt;single link&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;On &lt;strong&gt;5508 WLC&lt;/strong&gt; you can bundle &lt;strong&gt;up to 8 ports&lt;/strong&gt; into a &lt;strong&gt;single link&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link Aggregation Control Protocol&lt;/strong&gt; (&lt;strong&gt;LACP&lt;/strong&gt;) or Cisco proprietary &lt;strong&gt;Port Aggregation Protocol&lt;/strong&gt; (&lt;strong&gt;PAgP&lt;/strong&gt;) are not supported by the WLC. &lt;strong&gt;Port-Channel members&lt;/strong&gt; must be &lt;strong&gt;set unconditionally to LAG&lt;/strong&gt; (shown in the configuration below).&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Only &lt;strong&gt;one LAG Group&lt;/strong&gt; is supported &lt;strong&gt;per WLC&lt;/strong&gt;, you can therefore connect a WLC &lt;strong&gt;only to one switch&lt;/strong&gt; unless using &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-data-center/nexus-vpc-configuration-design-operation-troubleshooting.html#vpc_vs_vss&quot; target=&quot;_blank&quot; title=&quot;VSS (Catalyst) or vPC (Nexus) technologies&quot;&gt;VSS (Catalyst) or vPC (Nexus) technologies&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;When &lt;strong&gt;LAG&lt;/strong&gt; is &lt;strong&gt;enabled&lt;/strong&gt;, if a &lt;strong&gt;single link fails&lt;/strong&gt;, traffic is automatically switched to the other links.&lt;/li&gt;
&lt;li&gt;After &lt;strong&gt;enabling LAG&lt;/strong&gt; the WLC must be &lt;strong&gt;rebooted&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;When &lt;strong&gt;enabling LAG&lt;/strong&gt;, &lt;strong&gt;all dynamic AP manager interfaces&lt;/strong&gt; and &lt;strong&gt;untagged interfaces&lt;/strong&gt; will be &lt;strong&gt;deleted&lt;/strong&gt;. (See related article &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;WLC Interfaces – Logical Interfaces&quot;&gt;WLC Interfaces – Logical Interfaces&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;After &lt;strong&gt;enabling LAG&lt;/strong&gt;, &lt;strong&gt;all Virtual Interfaces&lt;/strong&gt; use the &lt;strong&gt;LAG interface&lt;/strong&gt;. No backup port (under the Virtual Interface settings) is configurable:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-virtual-interfaces-with-and-without-lag-port-channel-large.png&quot; class=&quot;jcepopup&quot; title=&quot;wlc virtual interfaces with and without lag port channel&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WLC virtual interfaces with and without lag port channel&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-virtual-interfaces-with-and-without-lag-port-channel-small.png&quot; alt=&quot;wlc virtual interfaces with and without lag port channel&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;wlc virtual interfaces with and without lag port channel&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;wlc-lag-configuration&quot;&gt;Wireless Controller LAG Configuration – Enabling LAG&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First step is to enable LAG. Log into the &lt;strong&gt;WLC&lt;/strong&gt; and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Advanced menu option&lt;/strong&gt; (firmware v8 and above only). Next, select the &lt;strong&gt;Controller&lt;/strong&gt; menu option and set the &lt;strong&gt;LAG Mode on next reboot&lt;/strong&gt; option to &lt;strong&gt;Enabled&lt;/strong&gt; and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Apply&lt;/strong&gt; button:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-enable-lag.png&quot; alt=&quot;How to enable LAG on Cisco WLC&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;How to enable LAG on Cisco WLC&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point the WLC will pop up a warning window explaining the changes that are about to take place. As mentioned previously, &lt;strong&gt;all dynamic AP manager interfaces&lt;/strong&gt; and &lt;strong&gt;untagged interfaces&lt;/strong&gt; will be &lt;strong&gt;deleted&lt;/strong&gt;. (See related article &lt;a href=&quot;https://www.firewall.cx//cisco-technical-knowledgebase/cisco-wireless/1077-cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;WLC Interfaces – Logical Interfaces&quot;&gt;WLC Interfaces – Logical Interfaces&lt;/a&gt; to understand the implications):&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-enable-lag-confirmation.png&quot; alt=&quot;WLC Configuration to enable LAG Support&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;WLC Configuration to enable LAG Support&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once we &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; the WLC will proceed to &lt;strong&gt;enable LAG mode&lt;/strong&gt; and present us with another notification requesting that we &lt;strong&gt;save the configuration&lt;/strong&gt; and &lt;strong&gt;reboot the controller&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-lag-confirmation.png&quot; alt=&quot;WLC LAG Mode Confirmation&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;WLC LAG Mode Confirmation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Note: Ignore the DNS Server IP that was presented in our Lab environment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Save Configuration&lt;/strong&gt; button on the top right corner. To &lt;strong&gt;reboot the controller&lt;/strong&gt;, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Commands&lt;/strong&gt; menu, select &lt;strong&gt;Reboot&lt;/strong&gt; from the &lt;strong&gt;right menu column&lt;/strong&gt; and finally &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Reboot&lt;/strong&gt; button on the right:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco/wireless/wlc-lag-configuration/wlc-2504-reboot.png&quot; alt=&quot;wlc 2504 reboot process&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;wlc 2504 reboot process&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; in the popup message to confirm the reboot.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point the WLC will reboot and we won’t be able to ping or access the WLC web interface until we configure the switch. All access points and wireless networks will also be unavailable.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;configuring-switch-port-channel&quot;&gt;Configuring Switch Port-Channel to Support Link Aggregation&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Port-channel configuration&lt;/strong&gt; is a straight forward process. It’s best to ensure all interfaces participating in the &lt;strong&gt;Port-channel&lt;/strong&gt; are set to their &lt;strong&gt;default configuration&lt;/strong&gt;. This will remove any existing configuration, minimizing errors during the switchport configuration process.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First &lt;strong&gt;remove existing configuration&lt;/strong&gt; from the interfaces participating in the Port-channel (&lt;strong&gt;Gigabitethernet 0/6 &lt;/strong&gt;&amp;amp; &lt;strong&gt;0/7&lt;/strong&gt;), then make them &lt;strong&gt;members&lt;/strong&gt; of &lt;strong&gt;Port-channel 1&lt;/strong&gt;. If the Port-channel doesn’t exist, it will be automatically created:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;3560cx-HQ(config)# &lt;strong&gt;default interface range Gigabitethernet 0/6-7&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config)# &lt;strong&gt;interface range GigabitEthernet 0/6-7&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;channel-group 1 mode on&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Creating a port-channel interface Port-channel 1&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;description WLC2504&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)#&lt;strong&gt; switchport mode trunk&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;/strong&gt;&lt;br /&gt;3560cx-HQ(config-if-range)# &lt;strong&gt;no shutdown&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;Below is the complete Port-channel and interface configuration:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;!&lt;br /&gt;interface Port-channel1&lt;br /&gt;description WLC2504&lt;br /&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;br /&gt;switchport mode trunk&lt;br /&gt;!&lt;br /&gt;interface GigabitEthernet0/6&lt;br /&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;br /&gt;switchport mode trunk&lt;br /&gt;channel-group 1 mode on&lt;br /&gt;!&lt;br /&gt;interface GigabitEthernet0/7&lt;br /&gt;switchport trunk allowed vlan 2,15,16,22,26&lt;br /&gt;switchport mode trunk&lt;br /&gt;channel-group 1 mode on&lt;br /&gt;!&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that the &lt;strong&gt;channel-group mode&lt;/strong&gt; is set to &lt;strong&gt;on&lt;/strong&gt; which enables &lt;strong&gt;Etherchannel &lt;/strong&gt;without any &lt;strong&gt;LACP&lt;/strong&gt; or &lt;strong&gt;PAgP &lt;/strong&gt;support. This is because the &lt;strong&gt;WLC&lt;/strong&gt; &lt;strong&gt;doesn’t support&lt;/strong&gt; &lt;strong&gt;LACP&lt;/strong&gt; or &lt;strong&gt;PAgP&lt;/strong&gt; and requires a plain vanilla Etherchannel.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When connecting the &lt;strong&gt;WLC&lt;/strong&gt; to a &lt;strong&gt;modular Catalyst&lt;/strong&gt; or &lt;strong&gt;Nexus&lt;/strong&gt; switch its always advisable to use ports on &lt;strong&gt;different modules &lt;/strong&gt;as this will &lt;strong&gt;increase redundancy&lt;/strong&gt; in the event of a &lt;strong&gt;module failure&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Finally during the &lt;strong&gt;Port-channel configuration&lt;/strong&gt; process, ensure to allow all necessary VLANs used by the WLC controller and wireless network.&lt;/p&gt;
&lt;p&gt;Once the configuration is complete, we’ll should be able to ping and access the WLC again.&lt;/p&gt;
&lt;p&gt;A simple &lt;strong&gt;show interface port-channel 1&lt;/strong&gt; will also confirm both configured links are up and we have a total bandwidth of &lt;strong&gt;2Gbps&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;3560cx-HQ# &lt;strong&gt;show interface port-channel 1&lt;/strong&gt;
&lt;p&gt;Port-channel1 is up, line protocol is up (connected)&lt;br /&gt;Hardware is EtherChannel, address is 0076.8697.b607 (bia 0076.8697.b607)&lt;br /&gt;Description: WLC2504&lt;br /&gt;MTU 1500 bytes, BW 2000000 Kbit/sec, DLY 10 usec,&lt;br /&gt;reliability 255/255, txload 1/255, rxload 1/255&lt;br /&gt;Encapsulation ARPA, loopback not set&lt;br /&gt;Keepalive set (10 sec)&lt;br /&gt;Full-duplex, 1000Mb/s, link type is auto, media type is unknown&lt;br /&gt;input flow-control is off, output flow-control is unsupported&lt;br /&gt;Members in this channel: Gi0/6 Gi0/7&lt;br /&gt;ARP type: ARPA, ARP Timeout 04:00:00&lt;/p&gt;
&amp;lt;output ommited&amp;gt;&lt;/div&gt;
&lt;p&gt;Additional useful commands that can be used to obtain more information on the Etherchannel are:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 summary&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 status&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 port-channel&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Show etherchannel 1 protocol &lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained the &lt;strong&gt;advantages&lt;/strong&gt; and showed &lt;strong&gt;how to configure Link Aggregation&lt;/strong&gt; (&lt;strong&gt;LAG&lt;/strong&gt;) on your &lt;strong&gt;Cisco WLC&lt;/strong&gt;. We included a number of &lt;strong&gt;important LAG restrictions&lt;/strong&gt; for &lt;strong&gt;WLCs&lt;/strong&gt; while noting restrictions for specific WLC models (2504, 5508 etc). &lt;strong&gt;Cisco switch port configuration&lt;/strong&gt; using &lt;strong&gt;Port-channel interfaces&lt;/strong&gt; was also included along side with an explanation on why &lt;strong&gt;Etherchannel&lt;/strong&gt; must be used as &lt;strong&gt;WLC LAG&lt;/strong&gt; does not support &lt;strong&gt;LACP&lt;/strong&gt; or &lt;strong&gt;PAgP&lt;/strong&gt;. Finally we included a number of &lt;strong&gt;useful commands&lt;/strong&gt; to &lt;strong&gt;verify and troubleshoot&lt;/strong&gt; &lt;strong&gt;Link Aggregation&lt;/strong&gt; or &lt;strong&gt;Port-channel interfaces&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Cisco WLC Interfaces, Ports &amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp; Wi-Fi SSID/VLAN mappings</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html"/>
		<published>2015-03-16T08:26:21+11:00</published>
		<updated>2015-03-16T08:26:21+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;Our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts&quot;&gt;previous article&lt;/a&gt; introduced &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controller - Introduction &amp;amp; Basic concepts&quot;&gt;Cisco’s popular Wireless ControllerCisco’s popular Wireless Controller&lt;/a&gt; (WLC) devices and examined their &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;benefits to enterprise networks&quot;&gt;benefits to enterprise networks&lt;/a&gt;, different models offered and finally took a look at their friendly &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;GUI interfaces&quot;&gt;GUI interfaces&lt;/a&gt;. This article continues by explaining the &lt;strong&gt;purpose and functionality&lt;/strong&gt; of each &lt;strong&gt;WLC interface&lt;/strong&gt; (&lt;strong&gt;Management interface&lt;/strong&gt;, &lt;strong&gt;Virtual interface&lt;/strong&gt;, &lt;strong&gt;AP-Manager interface&lt;/strong&gt;, &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; etc),&amp;nbsp;&lt;strong&gt;WLC Port&lt;/strong&gt; (&lt;strong&gt;Service port&lt;/strong&gt;, &lt;strong&gt;Redundant port&lt;/strong&gt;, &lt;strong&gt;Distribution ports&lt;/strong&gt; etc), &lt;strong&gt;how WLCs connect to the network infrastructure&lt;/strong&gt;, &lt;strong&gt;VLAN requirements&lt;/strong&gt; and &lt;strong&gt;mapping to SSIDs&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Users can freely download Cisco's WLC product portfolio in our &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; target=&quot;_blank&quot; title=&quot;Cisco's Wireless Controller Datasheets - Free download&quot;&gt;Cisco's Wireless Controller Datasheets&lt;/a&gt; download section.&amp;nbsp;The datasheets contain all currently available WLC models, brief specification overview/comparison and much more.&lt;/p&gt;
&lt;h2&gt;WLC Interface Concepts – Understanding Ports &amp;amp; Logical Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Every WLC is fitted with a number of &lt;strong&gt;ports&lt;/strong&gt; (&lt;strong&gt;physical interfaces&lt;/strong&gt;) and &lt;strong&gt;logical interfaces&lt;/strong&gt;, all critical for the device’s proper &lt;strong&gt;operation&lt;/strong&gt; and &lt;strong&gt;integration&lt;/strong&gt; with the &lt;strong&gt;network infrastructure&lt;/strong&gt;. It is important that engineers working with WLCs, &lt;strong&gt;understand&lt;/strong&gt; the &lt;strong&gt;purpose&lt;/strong&gt; of &lt;strong&gt;each interface&lt;/strong&gt; and how it should be used. This will help maximize the &lt;strong&gt;stability&lt;/strong&gt; and &lt;strong&gt;scalability&lt;/strong&gt; of any &lt;strong&gt;WLC deployment&lt;/strong&gt; by correctly configuring all necessary interfaces and attached devices.&lt;/p&gt;
&lt;h2&gt;WLC Ports (Physical Interfaces)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will now take a look at the different ports that can be found on WLCs and explain their purpose. Depending on the WLC model, some ports might or might not be present. The &lt;strong&gt;Console Port&lt;/strong&gt; and &lt;strong&gt;Distribution System Ports&lt;/strong&gt; are found on all WLCs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-1.jpg&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller 5500 ports and interfaces&quot; /&gt;Figure 1. Available Ports on a Cisco WLC 5500&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Redundancy Port&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This port is used for &lt;strong&gt;High-Availability&lt;/strong&gt; (&lt;strong&gt;HA&lt;/strong&gt;) &lt;strong&gt;deployment&lt;/strong&gt; &lt;strong&gt;designs&lt;/strong&gt; when there are &lt;strong&gt;two WLCs&lt;/strong&gt; available. In this setup, both WLCs are physically connected with each other through the &lt;strong&gt;Redundant Port&lt;/strong&gt; using an Ethernet cable. The &lt;strong&gt;redundancy port&lt;/strong&gt; is used for configuration, operational data synchronization and role negotiation between the &lt;strong&gt;primary&lt;/strong&gt; and &lt;strong&gt;secondary&lt;/strong&gt; controllers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The redundancy port checks for peer reachability by sending &lt;strong&gt;UDP keepalive messages&lt;/strong&gt; every &lt;strong&gt;100 milliseconds&lt;/strong&gt; from the standby-hot WLC to the active WLC. Finally, the &lt;strong&gt;first two octets&lt;/strong&gt; of the redundancy port’s IP address is always &lt;strong&gt;169.254.xxx.xxx&lt;/strong&gt;.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Service Port&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;service port&lt;/strong&gt; is used for &lt;strong&gt;out-of-band management&lt;/strong&gt; of the controller and &lt;strong&gt;system recovery&lt;/strong&gt; and &lt;strong&gt;maintenance&lt;/strong&gt; in the event of a network failure. It is important to note that the &lt;strong&gt;service port&lt;/strong&gt; does &lt;strong&gt;not support VLAN trunking&lt;/strong&gt; or &lt;strong&gt;VLAN tagging&lt;/strong&gt; and is therefore required to connect to an &lt;strong&gt;access port&lt;/strong&gt; on the switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is also recommended &lt;strong&gt;not to connect the service port&lt;/strong&gt; to the &lt;strong&gt;same VLAN&lt;/strong&gt; as the &lt;strong&gt;wired clients network&lt;/strong&gt; because by doing so, administrators will not be able to access the &lt;strong&gt;management interface&lt;/strong&gt; (analysed later) of the controller.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;SFP/Ethernet Distribution System Ports&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;distribution system ports&lt;/strong&gt; are the &lt;strong&gt;most important ports&lt;/strong&gt; on the WLC as they connect the &lt;strong&gt;internal logical interfaces&lt;/strong&gt; (analysed below) and &lt;strong&gt;wireless client traffic&lt;/strong&gt; to the rest of our network. &lt;strong&gt;High-end WLCs&lt;/strong&gt; as the WLC 5500 series above, have &lt;strong&gt;multiple SFP-based distribution system ports&lt;/strong&gt; allowing engineers to connect the WLC with the network backbone using different configurations. The &lt;strong&gt;SFP Ports&lt;/strong&gt; are able to accept &lt;strong&gt;fiber optic&lt;/strong&gt; or &lt;strong&gt;Ethernet copper interfaces&lt;/strong&gt;, with the use of the appropriate SFPs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-2b.png&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-2b&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller SFPs - Fiber Optic / Copper Ethernet&quot; /&gt;Figure 2. Picture of Fiber &amp;amp; Ethernet Copper SFPs&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lower-end WLCs such as the &lt;strong&gt;WLC2504&lt;/strong&gt; or the older &lt;strong&gt;WLC2100&lt;/strong&gt; series provide Ethernet interfaces only, because of the limited number of access points supported. For example, the &lt;strong&gt;WLC2504&lt;/strong&gt; provides up to &lt;strong&gt;4 Gigabit Ethernet ports&lt;/strong&gt; and can support up to &lt;strong&gt;75 access points&lt;/strong&gt;, while the &lt;strong&gt;WLC2125&lt;/strong&gt; provides up to &lt;strong&gt;8 FastEthernet ports&lt;/strong&gt; and supports up to &lt;strong&gt;25 access points&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-3.png&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller Pictures of WLC2504 &amp;amp; WLC2124&quot; /&gt;Figure 3. Pictures of WLC2504 &amp;amp; WLC2124&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;WLC Interfaces (logical Interfaces)&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this section, we will examine the &lt;strong&gt;logical interfaces &lt;/strong&gt;that can be found on all WLCs. Understanding the functionality of each logical interface is crucial for the correct setup and deployment of any Cisco WLC-based wireless network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The WLC’s logical interfaces are used to help manage the Wireless SSIDs broadcasted by the access points, manage the controller, access point and user data, plus more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below provides and visual layout of the logical interfaces and how they connect to the physical ports of a WLC:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-4b.png&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controller Interfaces and Ports&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-4.png&quot; alt=&quot;&quot; width=&quot;425&quot; height=&quot;372&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller Interfaces &amp;amp; Ports&quot; data-alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-4&quot; /&gt;&lt;/a&gt;Figure 4. Cisco Wireless Controller Interfaces &amp;amp; Ports (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above layout shows how each &lt;strong&gt;Wireless SSID&lt;/strong&gt; (WLAN 1, WLAN 2 etc), &lt;strong&gt;maps&lt;/strong&gt; to a &lt;strong&gt;Dynamic interface&lt;/strong&gt;. In turn, each &lt;strong&gt;Dynamic interface&lt;/strong&gt; &lt;strong&gt;maps&lt;/strong&gt; to a &lt;strong&gt;specific VLAN&lt;/strong&gt;. The number of &lt;strong&gt;WLANs &amp;amp; Dynamic interfaces&lt;/strong&gt; &lt;strong&gt;depend&lt;/strong&gt; on the &lt;strong&gt;WLC model&lt;/strong&gt;. The bigger the WLC model, the more SSIDs (Wireless Networks)/Dynamic interfaces it supports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; and &lt;strong&gt;AP-Manager&lt;/strong&gt;/&lt;strong&gt;Manager interfaces&lt;/strong&gt; connect to the network infrastructure via the &lt;strong&gt;Distribution ports&lt;/strong&gt; which depending on the WLC model are &lt;strong&gt;SFP&lt;/strong&gt; or &lt;strong&gt;Ethernet&lt;/strong&gt; (10/100 or Gigabit) &lt;strong&gt;interfaces&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because all WLCs have &lt;strong&gt;multiple physical Distribution ports&lt;/strong&gt;, it is possible to assign all &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; and &lt;strong&gt;AP-Manager&lt;/strong&gt;/&lt;strong&gt;Manager&lt;/strong&gt; &lt;strong&gt;interfaces&lt;/strong&gt; to &lt;strong&gt;one physical Distribution port&lt;/strong&gt;, as shown in the above diagram. In this case, the &lt;strong&gt;Distribution port&lt;/strong&gt; is configured as an &lt;strong&gt;802.1q Trunk port&lt;/strong&gt;. Alternatively, &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; can also be assigned to &lt;strong&gt;separate physical Distribution ports&lt;/strong&gt;, so that &lt;strong&gt;a specific WLAN/Dynamic interface&lt;/strong&gt; can tunnel its traffic through &lt;strong&gt;a single Distribution port&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;dedicated Service-Port&lt;/strong&gt; seen in the above diagram can be found only on the &lt;strong&gt;WLC 5500 series&lt;/strong&gt; and &lt;strong&gt;7500/8500 series &lt;/strong&gt;which connects directly to the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a closer look at each logical interface and explain its purpose:&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Management Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;management interface&lt;/strong&gt; is the default interface used to access and manage the WLC. The &lt;strong&gt;management interface&lt;/strong&gt; is also &lt;strong&gt;used by the access points&lt;/strong&gt; to &lt;strong&gt;communicate&lt;/strong&gt; with the WLC. The &lt;strong&gt;management interface&lt;/strong&gt; IP address &lt;strong&gt;is the only ping-able IP address&lt;/strong&gt; and is used by administrators to manage the WLC.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Administrators can &lt;strong&gt;log into&lt;/strong&gt; the WLC’s configuration GUI by entering the &lt;strong&gt;management interface IP address&lt;/strong&gt; in a web browser and logging into the system.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;AP-Manager Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A controller can have &lt;strong&gt;one of more AP-Manager interfaces&lt;/strong&gt; which are used for all &lt;strong&gt;Layer 3 communications&lt;/strong&gt; between the &lt;strong&gt;controller&lt;/strong&gt; and &lt;strong&gt;lightweight access points&lt;/strong&gt; after they have joined the controller. The &lt;strong&gt;AP-Manager IP address&lt;/strong&gt; is used as the &lt;strong&gt;tunnel source&lt;/strong&gt; for &lt;strong&gt;CAPWAP&lt;/strong&gt;/&lt;strong&gt;LWAPP&lt;/strong&gt; packets from the controller to the access points, and as the &lt;strong&gt;destination IP address&lt;/strong&gt; for &lt;strong&gt;CAPWAP/ LWAPP packets&lt;/strong&gt; from the access points to the controller.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While the configuration and usage of the &lt;strong&gt;AP-Manager interfaces&lt;/strong&gt; is optional, models such as the &lt;strong&gt;WLC2504&lt;/strong&gt; and &lt;strong&gt;WLC5508&lt;/strong&gt;, &lt;strong&gt;do not have a dedicated AP-Manager interface&lt;/strong&gt;. For these models, under the &lt;strong&gt;Management interface settings&lt;/strong&gt;, there is an option labeled &lt;strong&gt;Enable Dynamic AP Management&lt;/strong&gt;, that allows the &lt;strong&gt;Management interface&lt;/strong&gt; to work as an &lt;strong&gt;AP-Manager interface&lt;/strong&gt; at the same time:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-5b.png&quot; target=&quot;_blank&quot; title=&quot;Cisco WL2504 - Management interface, Dynamic AP Management option&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-5.png&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco WL2504 - Management interface, Dynamic AP Management option&quot; /&gt;&lt;/a&gt;Figure 5. Cisco WL2504 - Management interface, Dynamic AP Management option (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;According to Cisco's documentation, each &lt;strong&gt;AP-Manager interface&lt;/strong&gt; can handle up to &lt;strong&gt;48 access points&lt;/strong&gt;, however we belieive with the latest firmware updates that this limit has been increased to &lt;strong&gt;75&lt;/strong&gt;, because the smaller WLC model (2504) can now handle up to &lt;strong&gt;75 access points&lt;/strong&gt; with its dual-purpose &lt;strong&gt;management/AP-Manager interface&lt;/strong&gt;. If more access points are installed, then &lt;strong&gt;multiple AP-Manager interfaces&lt;/strong&gt; are required to be configured.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Virtual Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;virtual interface&lt;/strong&gt; is used to &lt;strong&gt;manage and support wireless clients&lt;/strong&gt; by providing &lt;strong&gt;DHCP relay functionality&lt;/strong&gt;, &lt;strong&gt;guest web authentication&lt;/strong&gt;, &lt;strong&gt;VPN termination&lt;/strong&gt; and other services. The virtual interface plays the following two primary roles:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Acts as the DHCP server placeholder for wireless clients that obtain their IP address from a DHCP server.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Serves as the redirect address for the web authentication login page (if configured).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;virtual interface IP address&lt;/strong&gt; is only used for &lt;strong&gt;communications&lt;/strong&gt; between the &lt;strong&gt;controller&lt;/strong&gt; and &lt;strong&gt;wireless clients&lt;/strong&gt;. It &lt;strong&gt;never appears&lt;/strong&gt; as the &lt;strong&gt;source or destination address&lt;/strong&gt; of a packet that goes out through the distribution ports and on to the local network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, the IP address of the virtual interface &lt;strong&gt;must be unique&lt;/strong&gt; on the network. For this reason, a &lt;strong&gt;common IP address&lt;/strong&gt; used for the &lt;strong&gt;virtual interface&lt;/strong&gt; is &lt;strong&gt;1.1.1.1&lt;/strong&gt;. All controllers within a mobility group must be configured with the same virtual interface IP address to ensure inter-controller roaming works correctly without connectivity loss.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Service-Port Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;service-port interface&lt;/strong&gt; is used for &lt;strong&gt;out-of-band management&lt;/strong&gt; of the controller. If the management workstation is in a remote subnet, it may be necessary to add a IPv4 route on the controller in order to manage the controller from the remote workstation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that the&lt;strong&gt; service-port IP address&lt;/strong&gt; must &lt;strong&gt;not reside on the same subnet&lt;/strong&gt; as the &lt;strong&gt;Manager/AP-Manager interface&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Smaller WLC models such as the WLC2124, WLC2504 do not have a service-port interface.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Dynamic Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The easiest way to explain &lt;strong&gt;dynamic interfaces&lt;/strong&gt; is to think of them as &lt;strong&gt;VLAN interfaces for your wireless networks (SSIDs)&lt;/strong&gt;. &lt;strong&gt;One dynamic interface&lt;/strong&gt; is created &lt;strong&gt;per wireless network/SSID&lt;/strong&gt;. The &lt;strong&gt;wireless network&lt;/strong&gt; or &lt;strong&gt;SSID&lt;/strong&gt; is &lt;strong&gt;mapped&lt;/strong&gt; to a &lt;strong&gt;dynamic interface&lt;/strong&gt;, which is then mapped to a &lt;strong&gt;specific VLAN network&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, &lt;strong&gt;dynamic interfaces&lt;/strong&gt; can be assigned to &lt;strong&gt;separate physical distribution ports&lt;/strong&gt;, so that traffic from &lt;strong&gt;specific WLANs&lt;/strong&gt;, pass to the wired network via &lt;strong&gt;specific distribution ports&lt;/strong&gt;. In this scenario, each distribution port is a single access-link carrying one VLAN only.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Alternatively, &lt;strong&gt;all dynamic interfaces&lt;/strong&gt; can be mapped to &lt;strong&gt;one distribution port&lt;/strong&gt;, in which case will be a &lt;strong&gt;trunk port&lt;/strong&gt; so that it can carry all &lt;strong&gt;WLANs/VLANs&lt;/strong&gt;. This is a common setup method for smaller networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, each &lt;strong&gt;dynamic interface&lt;/strong&gt; must be on a &lt;strong&gt;different VLAN or IP subnet&lt;/strong&gt; from all other interfaces.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since the &lt;strong&gt;WLC2504&lt;/strong&gt; controller can handle up to &lt;strong&gt;16 SSIDs&lt;/strong&gt;, it can have a maximum of &lt;strong&gt;16 dynamic interfaces&lt;/strong&gt;, and support a maximum of &lt;strong&gt;16 VLANs&lt;/strong&gt;.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Distribution Port - Link Aggregation&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All WLCs support the aggregation of &lt;strong&gt;multiple distribution ports&lt;/strong&gt; into &lt;strong&gt;a single port&lt;/strong&gt; using the &lt;strong&gt;802.3ad port standard&lt;/strong&gt;. This allows an administrator to create&lt;strong&gt; one large link&lt;/strong&gt; between the WLC and the local switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For example, the WLC2504 provides &lt;strong&gt;4 Gigabit Ethernet ports&lt;/strong&gt;, allowing us to &lt;strong&gt;aggregate all 4 ports&lt;/strong&gt; with the &lt;strong&gt;neighbour switch&lt;/strong&gt; and create a &lt;strong&gt;4 Gigabit Ethernet link&lt;/strong&gt; with the wired network. &lt;strong&gt;EtherChannel&lt;/strong&gt; will have to be configured on the local switch for the link aggregation to work.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WLCs do not support &lt;strong&gt;Link Aggregation Control Protocol&lt;/strong&gt; (&lt;strong&gt;LACP&lt;/strong&gt;) or &lt;strong&gt;Cisco’s proprietary Port Aggregation Protocol&lt;/strong&gt; (&lt;strong&gt;PAgP&lt;/strong&gt;), and therefore the switch must be &lt;strong&gt;set unconditionally to LAG&lt;/strong&gt;. Only one LAG group is supported per controller.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Conclusion&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article &lt;strong&gt;introduced&lt;/strong&gt; the &lt;strong&gt;Cisco Wireless LAN Controller interfaces&lt;/strong&gt;. We covered the &lt;strong&gt;interfaces&lt;/strong&gt; and &lt;strong&gt;ports&lt;/strong&gt; found on &lt;strong&gt;WLCs&lt;/strong&gt;, and analysed each &lt;strong&gt;interface's&amp;nbsp;purpose&lt;/strong&gt;, including &lt;strong&gt;Ethernet distribution ports&lt;/strong&gt;, &lt;strong&gt;service port&lt;/strong&gt;, &lt;strong&gt;redundancy port&lt;/strong&gt;, interfaces such as the &lt;strong&gt;management interface&lt;/strong&gt;, &lt;strong&gt;ap-manager interface&lt;/strong&gt;, &lt;strong&gt;virtual interface&lt;/strong&gt; and &lt;strong&gt;dynamic interfaces&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;Our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts&quot;&gt;previous article&lt;/a&gt; introduced &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controller - Introduction &amp;amp; Basic concepts&quot;&gt;Cisco’s popular Wireless ControllerCisco’s popular Wireless Controller&lt;/a&gt; (WLC) devices and examined their &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;benefits to enterprise networks&quot;&gt;benefits to enterprise networks&lt;/a&gt;, different models offered and finally took a look at their friendly &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;GUI interfaces&quot;&gt;GUI interfaces&lt;/a&gt;. This article continues by explaining the &lt;strong&gt;purpose and functionality&lt;/strong&gt; of each &lt;strong&gt;WLC interface&lt;/strong&gt; (&lt;strong&gt;Management interface&lt;/strong&gt;, &lt;strong&gt;Virtual interface&lt;/strong&gt;, &lt;strong&gt;AP-Manager interface&lt;/strong&gt;, &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; etc),&amp;nbsp;&lt;strong&gt;WLC Port&lt;/strong&gt; (&lt;strong&gt;Service port&lt;/strong&gt;, &lt;strong&gt;Redundant port&lt;/strong&gt;, &lt;strong&gt;Distribution ports&lt;/strong&gt; etc), &lt;strong&gt;how WLCs connect to the network infrastructure&lt;/strong&gt;, &lt;strong&gt;VLAN requirements&lt;/strong&gt; and &lt;strong&gt;mapping to SSIDs&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Users can freely download Cisco's WLC product portfolio in our &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; target=&quot;_blank&quot; title=&quot;Cisco's Wireless Controller Datasheets - Free download&quot;&gt;Cisco's Wireless Controller Datasheets&lt;/a&gt; download section.&amp;nbsp;The datasheets contain all currently available WLC models, brief specification overview/comparison and much more.&lt;/p&gt;
&lt;h2&gt;WLC Interface Concepts – Understanding Ports &amp;amp; Logical Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Every WLC is fitted with a number of &lt;strong&gt;ports&lt;/strong&gt; (&lt;strong&gt;physical interfaces&lt;/strong&gt;) and &lt;strong&gt;logical interfaces&lt;/strong&gt;, all critical for the device’s proper &lt;strong&gt;operation&lt;/strong&gt; and &lt;strong&gt;integration&lt;/strong&gt; with the &lt;strong&gt;network infrastructure&lt;/strong&gt;. It is important that engineers working with WLCs, &lt;strong&gt;understand&lt;/strong&gt; the &lt;strong&gt;purpose&lt;/strong&gt; of &lt;strong&gt;each interface&lt;/strong&gt; and how it should be used. This will help maximize the &lt;strong&gt;stability&lt;/strong&gt; and &lt;strong&gt;scalability&lt;/strong&gt; of any &lt;strong&gt;WLC deployment&lt;/strong&gt; by correctly configuring all necessary interfaces and attached devices.&lt;/p&gt;
&lt;h2&gt;WLC Ports (Physical Interfaces)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We will now take a look at the different ports that can be found on WLCs and explain their purpose. Depending on the WLC model, some ports might or might not be present. The &lt;strong&gt;Console Port&lt;/strong&gt; and &lt;strong&gt;Distribution System Ports&lt;/strong&gt; are found on all WLCs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-1.jpg&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller 5500 ports and interfaces&quot; /&gt;Figure 1. Available Ports on a Cisco WLC 5500&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Redundancy Port&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This port is used for &lt;strong&gt;High-Availability&lt;/strong&gt; (&lt;strong&gt;HA&lt;/strong&gt;) &lt;strong&gt;deployment&lt;/strong&gt; &lt;strong&gt;designs&lt;/strong&gt; when there are &lt;strong&gt;two WLCs&lt;/strong&gt; available. In this setup, both WLCs are physically connected with each other through the &lt;strong&gt;Redundant Port&lt;/strong&gt; using an Ethernet cable. The &lt;strong&gt;redundancy port&lt;/strong&gt; is used for configuration, operational data synchronization and role negotiation between the &lt;strong&gt;primary&lt;/strong&gt; and &lt;strong&gt;secondary&lt;/strong&gt; controllers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The redundancy port checks for peer reachability by sending &lt;strong&gt;UDP keepalive messages&lt;/strong&gt; every &lt;strong&gt;100 milliseconds&lt;/strong&gt; from the standby-hot WLC to the active WLC. Finally, the &lt;strong&gt;first two octets&lt;/strong&gt; of the redundancy port’s IP address is always &lt;strong&gt;169.254.xxx.xxx&lt;/strong&gt;.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Service Port&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;service port&lt;/strong&gt; is used for &lt;strong&gt;out-of-band management&lt;/strong&gt; of the controller and &lt;strong&gt;system recovery&lt;/strong&gt; and &lt;strong&gt;maintenance&lt;/strong&gt; in the event of a network failure. It is important to note that the &lt;strong&gt;service port&lt;/strong&gt; does &lt;strong&gt;not support VLAN trunking&lt;/strong&gt; or &lt;strong&gt;VLAN tagging&lt;/strong&gt; and is therefore required to connect to an &lt;strong&gt;access port&lt;/strong&gt; on the switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is also recommended &lt;strong&gt;not to connect the service port&lt;/strong&gt; to the &lt;strong&gt;same VLAN&lt;/strong&gt; as the &lt;strong&gt;wired clients network&lt;/strong&gt; because by doing so, administrators will not be able to access the &lt;strong&gt;management interface&lt;/strong&gt; (analysed later) of the controller.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;SFP/Ethernet Distribution System Ports&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;distribution system ports&lt;/strong&gt; are the &lt;strong&gt;most important ports&lt;/strong&gt; on the WLC as they connect the &lt;strong&gt;internal logical interfaces&lt;/strong&gt; (analysed below) and &lt;strong&gt;wireless client traffic&lt;/strong&gt; to the rest of our network. &lt;strong&gt;High-end WLCs&lt;/strong&gt; as the WLC 5500 series above, have &lt;strong&gt;multiple SFP-based distribution system ports&lt;/strong&gt; allowing engineers to connect the WLC with the network backbone using different configurations. The &lt;strong&gt;SFP Ports&lt;/strong&gt; are able to accept &lt;strong&gt;fiber optic&lt;/strong&gt; or &lt;strong&gt;Ethernet copper interfaces&lt;/strong&gt;, with the use of the appropriate SFPs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-2b.png&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-2b&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller SFPs - Fiber Optic / Copper Ethernet&quot; /&gt;Figure 2. Picture of Fiber &amp;amp; Ethernet Copper SFPs&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Lower-end WLCs such as the &lt;strong&gt;WLC2504&lt;/strong&gt; or the older &lt;strong&gt;WLC2100&lt;/strong&gt; series provide Ethernet interfaces only, because of the limited number of access points supported. For example, the &lt;strong&gt;WLC2504&lt;/strong&gt; provides up to &lt;strong&gt;4 Gigabit Ethernet ports&lt;/strong&gt; and can support up to &lt;strong&gt;75 access points&lt;/strong&gt;, while the &lt;strong&gt;WLC2125&lt;/strong&gt; provides up to &lt;strong&gt;8 FastEthernet ports&lt;/strong&gt; and supports up to &lt;strong&gt;25 access points&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-3.png&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller Pictures of WLC2504 &amp;amp; WLC2124&quot; /&gt;Figure 3. Pictures of WLC2504 &amp;amp; WLC2124&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;WLC Interfaces (logical Interfaces)&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this section, we will examine the &lt;strong&gt;logical interfaces &lt;/strong&gt;that can be found on all WLCs. Understanding the functionality of each logical interface is crucial for the correct setup and deployment of any Cisco WLC-based wireless network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The WLC’s logical interfaces are used to help manage the Wireless SSIDs broadcasted by the access points, manage the controller, access point and user data, plus more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below provides and visual layout of the logical interfaces and how they connect to the physical ports of a WLC:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-4b.png&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controller Interfaces and Ports&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-4.png&quot; alt=&quot;&quot; width=&quot;425&quot; height=&quot;372&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller Interfaces &amp;amp; Ports&quot; data-alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-4&quot; /&gt;&lt;/a&gt;Figure 4. Cisco Wireless Controller Interfaces &amp;amp; Ports (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above layout shows how each &lt;strong&gt;Wireless SSID&lt;/strong&gt; (WLAN 1, WLAN 2 etc), &lt;strong&gt;maps&lt;/strong&gt; to a &lt;strong&gt;Dynamic interface&lt;/strong&gt;. In turn, each &lt;strong&gt;Dynamic interface&lt;/strong&gt; &lt;strong&gt;maps&lt;/strong&gt; to a &lt;strong&gt;specific VLAN&lt;/strong&gt;. The number of &lt;strong&gt;WLANs &amp;amp; Dynamic interfaces&lt;/strong&gt; &lt;strong&gt;depend&lt;/strong&gt; on the &lt;strong&gt;WLC model&lt;/strong&gt;. The bigger the WLC model, the more SSIDs (Wireless Networks)/Dynamic interfaces it supports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; and &lt;strong&gt;AP-Manager&lt;/strong&gt;/&lt;strong&gt;Manager interfaces&lt;/strong&gt; connect to the network infrastructure via the &lt;strong&gt;Distribution ports&lt;/strong&gt; which depending on the WLC model are &lt;strong&gt;SFP&lt;/strong&gt; or &lt;strong&gt;Ethernet&lt;/strong&gt; (10/100 or Gigabit) &lt;strong&gt;interfaces&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Because all WLCs have &lt;strong&gt;multiple physical Distribution ports&lt;/strong&gt;, it is possible to assign all &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; and &lt;strong&gt;AP-Manager&lt;/strong&gt;/&lt;strong&gt;Manager&lt;/strong&gt; &lt;strong&gt;interfaces&lt;/strong&gt; to &lt;strong&gt;one physical Distribution port&lt;/strong&gt;, as shown in the above diagram. In this case, the &lt;strong&gt;Distribution port&lt;/strong&gt; is configured as an &lt;strong&gt;802.1q Trunk port&lt;/strong&gt;. Alternatively, &lt;strong&gt;Dynamic interfaces&lt;/strong&gt; can also be assigned to &lt;strong&gt;separate physical Distribution ports&lt;/strong&gt;, so that &lt;strong&gt;a specific WLAN/Dynamic interface&lt;/strong&gt; can tunnel its traffic through &lt;strong&gt;a single Distribution port&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;dedicated Service-Port&lt;/strong&gt; seen in the above diagram can be found only on the &lt;strong&gt;WLC 5500 series&lt;/strong&gt; and &lt;strong&gt;7500/8500 series &lt;/strong&gt;which connects directly to the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a closer look at each logical interface and explain its purpose:&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Management Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;management interface&lt;/strong&gt; is the default interface used to access and manage the WLC. The &lt;strong&gt;management interface&lt;/strong&gt; is also &lt;strong&gt;used by the access points&lt;/strong&gt; to &lt;strong&gt;communicate&lt;/strong&gt; with the WLC. The &lt;strong&gt;management interface&lt;/strong&gt; IP address &lt;strong&gt;is the only ping-able IP address&lt;/strong&gt; and is used by administrators to manage the WLC.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Administrators can &lt;strong&gt;log into&lt;/strong&gt; the WLC’s configuration GUI by entering the &lt;strong&gt;management interface IP address&lt;/strong&gt; in a web browser and logging into the system.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;AP-Manager Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A controller can have &lt;strong&gt;one of more AP-Manager interfaces&lt;/strong&gt; which are used for all &lt;strong&gt;Layer 3 communications&lt;/strong&gt; between the &lt;strong&gt;controller&lt;/strong&gt; and &lt;strong&gt;lightweight access points&lt;/strong&gt; after they have joined the controller. The &lt;strong&gt;AP-Manager IP address&lt;/strong&gt; is used as the &lt;strong&gt;tunnel source&lt;/strong&gt; for &lt;strong&gt;CAPWAP&lt;/strong&gt;/&lt;strong&gt;LWAPP&lt;/strong&gt; packets from the controller to the access points, and as the &lt;strong&gt;destination IP address&lt;/strong&gt; for &lt;strong&gt;CAPWAP/ LWAPP packets&lt;/strong&gt; from the access points to the controller.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While the configuration and usage of the &lt;strong&gt;AP-Manager interfaces&lt;/strong&gt; is optional, models such as the &lt;strong&gt;WLC2504&lt;/strong&gt; and &lt;strong&gt;WLC5508&lt;/strong&gt;, &lt;strong&gt;do not have a dedicated AP-Manager interface&lt;/strong&gt;. For these models, under the &lt;strong&gt;Management interface settings&lt;/strong&gt;, there is an option labeled &lt;strong&gt;Enable Dynamic AP Management&lt;/strong&gt;, that allows the &lt;strong&gt;Management interface&lt;/strong&gt; to work as an &lt;strong&gt;AP-Manager interface&lt;/strong&gt; at the same time:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-5b.png&quot; target=&quot;_blank&quot; title=&quot;Cisco WL2504 - Management interface, Dynamic AP Management option&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-interfaces-ports-functionality-5.png&quot; alt=&quot;cisco-wireless-controllers-interfaces-ports-functionality-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco WL2504 - Management interface, Dynamic AP Management option&quot; /&gt;&lt;/a&gt;Figure 5. Cisco WL2504 - Management interface, Dynamic AP Management option (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;According to Cisco's documentation, each &lt;strong&gt;AP-Manager interface&lt;/strong&gt; can handle up to &lt;strong&gt;48 access points&lt;/strong&gt;, however we belieive with the latest firmware updates that this limit has been increased to &lt;strong&gt;75&lt;/strong&gt;, because the smaller WLC model (2504) can now handle up to &lt;strong&gt;75 access points&lt;/strong&gt; with its dual-purpose &lt;strong&gt;management/AP-Manager interface&lt;/strong&gt;. If more access points are installed, then &lt;strong&gt;multiple AP-Manager interfaces&lt;/strong&gt; are required to be configured.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Virtual Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;virtual interface&lt;/strong&gt; is used to &lt;strong&gt;manage and support wireless clients&lt;/strong&gt; by providing &lt;strong&gt;DHCP relay functionality&lt;/strong&gt;, &lt;strong&gt;guest web authentication&lt;/strong&gt;, &lt;strong&gt;VPN termination&lt;/strong&gt; and other services. The virtual interface plays the following two primary roles:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Acts as the DHCP server placeholder for wireless clients that obtain their IP address from a DHCP server.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Serves as the redirect address for the web authentication login page (if configured).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;virtual interface IP address&lt;/strong&gt; is only used for &lt;strong&gt;communications&lt;/strong&gt; between the &lt;strong&gt;controller&lt;/strong&gt; and &lt;strong&gt;wireless clients&lt;/strong&gt;. It &lt;strong&gt;never appears&lt;/strong&gt; as the &lt;strong&gt;source or destination address&lt;/strong&gt; of a packet that goes out through the distribution ports and on to the local network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, the IP address of the virtual interface &lt;strong&gt;must be unique&lt;/strong&gt; on the network. For this reason, a &lt;strong&gt;common IP address&lt;/strong&gt; used for the &lt;strong&gt;virtual interface&lt;/strong&gt; is &lt;strong&gt;1.1.1.1&lt;/strong&gt;. All controllers within a mobility group must be configured with the same virtual interface IP address to ensure inter-controller roaming works correctly without connectivity loss.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Service-Port Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;service-port interface&lt;/strong&gt; is used for &lt;strong&gt;out-of-band management&lt;/strong&gt; of the controller. If the management workstation is in a remote subnet, it may be necessary to add a IPv4 route on the controller in order to manage the controller from the remote workstation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that the&lt;strong&gt; service-port IP address&lt;/strong&gt; must &lt;strong&gt;not reside on the same subnet&lt;/strong&gt; as the &lt;strong&gt;Manager/AP-Manager interface&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Smaller WLC models such as the WLC2124, WLC2504 do not have a service-port interface.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Dynamic Interface&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The easiest way to explain &lt;strong&gt;dynamic interfaces&lt;/strong&gt; is to think of them as &lt;strong&gt;VLAN interfaces for your wireless networks (SSIDs)&lt;/strong&gt;. &lt;strong&gt;One dynamic interface&lt;/strong&gt; is created &lt;strong&gt;per wireless network/SSID&lt;/strong&gt;. The &lt;strong&gt;wireless network&lt;/strong&gt; or &lt;strong&gt;SSID&lt;/strong&gt; is &lt;strong&gt;mapped&lt;/strong&gt; to a &lt;strong&gt;dynamic interface&lt;/strong&gt;, which is then mapped to a &lt;strong&gt;specific VLAN network&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, &lt;strong&gt;dynamic interfaces&lt;/strong&gt; can be assigned to &lt;strong&gt;separate physical distribution ports&lt;/strong&gt;, so that traffic from &lt;strong&gt;specific WLANs&lt;/strong&gt;, pass to the wired network via &lt;strong&gt;specific distribution ports&lt;/strong&gt;. In this scenario, each distribution port is a single access-link carrying one VLAN only.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Alternatively, &lt;strong&gt;all dynamic interfaces&lt;/strong&gt; can be mapped to &lt;strong&gt;one distribution port&lt;/strong&gt;, in which case will be a &lt;strong&gt;trunk port&lt;/strong&gt; so that it can carry all &lt;strong&gt;WLANs/VLANs&lt;/strong&gt;. This is a common setup method for smaller networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, each &lt;strong&gt;dynamic interface&lt;/strong&gt; must be on a &lt;strong&gt;different VLAN or IP subnet&lt;/strong&gt; from all other interfaces.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since the &lt;strong&gt;WLC2504&lt;/strong&gt; controller can handle up to &lt;strong&gt;16 SSIDs&lt;/strong&gt;, it can have a maximum of &lt;strong&gt;16 dynamic interfaces&lt;/strong&gt;, and support a maximum of &lt;strong&gt;16 VLANs&lt;/strong&gt;.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Distribution Port - Link Aggregation&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All WLCs support the aggregation of &lt;strong&gt;multiple distribution ports&lt;/strong&gt; into &lt;strong&gt;a single port&lt;/strong&gt; using the &lt;strong&gt;802.3ad port standard&lt;/strong&gt;. This allows an administrator to create&lt;strong&gt; one large link&lt;/strong&gt; between the WLC and the local switch.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For example, the WLC2504 provides &lt;strong&gt;4 Gigabit Ethernet ports&lt;/strong&gt;, allowing us to &lt;strong&gt;aggregate all 4 ports&lt;/strong&gt; with the &lt;strong&gt;neighbour switch&lt;/strong&gt; and create a &lt;strong&gt;4 Gigabit Ethernet link&lt;/strong&gt; with the wired network. &lt;strong&gt;EtherChannel&lt;/strong&gt; will have to be configured on the local switch for the link aggregation to work.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WLCs do not support &lt;strong&gt;Link Aggregation Control Protocol&lt;/strong&gt; (&lt;strong&gt;LACP&lt;/strong&gt;) or &lt;strong&gt;Cisco’s proprietary Port Aggregation Protocol&lt;/strong&gt; (&lt;strong&gt;PAgP&lt;/strong&gt;), and therefore the switch must be &lt;strong&gt;set unconditionally to LAG&lt;/strong&gt;. Only one LAG group is supported per controller.&lt;/p&gt;
&lt;h4 style=&quot;text-align: justify;&quot;&gt;Conclusion&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article &lt;strong&gt;introduced&lt;/strong&gt; the &lt;strong&gt;Cisco Wireless LAN Controller interfaces&lt;/strong&gt;. We covered the &lt;strong&gt;interfaces&lt;/strong&gt; and &lt;strong&gt;ports&lt;/strong&gt; found on &lt;strong&gt;WLCs&lt;/strong&gt;, and analysed each &lt;strong&gt;interface's&amp;nbsp;purpose&lt;/strong&gt;, including &lt;strong&gt;Ethernet distribution ports&lt;/strong&gt;, &lt;strong&gt;service port&lt;/strong&gt;, &lt;strong&gt;redundancy port&lt;/strong&gt;, interfaces such as the &lt;strong&gt;management interface&lt;/strong&gt;, &lt;strong&gt;ap-manager interface&lt;/strong&gt;, &lt;strong&gt;virtual interface&lt;/strong&gt; and &lt;strong&gt;dynamic interfaces&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Introduction To Cisco Wireless Controllers (WLC) - Basic Concepts – WLC Models, Benefits &amp; Their Friendly GUI Interface</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html"/>
		<published>2015-03-11T06:11:36+11:00</published>
		<updated>2015-03-11T06:11:36+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Cisco Wireless Controller&lt;/strong&gt; (WLC) series devices provide a single solution to &lt;strong&gt;configure&lt;/strong&gt;, &lt;strong&gt;manage&lt;/strong&gt; and &lt;strong&gt;support corporate wireless networks&lt;/strong&gt;, regardless of their size and locations. Cisco WLCs have become very popular during the last decade as companies move from &lt;strong&gt;standalone Access Point&lt;/strong&gt; (AP) &lt;strong&gt;deployment designs&lt;/strong&gt; to a &lt;strong&gt;centralized controller-based design&lt;/strong&gt;, reaping the &lt;strong&gt;enhanced functionality&lt;/strong&gt; and redundancy benefits that come with controller-based designs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Cisco currently offers a number of different WLC models, each targeted for different sized networks. As expected, the larger models (WLC 8500, 7500, 5760 etc) offer more high-speed gigabit network interfaces, high availability and some advanced features required in large &amp;amp; complex networks, for example supporting more VLANs and WiFi networks, thousands of AP &amp;amp; Clients per WLC device and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Recently, Cisco has begun offering WLC services in higher-end Catalyst switches by embedding the WLC &lt;strong&gt;inside Catalyst switches&lt;/strong&gt; e.g Catalyst 3850, but also as a virtual image '&lt;strong&gt;Virtual WLC&lt;/strong&gt;' that runs under &lt;strong&gt;VMware ESX/ESXi 4.x/5.x&lt;/strong&gt;. Finally Cisco &lt;strong&gt;ISR G2 routers 2900&lt;/strong&gt; &amp;amp; &lt;strong&gt;3900&lt;/strong&gt; series can accept &lt;strong&gt;Cisco UCS–E server modules, &lt;/strong&gt;adding &lt;strong&gt;WLC functionality&lt;/strong&gt; and&amp;nbsp; supporting up to &lt;strong&gt;200 access points&lt;/strong&gt; and &lt;strong&gt;3000 clients&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-1.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controllers WLC 8500, 7500, 3850 Series&quot; /&gt;Figure 1.&amp;nbsp; A few of the larger Cisco WLC models and Catalyst 3850&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;More detailed information on the current available models and their specifications can be obtained from our &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controller Product and Datasheet section&quot;&gt;Cisco Wireless Controller Product and Datasheet section&lt;/a&gt;&amp;nbsp; and freely download WLC datasheets containing each model’s features, deployment modes, supported VLANs, maximum access points &amp;amp; clients, encryption features, wireless standards support (802.11xx) and many more.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Learn about WLC interfaces, their physical and logical ports, how they connect to the network and how Wireless SSIDs are mapped to VLAN interfaces, plus much more, in our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&lt;/a&gt; article.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Working With The Cisco WLC&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While all WLC models support GUI and CLI based configuration, in contrast with Cisco routers and switches which are usually configured via CLI, WLCs are most often configured via their nicely designed web GUI.&amp;nbsp; The CLI is mandatory only during the initial configuration, where the engineer is required to assign an IP address to the WLC device, along with a few other important parameters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Working with any WLC model gives the engineer a great advantage as the interface is identical across all WLC models, making it easy to manage and configure, regardless of the WLC model:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-2.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controllers Web GUI Interface&quot; /&gt;Figure 2.&amp;nbsp; Cisco WLC 8500 (left) and Cisco WLC 2500 (right) web interface&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike other Cisco products, the &lt;strong&gt;WLC’s GUI&lt;/strong&gt; interface is extremely well designed with a logical layout.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When logging into the &lt;strong&gt;WLC GUI&lt;/strong&gt;, the administrator is presented with a healthy amount of information, including a front view of the controller from where he can see the status of each physical port and more details which we’ll be looking into right now.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below is a screenshot of the &lt;strong&gt;WLC2504&lt;/strong&gt; homepage web interface:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-3b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-3.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller 2504 Web Interface&quot; /&gt;&lt;/a&gt;&amp;nbsp;Figure 3.&amp;nbsp; Cisco 2504 WLC – Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The great part is that the homepage provides all necessary information an administrator would want to see during a routine check and that includes:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Visual state of the controller’s physical ports&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Status of the controller's hardware (up time, IP address, CPU/Memory usage, temperature, firmware version etc)&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Summary of Access Points connected and up/down radio interfaces&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Current connected clients (on all wireless networks)&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Top wireless networks and number of clients connected to each&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Rogue Access Points and Clients detected&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recent traps generated by the controller&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Obtaining more information on any section can be easily done by &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;Detail&lt;/strong&gt; link next to it. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following screenshot shows the information presented by the controller when &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;Detail&lt;/strong&gt; link under the &lt;strong&gt;Access Point Summary &amp;gt; All Access Points&lt;/strong&gt; section:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-4b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-4.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller - Listing Registered Access Points &quot; /&gt;&lt;/a&gt;&amp;nbsp;Figure 4.&amp;nbsp; Browsing through All APs currently registered – Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The information shown is extremely useful as it contains each access point's name, model, MAC address, Up time (extremely useful when troubleshooting client connection issues), access point admin state (enabled/disabled), firmware version and many more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Equally useful information is provided when clicking on the &lt;strong&gt;Detail&lt;/strong&gt; link of the &lt;strong&gt;Client Summary &amp;gt; Current Clients&lt;/strong&gt; section:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-5b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-5.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller - Listing Connected Wireless Clients&quot; /&gt;&lt;/a&gt;&amp;nbsp;Figure 5.&amp;nbsp; Viewing currently connected clients – Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this screen, the controller shows each client’s MAC address, the AP to which its connected, WLAN Profile used, WLAN SSID the client is connected to, protocol used (802.11a/b/g/n), status and much more. We would however like to have the option to also show the IP address of the wireless client on this page – for this information you currently need to &lt;strong&gt;click&lt;/strong&gt; on its MAC address, after which a page loads the IP address of the client alongside with other information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When necessary, the administrator can dive further and obtain more information on almost any aspect of the Wireless network, SSIDs, clients connected, client speeds etc – the list is endless!&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article &lt;strong&gt;introduced&lt;/strong&gt; the &lt;strong&gt;Cisco Wireless LAN Controller&lt;/strong&gt; (WLC). We explained the &lt;strong&gt;basic concepts&lt;/strong&gt; behind the product, and talked about the &lt;strong&gt;different models&lt;/strong&gt; available and their &lt;strong&gt;main features&lt;/strong&gt;. We took a look at the &lt;strong&gt;intuitive GUI interface&lt;/strong&gt; used to &lt;strong&gt;setup and monitor&lt;/strong&gt; the &lt;strong&gt;controller&lt;/strong&gt; and the whole &lt;strong&gt;wireless infrastructure&lt;/strong&gt;.&amp;nbsp; More information on Cisco Wireless Controllers and wireless technology can be found in our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Section - Articles&quot;&gt;&lt;strong&gt;Cisco Wireless Section&lt;/strong&gt;&lt;/a&gt;. Users can also read about WLC interfaces-ports and their purpose, VLAN/SSID mappings and much more, in our next article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Cisco Wireless Controller&lt;/strong&gt; (WLC) series devices provide a single solution to &lt;strong&gt;configure&lt;/strong&gt;, &lt;strong&gt;manage&lt;/strong&gt; and &lt;strong&gt;support corporate wireless networks&lt;/strong&gt;, regardless of their size and locations. Cisco WLCs have become very popular during the last decade as companies move from &lt;strong&gt;standalone Access Point&lt;/strong&gt; (AP) &lt;strong&gt;deployment designs&lt;/strong&gt; to a &lt;strong&gt;centralized controller-based design&lt;/strong&gt;, reaping the &lt;strong&gt;enhanced functionality&lt;/strong&gt; and redundancy benefits that come with controller-based designs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Cisco currently offers a number of different WLC models, each targeted for different sized networks. As expected, the larger models (WLC 8500, 7500, 5760 etc) offer more high-speed gigabit network interfaces, high availability and some advanced features required in large &amp;amp; complex networks, for example supporting more VLANs and WiFi networks, thousands of AP &amp;amp; Clients per WLC device and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Recently, Cisco has begun offering WLC services in higher-end Catalyst switches by embedding the WLC &lt;strong&gt;inside Catalyst switches&lt;/strong&gt; e.g Catalyst 3850, but also as a virtual image '&lt;strong&gt;Virtual WLC&lt;/strong&gt;' that runs under &lt;strong&gt;VMware ESX/ESXi 4.x/5.x&lt;/strong&gt;. Finally Cisco &lt;strong&gt;ISR G2 routers 2900&lt;/strong&gt; &amp;amp; &lt;strong&gt;3900&lt;/strong&gt; series can accept &lt;strong&gt;Cisco UCS–E server modules, &lt;/strong&gt;adding &lt;strong&gt;WLC functionality&lt;/strong&gt; and&amp;nbsp; supporting up to &lt;strong&gt;200 access points&lt;/strong&gt; and &lt;strong&gt;3000 clients&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-1.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controllers WLC 8500, 7500, 3850 Series&quot; /&gt;Figure 1.&amp;nbsp; A few of the larger Cisco WLC models and Catalyst 3850&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;More detailed information on the current available models and their specifications can be obtained from our &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controller Product and Datasheet section&quot;&gt;Cisco Wireless Controller Product and Datasheet section&lt;/a&gt;&amp;nbsp; and freely download WLC datasheets containing each model’s features, deployment modes, supported VLANs, maximum access points &amp;amp; clients, encryption features, wireless standards support (802.11xx) and many more.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Learn about WLC interfaces, their physical and logical ports, how they connect to the network and how Wireless SSIDs are mapped to VLAN interfaces, plus much more, in our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; target=&quot;_blank&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&lt;/a&gt; article.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Working With The Cisco WLC&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While all WLC models support GUI and CLI based configuration, in contrast with Cisco routers and switches which are usually configured via CLI, WLCs are most often configured via their nicely designed web GUI.&amp;nbsp; The CLI is mandatory only during the initial configuration, where the engineer is required to assign an IP address to the WLC device, along with a few other important parameters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Working with any WLC model gives the engineer a great advantage as the interface is identical across all WLC models, making it easy to manage and configure, regardless of the WLC model:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-2.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controllers Web GUI Interface&quot; /&gt;Figure 2.&amp;nbsp; Cisco WLC 8500 (left) and Cisco WLC 2500 (right) web interface&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike other Cisco products, the &lt;strong&gt;WLC’s GUI&lt;/strong&gt; interface is extremely well designed with a logical layout.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When logging into the &lt;strong&gt;WLC GUI&lt;/strong&gt;, the administrator is presented with a healthy amount of information, including a front view of the controller from where he can see the status of each physical port and more details which we’ll be looking into right now.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below is a screenshot of the &lt;strong&gt;WLC2504&lt;/strong&gt; homepage web interface:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-3b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-3.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller 2504 Web Interface&quot; /&gt;&lt;/a&gt;&amp;nbsp;Figure 3.&amp;nbsp; Cisco 2504 WLC – Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The great part is that the homepage provides all necessary information an administrator would want to see during a routine check and that includes:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Visual state of the controller’s physical ports&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Status of the controller's hardware (up time, IP address, CPU/Memory usage, temperature, firmware version etc)&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Summary of Access Points connected and up/down radio interfaces&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Current connected clients (on all wireless networks)&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Top wireless networks and number of clients connected to each&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Rogue Access Points and Clients detected&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Recent traps generated by the controller&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Obtaining more information on any section can be easily done by &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;Detail&lt;/strong&gt; link next to it. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following screenshot shows the information presented by the controller when &lt;strong&gt;clicking&lt;/strong&gt; on the &lt;strong&gt;Detail&lt;/strong&gt; link under the &lt;strong&gt;Access Point Summary &amp;gt; All Access Points&lt;/strong&gt; section:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-4b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-4.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller - Listing Registered Access Points &quot; /&gt;&lt;/a&gt;&amp;nbsp;Figure 4.&amp;nbsp; Browsing through All APs currently registered – Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The information shown is extremely useful as it contains each access point's name, model, MAC address, Up time (extremely useful when troubleshooting client connection issues), access point admin state (enabled/disabled), firmware version and many more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Equally useful information is provided when clicking on the &lt;strong&gt;Detail&lt;/strong&gt; link of the &lt;strong&gt;Client Summary &amp;gt; Current Clients&lt;/strong&gt; section:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-5b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-controllers-introduction-basic-concepts-5.png&quot; alt=&quot;cisco-wireless-controllers-introduction-basic-concepts-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Wireless Controller - Listing Connected Wireless Clients&quot; /&gt;&lt;/a&gt;&amp;nbsp;Figure 5.&amp;nbsp; Viewing currently connected clients – Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this screen, the controller shows each client’s MAC address, the AP to which its connected, WLAN Profile used, WLAN SSID the client is connected to, protocol used (802.11a/b/g/n), status and much more. We would however like to have the option to also show the IP address of the wireless client on this page – for this information you currently need to &lt;strong&gt;click&lt;/strong&gt; on its MAC address, after which a page loads the IP address of the client alongside with other information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When necessary, the administrator can dive further and obtain more information on almost any aspect of the Wireless network, SSIDs, clients connected, client speeds etc – the list is endless!&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article &lt;strong&gt;introduced&lt;/strong&gt; the &lt;strong&gt;Cisco Wireless LAN Controller&lt;/strong&gt; (WLC). We explained the &lt;strong&gt;basic concepts&lt;/strong&gt; behind the product, and talked about the &lt;strong&gt;different models&lt;/strong&gt; available and their &lt;strong&gt;main features&lt;/strong&gt;. We took a look at the &lt;strong&gt;intuitive GUI interface&lt;/strong&gt; used to &lt;strong&gt;setup and monitor&lt;/strong&gt; the &lt;strong&gt;controller&lt;/strong&gt; and the whole &lt;strong&gt;wireless infrastructure&lt;/strong&gt;.&amp;nbsp; More information on Cisco Wireless Controllers and wireless technology can be found in our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Section - Articles&quot;&gt;&lt;strong&gt;Cisco Wireless Section&lt;/strong&gt;&lt;/a&gt;. Users can also read about WLC interfaces-ports and their purpose, VLAN/SSID mappings and much more, in our next article: &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-interfaces-ports-functionality.html&quot; title=&quot;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&quot;&gt;Cisco WLC Interfaces, Ports &amp;amp; Their Functionality. Understand How WLCs Work, Connect to the Network Infrastructure &amp;amp; Wi-Fi SSID/VLAN mappings&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Cisco Wireless Controllers (WLC) Datasheets Available for Download</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-downloads-wlc-datasheels.html"/>
		<published>2015-03-11T05:24:54+11:00</published>
		<updated>2015-03-11T05:24:54+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-downloads-wlc-datasheels.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/downloads-wlc-datasheets.png&quot; alt=&quot;downloads-wlc-datasheets&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Cisco Wireless Controller Models and Specifications&quot; /&gt;We would like to inform our readers that Firewall.cx has just made available as a free download all of &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; title=&quot;Cisco's Wireless Controller Datasheets&quot;&gt;Cisco's Wireless Controller Datasheets&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The datasheets provide valuable infomation for all currently available Cisco Wireless Controllers including:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Scalability,&lt;/li&gt;
&lt;li&gt;Performance speed&lt;/li&gt;
&lt;li&gt;RF Management&lt;/li&gt;
&lt;li&gt;QoS features&lt;/li&gt;
&lt;li&gt;Supported Access Points models&lt;/li&gt;
&lt;li&gt;Maximum Access Points &amp;amp; SSIDs&lt;/li&gt;
&lt;li&gt;Supported Wireless Standard (802.11xx)&lt;/li&gt;
&lt;li&gt;Physical interfaces&lt;/li&gt;
&lt;li&gt;Redundancy options&lt;/li&gt;
&lt;li&gt;Security standards&lt;/li&gt;
&lt;li&gt;RFC compliance and support&lt;/li&gt;
&lt;li&gt;Supported encryption methods&lt;/li&gt;
&lt;li&gt;Authentication - Authorization &amp;amp; Accounting (AAA) support&lt;/li&gt;
&lt;li&gt;Ordering information (product-id)&lt;/li&gt;
&lt;li&gt;Optional accessories&lt;/li&gt;
&lt;li&gt;License upgrade options their product-id&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;Read our article on &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controllers - Basic concepts, models and benefits they provide to companies&quot;&gt;Cisco Wireless Controllers - Basic concepts, models and benefits they provide to companies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Readers can head directly to our &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Product Datasheets &amp;amp; Guides&quot;&gt;Cisco Product Datasheets &amp;amp; Guides&lt;/a&gt; where they can find the &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; title=&quot;Cisco Wireless Controllers (WLC) Datasheet section&quot;&gt;Cisco Wireless Controllers (WLC) Datasheet section&lt;/a&gt; amongst other Cisco products.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/downloads-wlc-datasheets.png&quot; alt=&quot;downloads-wlc-datasheets&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Cisco Wireless Controller Models and Specifications&quot; /&gt;We would like to inform our readers that Firewall.cx has just made available as a free download all of &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; title=&quot;Cisco's Wireless Controller Datasheets&quot;&gt;Cisco's Wireless Controller Datasheets&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The datasheets provide valuable infomation for all currently available Cisco Wireless Controllers including:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Scalability,&lt;/li&gt;
&lt;li&gt;Performance speed&lt;/li&gt;
&lt;li&gt;RF Management&lt;/li&gt;
&lt;li&gt;QoS features&lt;/li&gt;
&lt;li&gt;Supported Access Points models&lt;/li&gt;
&lt;li&gt;Maximum Access Points &amp;amp; SSIDs&lt;/li&gt;
&lt;li&gt;Supported Wireless Standard (802.11xx)&lt;/li&gt;
&lt;li&gt;Physical interfaces&lt;/li&gt;
&lt;li&gt;Redundancy options&lt;/li&gt;
&lt;li&gt;Security standards&lt;/li&gt;
&lt;li&gt;RFC compliance and support&lt;/li&gt;
&lt;li&gt;Supported encryption methods&lt;/li&gt;
&lt;li&gt;Authentication - Authorization &amp;amp; Accounting (AAA) support&lt;/li&gt;
&lt;li&gt;Ordering information (product-id)&lt;/li&gt;
&lt;li&gt;Optional accessories&lt;/li&gt;
&lt;li&gt;License upgrade options their product-id&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;Read our article on &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-controllers-introduction-basic-concepts.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Wireless Controllers - Basic concepts, models and benefits they provide to companies&quot;&gt;Cisco Wireless Controllers - Basic concepts, models and benefits they provide to companies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Readers can head directly to our &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Product Datasheets &amp;amp; Guides&quot;&gt;Cisco Product Datasheets &amp;amp; Guides&lt;/a&gt; where they can find the &lt;a href=&quot;https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-wireless-controllers-wlc.html&quot; title=&quot;Cisco Wireless Controllers (WLC) Datasheet section&quot;&gt;Cisco Wireless Controllers (WLC) Datasheet section&lt;/a&gt; amongst other Cisco products.&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Cisco Aironet 1100 &amp; 1200 Series (1110, 1121, 1142, 1230, 1240, 1242AG) Factory Reset &amp; Configuration Password Reset Procedure via CLI and Web GUI</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-aironet-reset.html"/>
		<published>2012-12-27T05:29:52+11:00</published>
		<updated>2012-12-27T05:29:52+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-aironet-reset.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Resetting&lt;/strong&gt; a &lt;strong&gt;Cisco Aironet access point&lt;/strong&gt; can be required if you’ve lost your password or need to wipe out the configuration of a previously configured access point. Cisco provides two main methods to perform a &lt;strong&gt;factory reset&lt;/strong&gt; on the &lt;strong&gt;Aironet 1100&lt;/strong&gt; and &lt;strong&gt;1200&lt;/strong&gt; series &lt;strong&gt;access points&lt;/strong&gt; and these are: 1) Via the&lt;strong&gt; Mode Button&lt;/strong&gt; 2) Via &lt;strong&gt;Web Interface&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The first method (Mode Button) does not require any user credentials or passwords as the reset procedure is performed during the boot up process and does not involve logging into the access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The second method (Web Interface) requires username and password with &lt;strong&gt;privileged access 15&lt;/strong&gt; (administrator privileges) in order to perform the reset procedure.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Both reset procedures described below will reset all configuration settings to factory defaults. This means it will erase all passwords, SSIDs, WEP/WPA keys, IP address and anything else configured on the access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When the Cisco Aironet access point factory-reset procedure is complete, the default credentials will need to be used to access it. Both username and passwords are &lt;strong&gt;Cisco&lt;/strong&gt; with a capital “&lt;strong&gt;C&lt;/strong&gt;” (case-sensitive). In addition, the factory default IP address for the access point will be &lt;strong&gt;10.0.0.1&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Factory Reset via MODE Button&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is the most common reset method engineers look for, and we’ve got it covered in four easy-to-follow steps!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&lt;br /&gt;Disconnect power (the power jack for external power or the Ethernet cable for in-line power) from the access point.&lt;br /&gt; &lt;strong&gt;&lt;br /&gt;Step 2 &lt;/strong&gt;&lt;br /&gt;Press and hold the &lt;strong&gt;MODE&lt;/strong&gt; button while you reconnect power to the access point.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 3 &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Hold the MODE button&lt;/strong&gt; until the Status LED turns &lt;strong&gt;amber&lt;/strong&gt; (approximately 1 to 2 seconds), and release the button.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 4 &lt;/strong&gt;&lt;br /&gt;Reboot the access point by performing a power-cycle (switch off and then on) After the access point reboots, you must reconfigure the access point by using the Web-browser interface or the CLI.&lt;/p&gt;
&lt;h2&gt;CLI Output During Factory Reset via MODE Button&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below is the CLI output during the Mode button reset method.&amp;nbsp; It is clear that once the access point sees the &lt;strong&gt;MODE &lt;/strong&gt;button pressed for 20 seconds (the time it takes until the status LED turns amber), it initiates the recovery process:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;flashfs[0]: 147 files, 7 directories
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: 0 orphaned files, 0 orphaned directories&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: Total bytes: 32385024&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: Bytes used: 5549056&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: Bytes available: 26835968&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: flashfs fsck took 20 seconds.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Reading cookie from system serial eeprom...Done&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Base Ethernet MAC address: 1c:de:0f:94:b7:b8&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Ethernet speed is 100 Mb - FULL duplex&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;button pressed for &lt;strong&gt;20 seconds&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;process_config_recovery: set IP address and config to default 10.0.0.1&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;process_config_recovery: image recovery&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;image_recovery: Download default IOS tar image tftp://255.255.255.255/c1140-k9w7-tar.default&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;examining image...&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Factory Reset via Web Interface (Recommended Option for Remote Reset)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Resetting your Cisco access point via its web interface is an easy process. &amp;nbsp;Following are the steps required:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&lt;br /&gt;Open a web browser and enter the IP address of your Cisco access point&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 2&lt;/strong&gt;&lt;br /&gt;Enter the necessary credentials (username &amp;amp; password)&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 3&lt;/strong&gt;&lt;br /&gt;Once successfully logged in, you’ll be presented with &lt;strong&gt;Summary Status&lt;/strong&gt; page:&lt;strong&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-1200-reset-1.png&quot; alt=&quot;cisco-wireless-1200-reset-1&quot; width=&quot;750&quot; height=&quot;618&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Aironet 1240 Web GUI Interface&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Step 4&lt;/strong&gt;&lt;br /&gt;From the main menu, select &lt;strong&gt;System Software&lt;/strong&gt; and then &lt;strong&gt;System Configuration &lt;/strong&gt;sub-menu.&amp;nbsp; The access point will present a number of different management options.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-1200-reset-2.png&quot; alt=&quot;&quot; width=&quot;750&quot; height=&quot;458&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Aironet 1240AG Web Factory Reset GUI&quot; data-alt=&quot;cisco-wireless-1200-reset-2&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here we can select the &lt;strong&gt;Reset to Defaults&lt;/strong&gt; to initiate the factory reset or alternatively the &lt;strong&gt;Reset to Defaults (Except IP)&lt;/strong&gt; if we wish to reset to factory defaults but keep the current IP address.&amp;nbsp; The second option is especially handy in case you are required to perform this procedure remotely.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;This completes the &lt;strong&gt;Factory Reset procedure&lt;/strong&gt; for all &lt;strong&gt;Cisco Aironet 1100 &amp;amp; 1200 series access points&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Resetting&lt;/strong&gt; a &lt;strong&gt;Cisco Aironet access point&lt;/strong&gt; can be required if you’ve lost your password or need to wipe out the configuration of a previously configured access point. Cisco provides two main methods to perform a &lt;strong&gt;factory reset&lt;/strong&gt; on the &lt;strong&gt;Aironet 1100&lt;/strong&gt; and &lt;strong&gt;1200&lt;/strong&gt; series &lt;strong&gt;access points&lt;/strong&gt; and these are: 1) Via the&lt;strong&gt; Mode Button&lt;/strong&gt; 2) Via &lt;strong&gt;Web Interface&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The first method (Mode Button) does not require any user credentials or passwords as the reset procedure is performed during the boot up process and does not involve logging into the access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The second method (Web Interface) requires username and password with &lt;strong&gt;privileged access 15&lt;/strong&gt; (administrator privileges) in order to perform the reset procedure.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Both reset procedures described below will reset all configuration settings to factory defaults. This means it will erase all passwords, SSIDs, WEP/WPA keys, IP address and anything else configured on the access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When the Cisco Aironet access point factory-reset procedure is complete, the default credentials will need to be used to access it. Both username and passwords are &lt;strong&gt;Cisco&lt;/strong&gt; with a capital “&lt;strong&gt;C&lt;/strong&gt;” (case-sensitive). In addition, the factory default IP address for the access point will be &lt;strong&gt;10.0.0.1&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Factory Reset via MODE Button&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is the most common reset method engineers look for, and we’ve got it covered in four easy-to-follow steps!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&lt;br /&gt;Disconnect power (the power jack for external power or the Ethernet cable for in-line power) from the access point.&lt;br /&gt; &lt;strong&gt;&lt;br /&gt;Step 2 &lt;/strong&gt;&lt;br /&gt;Press and hold the &lt;strong&gt;MODE&lt;/strong&gt; button while you reconnect power to the access point.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 3 &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Hold the MODE button&lt;/strong&gt; until the Status LED turns &lt;strong&gt;amber&lt;/strong&gt; (approximately 1 to 2 seconds), and release the button.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 4 &lt;/strong&gt;&lt;br /&gt;Reboot the access point by performing a power-cycle (switch off and then on) After the access point reboots, you must reconfigure the access point by using the Web-browser interface or the CLI.&lt;/p&gt;
&lt;h2&gt;CLI Output During Factory Reset via MODE Button&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Below is the CLI output during the Mode button reset method.&amp;nbsp; It is clear that once the access point sees the &lt;strong&gt;MODE &lt;/strong&gt;button pressed for 20 seconds (the time it takes until the status LED turns amber), it initiates the recovery process:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;flashfs[0]: 147 files, 7 directories
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: 0 orphaned files, 0 orphaned directories&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: Total bytes: 32385024&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: Bytes used: 5549056&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: Bytes available: 26835968&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;flashfs[0]: flashfs fsck took 20 seconds.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Reading cookie from system serial eeprom...Done&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Base Ethernet MAC address: 1c:de:0f:94:b7:b8&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Ethernet speed is 100 Mb - FULL duplex&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;button pressed for &lt;strong&gt;20 seconds&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;process_config_recovery: set IP address and config to default 10.0.0.1&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;process_config_recovery: image recovery&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;image_recovery: Download default IOS tar image tftp://255.255.255.255/c1140-k9w7-tar.default&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;examining image...&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Factory Reset via Web Interface (Recommended Option for Remote Reset)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Resetting your Cisco access point via its web interface is an easy process. &amp;nbsp;Following are the steps required:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&lt;br /&gt;Open a web browser and enter the IP address of your Cisco access point&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 2&lt;/strong&gt;&lt;br /&gt;Enter the necessary credentials (username &amp;amp; password)&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 3&lt;/strong&gt;&lt;br /&gt;Once successfully logged in, you’ll be presented with &lt;strong&gt;Summary Status&lt;/strong&gt; page:&lt;strong&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-1200-reset-1.png&quot; alt=&quot;cisco-wireless-1200-reset-1&quot; width=&quot;750&quot; height=&quot;618&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Aironet 1240 Web GUI Interface&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Step 4&lt;/strong&gt;&lt;br /&gt;From the main menu, select &lt;strong&gt;System Software&lt;/strong&gt; and then &lt;strong&gt;System Configuration &lt;/strong&gt;sub-menu.&amp;nbsp; The access point will present a number of different management options.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-1200-reset-2.png&quot; alt=&quot;&quot; width=&quot;750&quot; height=&quot;458&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Cisco Aironet 1240AG Web Factory Reset GUI&quot; data-alt=&quot;cisco-wireless-1200-reset-2&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here we can select the &lt;strong&gt;Reset to Defaults&lt;/strong&gt; to initiate the factory reset or alternatively the &lt;strong&gt;Reset to Defaults (Except IP)&lt;/strong&gt; if we wish to reset to factory defaults but keep the current IP address.&amp;nbsp; The second option is especially handy in case you are required to perform this procedure remotely.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;This completes the &lt;strong&gt;Factory Reset procedure&lt;/strong&gt; for all &lt;strong&gt;Cisco Aironet 1100 &amp;amp; 1200 series access points&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Understanding, Configuring &amp; Tweaking Web-based Cisco Aironet Access Point. Network Interface Radio0 802.11a/b/g Settings</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-radio-settings.html"/>
		<published>2012-01-13T09:09:51+11:00</published>
		<updated>2012-01-13T09:09:51+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-radio-settings.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Cisco Aironet Access Points&lt;/strong&gt;, just like most Cisco devices, provide a web interface from which we are able to configure the device. It is often we are presented with a number of options and settings, which we really are not sure why they exist, what they do, and how they can affect the performance of our wireless access point.&amp;nbsp; This is all about to change!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article aims to help cover this gap by explaining the various configuration options and settings found in Cisco's Aironet series Web-Based configuration page.&amp;nbsp; While the web-based interface allows the configuration of many functions within the Aironet device, we will be focusing on the '&lt;strong&gt;Network Interfaces: Radio0-802.11a/b/g&lt;/strong&gt;' Settings, which is perhaps the most important section for the device's proper wireless operation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Understanding and configuring correctly your Cisco Aironet Access Points can really make a difference in your clients wireless performance and connectivity range.&amp;nbsp; You'd be suprised on the performance difference of your wireless network, when tweaking your Cisco Aironet Access Points to adapt to the working environment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explains all the network options found under the Cisco Aironet web-interface setup, in a step-by-step manner.&amp;nbsp; To help make it easier to track, we have broken the page into three sections, each containing a screenshot of the covered options.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Please note that some features and settings will not appear on your Cisco Aironet Access Point as they are supported only on specific models:&lt;/p&gt;
&lt;h2&gt;Cisco Aironet Network Interfaces: Radio0-802.11a/b/g Settings&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-ap-web-1.jpg&quot; alt=&quot;cisco-wireless-ap-web-1&quot; width=&quot;568&quot; height=&quot;533&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Enable Radio&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If enabled, the access point sends packets through its 802.11a/b/g radio interface and monitors when other devices use the 802.11a/b/g radio interface to send packets. To change the administrative state of the radio from up to down, choose &lt;strong&gt;Disable&lt;/strong&gt;. To change the administrative state of the radio from down to up, choose &lt;strong&gt;Enable&lt;/strong&gt;.&lt;/p&gt;
&lt;h4&gt;&lt;span style=&quot;color: #99ccff;&quot;&gt;&lt;/span&gt;Current Status (Software/Hardware)&lt;/h4&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Software&lt;/strong&gt; - Indicates whether the interface has been enabled or disabled by the user.&lt;/p&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware &lt;/strong&gt;- Indicates whether the line protocol for the interface is up or down.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Role in Radio Network&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Select the role of the access point on your network. Choose one of the three &lt;strong&gt;access point (root)&lt;/strong&gt; settings if the access point is connected to the wired LAN.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Access Point Root&lt;/strong&gt; (Fallback to Radio Island): This default setting enables wireless clients to continue to associate even when there is no connection to the wired LAN.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Access Point Root (Fallback to Radio Shutdown): &lt;/strong&gt;When the wired connection is lost, the radio shuts down. This fallback forces the clients to associate to another access point if one is available.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Access Point Root (Fallback to Repeater): &lt;/strong&gt;When the wired connection is lost, the radio becomes a repeater. The repeater parent should be configured to allow data to be wirelessly transferred to another access point.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Repeater Non-Root:&lt;/strong&gt; Choose this setting if the access point is not connected to the wired LAN. Client data is transferred to the access point selected as the repeater parent. The repeater parent may be configured as an access point or another repeater.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fallback Mode Upon Loss of Ethernet Connection: &lt;/strong&gt;Access points operate as root access points by default. When set to defaults, Cisco Aironet 1400 Series Wireless Bridges start up in install mode and adopt the root role if they do not associate to another bridge. If a 1400 series bridge associates to another bridge at start-up, it automatically adopts the non-root role. Cisco Aironet 1300 Series Wireless Bridges operate as root bridges by default.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Repeater: &lt;/strong&gt;Specifies that the access point is configured for repeater operation. Repeater operation indicates the access point is not connected to a wired LAN and must associate to a root access point that is connected to the wired LAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Root: &lt;/strong&gt;On access points, specifies that the access point is configured for root mode operation and connected to a wired LAN. This parameter also specifies that the access point should attempt to continue access point operation when the primary Ethernet interface is not functional.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Root Bridge: &lt;/strong&gt;On 1300 series bridges, specifies that the bridge functions as a root access point. If the Ethernet interface is not functional, the unit attempts to continue access point operation. However, you can specify a fallback mode for the radio. This option is supported only on 1300 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Non-root Bridge: &lt;/strong&gt;On 1400 series bridges, specifies that the bridge operates as a non-root bridge and must associate to a root bridge. This option is supported only on 1400 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fallback Shutdown &lt;/strong&gt;(Optional): Specifies that the access point should shutdown when the primary Ethernet interface is not functional. This option is supported only on access points and on 1300 series bridges in access point mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fallback Repeater &lt;/strong&gt;(Optional): Specifies that the access point should operate in repeater mode when the primary Ethernet interface is not functional. This option is supported only on access points and on 1300 series bridges in access point mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Install: &lt;/strong&gt;On 1400 series bridges, configures the bridge for installation mode. In installation mode, the bridge flashes its LEDs to indicate received signal strength (RSSI) to assist in antenna alignment. This option is supported only on 1400 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Workgroup-Bridge: &lt;/strong&gt;On 1300 series bridges, specifies that the bridge operates in workgroup bridge mode. As a workgroup bridge, the device associates to an access point or bridge as a client and provides a wireless LAN connection for devices connected to its Ethernet port. This option is supported only on 1300 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Universal Workgroup Bridge Mode: &lt;/strong&gt;When configuring the universal workgroup bridge roll, you must include the client's MAC address. The workgroup bridge will associate with this MAC address only if it is present in the bridge table and is not a static entry. If validation fails, the workgroup bridge associates with its BVI's MAC address. In universal workgroup bridge mode, the workgroup bridge uses the Ethernet client's MAC address to associate with Cisco or non-Cisco root devices. The universal workgroup bridge is transparent and is not managed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Scanner: &lt;/strong&gt;This option is supported only when used with a WLSE device on your network. It specifies that the access point operates as a radio scanner only and does not accept associations from client devices. As a scanner, the access point collects radio data and sends it to the WDS access point on your network. This option is supported only on access points.&lt;/p&gt;
&lt;h4&gt;Data Rates&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Use the data rates setting to choose the data transmission rates. The rates are expressed in megabits per second. The device always attempts to transmit at the highest rate selected. If there are obstacles or interference, the device steps down to the highest rate that enables data transmission.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Click the &lt;strong&gt;Best Range&lt;/strong&gt; button to optimize access point range or the &lt;strong&gt;Best Throughput &lt;/strong&gt;button to optimize throughput.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: When you configure the 802.11g access point radio for best throughput, the access point sets all 802.11g data rates to basic (required). This setting blocks association from 802.11b client devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For each of the rates, choose &lt;strong&gt;Require&lt;/strong&gt;, &lt;strong&gt;Enable&lt;/strong&gt;, or &lt;strong&gt;Disable&lt;/strong&gt;.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Require&lt;/strong&gt; - Enables transmission at this rate for all packets, both unicast and multicast. At least one data rate must be set to Require. A client must support a required rate before it can associate.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Enable&lt;/strong&gt; - Enables transmission at this rate for unicast packets only.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Disable&lt;/strong&gt; - Does not allow transmission at this rate.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note: &lt;/strong&gt;The client must support the basic rate you select or it cannot associate with the access point.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/red-line.gif&quot; alt=&quot;red-line&quot; width=&quot;625&quot; height=&quot;10&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h4&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-ap-web-2.jpg&quot; alt=&quot;cisco-wireless-ap-web-2&quot; width=&quot;568&quot; height=&quot;667&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Transmit Power: &lt;/strong&gt;This setting determines the power level of the radio transmission. The default power setting is the highest transmit power allowed in your regulatory domain.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; Government regulations define the highest allowable power level for radio devices. This setting must conform to established standards for the country in which you use the device.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To reduce interference, limit the range of your access point, or to conserve power, select a lower power setting.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For an&lt;strong&gt; 802.11g radio&lt;/strong&gt;, Transmit Power is divided into CCK Transmit Power and OFDM Transmit power. CCK is the modulation used in 802.11g for the lower frequency rates, and OFDM is the modulation used in 802.11g for higher data rates (above 20 Mbps).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; The 100 mW (20dBM) value is not available for rates greater than 12 Mbps.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Power Translation Table (mW/dBm)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The power settings may be in mW or in dBm depending on the particular radio that is being configured. This table translates between mW and dBm.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Limit Client Power (mw)&lt;/strong&gt;: Determine the maximum power level allowed on client devices that associate to the access point. When a client device associates to the access point, the access point sends the maximum power level setting to the client.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; The 100 mW value is not available for rates greater than 12 Mbps.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Default Radio Channel&lt;/strong&gt;: The available selection of radio channels is determined by your regulatory domain. The default setting is the least-congested frequency. With this setting, the device scans for the radio channel that is least busy and selects that channel for use. The device scans at power-up and when the radio settings are changed. You can also select specific channel settings from the Default Radio Channel drop-down menu.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Short Slot Time&lt;/strong&gt;&lt;em&gt; (for 802.11g radios only): &lt;/em&gt;Determine if you want to enable support for the Extended-Rate-PHY short slot time. Enabling this setting reduces the slot time from the standard 20 microseconds to 9 microseconds to increase throughput.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Least Congested Channel Search&lt;/strong&gt;: This selection list is available only when Default Radio Channel is set to Least Congested Frequency. You can search for least congested channels but exclude some channel(s) which are known to be problematic or already in use by other applications. By default, all channels are selected and searched. To select more than one channel, hold down the Ctrl or Shift keys to highlight multiple channels.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;World Mode Multi-Domain Operation (for 802.11b and 802.11g only)&lt;/strong&gt;: World mode operation is disabled by default. If you uncheck &lt;strong&gt;Disable&lt;/strong&gt;, the device adds channel carrier set information to its beacon. Client devices with world-mode enabled receive the carrier set information and adjust their settings automatically. If you select the &lt;strong&gt;dot11d&lt;/strong&gt; option, you must enter an ISO country code. If you select the&lt;strong&gt; legacy&lt;/strong&gt; option, you enable Cisco legacy world mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With world mode enabled, the access point advertises the local settings, such as allowed frequencies and transmitter power levels. Clients with this capability then passively detect and adopt the advertised world settings, and then actively scan for the best access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Country Code (required only for dot11d option)&lt;/strong&gt;: A country code can be selected only if the dot11d option was chosen in the World Mode option above. Use the drop-down menu to select the appropriate country. After the country code, you must enter &lt;strong&gt;indoor&lt;/strong&gt; or &lt;strong&gt;outdoor&lt;/strong&gt; to indicate the placement of the access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Radio Preamble (802.11b and 802.11g only)&lt;/strong&gt;: The radio preamble is a section of data at the head of a packet that contains information the access point and the client devices need when sending and receiving packets. Keep the setting on &lt;strong&gt;short &lt;/strong&gt;unless you want to test with long preambles. If you have the radio preamble set to short and a client associates that does not support short preamble associates, the access point will send only long preamble packets to this client.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Short&lt;/strong&gt; - A short preamble improves throughput performance. Cisco Aironet's Wireless LAN Adapter supports short preambles. The access point and client negotiate the use of the short preamble. Early models of Cisco Aironet's Wireless LAN Adapter require long preambles.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Long&lt;/strong&gt; - A long preamble ensures compatibility between the access point and all early models of Cisco Aironet Wireless LAN Adapters.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Receive Antenna and&amp;nbsp; Transmit Antenna&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Diversity&lt;/strong&gt; - This default setting tells the device to use the antenna that receives the best signal. If your device has two fixed (non-removable) antennas, you should use this setting for both receive and transmit.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Left (secondary)&lt;/strong&gt;- If your device has removable antennas and you install a high-gain antenna on the left connector, you should use this setting for both receive and transmit. When you look at the back panel, the left antenna is on the left.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Right&lt;/strong&gt; (primary)- If your device has removable antennas and you install a high-gain antenna on the right connector, you should use this setting for both receive and transmit. When you look at the back panel, the right antenna is on the right.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; The device receives and transmits using only one antenna at a time, so you cannot increase range by installing high-gain antennas on both connectors and pointing one north and one south. When the device uses the north-pointing antenna, client devices to the south should be ignored by the access point.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;External Antenna Configuration&lt;/strong&gt;: This feature is currently not operational, but it may be supported in future releases.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Antenna Gain(dB)&lt;/strong&gt;: The gain of an antenna is a measure of the antenna's ability to direct or focus radio energy over a region of space. High-gain antennas have a more focused radiation pattern in a specific direction. This setting is disabled on the bridge.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Aironet Extensions&lt;/strong&gt;: Select &lt;strong&gt;Enable &lt;/strong&gt;to use Cisco Aironet 802.11 extensions. This setting must be set to Enable so that you can use load balancing, MIC, and TKIP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ethernet Encapsulation Transform&lt;/strong&gt;: Choose &lt;strong&gt;802.1h&lt;/strong&gt; or &lt;strong&gt;RFC1042&lt;/strong&gt;to set Ethernet encapsulation type. Data packets that are not 802.2 packets must be formatted to 802.2 with 802.1h or RFC1042. Cisco Aironet equipment defaults to RFC1042 because it provides optimum interoperability.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;802.1h&lt;/strong&gt; - This setting provides optimum performance for Cisco Aironet wireless products.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;RFC1042&lt;/strong&gt; - Use this setting to ensure interoperability with non-Cisco Aironet wireless equipment. RFC1042 does not provide the interoperability advantages of 802.1h but is used by other manufacturers of wireless equipment.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Reliable Multicast to WGB&lt;/strong&gt;: Normally, an access point treats a workgroup bridge as an infrastructure device and not as a client. The access point uses the reliable multicast protocol to ensure delivery of all multicast packets. The extra traffic caused by reliable delivery limits the number of workgroup bridges that can be associated. Select &lt;strong&gt;Disable&lt;/strong&gt;to allow the workgroup bridge to be treated as a non-infrastructure device and thus allow the maximum number of workgroup bridges to be associated.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Public Secure Packet Forwarding&lt;/strong&gt;: Public Secure Packet Forwarding (PSPF) prevents client devices associated to an access point from inadvertently sharing files or communicating with other client devices associated to the access point. It provides Internet access to client devices without providing other capabilities of a LAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;No exchange of unicast, broadcast, or multicast traffic occurs between protected ports. Choose &lt;strong&gt;Enable&lt;/strong&gt; so that the protected port can be used for secure mode configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;PSPF must be set per VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: To prevent communication between clients associated to different access points on your wireless LAN, you must set up protected ports on the switch to which your access points are connected.&lt;/p&gt;
&lt;h6&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/red-line.gif&quot; alt=&quot;red-line&quot; width=&quot;625&quot; height=&quot;10&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/h6&gt;
&lt;h6&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-ap-web-3.jpg&quot; alt=&quot;cisco-wireless-ap-web-3&quot; width=&quot;565&quot; height=&quot;305&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/h6&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Short Slot Time:&lt;/strong&gt; You can increase throughput on the 802.11g radio by enabling short slot time. Reducing the slot time from the standard 20 microseconds to the 9-microsecond short slot time decreases the overall backoff time, which increases throughput. Backoff time, which is a multiple of the slot time, is the random length of time that a station waits before sending a packet on the LAN.&lt;/p&gt;
&lt;p&gt;When you enable short slot time, the access point/bridge uses the short slot time only when all clients associated to the 802.11g radio support short slot time. Short slot time is disabled by default.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Beacon Privacy Guest-Mode:&lt;/strong&gt; This command must be configured if you wish the beacon frames to use the privacy settings of the guest-mode SSID. If there is no guest-mode SSID configured, the command has no effect. If there is a guest-mode SSID and the command is configured, the privacy bit present in the beacon frames are set to ON/OFF according to how the security (encryption) settings of the guest-mode SSID are configured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The command has no effect in MBSSID mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Beacon Period:&lt;/strong&gt; The beacon period is the amount of time between access point/bridge beacons in kilomicroseconds. One Kusec equals 1,024 microseconds. The default beacon period is 100&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Data Beacon Rate (DTIM):&lt;/strong&gt; This setting, always a multiple of the beacon period, determines how often the beacon contains a delivery traffic indication message (DTIM). A traffic indication map is present in every beacon. The DTIM notifies power-save client devices that a packet is waiting for them. If power save clients are active, the access point buffers any multicast traffics and delivers them immediately after the DTIM beacon. Power save nodes always wake for the DTIM beacons. The longer the time, the more buffering the access point does, and the longer the multicasts are delayed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the beacon period is set at 100 (its default setting), and the data beacon rate is set at 2 (its default setting), then the device sends a beacon containing a DTIM every 200 Kusec. One Kusec equals 1,024 microseconds.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Max. Data Retries:&lt;/strong&gt; The maximum number of attempts the device makes to send a packet before giving up, dropping the packet, and disassociating the client.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RTS Max. Retries:&lt;/strong&gt; The maximum number of times the device issues an RTS before stopping the attempt to send the packet through the radio. Enter a value from 1 to 128.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fragmentation Threshold:&lt;/strong&gt; This setting determines the size at which packets are fragmented (sent as several pieces instead of as one block). Use a low setting in areas where communication is poor or where there is a great deal of radio interference.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RTS Threshold:&lt;/strong&gt; This setting determines the packet size at which the device issues a request to send (RTS) before sending the packet. A low RTS Threshold setting can be useful in areas where many client devices are associating with the access point or in areas where the clients are far apart and can detect only the access point and not each other.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Repeater Parent AP Timeout:&lt;/strong&gt; If this timeout is enabled, the access point in repeater mode looks only for the parent access point specified in the following Repeater Parent AP MAC definition for this given amount of time. If the timeout expires, the list is ignored, and the unit associates to an access point that matches its requirements, regardless of its MAC address. If the timeout is disabled, the repeater associates only to parents in the list and continues the search.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Repeater Parent AP MAC 1-4:&lt;/strong&gt; Normally, a repeater access point (without a wired LAN connection) associates much like a normal client, choosing the best access point it can find. Enter MAC addresses in this list if you want to control the parent access point to which a repeater may associate. If MAC addresses are entered in this list, a repeater associates only to a parent whose MAC address matches an entry in the list. If the first MAC address is not available, the access point continues through the list and waits the amount of time specified in Repeater Parent AP Timeout field before trying the next.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Cisco Aironet Access Points&lt;/strong&gt;, just like most Cisco devices, provide a web interface from which we are able to configure the device. It is often we are presented with a number of options and settings, which we really are not sure why they exist, what they do, and how they can affect the performance of our wireless access point.&amp;nbsp; This is all about to change!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article aims to help cover this gap by explaining the various configuration options and settings found in Cisco's Aironet series Web-Based configuration page.&amp;nbsp; While the web-based interface allows the configuration of many functions within the Aironet device, we will be focusing on the '&lt;strong&gt;Network Interfaces: Radio0-802.11a/b/g&lt;/strong&gt;' Settings, which is perhaps the most important section for the device's proper wireless operation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Understanding and configuring correctly your Cisco Aironet Access Points can really make a difference in your clients wireless performance and connectivity range.&amp;nbsp; You'd be suprised on the performance difference of your wireless network, when tweaking your Cisco Aironet Access Points to adapt to the working environment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explains all the network options found under the Cisco Aironet web-interface setup, in a step-by-step manner.&amp;nbsp; To help make it easier to track, we have broken the page into three sections, each containing a screenshot of the covered options.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Please note that some features and settings will not appear on your Cisco Aironet Access Point as they are supported only on specific models:&lt;/p&gt;
&lt;h2&gt;Cisco Aironet Network Interfaces: Radio0-802.11a/b/g Settings&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-ap-web-1.jpg&quot; alt=&quot;cisco-wireless-ap-web-1&quot; width=&quot;568&quot; height=&quot;533&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Enable Radio&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If enabled, the access point sends packets through its 802.11a/b/g radio interface and monitors when other devices use the 802.11a/b/g radio interface to send packets. To change the administrative state of the radio from up to down, choose &lt;strong&gt;Disable&lt;/strong&gt;. To change the administrative state of the radio from down to up, choose &lt;strong&gt;Enable&lt;/strong&gt;.&lt;/p&gt;
&lt;h4&gt;&lt;span style=&quot;color: #99ccff;&quot;&gt;&lt;/span&gt;Current Status (Software/Hardware)&lt;/h4&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Software&lt;/strong&gt; - Indicates whether the interface has been enabled or disabled by the user.&lt;/p&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware &lt;/strong&gt;- Indicates whether the line protocol for the interface is up or down.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Role in Radio Network&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Select the role of the access point on your network. Choose one of the three &lt;strong&gt;access point (root)&lt;/strong&gt; settings if the access point is connected to the wired LAN.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Access Point Root&lt;/strong&gt; (Fallback to Radio Island): This default setting enables wireless clients to continue to associate even when there is no connection to the wired LAN.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Access Point Root (Fallback to Radio Shutdown): &lt;/strong&gt;When the wired connection is lost, the radio shuts down. This fallback forces the clients to associate to another access point if one is available.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Access Point Root (Fallback to Repeater): &lt;/strong&gt;When the wired connection is lost, the radio becomes a repeater. The repeater parent should be configured to allow data to be wirelessly transferred to another access point.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Repeater Non-Root:&lt;/strong&gt; Choose this setting if the access point is not connected to the wired LAN. Client data is transferred to the access point selected as the repeater parent. The repeater parent may be configured as an access point or another repeater.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fallback Mode Upon Loss of Ethernet Connection: &lt;/strong&gt;Access points operate as root access points by default. When set to defaults, Cisco Aironet 1400 Series Wireless Bridges start up in install mode and adopt the root role if they do not associate to another bridge. If a 1400 series bridge associates to another bridge at start-up, it automatically adopts the non-root role. Cisco Aironet 1300 Series Wireless Bridges operate as root bridges by default.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Repeater: &lt;/strong&gt;Specifies that the access point is configured for repeater operation. Repeater operation indicates the access point is not connected to a wired LAN and must associate to a root access point that is connected to the wired LAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Root: &lt;/strong&gt;On access points, specifies that the access point is configured for root mode operation and connected to a wired LAN. This parameter also specifies that the access point should attempt to continue access point operation when the primary Ethernet interface is not functional.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Root Bridge: &lt;/strong&gt;On 1300 series bridges, specifies that the bridge functions as a root access point. If the Ethernet interface is not functional, the unit attempts to continue access point operation. However, you can specify a fallback mode for the radio. This option is supported only on 1300 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Non-root Bridge: &lt;/strong&gt;On 1400 series bridges, specifies that the bridge operates as a non-root bridge and must associate to a root bridge. This option is supported only on 1400 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fallback Shutdown &lt;/strong&gt;(Optional): Specifies that the access point should shutdown when the primary Ethernet interface is not functional. This option is supported only on access points and on 1300 series bridges in access point mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fallback Repeater &lt;/strong&gt;(Optional): Specifies that the access point should operate in repeater mode when the primary Ethernet interface is not functional. This option is supported only on access points and on 1300 series bridges in access point mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Install: &lt;/strong&gt;On 1400 series bridges, configures the bridge for installation mode. In installation mode, the bridge flashes its LEDs to indicate received signal strength (RSSI) to assist in antenna alignment. This option is supported only on 1400 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Workgroup-Bridge: &lt;/strong&gt;On 1300 series bridges, specifies that the bridge operates in workgroup bridge mode. As a workgroup bridge, the device associates to an access point or bridge as a client and provides a wireless LAN connection for devices connected to its Ethernet port. This option is supported only on 1300 series bridges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Universal Workgroup Bridge Mode: &lt;/strong&gt;When configuring the universal workgroup bridge roll, you must include the client's MAC address. The workgroup bridge will associate with this MAC address only if it is present in the bridge table and is not a static entry. If validation fails, the workgroup bridge associates with its BVI's MAC address. In universal workgroup bridge mode, the workgroup bridge uses the Ethernet client's MAC address to associate with Cisco or non-Cisco root devices. The universal workgroup bridge is transparent and is not managed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Scanner: &lt;/strong&gt;This option is supported only when used with a WLSE device on your network. It specifies that the access point operates as a radio scanner only and does not accept associations from client devices. As a scanner, the access point collects radio data and sends it to the WDS access point on your network. This option is supported only on access points.&lt;/p&gt;
&lt;h4&gt;Data Rates&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Use the data rates setting to choose the data transmission rates. The rates are expressed in megabits per second. The device always attempts to transmit at the highest rate selected. If there are obstacles or interference, the device steps down to the highest rate that enables data transmission.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Click the &lt;strong&gt;Best Range&lt;/strong&gt; button to optimize access point range or the &lt;strong&gt;Best Throughput &lt;/strong&gt;button to optimize throughput.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: When you configure the 802.11g access point radio for best throughput, the access point sets all 802.11g data rates to basic (required). This setting blocks association from 802.11b client devices.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For each of the rates, choose &lt;strong&gt;Require&lt;/strong&gt;, &lt;strong&gt;Enable&lt;/strong&gt;, or &lt;strong&gt;Disable&lt;/strong&gt;.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Require&lt;/strong&gt; - Enables transmission at this rate for all packets, both unicast and multicast. At least one data rate must be set to Require. A client must support a required rate before it can associate.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Enable&lt;/strong&gt; - Enables transmission at this rate for unicast packets only.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Disable&lt;/strong&gt; - Does not allow transmission at this rate.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note: &lt;/strong&gt;The client must support the basic rate you select or it cannot associate with the access point.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/red-line.gif&quot; alt=&quot;red-line&quot; width=&quot;625&quot; height=&quot;10&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h4&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-ap-web-2.jpg&quot; alt=&quot;cisco-wireless-ap-web-2&quot; width=&quot;568&quot; height=&quot;667&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Transmit Power: &lt;/strong&gt;This setting determines the power level of the radio transmission. The default power setting is the highest transmit power allowed in your regulatory domain.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; Government regulations define the highest allowable power level for radio devices. This setting must conform to established standards for the country in which you use the device.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To reduce interference, limit the range of your access point, or to conserve power, select a lower power setting.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For an&lt;strong&gt; 802.11g radio&lt;/strong&gt;, Transmit Power is divided into CCK Transmit Power and OFDM Transmit power. CCK is the modulation used in 802.11g for the lower frequency rates, and OFDM is the modulation used in 802.11g for higher data rates (above 20 Mbps).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; The 100 mW (20dBM) value is not available for rates greater than 12 Mbps.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Power Translation Table (mW/dBm)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The power settings may be in mW or in dBm depending on the particular radio that is being configured. This table translates between mW and dBm.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Limit Client Power (mw)&lt;/strong&gt;: Determine the maximum power level allowed on client devices that associate to the access point. When a client device associates to the access point, the access point sends the maximum power level setting to the client.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; The 100 mW value is not available for rates greater than 12 Mbps.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Default Radio Channel&lt;/strong&gt;: The available selection of radio channels is determined by your regulatory domain. The default setting is the least-congested frequency. With this setting, the device scans for the radio channel that is least busy and selects that channel for use. The device scans at power-up and when the radio settings are changed. You can also select specific channel settings from the Default Radio Channel drop-down menu.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Short Slot Time&lt;/strong&gt;&lt;em&gt; (for 802.11g radios only): &lt;/em&gt;Determine if you want to enable support for the Extended-Rate-PHY short slot time. Enabling this setting reduces the slot time from the standard 20 microseconds to 9 microseconds to increase throughput.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Least Congested Channel Search&lt;/strong&gt;: This selection list is available only when Default Radio Channel is set to Least Congested Frequency. You can search for least congested channels but exclude some channel(s) which are known to be problematic or already in use by other applications. By default, all channels are selected and searched. To select more than one channel, hold down the Ctrl or Shift keys to highlight multiple channels.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;World Mode Multi-Domain Operation (for 802.11b and 802.11g only)&lt;/strong&gt;: World mode operation is disabled by default. If you uncheck &lt;strong&gt;Disable&lt;/strong&gt;, the device adds channel carrier set information to its beacon. Client devices with world-mode enabled receive the carrier set information and adjust their settings automatically. If you select the &lt;strong&gt;dot11d&lt;/strong&gt; option, you must enter an ISO country code. If you select the&lt;strong&gt; legacy&lt;/strong&gt; option, you enable Cisco legacy world mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With world mode enabled, the access point advertises the local settings, such as allowed frequencies and transmitter power levels. Clients with this capability then passively detect and adopt the advertised world settings, and then actively scan for the best access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Country Code (required only for dot11d option)&lt;/strong&gt;: A country code can be selected only if the dot11d option was chosen in the World Mode option above. Use the drop-down menu to select the appropriate country. After the country code, you must enter &lt;strong&gt;indoor&lt;/strong&gt; or &lt;strong&gt;outdoor&lt;/strong&gt; to indicate the placement of the access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Radio Preamble (802.11b and 802.11g only)&lt;/strong&gt;: The radio preamble is a section of data at the head of a packet that contains information the access point and the client devices need when sending and receiving packets. Keep the setting on &lt;strong&gt;short &lt;/strong&gt;unless you want to test with long preambles. If you have the radio preamble set to short and a client associates that does not support short preamble associates, the access point will send only long preamble packets to this client.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Short&lt;/strong&gt; - A short preamble improves throughput performance. Cisco Aironet's Wireless LAN Adapter supports short preambles. The access point and client negotiate the use of the short preamble. Early models of Cisco Aironet's Wireless LAN Adapter require long preambles.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Long&lt;/strong&gt; - A long preamble ensures compatibility between the access point and all early models of Cisco Aironet Wireless LAN Adapters.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Receive Antenna and&amp;nbsp; Transmit Antenna&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Diversity&lt;/strong&gt; - This default setting tells the device to use the antenna that receives the best signal. If your device has two fixed (non-removable) antennas, you should use this setting for both receive and transmit.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Left (secondary)&lt;/strong&gt;- If your device has removable antennas and you install a high-gain antenna on the left connector, you should use this setting for both receive and transmit. When you look at the back panel, the left antenna is on the left.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Right&lt;/strong&gt; (primary)- If your device has removable antennas and you install a high-gain antenna on the right connector, you should use this setting for both receive and transmit. When you look at the back panel, the right antenna is on the right.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Note:&lt;/strong&gt; The device receives and transmits using only one antenna at a time, so you cannot increase range by installing high-gain antennas on both connectors and pointing one north and one south. When the device uses the north-pointing antenna, client devices to the south should be ignored by the access point.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;External Antenna Configuration&lt;/strong&gt;: This feature is currently not operational, but it may be supported in future releases.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Antenna Gain(dB)&lt;/strong&gt;: The gain of an antenna is a measure of the antenna's ability to direct or focus radio energy over a region of space. High-gain antennas have a more focused radiation pattern in a specific direction. This setting is disabled on the bridge.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Aironet Extensions&lt;/strong&gt;: Select &lt;strong&gt;Enable &lt;/strong&gt;to use Cisco Aironet 802.11 extensions. This setting must be set to Enable so that you can use load balancing, MIC, and TKIP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Ethernet Encapsulation Transform&lt;/strong&gt;: Choose &lt;strong&gt;802.1h&lt;/strong&gt; or &lt;strong&gt;RFC1042&lt;/strong&gt;to set Ethernet encapsulation type. Data packets that are not 802.2 packets must be formatted to 802.2 with 802.1h or RFC1042. Cisco Aironet equipment defaults to RFC1042 because it provides optimum interoperability.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;802.1h&lt;/strong&gt; - This setting provides optimum performance for Cisco Aironet wireless products.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;RFC1042&lt;/strong&gt; - Use this setting to ensure interoperability with non-Cisco Aironet wireless equipment. RFC1042 does not provide the interoperability advantages of 802.1h but is used by other manufacturers of wireless equipment.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Reliable Multicast to WGB&lt;/strong&gt;: Normally, an access point treats a workgroup bridge as an infrastructure device and not as a client. The access point uses the reliable multicast protocol to ensure delivery of all multicast packets. The extra traffic caused by reliable delivery limits the number of workgroup bridges that can be associated. Select &lt;strong&gt;Disable&lt;/strong&gt;to allow the workgroup bridge to be treated as a non-infrastructure device and thus allow the maximum number of workgroup bridges to be associated.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Public Secure Packet Forwarding&lt;/strong&gt;: Public Secure Packet Forwarding (PSPF) prevents client devices associated to an access point from inadvertently sharing files or communicating with other client devices associated to the access point. It provides Internet access to client devices without providing other capabilities of a LAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;No exchange of unicast, broadcast, or multicast traffic occurs between protected ports. Choose &lt;strong&gt;Enable&lt;/strong&gt; so that the protected port can be used for secure mode configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;PSPF must be set per VLAN.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: To prevent communication between clients associated to different access points on your wireless LAN, you must set up protected ports on the switch to which your access points are connected.&lt;/p&gt;
&lt;h6&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/red-line.gif&quot; alt=&quot;red-line&quot; width=&quot;625&quot; height=&quot;10&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/h6&gt;
&lt;h6&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/cisco-wireless-ap-web-3.jpg&quot; alt=&quot;cisco-wireless-ap-web-3&quot; width=&quot;565&quot; height=&quot;305&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/h6&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Short Slot Time:&lt;/strong&gt; You can increase throughput on the 802.11g radio by enabling short slot time. Reducing the slot time from the standard 20 microseconds to the 9-microsecond short slot time decreases the overall backoff time, which increases throughput. Backoff time, which is a multiple of the slot time, is the random length of time that a station waits before sending a packet on the LAN.&lt;/p&gt;
&lt;p&gt;When you enable short slot time, the access point/bridge uses the short slot time only when all clients associated to the 802.11g radio support short slot time. Short slot time is disabled by default.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Beacon Privacy Guest-Mode:&lt;/strong&gt; This command must be configured if you wish the beacon frames to use the privacy settings of the guest-mode SSID. If there is no guest-mode SSID configured, the command has no effect. If there is a guest-mode SSID and the command is configured, the privacy bit present in the beacon frames are set to ON/OFF according to how the security (encryption) settings of the guest-mode SSID are configured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The command has no effect in MBSSID mode.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Beacon Period:&lt;/strong&gt; The beacon period is the amount of time between access point/bridge beacons in kilomicroseconds. One Kusec equals 1,024 microseconds. The default beacon period is 100&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Data Beacon Rate (DTIM):&lt;/strong&gt; This setting, always a multiple of the beacon period, determines how often the beacon contains a delivery traffic indication message (DTIM). A traffic indication map is present in every beacon. The DTIM notifies power-save client devices that a packet is waiting for them. If power save clients are active, the access point buffers any multicast traffics and delivers them immediately after the DTIM beacon. Power save nodes always wake for the DTIM beacons. The longer the time, the more buffering the access point does, and the longer the multicasts are delayed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If the beacon period is set at 100 (its default setting), and the data beacon rate is set at 2 (its default setting), then the device sends a beacon containing a DTIM every 200 Kusec. One Kusec equals 1,024 microseconds.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Max. Data Retries:&lt;/strong&gt; The maximum number of attempts the device makes to send a packet before giving up, dropping the packet, and disassociating the client.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RTS Max. Retries:&lt;/strong&gt; The maximum number of times the device issues an RTS before stopping the attempt to send the packet through the radio. Enter a value from 1 to 128.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fragmentation Threshold:&lt;/strong&gt; This setting determines the size at which packets are fragmented (sent as several pieces instead of as one block). Use a low setting in areas where communication is poor or where there is a great deal of radio interference.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RTS Threshold:&lt;/strong&gt; This setting determines the packet size at which the device issues a request to send (RTS) before sending the packet. A low RTS Threshold setting can be useful in areas where many client devices are associating with the access point or in areas where the clients are far apart and can detect only the access point and not each other.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Repeater Parent AP Timeout:&lt;/strong&gt; If this timeout is enabled, the access point in repeater mode looks only for the parent access point specified in the following Repeater Parent AP MAC definition for this given amount of time. If the timeout expires, the list is ignored, and the unit associates to an access point that matches its requirements, regardless of its MAC address. If the timeout is disabled, the repeater associates only to parents in the list and continues the search.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Repeater Parent AP MAC 1-4:&lt;/strong&gt; Normally, a repeater access point (without a wired LAN connection) associates much like a normal client, choosing the best access point it can find. Enter MAC addresses in this list if you want to control the parent access point to which a repeater may associate. If MAC addresses are entered in this list, a repeater associates only to a parent whose MAC address matches an entry in the list. If the first MAC address is not available, the access point continues through the list and waits the amount of time specified in Repeater Parent AP Timeout field before trying the next.&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Wireless (Wifi) WEP WPA WPA2 Key Generator</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-wlan-keygen.html"/>
		<published>2011-11-27T09:43:40+11:00</published>
		<updated>2011-11-27T09:43:40+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-wireless-wlan-keygen.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;script type=&quot;text/javascript&quot; src=&quot;https://www.firewall.cx//./key-gen.js&quot;&gt;&lt;/script&gt;
The Firewall.cx Wireless LAN Key Generator will allow the generation of a WEP or WPA  ASCII based encryption key and will provide the equivalent HEX or ASCII string so it can be inserted directly into a Cisco Access Point configuration.&lt;br /&gt;&lt;br /&gt;As many engineers know, it is a common problem that when configuring a WEP encryption key in a Cisco Access Point, the IOS will not allow the input of the actual ASCII key, but instead requires the HEX equivalent. With our WLAN Key generator, simply insert your desired pass phrase and it will generate the necessary HEX value encryption key that needs to be used in the CLI or Web-Based configuration of the Cisco Access Point.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt; The Wireless LAN Key Generator allows for quick and valid WEP/WPA key generation. &lt;br /&gt;&lt;br /&gt; You can use the &lt;strong&gt;Random WEP/WPA Key Generator&lt;/strong&gt; to generate a random WEP or WPA key.  Simply choose the desired key length using the drop-down menu, and one will be generated for you. &lt;br /&gt;&lt;br /&gt; The WEP/WPA Key Generator supports &lt;strong&gt;64bit&lt;/strong&gt;, &lt;strong&gt;128bit&lt;/strong&gt;, &lt;strong&gt;152bit &lt;/strong&gt;&amp;amp; &lt;strong&gt;256bit WEP keys&lt;/strong&gt;, and &lt;strong&gt;160bit&lt;/strong&gt;, &lt;strong&gt;504bit WPA/WPA2 keys &lt;/strong&gt;for maximum security.&lt;br /&gt;&lt;br /&gt;Alternatively, if you require to generate a key based on a custom passphrase (most cases), you can use the &lt;strong&gt;Custom WEP/WPA Key Generator&lt;/strong&gt;. Just enter your password phrase into the &lt;strong&gt;Custom WEP/WPA Key Generator&lt;/strong&gt; - &lt;strong&gt;ASCII &lt;/strong&gt;text fields, and its HEX equivalent will be generated automatically.  You can also insert the HEX Value and the system will reveal the actual ASCII value - handy if you want to discover what password phrase has been used for the encryption.

&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/collaborations/zoho-netflow-800x140.jpg&quot; alt=&quot;Netflow Analyzer&quot; width=&quot;850&quot; height=&quot;150&quot; /&gt;&lt;/a&gt;&lt;br /&gt; &lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;form id=&quot;keyform&quot; action=&quot;&quot; name=&quot;keyform&quot; onsubmit=&quot;return false;&quot;&gt;
&lt;table class=&quot;t1&quot; style=&quot;width: 550px;&quot;&gt;
&lt;tbody&gt;
&lt;h4&gt;&lt;tr&gt;&lt;th colspan=&quot;2&quot;&gt;WEP/WPA Key Generator&lt;/th&gt;&lt;/tr&gt;&lt;/h4&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: left;&quot; colspan=&quot;2&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #3366ff;&quot;&gt;Random WEP/WPA Key Generator&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;white-space: nowrap; text-align: right;&quot;&gt;Key Length:&lt;/td&gt;
&lt;td style=&quot;text-align: left;&quot;&gt;&lt;select class=&quot;formselect&quot; name=&quot;klength&quot; onchange=&quot;process(this.form, this[this.selectedIndex].value);&quot;&gt; &lt;option selected=&quot;selected&quot; value=&quot;0&quot;&gt; --- choose key type --- &lt;/option&gt; &lt;option value=&quot;40&quot;&gt; 40 bit WEP Key ( 5 characters, 64 total bits)&lt;/option&gt; &lt;option value=&quot;104&quot;&gt; 104 bit WEP Key (13 cahracters, 128 total bits)&lt;/option&gt; &lt;option value=&quot;128&quot;&gt; 128 bit WEP Key (16 characters, 152 total bits)&lt;/option&gt; &lt;option value=&quot;232&quot;&gt; 232 bit WEP Key (29 characters, 256 total bits)&lt;/option&gt; &lt;option value=&quot;160&quot;&gt; 160 bit WPA Key (20 characters, minimum security)&lt;/option&gt; &lt;option value=&quot;504&quot;&gt; 504 bit WPA Key (63 characters, maximum security)&lt;/option&gt; &lt;/select&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;ASCII :&lt;/td&gt;
&lt;td&gt;&lt;input class=&quot;formtext&quot; onclick=&quot;this.form.asciikeytf.select();&quot; onfocus=&quot;this.form.asciikeytf.select();&quot; type=&quot;text&quot; name=&quot;asciikeytf&quot; value=&quot;&quot; size=&quot;76&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;HEX :&lt;/td&gt;
&lt;td&gt;&lt;input class=&quot;formtext&quot; onclick=&quot;this.form.hexkeytf.select();&quot; onfocus=&quot;this.form.hexkeytf.select();&quot; type=&quot;text&quot; name=&quot;hexkeytf&quot; value=&quot;&quot; size=&quot;76&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: left;&quot; colspan=&quot;2&quot;&gt;&lt;span style=&quot;color: #800080;&quot;&gt;&lt;strong&gt;Custom WEP/WPA Key&lt;/strong&gt; &lt;strong&gt;Generator&lt;/strong&gt;&lt;/span&gt;  &lt;br /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Note: use 5/13/16/29 characters for 64/128/152/256-bit WEP Encryption&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;ASCII :&lt;/td&gt;
&lt;td style=&quot;white-space: nowrap;&quot;&gt;&lt;input class=&quot;formtext&quot; title=&quot;custom passphrase (use 20-63 characters for WPA/PSK)&quot; onkeypress=&quot;keyform.customcount.value = keyform.customakeytf.value.length + 1;&quot; type=&quot;text&quot; name=&quot;customakeytf&quot; size=&quot;69&quot; onchange=&quot;process(this.form, keyform.klength.value);&quot; /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt; # &lt;/span&gt;&lt;input class=&quot;formtext&quot; title=&quot;character count&quot; type=&quot;text&quot; name=&quot;customcount&quot; value=&quot;0&quot; size=&quot;1&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;HEX :&lt;/td&gt;
&lt;td&gt;&lt;input class=&quot;formtext&quot; onkeypress=&quot;if ((event.keyCode &lt; 48) || (event.keyCode &gt; 57) &amp;amp;&amp;amp; (event.keyCode &lt; 65) || (event.keyCode &gt; 70) &amp;amp;&amp;amp; (event.keyCode &lt; 97) || (event.keyCode &gt; 102)) event.returnValue = false;&quot; type=&quot;text&quot; name=&quot;customhkeytf&quot; size=&quot;76&quot; onchange=&quot;process(this.form, keyform.klength.value);&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/form&gt;&lt;/div&gt;
&lt;p&gt;&lt;em&gt;                                          &lt;a href=&quot;https://www.firewall.cx/javascript:process(keyform,%20keyform.klength.value);&quot;&gt;Calculate Key Now!&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;               &lt;a href=&quot;https://www.firewall.cx/javascript:document.keyform.reset();&quot;&gt;Clear Form&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; Notes: WEP encryption uses 24 bit &quot;Initilization Vector&quot; in addition to the &quot;secret key&quot;. Therefore, 40 bit WEP can be refered to as 64 bit WEP, and 104 bit can be refered to as 128 bit, depending on whether the &quot;initialization vector&quot; is counted or not. &lt;/em&gt; &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;script type=&quot;text/javascript&quot; src=&quot;https://www.firewall.cx//./key-gen.js&quot;&gt;&lt;/script&gt;
The Firewall.cx Wireless LAN Key Generator will allow the generation of a WEP or WPA  ASCII based encryption key and will provide the equivalent HEX or ASCII string so it can be inserted directly into a Cisco Access Point configuration.&lt;br /&gt;&lt;br /&gt;As many engineers know, it is a common problem that when configuring a WEP encryption key in a Cisco Access Point, the IOS will not allow the input of the actual ASCII key, but instead requires the HEX equivalent. With our WLAN Key generator, simply insert your desired pass phrase and it will generate the necessary HEX value encryption key that needs to be used in the CLI or Web-Based configuration of the Cisco Access Point.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt; The Wireless LAN Key Generator allows for quick and valid WEP/WPA key generation. &lt;br /&gt;&lt;br /&gt; You can use the &lt;strong&gt;Random WEP/WPA Key Generator&lt;/strong&gt; to generate a random WEP or WPA key.  Simply choose the desired key length using the drop-down menu, and one will be generated for you. &lt;br /&gt;&lt;br /&gt; The WEP/WPA Key Generator supports &lt;strong&gt;64bit&lt;/strong&gt;, &lt;strong&gt;128bit&lt;/strong&gt;, &lt;strong&gt;152bit &lt;/strong&gt;&amp;amp; &lt;strong&gt;256bit WEP keys&lt;/strong&gt;, and &lt;strong&gt;160bit&lt;/strong&gt;, &lt;strong&gt;504bit WPA/WPA2 keys &lt;/strong&gt;for maximum security.&lt;br /&gt;&lt;br /&gt;Alternatively, if you require to generate a key based on a custom passphrase (most cases), you can use the &lt;strong&gt;Custom WEP/WPA Key Generator&lt;/strong&gt;. Just enter your password phrase into the &lt;strong&gt;Custom WEP/WPA Key Generator&lt;/strong&gt; - &lt;strong&gt;ASCII &lt;/strong&gt;text fields, and its HEX equivalent will be generated automatically.  You can also insert the HEX Value and the system will reveal the actual ASCII value - handy if you want to discover what password phrase has been used for the encryption.

&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/collaborations/zoho-netflow-800x140.jpg&quot; alt=&quot;Netflow Analyzer&quot; width=&quot;850&quot; height=&quot;150&quot; /&gt;&lt;/a&gt;&lt;br /&gt; &lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;form id=&quot;keyform&quot; action=&quot;&quot; name=&quot;keyform&quot; onsubmit=&quot;return false;&quot;&gt;
&lt;table class=&quot;t1&quot; style=&quot;width: 550px;&quot;&gt;
&lt;tbody&gt;
&lt;h4&gt;&lt;tr&gt;&lt;th colspan=&quot;2&quot;&gt;WEP/WPA Key Generator&lt;/th&gt;&lt;/tr&gt;&lt;/h4&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: left;&quot; colspan=&quot;2&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #3366ff;&quot;&gt;Random WEP/WPA Key Generator&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;white-space: nowrap; text-align: right;&quot;&gt;Key Length:&lt;/td&gt;
&lt;td style=&quot;text-align: left;&quot;&gt;&lt;select class=&quot;formselect&quot; name=&quot;klength&quot; onchange=&quot;process(this.form, this[this.selectedIndex].value);&quot;&gt; &lt;option selected=&quot;selected&quot; value=&quot;0&quot;&gt; --- choose key type --- &lt;/option&gt; &lt;option value=&quot;40&quot;&gt; 40 bit WEP Key ( 5 characters, 64 total bits)&lt;/option&gt; &lt;option value=&quot;104&quot;&gt; 104 bit WEP Key (13 cahracters, 128 total bits)&lt;/option&gt; &lt;option value=&quot;128&quot;&gt; 128 bit WEP Key (16 characters, 152 total bits)&lt;/option&gt; &lt;option value=&quot;232&quot;&gt; 232 bit WEP Key (29 characters, 256 total bits)&lt;/option&gt; &lt;option value=&quot;160&quot;&gt; 160 bit WPA Key (20 characters, minimum security)&lt;/option&gt; &lt;option value=&quot;504&quot;&gt; 504 bit WPA Key (63 characters, maximum security)&lt;/option&gt; &lt;/select&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;ASCII :&lt;/td&gt;
&lt;td&gt;&lt;input class=&quot;formtext&quot; onclick=&quot;this.form.asciikeytf.select();&quot; onfocus=&quot;this.form.asciikeytf.select();&quot; type=&quot;text&quot; name=&quot;asciikeytf&quot; value=&quot;&quot; size=&quot;76&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;HEX :&lt;/td&gt;
&lt;td&gt;&lt;input class=&quot;formtext&quot; onclick=&quot;this.form.hexkeytf.select();&quot; onfocus=&quot;this.form.hexkeytf.select();&quot; type=&quot;text&quot; name=&quot;hexkeytf&quot; value=&quot;&quot; size=&quot;76&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: left;&quot; colspan=&quot;2&quot;&gt;&lt;span style=&quot;color: #800080;&quot;&gt;&lt;strong&gt;Custom WEP/WPA Key&lt;/strong&gt; &lt;strong&gt;Generator&lt;/strong&gt;&lt;/span&gt;  &lt;br /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Note: use 5/13/16/29 characters for 64/128/152/256-bit WEP Encryption&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;ASCII :&lt;/td&gt;
&lt;td style=&quot;white-space: nowrap;&quot;&gt;&lt;input class=&quot;formtext&quot; title=&quot;custom passphrase (use 20-63 characters for WPA/PSK)&quot; onkeypress=&quot;keyform.customcount.value = keyform.customakeytf.value.length + 1;&quot; type=&quot;text&quot; name=&quot;customakeytf&quot; size=&quot;69&quot; onchange=&quot;process(this.form, keyform.klength.value);&quot; /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt; # &lt;/span&gt;&lt;input class=&quot;formtext&quot; title=&quot;character count&quot; type=&quot;text&quot; name=&quot;customcount&quot; value=&quot;0&quot; size=&quot;1&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: right;&quot;&gt;HEX :&lt;/td&gt;
&lt;td&gt;&lt;input class=&quot;formtext&quot; onkeypress=&quot;if ((event.keyCode &lt; 48) || (event.keyCode &gt; 57) &amp;amp;&amp;amp; (event.keyCode &lt; 65) || (event.keyCode &gt; 70) &amp;amp;&amp;amp; (event.keyCode &lt; 97) || (event.keyCode &gt; 102)) event.returnValue = false;&quot; type=&quot;text&quot; name=&quot;customhkeytf&quot; size=&quot;76&quot; onchange=&quot;process(this.form, keyform.klength.value);&quot; /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/form&gt;&lt;/div&gt;
&lt;p&gt;&lt;em&gt;                                          &lt;a href=&quot;https://www.firewall.cx/javascript:process(keyform,%20keyform.klength.value);&quot;&gt;Calculate Key Now!&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;               &lt;a href=&quot;https://www.firewall.cx/javascript:document.keyform.reset();&quot;&gt;Clear Form&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; Notes: WEP encryption uses 24 bit &quot;Initilization Vector&quot; in addition to the &quot;secret key&quot;. Therefore, 40 bit WEP can be refered to as 64 bit WEP, and 104 bit can be refered to as 128 bit, depending on whether the &quot;initialization vector&quot; is counted or not. &lt;/em&gt; &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
	<entry>
		<title>Cisco Aironet 1242AG /1240   - Multiple SSID &amp; 802.1q Trunk VLAN Link Configuration</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/cisco/cisco-wireless/cisco-wiress-air1242-mssid.html"/>
		<published>2011-10-19T09:17:23+11:00</published>
		<updated>2011-10-19T09:17:23+11:00</updated>
		<id>https://www.firewall.cx/cisco/cisco-wireless/cisco-wiress-air1242-mssid.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;This article explains how the Cisco 1240 series access point can be setup to provide support for multiple SSID,&amp;nbsp;each SSID assigned to a&amp;nbsp;separate VLAN. &amp;nbsp;This type of configuration is ideal for supporting different wireless networks, each one with its own characteristics.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Frequently used setup of Cisco access points involve at least one wireless network (SSID) for &amp;nbsp;accessing the local network (VLAN1) and another SSID for Internet access (Guest VLAN).&lt;/p&gt;
&lt;p&gt;It is important to note that this guide is also valid for the following Cisco Access Points: Cisco Aironet 1240 Series, Cisco Aironet 1040 series, Cisco Aironet 1130 AG Series, Cisco Aironet 1140 Series, Cisco Aironet 1200 Series, Cisco Aironet 1250 Series and Cisco Aironet 1260 Series. &amp;nbsp;Configuration of multiple SSIDs with Trunk links is almost identical, with minor differences in the interfaces (where we have more than one radio) and channels, depending if there is support for 802.11a/b/g/n.&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/tk-cisco-air-1242-1.gif&quot; alt=&quot;Cisco 1242AG Multiple SSID VLAN Trunk Link&quot; width=&quot;640&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Cisco Access Point Multiple SSID Configuration&amp;nbsp;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Configuring multiple SSIDs on a Cisco access point is a straight-forward process, however it does contain a few details we will analyse as we progress.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We need to now create the two SSIDs by defining their name, which will be broadcasted so users can find them, encryption method plus keys and VLAN assignment.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;dot11 ssid Company&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;vlan 1&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;authentication open&lt;/strong&gt; &lt;br /&gt;AP (config-ssid)# &lt;strong&gt;authentication key-management wpa&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;guest-mode&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;mbssid guest-mode&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;infrastructure-ssid optional&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;wpa-psk ascii 0&amp;nbsp;firewall.cx&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;exit&lt;/strong&gt;&lt;br /&gt; AP (config)#&lt;strong&gt; dot11 ssid Hotspot&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; vlan 2&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; authentication open &lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; authentication key-management wpa&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; mbssid guest-mode&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; wpa-psk ascii 0 free-access&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;exit&lt;/strong&gt;&lt;br /&gt;AP (config)#&lt;strong&gt; dot11 vlan-name vlan1 vlan1&lt;/strong&gt;&lt;br /&gt;AP (config)# &lt;strong&gt;dot11 vlan-name vlan2 vlan2&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above configuration is quite different from setups with one SSID. Reason being the multiple SSID and VLAN configuration required to ensure each SSID is assigned to the correct vlan. The '&lt;strong&gt;Company&lt;/strong&gt;' wireless network is assigned to &lt;strong&gt;VLAN 1&lt;/strong&gt; and the '&lt;strong&gt;Hotspot&lt;/strong&gt;' wireless network to &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that when using multiple SSIDs on a Cisco aironet access point, it is imperative to use the mbssid &lt;strong&gt;guest-mode&lt;/strong&gt; command otherwise the SSID name of the wireless network will not be broadcasted correctly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;dot11 &amp;lt;vlan-name&amp;gt;&lt;/strong&gt;'&amp;nbsp; command ensures the correct mapping of vlans and their respective VLAN names. In our example, the VLAN names follow the actual VLANs. So, VLAN 1 has been named 'vlan1'. This helps keep track of them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, we must ensure the integrated routing and bridging (IRB) feature is enabled to allow the routing of our protocols (IP) between routed interfaces and bridge groups. This command is most likely already present in the configuration, but let's play safe and enter it:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;AP (config)# &lt;strong&gt;bridge irb&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Configuring The Dot11Radio0 Interface&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Configuring the &lt;strong&gt;Dot11Radio0 interface&lt;/strong&gt; is our next step.&amp;nbsp;Dot11Radio0 is the actual radio interface of the integrated Cisco access point. &amp;nbsp;We will need to assign the SSIDs configured previously to this interface, along with the encryption methods and a few more parameters.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;interface Dot11Radio0&lt;/strong&gt;&lt;br /&gt;AP (config-if)# &lt;strong&gt;encryption vlan1 mode ciphers tkip &lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; encryption vlan2 mode ciphers tkip &lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; ssid Company&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; ssid Hotspot&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; mbssid&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; station-role root&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; speed&amp;nbsp; basic-1.0 2.0 5.5 11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; channel 2462&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most commands are self-explanatory. We will however explain the basic and important ones:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;span style=&quot;font-weight: bold;&quot;&gt;Encryption VLAN &lt;/span&gt; commands set the encryption mode for each VLAN and, therefore, each SSID. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt; command assigns the SSIDs to this interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;span style=&quot;font-weight: bold;&quot;&gt;mbssid&lt;/span&gt; command ensures both SSIDs are broadcast and are viewable to our wireless clients.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The station-role root is a default command and makes the access point act as a root station, in other words as an autonomous access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note the &lt;strong&gt;speed basic&lt;/strong&gt; command. This as well is a default command that sets the supported speeds. The first portion, &lt;strong&gt;1.0 to 54.0&lt;/strong&gt; refers to the 802.11 b/g protocol. If you have a dual radio on your access point you can configure the Dot11Radio1 (Second radio) interface accordingly.&lt;/p&gt;
&lt;h2&gt;Configuring The Dot11Radio0 Sub-interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point we are required to &lt;strong&gt;configure sub-interfaces&lt;/strong&gt; on&amp;nbsp;&lt;strong&gt;Dot11Radio0&lt;/strong&gt;, assigning each sub-interface to a VLAN.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;interface Dot11Radio0.1&lt;/strong&gt;&lt;br /&gt;AP (config-subif)#&lt;strong&gt; encapsulation dot1Q 1 native&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;no ip route-cache&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1 subscriber-loop-control&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1 block-unknown-source&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;no bridge-group 1 source-learning&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no bridge-group 1 unicast-flooding&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1 spanning-disabled&lt;/strong&gt;&lt;br /&gt; AP (config)#&lt;strong&gt; exit&lt;/strong&gt;&lt;br /&gt; AP (config)#&lt;strong&gt; interface Dot11Radio0.2&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;encapsulation dot1Q 2&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no ip route-cache&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;bridge-group 2&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;bridge-group 2 block-unknown-source&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no bridge-group 2 source-learning&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no bridge-group 2 unicast-flooding&lt;/strong&gt;&lt;br /&gt;AP (config-subif)#&lt;strong&gt;&amp;nbsp;bridge-group 2 spanning-disabled&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;When creating the subinterfaces, we always use easy-to-identify methods of mapping. Thus, &lt;strong&gt;interface Dot11Radio0.1&lt;/strong&gt; means this interface will be mapped to &lt;strong&gt;VLAN 1&lt;/strong&gt;, while &lt;strong&gt;interface Dot11Radio0.2&lt;/strong&gt; will map to&amp;nbsp;&lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;encapsulation dot1Q 1 native&lt;/strong&gt; command surves two purposes. It maps&amp;nbsp;VLAN 1 to sub-interface&amp;nbsp;Dot11Radio0.1 and tells the ap that this&amp;nbsp;VLAN (1) is the native vlan. &amp;nbsp;This means that untagged VLAN traffic belongs to&amp;nbsp;VLAN 1. &amp;nbsp;More information on&amp;nbsp;VLAN is available in our &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot;&gt;VLAN Section&lt;/a&gt; - be sure to visit it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Similarly, under &lt;strong&gt;interface Dot11Radio0.2&lt;/strong&gt;, &amp;nbsp;the &lt;strong&gt;encapsulation dotQ 2&lt;/strong&gt; command maps&amp;nbsp;VLAN 2 traffic to this sub-interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;bridge-group&lt;/strong&gt; command assigns each sub-interface to a bridge group. Each sub-interface is assigned to its own bridge-group. The bridge group essentially connects the wireless sub-interfaces with the Fast Ethernet interface this access point has. This is analysed below.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Configuring Cisco 1242AG / 1240 Access Point Fast Ethernet0, Sub-Interfaces &amp;amp; BVI interface&lt;/h2&gt;
&lt;p&gt;As with all Cisco Aironet access points, you'll find a Fast Ethernet0 interface that is used to connect the access point to our LAN switch. On Cisco Aironet models that support 802.11n technology e.g Cisco Aironet 1140, this interface is replaced with a Gigabit Ethernet interace, desinged to handle the increased capacity and throughput of the access point.&lt;/p&gt;
&lt;p&gt;Following is the configuration required to create the necessary GigabitEthernet sub-interfaces and map the Dot11Radio0.X interfaces previously created, with them:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;interface FastEthernet0&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&amp;nbsp;&lt;strong&gt;no ip address&lt;/strong&gt;&lt;br /&gt;AP (config-if)# &lt;strong&gt;no ip route-cache&lt;/strong&gt;&lt;br /&gt; AP (config-if)# &lt;strong&gt;exit&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;AP (config)#&lt;strong&gt; interface FastEthernet0.1&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;encapsulation dot1Q 1 native&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;no ip route-cache&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;bridge-group 1&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;no bridge-group 1 source-learning&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;bridge-group 1 spanning-disabled&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; exit &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;AP (config)#&lt;strong&gt; interface FastEthernet0.2&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; encapsulation dot1Q 2&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; no ip route-cache&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; bridge-group 2&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; no bridge-group 2 source-learning&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; bridge-group 2 spanning-disabled&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; exit &lt;/strong&gt;&lt;br /&gt; &lt;br /&gt;AP (config)# &lt;strong&gt;interface BVI1&lt;/strong&gt;&lt;br /&gt;AP (config-if)# &lt;strong&gt;ip address 192.168.30.5 255.255.255.0&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; no ip route-cache&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;FastEthernet interface&lt;/strong&gt; and &lt;strong&gt;sub-interface configuration&lt;/strong&gt; follows the same logic as the &lt;strong&gt;Dot11Radio0 interface&lt;/strong&gt;. Notice that each FastEthernet sub-interface is mapped to the same VLAN and bridge-group as the Dot11Radio0 sub-interfaces. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, we create the one and only BVI1 interface and assign it an IP Address. This is basically the IP Address of our access point and is reachable from our LAN network, so it's best to assign it an IP Address from your LAN network (VLAN 1).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that only &lt;strong&gt;one bridge-interface&lt;/strong&gt; (&lt;strong&gt;BVI Interface&lt;/strong&gt;) is configured with an IP Address. The rest of the bridge groups are not required to have a BVI interface as all traffic is trunked through the &lt;strong&gt;BVI1 Interface&lt;/strong&gt;. This is per Cisco design.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, we must &lt;strong&gt;enable ip routing&lt;/strong&gt; for&amp;nbsp;&lt;strong&gt;bridge 1&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;bridge 1 protocol ieee&lt;/strong&gt;&lt;br /&gt;AP (config)# &lt;strong&gt;bridge 1 route ip&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Configuring DHCP Service For Both VLAN Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First step is to define the DHCP service and ip address pools for our two Vlans, and therefore SSID's.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you prefer to configure the DHCP service on your Cisco router, detailed instructionscan be found at our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-dhcp-config.html&quot; target=&quot;_blank&quot;&gt;Cisco Router DHCP Server Configuration&lt;/a&gt; article.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help make it easy, we are providing the necessary commands for our example:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP(config)#&lt;strong&gt; ip dhcp excluded-address 192.168.30.1 192.168.30.20&lt;/strong&gt;&lt;br /&gt;AP(config)# &lt;strong&gt;ip dhcp excluded-address 192.168.40.1 192.168.40.20&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;AP(config)# &lt;strong&gt;ip dhcp pool Company&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)# &lt;strong&gt;network 192.168.30.0 255.255.255&lt;/strong&gt;.0&lt;br /&gt; AP(dhcp-config)# &lt;strong&gt;dns-server 192.168.30.1&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)# &lt;strong&gt;default-router 192.168.30.1 &lt;/strong&gt;&lt;br /&gt; &lt;br /&gt; AP(config)#&lt;strong&gt; ip dhcp pool Hotspot&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)#&lt;strong&gt; network 192.168.40.0 255.255.255.0&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)#&lt;strong&gt; default-router 192.168.40.1 &lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)#&lt;strong&gt; dns-server 192.168.40.1 &lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This configuration assumes that your router has two VLAN interfaces configured with the appropriate Internet access and Firewall configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On another note, &lt;strong&gt;NAT Overload&lt;/strong&gt; is required in most cases to ensure both VLAN networks have Internet access.. &amp;nbsp;This is covered extensively in our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-nat-overload.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Router NAT Overload&quot;&gt;Cisco Router NAT Overload&lt;/a&gt; article.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article provided an in-depth coverage on &lt;strong&gt;how to configure a Cisco Aironet 1242AG / 1240 series access point&lt;/strong&gt; to support &lt;strong&gt;multiple SSID wireless networks&lt;/strong&gt; and &lt;strong&gt;connect via 802.1q Trunk link&lt;/strong&gt; to a &lt;strong&gt;local switch&lt;/strong&gt;. &amp;nbsp;The information provided not only covers the basic commands, but also analyses the background theory and logic, to ensure the reader fully understands why this configuration method is used.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;This article explains how the Cisco 1240 series access point can be setup to provide support for multiple SSID,&amp;nbsp;each SSID assigned to a&amp;nbsp;separate VLAN. &amp;nbsp;This type of configuration is ideal for supporting different wireless networks, each one with its own characteristics.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Frequently used setup of Cisco access points involve at least one wireless network (SSID) for &amp;nbsp;accessing the local network (VLAN1) and another SSID for Internet access (Guest VLAN).&lt;/p&gt;
&lt;p&gt;It is important to note that this guide is also valid for the following Cisco Access Points: Cisco Aironet 1240 Series, Cisco Aironet 1040 series, Cisco Aironet 1130 AG Series, Cisco Aironet 1140 Series, Cisco Aironet 1200 Series, Cisco Aironet 1250 Series and Cisco Aironet 1260 Series. &amp;nbsp;Configuration of multiple SSIDs with Trunk links is almost identical, with minor differences in the interfaces (where we have more than one radio) and channels, depending if there is support for 802.11a/b/g/n.&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/tk-cisco-air-1242-1.gif&quot; alt=&quot;Cisco 1242AG Multiple SSID VLAN Trunk Link&quot; width=&quot;640&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Cisco Access Point Multiple SSID Configuration&amp;nbsp;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Configuring multiple SSIDs on a Cisco access point is a straight-forward process, however it does contain a few details we will analyse as we progress.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We need to now create the two SSIDs by defining their name, which will be broadcasted so users can find them, encryption method plus keys and VLAN assignment.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;dot11 ssid Company&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;vlan 1&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;authentication open&lt;/strong&gt; &lt;br /&gt;AP (config-ssid)# &lt;strong&gt;authentication key-management wpa&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;guest-mode&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;mbssid guest-mode&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;infrastructure-ssid optional&lt;/strong&gt;&lt;br /&gt;AP (config-ssid)# &lt;strong&gt;wpa-psk ascii 0&amp;nbsp;firewall.cx&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;exit&lt;/strong&gt;&lt;br /&gt; AP (config)#&lt;strong&gt; dot11 ssid Hotspot&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; vlan 2&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; authentication open &lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; authentication key-management wpa&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; mbssid guest-mode&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)#&lt;strong&gt; wpa-psk ascii 0 free-access&lt;/strong&gt;&lt;br /&gt; AP (config-ssid)# &lt;strong&gt;exit&lt;/strong&gt;&lt;br /&gt;AP (config)#&lt;strong&gt; dot11 vlan-name vlan1 vlan1&lt;/strong&gt;&lt;br /&gt;AP (config)# &lt;strong&gt;dot11 vlan-name vlan2 vlan2&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above configuration is quite different from setups with one SSID. Reason being the multiple SSID and VLAN configuration required to ensure each SSID is assigned to the correct vlan. The '&lt;strong&gt;Company&lt;/strong&gt;' wireless network is assigned to &lt;strong&gt;VLAN 1&lt;/strong&gt; and the '&lt;strong&gt;Hotspot&lt;/strong&gt;' wireless network to &lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that when using multiple SSIDs on a Cisco aironet access point, it is imperative to use the mbssid &lt;strong&gt;guest-mode&lt;/strong&gt; command otherwise the SSID name of the wireless network will not be broadcasted correctly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;dot11 &amp;lt;vlan-name&amp;gt;&lt;/strong&gt;'&amp;nbsp; command ensures the correct mapping of vlans and their respective VLAN names. In our example, the VLAN names follow the actual VLANs. So, VLAN 1 has been named 'vlan1'. This helps keep track of them.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, we must ensure the integrated routing and bridging (IRB) feature is enabled to allow the routing of our protocols (IP) between routed interfaces and bridge groups. This command is most likely already present in the configuration, but let's play safe and enter it:&lt;/p&gt;
&lt;div class=&quot;box-content&quot; style=&quot;text-align: justify;&quot;&gt;AP (config)# &lt;strong&gt;bridge irb&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Configuring The Dot11Radio0 Interface&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Configuring the &lt;strong&gt;Dot11Radio0 interface&lt;/strong&gt; is our next step.&amp;nbsp;Dot11Radio0 is the actual radio interface of the integrated Cisco access point. &amp;nbsp;We will need to assign the SSIDs configured previously to this interface, along with the encryption methods and a few more parameters.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;interface Dot11Radio0&lt;/strong&gt;&lt;br /&gt;AP (config-if)# &lt;strong&gt;encryption vlan1 mode ciphers tkip &lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; encryption vlan2 mode ciphers tkip &lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; ssid Company&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; ssid Hotspot&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; mbssid&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; station-role root&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&lt;strong&gt; speed&amp;nbsp; basic-1.0 2.0 5.5 11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; channel 2462&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most commands are self-explanatory. We will however explain the basic and important ones:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;span style=&quot;font-weight: bold;&quot;&gt;Encryption VLAN &lt;/span&gt; commands set the encryption mode for each VLAN and, therefore, each SSID. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt; command assigns the SSIDs to this interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;span style=&quot;font-weight: bold;&quot;&gt;mbssid&lt;/span&gt; command ensures both SSIDs are broadcast and are viewable to our wireless clients.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The station-role root is a default command and makes the access point act as a root station, in other words as an autonomous access point.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note the &lt;strong&gt;speed basic&lt;/strong&gt; command. This as well is a default command that sets the supported speeds. The first portion, &lt;strong&gt;1.0 to 54.0&lt;/strong&gt; refers to the 802.11 b/g protocol. If you have a dual radio on your access point you can configure the Dot11Radio1 (Second radio) interface accordingly.&lt;/p&gt;
&lt;h2&gt;Configuring The Dot11Radio0 Sub-interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point we are required to &lt;strong&gt;configure sub-interfaces&lt;/strong&gt; on&amp;nbsp;&lt;strong&gt;Dot11Radio0&lt;/strong&gt;, assigning each sub-interface to a VLAN.&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;interface Dot11Radio0.1&lt;/strong&gt;&lt;br /&gt;AP (config-subif)#&lt;strong&gt; encapsulation dot1Q 1 native&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;no ip route-cache&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1 subscriber-loop-control&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1 block-unknown-source&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;no bridge-group 1 source-learning&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no bridge-group 1 unicast-flooding&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&amp;nbsp;&lt;strong&gt;bridge-group 1 spanning-disabled&lt;/strong&gt;&lt;br /&gt; AP (config)#&lt;strong&gt; exit&lt;/strong&gt;&lt;br /&gt; AP (config)#&lt;strong&gt; interface Dot11Radio0.2&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;encapsulation dot1Q 2&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no ip route-cache&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;bridge-group 2&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;bridge-group 2 block-unknown-source&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no bridge-group 2 source-learning&lt;/strong&gt;&lt;br /&gt; AP (config-subif)#&lt;strong&gt;&amp;nbsp;no bridge-group 2 unicast-flooding&lt;/strong&gt;&lt;br /&gt;AP (config-subif)#&lt;strong&gt;&amp;nbsp;bridge-group 2 spanning-disabled&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;When creating the subinterfaces, we always use easy-to-identify methods of mapping. Thus, &lt;strong&gt;interface Dot11Radio0.1&lt;/strong&gt; means this interface will be mapped to &lt;strong&gt;VLAN 1&lt;/strong&gt;, while &lt;strong&gt;interface Dot11Radio0.2&lt;/strong&gt; will map to&amp;nbsp;&lt;strong&gt;VLAN 2&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;encapsulation dot1Q 1 native&lt;/strong&gt; command surves two purposes. It maps&amp;nbsp;VLAN 1 to sub-interface&amp;nbsp;Dot11Radio0.1 and tells the ap that this&amp;nbsp;VLAN (1) is the native vlan. &amp;nbsp;This means that untagged VLAN traffic belongs to&amp;nbsp;VLAN 1. &amp;nbsp;More information on&amp;nbsp;VLAN is available in our &lt;a href=&quot;https://www.firewall.cx/networking/vlan-networks.html&quot; target=&quot;_blank&quot;&gt;VLAN Section&lt;/a&gt; - be sure to visit it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Similarly, under &lt;strong&gt;interface Dot11Radio0.2&lt;/strong&gt;, &amp;nbsp;the &lt;strong&gt;encapsulation dotQ 2&lt;/strong&gt; command maps&amp;nbsp;VLAN 2 traffic to this sub-interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;bridge-group&lt;/strong&gt; command assigns each sub-interface to a bridge group. Each sub-interface is assigned to its own bridge-group. The bridge group essentially connects the wireless sub-interfaces with the Fast Ethernet interface this access point has. This is analysed below.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Configuring Cisco 1242AG / 1240 Access Point Fast Ethernet0, Sub-Interfaces &amp;amp; BVI interface&lt;/h2&gt;
&lt;p&gt;As with all Cisco Aironet access points, you'll find a Fast Ethernet0 interface that is used to connect the access point to our LAN switch. On Cisco Aironet models that support 802.11n technology e.g Cisco Aironet 1140, this interface is replaced with a Gigabit Ethernet interace, desinged to handle the increased capacity and throughput of the access point.&lt;/p&gt;
&lt;p&gt;Following is the configuration required to create the necessary GigabitEthernet sub-interfaces and map the Dot11Radio0.X interfaces previously created, with them:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;interface FastEthernet0&lt;/strong&gt;&lt;br /&gt; AP (config-if)#&amp;nbsp;&lt;strong&gt;no ip address&lt;/strong&gt;&lt;br /&gt;AP (config-if)# &lt;strong&gt;no ip route-cache&lt;/strong&gt;&lt;br /&gt; AP (config-if)# &lt;strong&gt;exit&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;AP (config)#&lt;strong&gt; interface FastEthernet0.1&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;encapsulation dot1Q 1 native&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;no ip route-cache&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;bridge-group 1&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;no bridge-group 1 source-learning&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; &amp;nbsp;bridge-group 1 spanning-disabled&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; exit &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;AP (config)#&lt;strong&gt; interface FastEthernet0.2&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; encapsulation dot1Q 2&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; no ip route-cache&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; bridge-group 2&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; no bridge-group 2 source-learning&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; bridge-group 2 spanning-disabled&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; exit &lt;/strong&gt;&lt;br /&gt; &lt;br /&gt;AP (config)# &lt;strong&gt;interface BVI1&lt;/strong&gt;&lt;br /&gt;AP (config-if)# &lt;strong&gt;ip address 192.168.30.5 255.255.255.0&lt;/strong&gt;&lt;br /&gt;AP (config-if)#&lt;strong&gt; no ip route-cache&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;FastEthernet interface&lt;/strong&gt; and &lt;strong&gt;sub-interface configuration&lt;/strong&gt; follows the same logic as the &lt;strong&gt;Dot11Radio0 interface&lt;/strong&gt;. Notice that each FastEthernet sub-interface is mapped to the same VLAN and bridge-group as the Dot11Radio0 sub-interfaces. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, we create the one and only BVI1 interface and assign it an IP Address. This is basically the IP Address of our access point and is reachable from our LAN network, so it's best to assign it an IP Address from your LAN network (VLAN 1).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is important to note that only &lt;strong&gt;one bridge-interface&lt;/strong&gt; (&lt;strong&gt;BVI Interface&lt;/strong&gt;) is configured with an IP Address. The rest of the bridge groups are not required to have a BVI interface as all traffic is trunked through the &lt;strong&gt;BVI1 Interface&lt;/strong&gt;. This is per Cisco design.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, we must &lt;strong&gt;enable ip routing&lt;/strong&gt; for&amp;nbsp;&lt;strong&gt;bridge 1&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP (config)# &lt;strong&gt;bridge 1 protocol ieee&lt;/strong&gt;&lt;br /&gt;AP (config)# &lt;strong&gt;bridge 1 route ip&lt;/strong&gt;&lt;/div&gt;
&lt;h2&gt;Configuring DHCP Service For Both VLAN Interfaces&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First step is to define the DHCP service and ip address pools for our two Vlans, and therefore SSID's.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you prefer to configure the DHCP service on your Cisco router, detailed instructionscan be found at our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-dhcp-config.html&quot; target=&quot;_blank&quot;&gt;Cisco Router DHCP Server Configuration&lt;/a&gt; article.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help make it easy, we are providing the necessary commands for our example:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;AP(config)#&lt;strong&gt; ip dhcp excluded-address 192.168.30.1 192.168.30.20&lt;/strong&gt;&lt;br /&gt;AP(config)# &lt;strong&gt;ip dhcp excluded-address 192.168.40.1 192.168.40.20&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;AP(config)# &lt;strong&gt;ip dhcp pool Company&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)# &lt;strong&gt;network 192.168.30.0 255.255.255&lt;/strong&gt;.0&lt;br /&gt; AP(dhcp-config)# &lt;strong&gt;dns-server 192.168.30.1&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)# &lt;strong&gt;default-router 192.168.30.1 &lt;/strong&gt;&lt;br /&gt; &lt;br /&gt; AP(config)#&lt;strong&gt; ip dhcp pool Hotspot&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)#&lt;strong&gt; network 192.168.40.0 255.255.255.0&lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)#&lt;strong&gt; default-router 192.168.40.1 &lt;/strong&gt;&lt;br /&gt; AP(dhcp-config)#&lt;strong&gt; dns-server 192.168.40.1 &lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This configuration assumes that your router has two VLAN interfaces configured with the appropriate Internet access and Firewall configuration.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On another note, &lt;strong&gt;NAT Overload&lt;/strong&gt; is required in most cases to ensure both VLAN networks have Internet access.. &amp;nbsp;This is covered extensively in our &lt;a href=&quot;https://www.firewall.cx/cisco/cisco-routers/cisco-router-nat-overload.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Router NAT Overload&quot;&gt;Cisco Router NAT Overload&lt;/a&gt; article.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article provided an in-depth coverage on &lt;strong&gt;how to configure a Cisco Aironet 1242AG / 1240 series access point&lt;/strong&gt; to support &lt;strong&gt;multiple SSID wireless networks&lt;/strong&gt; and &lt;strong&gt;connect via 802.1q Trunk link&lt;/strong&gt; to a &lt;strong&gt;local switch&lt;/strong&gt;. &amp;nbsp;The information provided not only covers the basic commands, but also analyses the background theory and logic, to ensure the reader fully understands why this configuration method is used.&lt;/p&gt;</content>
		<category term="Cisco Wireless" />
	</entry>
</feed>
