cc/td/doc/product/rtrmgmt/cwparent/cw_1105/wlse
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Quick Start Guide
Quick Start Guide for the CiscoWorks 1105
Wireless LAN Solution Engine

1 SUPPLEMENTAL LICENSE AGREEMENT
2 This Guide
3 Unpacking the Box
4 Installing and Configuring the Wireless LAN Solution Engine
5 Getting Started with the Wireless LAN Solution Engine
6 Obtaining Documentation
7 Obtaining Technical Assistance

Quick Start Guide

Quick Start Guide for the CiscoWorks 1105
Wireless LAN Solution Engine


1 SUPPLEMENTAL LICENSE AGREEMENT

2 This Guide

3 Unpacking the Box

4 Installing and Configuring the Wireless LAN Solution Engine

5 Getting Started with the Wireless LAN Solution Engine

6 Obtaining Documentation

7 Obtaining Technical Assistance

1 SUPPLEMENTAL LICENSE AGREEMENT

SUPPLEMENTAL LICENSE AGREEMENT FOR CISCO SYSTEMS NETWORK MANAGEMENT SOFTWARE RUNNING ON THE CISCO 11XX HARDWARE PLATFORM

IMPORTANT-READ CAREFULLY: This Supplemental License Agreement ("SLA") contains additional limitations on the license to the Software provided to Customer under the Software License Agreement between Customer and Cisco. Capitalized terms used in this SLA and not otherwise defined herein shall have the meanings assigned to them in the Software License Agreement. To the extent that there is a conflict among any of these terms and conditions applicable to the Software, the terms and conditions in this SLA shall take precedence.

By installing, downloading, accessing or otherwise using the Software, Customer agrees to be bound by the terms of this SLA. If Customer does not agree to the terms of this SLA, Customer may not install, download or otherwise use the Software.



ADDITIONAL LICENSE RESTRICTIONS

Installation and Use

The CiscoWorks Wireless LAN Solution Engine Software component of the Cisco 11XX Hardware Platform is preinstalled. CD's containing tools to restore this Software to the 11XX hardware are provided to Customer for reinstallation purposes only. Customer may only run the supported CiscoWorks Wireless LAN Solution Engine Software on the Cisco 11XX Hardware Platform designed for its use. No unsupported Software product or component may be installed on the Cisco 11XX Hardware Platform.

Software Upgrades, Major and Minor Releases

Cisco may provide CiscoWorks Wireless LAN Solution Engine Software updates and new version releases for the 11XX Hardware Platform. If the Software update and new version releases can be purchased through Cisco or a recognized partner or reseller, the Customer should purchase one Software update for each Cisco 11XX Hardware Platform. If the Customer is eligible to receive the Software update or new version release through a Cisco extended service program, the Customer should request to receive only one Software update or new version release per valid service contract.

Reproduction and Distribution

Customer may not reproduce nor distribute software.

DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS

Please refer to the Cisco Systems, Inc. Software License Agreement.

2 This Guide

This quick start guide is designed to help you get your Wireless LAN Solution Engine (WLSE) installed and ready to use as quickly as possible. If you require more comprehensive installation and configuration information, see the Hardware Installation and Configuration Guide for the CiscoWorks 1105 Wireless LAN Solution Engine. It is available in PDF format on the Product CD.

Additional Documentation

The following additional documents are either included with the WLSE as hardcopy documents, are available in PDF format on the Recovery CD, or both:


Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. To see translations of the warnings that appear in this publication, refer to the Regulatory Compliance and Safety Information document that accompanied this device.

Waarschuwing

Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij elektrische schakelingen betrokken risico's en dient u op de hoogte te zijn van standaard maatregelen om ongelukken te voorkomen. Voor vertalingen van de waarschuwingen die in deze publicatie verschijnen, kunt u het document Regulatory Compliance and Safety Information (Informatie over naleving van veiligheids- en andere voorschriften) raadplegen dat bij dit toestel is ingesloten.

Varoitus

Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja tavanomaisista onnettomuuksien ehkäisykeinoista. Tässä julkaisussa esiintyvien varoitusten käännökset löydät laitteen mukana olevasta Regulatory Compliance and Safety Information -kirjasesta (määräysten noudattaminen ja tietoa turvallisuudesta).

Attention

Ce symbole d'avertissement indique un danger. Vous vous trouvez dans une situation pouvant causer des blessures ou des dommages corporels. Avant de travailler sur un équipement, soyez conscient des dangers posés par les circuits électriques et familiarisez-vous avec les procédures couramment utilisées pour éviter les accidents. Pour prendre connaissance des traductions d'avertissements figurant dans cette publication, consultez le document Regulatory Compliance and Safety Information (Conformité aux règlements et consignes de sécurité) qui accompagne cet appareil.

Warnung

Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur Vermeidung von Unfällen bewußt. Übersetzungen der in dieser Veröffentlichung enthaltenen Warnhinweise finden Sie im Dokument Regulatory Compliance and Safety Information (Informationen zu behördlichen Vorschriften und Sicherheit), das zusammen mit diesem Gerät geliefert wurde.

Avvertenza

Questo simbolo di avvertenza indica un pericolo. La situazione potrebbe causare infortuni alle persone. Prima di lavorare su qualsiasi apparecchiatura, occorre conoscere i pericoli relativi ai circuiti elettrici ed essere al corrente delle pratiche standard per la prevenzione di incidenti. La traduzione delle avvertenze riportate in questa pubblicazione si trova nel documento Regulatory Compliance and Safety Information (Conformità alle norme e informazioni sulla sicurezza) che accompagna questo dispositivo.

Advarsel

Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan føre til personskade. Før du utfører arbeid på utstyr, må du vare oppmerksom på de faremomentene som elektriske kretser innebærer, samt gjøre deg kjent med vanlig praksis når det gjelder å unngå ulykker. Hvis du vil se oversettelser av de advarslene som finnes i denne publikasjonen, kan du se i dokumentet Regulatory Compliance and Safety Information (Overholdelse av forskrifter og sikkerhetsinformasjon) som ble levert med denne enheten.

Aviso

Este símbolo de aviso indica perigo. Encontra-se numa situação que lhe poderá causar danos físicos. Antes de começar a trabalhar com qualquer equipamento, familiarize-se com os perigos relacionados com circuitos eléctricos, e com quaisquer práticas comuns que possam prevenir possíveis acidentes. Para ver as traduções dos avisos que constam desta publicação, consulte o documento Regulatory Compliance and Safety Information (Informação de Segurança e Disposições Reguladoras) que acompanha este dispositivo.

¡Advertencia!

Este símbolo de aviso significa peligro. Existe riesgo para su integridad física. Antes de manipular cualquier equipo, considerar los riesgos que entraña la corriente eléctrica y familiarizarse con los procedimientos estándar de prevención de accidentes. Para ver una traducción de las advertencias que aparecen en esta publicación, consultar el documento titulado Regulatory Compliance and Safety Information (Información sobre seguridad y conformidad con las disposiciones reglamentarias) que se acompaña con este dispositivo.

Varning!

Denna varningssymbol signalerar fara. Du befinner dig i en situation som kan leda till personskada. Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och känna till vanligt förfarande för att förebygga skador. Se förklaringar av de varningar som förkommer i denna publikation i dokumentet Regulatory Compliance and Safety Information (Efterrättelse av föreskrifter och säkerhetsinformation), vilket medföljer denna anordning.

3 Unpacking the Box


Warning Read the installation instructions before you connect the system to its power source.


Warning Only trained and qualified personnel should be allowed to install, replace, or service this equipment.


Warning This unit is intended for installation in restricted access areas. A restricted access area is where access can only be gained by service personnel through the use of a special tool, lock and key, or other means of security, and is controlled by the authority responsible for the location.

The WLSE package includes the following:


1

Wireless LAN Solution Engine

2

Rack mounting kit

3

Power cable

4

Serial cable (light blue, RJ-45 to RJ-45)

5

10Base-T Ethernet cable (yellow)

6

Adapters (DB-9 to RJ-45)

7

Adapter (DB-25 to RJ-45)

8

WLSE Recovery CD

9

WLSE documentation—The following documents are shipped with the WLSE:

Quick Start Guide for the CiscoWorks 1105 Wireless LAN Solution Engine

Finding Documentation for the CiscoWorks 1105 Wireless LAN Solution Engine, Release 1.3

Regulatory Compliance and Safety Information for the CiscoWorks 1105 Wireless LAN Solution Engine

To install the WLSE, you will need the following:


1

Number 2 Phillips screwdriver

2

Tape measure

3

Level

4

ESD grounding strap

5

Antistatic mat or antistatic foam

4 Installing and Configuring the Wireless LAN Solution Engine


Warning Install the system in compliance with your local and national electrical codes. To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions to ensure that the system remains stable. The following guidelines are provided to ensure your safety:

—This unit should be mounted at the bottom of the rack if it is the only unit in the rack.

—When mounting this unit in a partially filled rack, load the rack from the bottom to the top with the heaviest component at the bottom of the rack.

—If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the unit in the rack.

Installing the Wireless LAN Solution Engine


Step 1   Attach the chassis-support brackets.


Step 2   Attach the rack-mount brackets to the rack. Make sure that all three bracket holes line up with the holes on the rack.


Step 3   Put the chassis into the rack and tighten the screws.



Caution   The rack-mount kit is not intended for use as a slide rail system. You must complete installation of the front-mount bracket assembly by securely fastening the chassis into the rack.


Warning This product relies on the building's installation for short-circuit (overcurrent) protection. Ensure that a fuse or circuit breaker no larger than 120 VAC, 15A U.S. (240 VAC, 10A outside the U.S.) is used on the phase conductors (all current-carrying conductors).


Warning This equipment has been designed for connection to TN and IT power systems.


Warning This product relies on the building's installation for short-circuit (overcurrent) protection. Ensure that a fuse or circuit breaker no larger than 120 VAC, 15A U.S. (240 VAC, 10A international) is used on the phase conductors (all current-carrying conductors).


Warning Never defeat the ground conductor or operate the equipment in the absence of a suitably installed ground conductor. Contact the appropriate electrical inspection authority or an electrician if you are uncertain that suitable grounding is available.

Step 4   Connect the AC power receptacle to the AC power source with the power cable.


Step 5   Plug the network connection into the Ethernet 0 port (the lower port).




Configuring the Wireless LAN Solution Engine

After you install and plug in the WLSE, you are ready to configure it at a console through the Command Line Interface (CLI).


Step 1   Connect a console to the WLSE front console port using the supplied serial cable and, if necessary, the DB-9-to-RJ-45 console adaptor.


Note    When connecting a console to the WLSE, use the console port on the front panel. Do not use the serial port located on the rear panel of the WLSE.


Step 2   Press the power switch to turn on the WLSE.

Step 3   Open a window for the system console, using a terminal emulation program if necessary.

The system begins booting and sends messages to the console window. When the system finishes booting, the localhost: login prompt appears. When the login prompt appears, you can configure the system.

Step 4   Enter setup at the login: prompt, then enter responses to the prompts that appear. The WLSE Setup Prgram Description Table on the next page describes how to respond to the prompts.

Press Enter to enter a response and proceed to the next prompt. Press Backspace or Delete to delete characters.


Tip If you incorrectly enter any entries and need to correct the information, exit the setup program by pressing Ctrl-c, or by entering no after the final prompt. Then perform an erase config and rerun the setup program.

Prompt Response Description Sample Response
login:

Enter setup

setup

host name:

System hostname.

SolutionEngine

domain name:

System domain name.

cisco.com

<admin> password:

Password for admin account.

Default username admin is reserved and cannot be deleted or changed.

Password is case-sensitive and can be between 5 and 20 characters.

Characters you type do not appear on screen.

wq1Cvu2pl

confirm password:

Reenter password to verify that you typed it correctly.

Characters you type do not appear on screen.

wq1Cvu2pl

eth0 IPaddress:

IP address of Ethernet 0 interface.

209.165.200.224

eth0 network mask:

Network mask of Ethernet 0 interface.

255.255.255.224

default gateway IP address:

IP address of default router that connects WLSE to network.

209.165.200.224

DNS server IP address:

IP address of a DNS server that WLSE uses for name/address resolution. The setup program does not validate the IP address you enter.

If you are not using a DNS server, see the Hardware Installation and Configuration Guide for the CiscoWorks 1105 Wireless LAN Solution Engine for instructions before proceeding.

209.165.201.1

Would you like to save this configuration? [yes]:

One of the following:

  • Press Enter to accept default. Configuration is saved and system reboots.
  • Type no and press Enter to exit without saving configuration and run the setup program again.

Press Enter

Step 5   Answer the next set of prompts to create a self-signed certificate. This certificate will allow you to access the WLSE securely, using HTTPS, until you are able to obtain a certificate from a certificate authority (CA). The Sefl_signed Certificate Table on the next page describes how to respond to the prompts. After you finish responding to these prompts, the WLSE will reboot.


Tip If you incorrectly enter any entries and need to correct the information in the self-signed certificate, you need to exit the program, perform an erase config and rerun the setup.

Prompt Response Description Sample Response
Country Name

Enter a 2-character code for the country in which you are using the WLSE.

US

State or Province Name

Enter the full name of the state or province in which you are using the WLSE.

Snake Desert

Locality Name

Enter the city in which you are using the WLSE.

Snake Town

Organization Name

Enter the name of the company that owns the WLSE.

Snake Oil, LTD.

Organizational Unit

Enter the section of the company that is using the WLSE. If this does not apply, enter a period at the prompt.

Webserver Team

Common Name

Enter the fully qualified domain name (FQDN) of the company that owns the WLSE.

www.snakeoil.com

Email Address

Enter the email address of the company that owns the WLSE.

www@snakeoil.com

Step 6   After you finish configuring the Wireless LAN Solution Engine, it will reboot. When the WLSE finishes rebooting, set up your mail server to send mail to external domains by entering the following command:

mailroute {hostname | ip-address}

where hostname is the hostname of the SMPT server and ip-address is the IP address of the SMPT server. If you do not set the mail server, email can only be sent only to the local domain. For more information, see the User Guide for the CiscoWorks 1105 Wireless LAN Solution Engine. You can access a PDF version of this guide by clicking View PDF in the WLSE's online help.



Verifying the Configuration

After configuring the WLSE, verify the configuration. Perform the following steps at the console to confirm that your settings are correct and that the system can communicate with the network. For more information on CLI commands, see the Hardware Installation and Configuration Guide for the CiscoWorks 1105 Wireless LAN Solution Engine. You can access a PDF version of this guide by clicking View PDF in the WLSE's online help.


Step 1   At the system console, enter admin at the login prompt, and log in with the password you created during setup.


Note    For security reasons, Telnet is disabled on the WLSE by default. To set up your security parameters and enable Telnet, use the telnetenable enable command. See the WLSE's Hardware Installation and Configuration guide for CLI command details.

Step 2   If you are using a DNS server, enter the following command to verify that the WLSE can obtain DNS services from the network:

# nslookup dns-name

where dns-name is the DNS name of a host that is registered in DNS. If the system cannot obtain the IP address of the host from DNS, use the ip name-server command to configure a working DNS server.

Step 3   Enter the following command to verify that the system can communicate with the network:

# ping ip-address

where ip-address is the IP address of a host that is accessible on the network. A DNS server is a recommended host to ping because it should always be running and accessible.

Step 4   Enter the command show config to verify that the configuration is as you expected.

Step 5   Enter the show clock command to verify that the system time and date are correct in Coordinated Universal Time (UTC).

Step 6   If the time or date is incorrect, set the correct time and date using the clock command.

Step 7   If your network uses NTP, configure the system to use NTP to set the clock.

Step 8   Enter the exit command to log out of the system. You are now finished using the console. The remaining steps take place at the client system.



Configuring the Browser

To configure a Web browser, perform the following steps on the client system:


Step 1   Make sure that the client system is running a supported browser:

Step 2   Enable JavaScript.

Step 3   Configure your browser to accept all cookies.

Step 4   Change the default font to sans serif for improved readability.

For detailed information about performing these steps, see the Hardware Installation and Configuration Guide for the CiscoWorks 1105 Wireless LAN Solution Engine or your browser's documentation.



Verifying HTTP and HTTPS Connectivity

Connect to the system using a Web browser, and perform the following steps to verify HTTP and HTTPS connectivity:


Step 1   To verify HTTP connectivity, enter the system IP address in a Web browser, followed by :1741 (the default port number).

For example, if the system IP address is 209.165.202.128, enter http://209.165.202.128:1741 .

A login dialog box appears.

Step 2   To verify HTTPS connectivity, enter the system IP address in a web browser, prefixed by https. No port number is needed.

For example, if the system IP address is 209.165.202.128, enter https://209.165.202.128.

A login dialog box appears.

Step 3   Enter the User Name admin and the password you created during setup in the login dialog box.

The system home page appears.



5 Getting Started with the Wireless LAN Solution Engine

There are two parts to getting the WLSE ready for use: setting up and discovering the devices, and enabling other users to use the WLSE. To discover your devices, you must add your seed devices, run and verify discovery, and set up network device credentials. After you discover and verify the network devices, you must create WLSE roles and add users to allow others access the WLSE.


Note   For security reasons, Telnet is disabled on the WLSE by default. To set up your security parameters and enable Telnet, use the telnetenable enable command. See the WLSE's online help for CLI command details.

Setting Up Devices

There are two ways to get devices into the system: using CDP seed devices or importing from a file or from CiscoWorks2000. If you have CDP enabled, then establish a seed device. If you choose not to use CDP, you can import the access point list from a file or from CiscoWorks2000, but will be unable to discover any connected switches or routers. In either case, device credentials must be added.

For information on importing devices, use Administration > Discover > Import Devices and see the WLSE's online help.

You must set up network devices so the WLSE can discover and manage them. This section describes both required and optional setup tasks for:

Access Points and Bridges

You can set up access points and bridges in two ways:

Tasks Procedure

1. Enable Cisco Discovery Protocol (CDP).

1. In the Summary Status page, click Setup. The Cisco Services Setup page appears.

2. Under Services: Cisco Services, click Cisco Discovery Protocol. The CDP Setup page appears.

3. Select Enabled. Click Apply or OK.

2. Enable SNMP.

(Optional) Set the location.

(Optional) Set the system name and system contact.

1. In the Summary Status page, click Setup. The Cisco Services Setup page appears.

2. Under Services, click SNMP. The SNMP Setup page appears.

3. Select Enabled.

4. Enter a System Name, System Location, and System Contact.

5. Click Apply or OK.

3. Set the community string by creating a user with all privileges.

(If you already entered an SNMP Admin Community name, the user created has Write, SNMP, Firmware, and Admin capabilities, and the User Manager is enabled, you do not need to create another user.)

1. In the Summary Status page, click Setup. The Cisco Services Setup page appears.

2. Under Services, click Security. The Security Setup page appears.

3. Click User Information; then click Add New User. The User Management window appears.

4. To create a user with SNMP read/write privileges, enter a username and password and select the Write, SNMP, Firmware, and Admin capabilities.

5. Click Apply or OK.

4. Add an HTTP user with the ability to modify firmware and enable the User Manager.

If the user has firmware privileges, you can use the same user that you created in Task 3.

1. In the Summary Status page, click Setup. The Cisco Services Setup page appears.

2. Click Security. The Security Setup page appears.

3. Click User Information; then click Add New User. The User Management window appears.

4. Enter a username and password and select Firmware; then click Apply.

5. Navigate back to the Security Setup page and click User Manager. The User Manager Setup window appears.

6. Select Enabled; then click Apply or OK.

5. Set up TFTP as the transfer protocol between the WLSE and access points.

1. In the Summary Status page, click Setup. The Cisco Services Setup page appears.

2. Under Services, click FTP. The FTP Setup page appears.

3. Use the pulldown menu to select TFTP as the file transfer protocol.

4. In the Default File Server text box, enter the IP address of the WLSE.

5. Click Apply or OK.

Routers and Switches


Note   Only routers and switches that have properly configured access points or bridges attached to them will be discovered.

On each router and switch, configure the following:

Task Procedure

1. Enable CDP and verify that access points and bridges are visible from the router or switch.

1. Enter enable mode.

2. Verify that CDP is running on the switch or router:

3. On IOS-based devices, use the show cdp run command.

4. On Hybrid OS-based Catalyst switches, use the show cdp command

5. If CDP is not running, use the set cdp enable command to enable CDP.

6. To verify that access points or bridges are visible in the device's CDP table, use the show cdp neighbors command.

2. Enable SNMP and set up community strings.

On IOS-based devices, enter configuration mode and use the snmp community community_string ro command.

On Hybrid OS-based Catalyst devices, enter enable mode and use the set snmp community read-only community_string command.

3. (Optional) Set the system name, contact, and location variables.

On IOS-based devices, enter configuration mode and use the following commands.

  • To set the system name, use the hostname name command.
  • To set the system contact, use the snmp contact contact command.
  • To set the location, use the snmp location location command.

On Hybrid OS-based Catalyst switches, enter enable mode and use the following commands:

  • To set the system name, use the set system name name command.
  • To set the system contact, use the set system contact contact command.
  • To set the location, use the set system location location command.

AAA Servers

The WLSE can monitor the performance of AAA (Authentication, Authorization, and Accounting) services provided by PCs running CiscoSecure ACS Server. To enable monitoring, you must:

To set up an AAA server and add the WLSE as a Network Access Server (NAS) on the AAA server:


Step 1   Log in to the CiscoSecure ACS Server on a PC that will provide authentication services to the wireless network.


Note    You will need the IP address or name of the PC when configuring the WLSE.

Step 2   Click User Setup on the left side of the initial page. The User Setup page appears.

Step 3   In the User text box, enter the username of the user that the WLSE will use for synthetic transactions.

Step 4   Click Add/Edit; then enter the appropriate information for the user, including the password. Click Submit.


Note    You will need this name and password when configuring the WLSE.

Step 5   Click Network Configuration on the left side of the page. The Network Configuration screen appears.

Step 6   Click Add Entry. In the Add AAA Client area, enter the WLSE information in the following text boxes:


Note    You will need this key when configuring the WLSE.

Step 7   Select RADIUS (Cisco Aironet) from the Authenticate Using list.

Step 8   Click Submit or Submit+Restart. A restart is required for the changes to take effect.



Entering HTTP Credentials

HTTP usernames and passwords are required for downloading configuration files to access points. If HTTP credentials are not entered on the WLSE, configuration information cannot be downloaded from the WLSE to access points. The password must be set on each access point, and you can enter as many usernames and passwords as necessary on the WLSE. See the online help for more information about HTTP credentials.

To enter the HTTP usernames and passwords, perform the following steps:


Step 1   Select Administration > Discover > Device Credentials > HTTP User/Password.

Step 2   To add a username and password:

    a. Enter the access point IP address or range of IP addresses that will use this username and password.

    b. Enter the username.

    c. Enter the password.

    d. Click Save. The IP address and username are added to the Current Entries textbox.

Step 3   Repeat step 2 to add more usernames and passwords.



Discovering the Network

The WLSE automatically discovers Cisco, CDP-enabled devices. To discover devices that are not CDP-enabled and to increase the discovery range, add the devices as seed devices by doing the following:

Enter SNMP Community Strings


Note   For additional information about setting the SNMP community strings, see the WLSE's online help.

If community strings are not entered correctly, the Wireless LAN Solution Engine cannot communicate with a device. To enter the community strings, perform the following steps:


Step 1   Select Administration > Discover > Device Credentials > SNMP Communities. The Bulk SNMP Settings dialog box appears.

This dialog box contains a default entry which covers all devices provided device community strings are set to the default (public).

Step 2   Add new entries or modify existing entries in the text box using the following syntax:

target:read_community::timeout:retries:::write_community

Note    You must enter the correct number of colons between variables. Otherwise, the community strings cannot be read.

Step 3   Select Reverse DNS Lookup if DNS is configured on the device.

Step 4   Click Save to apply your changes.



Add Seed Devices

Because the WLSE only automatically discovers CDP-enabled devices, if the device you want to manage does not support CDP, or if CDP is not running on the device, you must add that device as a seed. By adding a seed device (or set of seed devices), CDP-enabled neighbors of the seed device are also discovered. To add seed devices, do the following:


Step 1   Select Administration > Discover > DISCOVER > Schedule Discovery. The Discovery - Configuring Seeds screen appears.

Step 2   To add a seed device, enter its IP address in the Seed Values text box and click >>.


Note    Before you can modify the discovery schedule, you must have at least one seed device in the Seed Values list.

Step 3   Select the number of hops from the CDP Distance pull-down. The CDP distance applies to all the seed devices you add. You only need to set it once. If you set CDP Distance to 1, devices that are one hop from the seed device are discovered.


Note    Routers and switches that do not have access points attached to them are used when computing CDP distance. However, such devices will not appear in the discovered devices list.

Step 4   Repeat step 3 to add more seed devices.

Step 5   To enable and configure discovery, click Modify Schedule. The Modify Discovery Schedule dialog box appears.

    a. Select the State Date and Start Time from the pull-down lists.

    b. To repeat discovery at specified intervals, check the Enable check box. Then enter a number and select the interval from the pull-down list.

Step 6   Click Next. The CDP Discovery - Summary dialog box appears.

Step 7   Click Finish to submit your changes or Back to make changes in your settings.



Run Discovery

After you add seed devices, the WLSE can discover your devices. There are two ways to discover your devices. One is to schedule a discovery or perform a manual discovery.

To run discovery, select Administration > Discover > Discover > Run Discovery and click Run Now.

Verify Discovery

To verify that all the devices you want to monitor have been discovered, select Administration > Discover > Managed Devices > Manage/Unmanage. All newly discovered devices should appear in the New folder.


Note   No devices will appear elsewhere until you have moved them from the New to the Managed Device folder. For more information, see the Managing Devices section of the WLSE's online help.

Creating Additional Users

After you set up the network and make sure your devices have been discovered, create additional users so others can use the WLSE. WLSE allows you to limit a user's access based on the roles assigned to the user's login. Users are only enabled to use WLSE functions allowed by their login.

To create users, perform the following steps:


Step 1   Select Administration > User Admin > Manage Users.

Step 2   Enter a user name, password, and email address in the appropriate fields.

Step 3   Select the user's CLI access level.

Step 4   Select the user's Role. A user's role determines which WLSE features that user is allowed to access. The WLSE provides four predefined user roles:

    a. System Admin

    b. Network Admin

    c. Network Operator

    d. Help Desk

You can create additional roles by selecting Administration > User Admin > Manage Roles.. See the WLSE's online help for details.


Note    The predefined user roles cannot be deleted, but they can be modified. The System Administrator role, however, cannot be modified or deleted.

Step 5   Click Add to create the user.



6 Obtaining Documentation

These sections explain how to obtain documentation from Cisco Systems.

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com

Translated documentation is available at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.

Ordering Documentation

You can order Cisco documentation in these ways:

http://www.cisco.com/cgi-bin/order/order_root.pl

http://www.cisco.com/go/subscription

Documentation Feedback

You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.

You can e-mail your comments to bug-doc@cisco.com.

You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

7 Obtaining Technical Assistance

Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.

Cisco.com

Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.

Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:

If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:

http://www.cisco.com

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.

Cisco TAC inquiries are categorized according to the urgency of the issue:

The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.

Cisco TAC Web Site

You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:

http://www.cisco.com/tac

All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:

http://www.cisco.com/register/

If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:

http://www.cisco.com/tac/caseopen

If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.

Cisco TAC Escalation Center

The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.

To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Jul 1 10:26:20 PDT 2003
All contents are Copyright © 1992--2003 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.