cc/td/doc/product/wireless/wcs
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Overview

Cisco Wireless LAN Solution Overview

Single-Controller Deployments

Multiple-Controller Deployments

Operating System Software

Operating System Security

Cisco WLAN Solution Wired Security

Layer 2 and Layer 3 LWAPP Operation

Operational Requirements

Configuration Requirements

Radio Resource Management (RRM)

Cisco Wireless LAN Controllers

Primary, Secondary, and Tertiary Controllers

Client Roaming

Same-Controller (Layer 2) Roaming

Inter-Controller (Layer 2) Roaming

Inter-Subnet (Layer 3) Roaming

Client Location

External DHCP Servers

Per-Wireless LAN Assignment

Per-Interface Assignment

Security Considerations

Cisco WLAN Solution Mobility Groups

Cisco WLAN Solution Wired Connections

Cisco WLAN Solution Wireless LANs

Access Control Lists

Identity Networking

Enhanced Integration with Cisco Secure ACS

Dynamic Frequency Selection

File Transfers

Power over Ethernet

Pico Cell Functionality

Intrusion Detection Service (IDS)

Cisco Wireless LAN Controllers

Cisco 2000 Series Wireless LAN Controllers

Cisco 4100 Series Wireless LAN Controllers

Cisco 4400 Series Wireless LAN Controllers

Cisco 2000 Series Wireless LAN Controller Model Numbers

Cisco 4100 Series Wireless LAN Controller Model Numbers

Cisco 4400 Series Wireless LAN Controller Model Numbers

Distribution System Ports

About the Management Interface

AP-Manager Interface

Operator-Defined Interfaces

Virtual Interface

Service Port

Service-Port Interface

Startup Wizard

Cisco Wireless LAN Controller Memory

Cisco Wireless LAN Controller Failover Protection

Cisco Wireless LAN Controller Automatic Time Setting

Network Connections to Cisco Wireless LAN Controllers

Cisco 4100 Series Wireless LAN Controller VPN/Enhanced Security Module

Lightweight Access Points

Cisco 1000 Series IEEE 802.11a/b/g Lightweight Access Points

Cisco 1030 Remote Edge Lightweight Access Points

Cisco 1000 Series Lightweight Access Point Part Numbers

Cisco 1000 Series Lightweight Access Point External and Internal Antennas

Cisco 1000 Series Lightweight Access Point LEDs

Cisco 1000 Series Lightweight Access Point Connectors

Cisco 1000 Series Lightweight Access Point Power Requirements

Cisco 1000 Series Lightweight Access Point Mounting Options

Cisco 1000 Series Lightweight Access Point Physical Security

Cisco 1000 Series Lightweight Access Point Monitor Mode

Using the DNS for Controller Discovery

Autonomous Access Points Converted to Lightweight Mode

Guidelines for Using Access Points Converted to Lightweight Mode

Reverting from Lightweight Mode to Autonomous Mode

Controllers Accept SSCs from Access Points Converted to Lightweight Mode

Using DHCP Option 43

Using a Controller to Send Debug Commands to Access Points Converted to Lightweight Mode

Converted Access Points Send Crash Information to Controller

Converted Access Points Send Radio Core Dumps to Controller

Enabling Memory Core Dumps from Converted Access Points

Display of MAC Addresses for Converted Access Points

Disabling the Reset Button on Access Points Converted to Lightweight Mode

Configuring a Static IP Address on an Access Point Converted to Lightweight Mode

Rogue Access Points

Rogue Access Point Location, Tagging, and Containment

Web User Interface and the CLI

Web User Interface

Command Line Interface

Cisco Wireless Control System

Cisco WCS Base

Cisco WCS Location

Cisco WCS User Interface

Floor Plan Editor

Cisco WCS Cisco Wireless LAN Controller Autodiscovery

Cisco WCS Alarm Email Notification

Cisco WCS Location Calibration

Cisco 2700 Series Location Appliances


Overview


This chapter describes the components and features of the Cisco Wireless LAN Solution. This chapter contains these sections:

Cisco Wireless LAN Solution Overview

Operating System Software

Operating System Security

Radio Resource Management (RRM)

Cisco Wireless LAN Controllers

Client Roaming

External DHCP Servers

Cisco WLAN Solution Mobility Groups

Cisco WLAN Solution Wired Connections

Cisco WLAN Solution Wireless LANs

Access Control Lists

Identity Networking

Dynamic Frequency Selection

File Transfers

Power over Ethernet

Pico Cell Functionality

Intrusion Detection Service (IDS)

Cisco Wireless LAN Controllers

Lightweight Access Points

Autonomous Access Points Converted to Lightweight Mode

Rogue Access Points

Web User Interface and the CLI

Cisco Wireless Control System

Cisco 2700 Series Location Appliances

Cisco Wireless LAN Solution Overview

The Cisco Wireless LAN Solution is designed to provide 802.11 wireless networking solutions for enterprises and service providers. The Cisco Wireless LAN Solution simplifies deploying and managing large-scale wireless LANs and enables a unique best-in-class security infrastructure. The operating system manages all data client, communications, and system administration functions, performs Radio Resource Management (RRM) functions, manages system-wide mobility policies using the operating system Security solution, and coordinates all security functions using the operating system security framework.

The Cisco Wireless LAN Solution consists of Cisco Wireless LAN Controllers and their associated lightweight access points controlled by the operating system, all concurrently managed by any or all of the operating system user interfaces:

An HTTP and/or HTTPS full-featured Web User Interface hosted by Cisco Wireless LAN Controllers can be used to configure and monitor individual controllers. See the "Web User Interface and the CLI" section.

A full-featured command-line interface (CLI) can be used to configure and monitor individual Cisco Wireless LAN Controllers. See the "Web User Interface and the CLI" section.

The "Cisco Wireless Control System" section describes the Cisco Wireless Control System (WCS), which you use to configure and monitor one or more Cisco Wireless LAN Controllers and associated access points. WCS has tools to facilitate large-system monitoring and control. WCS runs on Windows 2000, Windows 2003, and Red Hat Enterprise Linux ES servers.

An industry-standard SNMP V1, V2c, and V3 interface can be used with any SNMP-compliant third-party network management system.

The Cisco Wireless LAN Solution supports client data services, client monitoring and control, and all rogue access point detection, monitoring, and containment functions. The Cisco Wireless LAN Solution uses lightweight access points, Cisco Wireless LAN Controllers, and the optional Cisco WCS to provide wireless services to enterprises and service providers.

The Cisco WCS application is offered in two versions:

Cisco WCS Base, which also supports client, rogue access point, rogue access point client, radio frequency ID (RFID) tag location to the nearest lightweight access point.

Cisco WCS Location, which also supports client, rogue access point, rogue access point client, RFID tag location to within 10 meters.

See the "Cisco WCS Base" section and the "Cisco WCS Location" section for more information.

When Cisco WCS Location is used, Cisco Wireless LAN Solution end users can also deploy Cisco 2700 Series Location Appliances, described in Chapter 10, "Configuring and Using Location Appliances." The location appliance enhances the high-accuracy built-in Cisco WCS Location abilities by computing, collecting and storing historical location data, which can be displayed in Cisco WCS. In this role, the location appliance acts as a server to one or more Cisco WCS Servers, collecting, storing, and passing on data from its associated controllers.


Note This document refers to Cisco Wireless LAN Controllers throughout. Unless specifically called out, the descriptions herein apply to all Cisco Wireless LAN Controllers, including but not limited to Cisco 2000 Series Wireless LAN Controllers, Cisco 4100 Series Wireless LAN Controllers, and Cisco 4400 Series Wireless LAN Controllers.


Figure 1-1 shows the Cisco Wireless LAN Solution components, which can be simultaneously deployed across multiple floors and buildings.

Figure 1-1 Cisco WLAN Solution Components

Single-Controller Deployments

A standalone Cisco Wireless LAN Controller can support lightweight access points across multiple floors and buildings simultaneously, and supports the following features:

Autodetecting and autoconfiguring lightweight access points as they are added to the network.

Full control of lightweight access points.

Full control of up to 16 lightweight access point wireless LAN (SSID) policies.

Lightweight access points connect to controllers through the network. The network equipment may or may not provide Power over Ethernet to the access points.

Note that some Cisco Wireless LAN Controllers use redundant Gigabit Ethernet connections to bypass single network failures. At any given time one of the redundant Gigabit Ethernet connections is active and the other is passive. Upon a network failure, the active connection becomes passive, and the passive connection becomes active.


Note Some controllers can connect through multiple physical ports to multiple subnets in the network. This feature can be helpful when Cisco WLAN Solution operators want to confine multiple VLANs to separate subnets.


Figure 1-2 shows a typical single-controller deployment.

Figure 1-2 Single-Controller Deployment

Multiple-Controller Deployments

Each Cisco Wireless LAN Controller can support lightweight access points across multiple floors and buildings simultaneously. However, full functionality of the Cisco Wireless LAN Solution is realized when it includes multiple controllers. A multiple-Cisco Wireless LAN Controller system has the following additional features:

Autodetecting and autoconfiguring Cisco Wireless LAN Controller RF parameters as the Cisco Wireless LAN Controllers are added to the network.

Same-Controller (Layer 2) Roaming and Inter-Subnet (Layer 3) Roaming.

Automatic access point failover to any redundant controller with unused ports (refer to the "Cisco Wireless LAN Controller Failover Protection" section).

The following figure shows a typical multiple-controller deployment. The figure also shows an optional dedicated Management Network and the three physical connection types between the network and the controllers.

Figure 1-3 Typical Multi-Controller Deployment

Operating System Software

The Operating System Software controls Cisco Wireless LAN Controllers and Cisco 1000 Series Lightweight Access Points. It includes full operating system security and Radio Resource Management (RRM) features.

Operating System Security

Operating system security bundles Layer 1, Layer 2, and Layer 3 security components into a simple, Cisco WLAN Solution-wide policy manager that creates independent security policies for each of up to 16 wireless LANs. (Refer to the "Cisco WLAN Solution Wireless LANs" section.)

The 802.11 Static WEP weaknesses can be overcome using robust industry-standard security solutions, such as:

802.1X dynamic keys with extensible authentication protocol (EAP).

Wi-Fi protected access (WPA) dynamic keys. The Cisco WLAN Solution WPA implementation includes:

Temporal key integrity protocol (TKIP) + message integrity code checksum (Michael) dynamic keys, or

WEP keys, with or without Pre-Shared key Passphrase.

RSN with or without Pre-Shared key.

Cranite FIPS140-2 compliant passthrough.

Fortress FIPS140-2 compliant passthrough.

Optional MAC Filtering.

The WEP problem can be further solved using industry-standard Layer 3 security solutions, such as:

Terminated and passthrough VPNs

Terminated and passthrough Layer Two Tunneling Protocol (L2TP), which uses the IP Security (IPSec) protocol.

Terminated and pass-through IPSec protocols. The terminated Cisco WLAN Solution IPSec implementation includes:

Internet key exchange (IKE)

Diffie-Hellman (DH) groups, and

Three optional levels of encryption: DES (ANSI X.3.92 data encryption standard), 3DES (ANSI X9.52-1998 data encryption standard), or AES/CBC (advanced encryption standard/cipher block chaining).

The Cisco WLAN Solution IPSec implementation also includes industry-standard authentication using:

Message digest algorithm (MD5), or

Secure hash algorithm-1 (SHA-1)

The Cisco Wireless LAN Solution supports local and RADIUS MAC Address filtering.

The Cisco Wireless LAN Solution supports local and RADIUS user/password authentication.

The Cisco Wireless LAN Solution also uses manual and automated Disabling to block access to network services. In manual Disabling, the operator blocks access using client MAC addresses. In automated Disabling, which is always active, the operating system software automatically blocks access to network services for an operator-defined period of time when a client fails to authenticate for a fixed number of consecutive attempts. This can be used to deter brute-force login attacks.

These and other security features use industry-standard authorization and authentication methods to ensure the highest possible security for your business-critical wireless LAN traffic.

Cisco WLAN Solution Wired Security

Many traditional access point vendors concentrate on security for the Wireless interface similar to that described in the "Operating System Security" section. However, for secure Cisco Wireless LAN Controller Service Interfaces, Cisco Wireless LAN Controller to access point, and inter-Cisco Wireless LAN Controller communications during device servicing and client roaming, the operating system includes built-in security.

Each Cisco Wireless LAN Controller and Cisco 1000 series lightweight access point is manufactured with a unique, signed X.509 certificate. This certificate is used to authenticate IPSec tunnels between devices. These IPSec tunnels ensure secure communications for mobility and device servicing.

Cisco Wireless LAN Controllers and Cisco 1000 series lightweight access points also use the signed certificates to verify downloaded code before it is loaded, ensuring that hackers do not download malicious code into any Cisco Wireless LAN Controller or Cisco 1000 series lightweight access point.

Layer 2 and Layer 3 LWAPP Operation

The LWAPP communications between Cisco Wireless LAN Controller and Cisco 1000 series lightweight access points can be conducted at ISO Data Link Layer 2 or Network Layer 3.

Operational Requirements

The requirement for Layer 2 LWAPP communications is that the Cisco Wireless LAN Controller and Cisco 1000 series lightweight access points must be connected to each other through Layer 2 devices on the same subnet. This is the default operational mode for the Cisco Wireless LAN Solution. Note that when the Cisco Wireless LAN Controller and Cisco 1000 series lightweight access points are on different subnets, these devices must be operated in Layer 3 mode.

The requirement for Layer 3 LWAPP communications is that the Cisco Wireless LAN Controllers and Cisco 1000 series lightweight access points can be connected through Layer 2 devices on the same subnet, or connected through Layer 3 devices across subnets.

Note that all Cisco Wireless LAN Controllers in a mobility group must use the same LWAPP Layer 2 or Layer 3 mode, or you will defeat the Mobility software algorithm.

Configuration Requirements

When you are operating the Cisco Wireless LAN Solution in Layer 2 mode, you must configure a management interface to control your Layer 2 communications.

When you are operating the Cisco Wireless LAN Solution in Layer 3 mode, you must configure a management interface to control your Layer 2 communications, and an AP-Manager interface to control Cisco 1000 series lightweight access point-to-Cisco Wireless LAN Controller Layer 3 communications.

Radio Resource Management (RRM)

Radio Resource Management (RRM) allows Cisco Wireless LAN Controllers to continually monitor their associated Cisco 1000 series lightweight access points for the following information:

Traffic Load — How much total bandwidth is used for transmitting and receiving traffic. This allows wireless LAN managers to track and plan network growth ahead of client demand.

Interference — How much traffic is coming from other 802.11 sources.

Noise — How much non-802.11 noise is interfering with the currently-assigned channel.

Coverage — Received Signal Strength (RSSI) and Signal to Noise Ratio (SNR) for all clients.

Nearby access points.

Using the collected information, RRM can periodically reconfigure the 802.11 RF network within operator-defined limits for best efficiency. To do this, RRM:

Dynamically reassigns channels to increase capacity and performance, both within the same Cisco Wireless LAN Controller and across multiple Cisco Wireless LAN Controllers.

Adjusts the transmit power to balance coverage and capacity, both within the same Cisco Wireless LAN Controller and across multiple Cisco Wireless LAN Controllers.

Allows the operator to assign nearby Cisco 1000 series lightweight access points into groups to streamline Radio Resource Management algorithm processing.

Load balances new clients across grouped Cisco 1000 series lightweight access points reporting to each Cisco Wireless LAN Controller. This is particularly important when many clients converge in one spot (such as a conference room or auditorium), because RRM can automatically force some subscribers to associate with nearby access points, allowing higher throughput for all clients.

Automatically detects and configures new Cisco 1000 series lightweight access points as they are added to the network. RRM automatically adjusts nearby Cisco 1000 series lightweight access points to accommodate the increased coverage and capacity.

Automatically detects and configures new Cisco Wireless LAN Controllers as they are added to the network. RRM automatically distributes associated Cisco 1000 series lightweight access points to maximize coverage and capacity.

Detects and reports coverage holes, where clients consistently connect to a Cisco 1000 Series lightweight access point at a very low signal strength.

Automatically defines Cisco Wireless LAN Controller Groups within operator-defined Mobility Groups.

The RRM solution thus allows the operator to avoid the costs of laborious historical data interpretation and individual Cisco 1000 Series IEEE 802.11a/b/g lightweight access point reconfiguration. The power control features of RRM ensure client satisfaction, and the coverage hole detection feature can alert the operator to the need for an additional (or relocated) Cisco 1000 series lightweight access point.

Note that the RRM uses separate monitoring and control for each of the deployed networks: 802.11a and 802.11b/802.11g. Also note that RRM is automatically enabled, but can be customized or disabled for individual Cisco 1000 series lightweight access points.

Finally, for operators requiring easy manual configuration, the RRM can recommend the best Cisco Radio settings, and then assign them on operator command.

The RRM controls produce a network that has optimal capacity, performance, and reliability. The RRM functions also free the operator from having to continually monitor the network for noise and interference problems, which can be transient and difficult to troubleshoot. Finally, RRM controls ensure that clients enjoy a seamless, trouble-free connection through the Cisco WLAN Solution 802.11 network.

Cisco Wireless LAN Controllers

When you are adding Cisco 1000 series lightweight access points to a multiple Cisco Wireless LAN Controller deployments network, it is convenient to have all Cisco 1000 series lightweight access points associate with one master controller on the same subnet. That way, the operator does not have to log into multiple controllers to find out which controller newly-added Cisco 1000 series lightweight access points associated with.

One controller in each subnet can be assigned as the master controller while adding lightweight access points. As long as a master controller is active on the same subnet, all new access points without a primary, secondary, and tertiary controller assigned automatically attempt to associate with the master Cisco Wireless LAN Controller. This process is described in the "Cisco Wireless LAN Controller Failover Protection" section.

The operator can monitor the master controller using the WCS Web User Interface and watch as access points associate with the master controller. The operator can then verify access point configuration and assign a primary, secondary, and tertiary controller to the access point, and reboot the access point so it reassociates with its primary, secondary, or tertiary controller.


Note Lightweight access points without a primary, secondary, and tertiary controller assigned always search for a master controller first upon reboot. After adding lightweight access points through the master controller, assign primary, secondary, and tertiary controllers to each access point. Cisco recommends that you disable the master setting on all controllers after initial configuration.


Primary, Secondary, and Tertiary Controllers

In multiple-controller networks, lightweight access points can associate with any controller on the same subnet. To ensure that each access point associates with a particular controller, the operator can assign primary, secondary, and tertiary controllers to the access point.

When an access point is added to a network, it looks for its primary, secondary, and tertiary controllers first, then a master controller, then the least-loaded controller with available access point ports. Refer to the "Cisco Wireless LAN Controller Failover Protection" section for more information.

Client Roaming

The Cisco Wireless LAN Solution supports seamless client roaming across Cisco 1000 series lightweight access points managed by the same Cisco Wireless LAN Controller, between Cisco Wireless LAN Controllers in the same Cisco WLAN Solution Mobility Group on the same subnet, and across controllers in the same Mobility Group on different subnets.

Same-Controller (Layer 2) Roaming

Each Cisco Wireless LAN Controller supports same-controller client roaming across access points managed by the same controller. This roaming is transparent to the client as the session is sustained and the client continues using the same DHCP-assigned or client-assigned IP Address. The controller provides DHCP functionality with a relay function. Same-controller roaming is supported in single-controller deployments and in mulitple-controller deployments.

Inter-Controller (Layer 2) Roaming

In multiple-controller deployments, the Cisco Wireless LAN Solution supports client roaming across access points managed by controllers in the same mobility group and on the same subnet. This roaming is also transparent to the client, as the session is sustained and a tunnel between controllers allows the client to continue using the same DHCP- or client-assigned IP Address as long as the session remains active. Note that the tunnel is torn down and the client must reauthenticate when the client sends a DHCP Discover with a 0.0.0.0 client IP Address or a 169.254.*.* client auto-IP Address, or when the operator-set session timeout is exceeded.

Note that the Cisco 1030 remote edge lightweight access points at a remote location must be on the same subnet to support roaming.

Inter-Subnet (Layer 3) Roaming

In multiple-controller deployments, the Cisco Wireless LAN Solution supports client roaming across access points managed by controllers in the same mobility group on different subnets. This roaming is transparent to the client, because the session is sustained and a tunnel between the controllers allows the client to continue using the same DHCP-assigned or client-assigned IP Address as long as the session remains active. Note that the tunnel is torn down and the client must reauthenticate when the client sends a DHCP Discover with a 0.0.0.0 client IP Address or a 169.254.*.* client auto-IP Address, or when the operator-set session timeout is exceeded.

Note that the Cisco 1030 remote edge lightweight access points at a remote location must be on the same subnet to support roaming.

Special Case: Voice Over IP Telephone Roaming

802.11 VoIP telephones actively seek out associations with the strongest RF signal to ensure best Quality of Service (QoS) and maximum throughput. The minimum VoIP telephone requirement of 20 millisecond or shorter latency time for the roaming handover is easily met by the Cisco Wireless LAN Solution, which has an average handover latency of nine or fewer milliseconds.

This short latency period is controlled by Cisco Wireless LAN Controllers, rather than allowing independent access points to negotiate roaming handovers.

The Cisco Wireless LAN Solution supports 802.11 VoIP telephone roaming across Cisco 1000 series lightweight access points managed by Cisco Wireless LAN Controllers on different subnets, as long as the controllers are in the same mobility group. This roaming is transparent to the VoIP telephone, because the session is sustained and a tunnel between controllers allows the VoIP telephone to continue using the same DHCP-assigned IP Address as long as the session remains active. Note that the tunnel is torn down and the VoIP client must reauthenticate when the VoIP telephone sends a DHCP Discover with a 0.0.0.0 VoIP telephone IP Address or a 169.254.*.* VoIP telephone auto-IP Address, or when the operator-set session timeout is exceeded.

Client Location

The Cisco Wireless LAN Solution periodically determines client, rogue access point, rogue access point client, radio frequency ID (RFID) tag location and stores the locations in the Cisco WCS database. To view the client location history, browse to the Cisco WCS Monitor Client client - vendor-MAC-address page and select Recent Map (High Resolution) or Present Map (High Resolution). Cisco WCS Base supports location to the nearest access point. Cisco WCS Location supports location to within 10 meters.

When Cisco WCS Location is used, Cisco Wireless LAN Solution end users can also deploy Cisco 2700 Series Location Appliances (location appliances), described in the "Cisco 2700 Series Location Appliances" section. The location appliance enhances the high-accuracy built-in Cisco WCS Location abilities by computing, collecting and storing historical location data, which can be displayed in Cisco WCS. In this role, the location appliance acts as a server to one or more Cisco WCS Servers, collecting, storing, and passing on data from its associated controllers.

External DHCP Servers

The operating system is designed to appear as a DHCP Relay to the network and as a DHCP Server to clients with industry-standard external DHCP Servers that support DHCP Relay. This means that each Cisco Wireless LAN Controller appears as a DHCP Relay agent to the DHCP Server. This also means that the Cisco Wireless LAN Controller appears as a DHCP Server at the virtual IP Address to wireless clients.

Because the Cisco Wireless LAN Controller captures the client IP Address obtained from a DHCP Server, it maintains the same IP Address for that client during same-Cisco Wireless LAN Controller, inter-Cisco Wireless LAN Controller, and inter-subnet client roaming.

Per-Wireless LAN Assignment

All Cisco WLAN Solution wireless LANs can be configured to use the same or different DHCP Servers, or no DHCP Server. This allows operators considerable flexibility in configuring their Wireless LANs, as further described in the "Cisco WLAN Solution Wireless LANs" section.

Note that Cisco WLAN Solution wireless LANs that support management over wireless must allow the management (device servicing) clients to obtain an IP Address from a DHCP Server. See the "Using Management over Wireless" section on page 3-14 for instructions on configuring management over wireless.

Per-Interface Assignment

You can assign DHCP servers for individual interfaces.

The Layer 2 management interface can be configured for a primary and secondary DHCP server. See the "About the Management Interface" section for more information on the management interface.

The Layer 3 AP-Manager interface can be configured for a primary and secondary DHCP server. See the "AP-Manager Interface" section for more information on the AP-Manager interface.

Each of the operator-defined interfaces can be configured for a primary and secondary DHCP server. See the "Operator-Defined Interfaces" section for more information on operator-defined interfaces.

The virtual interface does not use DHCP servers. See the "Virtual Interface" section for more information on virtual interfaces.

The service-port interface can be configured to enable or disable DHCP servers. See the "Service Port" section for more information on service-port interfaces.

Security Considerations

For enhanced security, it is recommended that operators require all clients to obtain their IP Addresses from a DHCP server. To enforce this requirement, all wireless LANs can be configured with a DHCP Required setting and a valid DHCP Server IP Address, which disallows client static IP Addresses. If a client associating with a wireless LAN with DHCP Required set does not obtain its IP Address from the designated DHCP Server, it is not allowed access to any network services.

Note that if DHCP Required is selected, clients must obtain an IP address via DHCP. Any client with a static IP address will not be allowed on the network. The Cisco Wireless LAN Controller monitors DHCP traffic since it acts as a DHCP proxy for the clients.

If slightly less security is tolerable, operators can create wireless LANs with DHCP Required disabled and a valid DHCP Server IP Address. Clients then have the option of using a static IP Address or obtaining an IP Address from the designated DHCP Server.

Operators are also allowed to create separate wireless LANs with DHCP Required disabled and a DHCP Server IP Address of 0.0.0.0. These wireless LANs drop all DHCP requests and force clients to use a static IP Address. Note that these wireless LANs do not support management over wireless connections.

Cisco WLAN Solution Mobility Groups

Cisco Wireless LAN Solution operators can define Mobility Groups to allow client roaming across groups of controllers. Because the controllers in multiple-controller deployments can detect each other across the network and over the air, it is important that each enterprise, institution, and wireless internet service provider isolate their controllers. The operating system makes it easy for operators to create this isolation by allowing them to assign a Mobility Group Name to their controllers. This assignment can be made using the web user interface, WCS, or the CLI.

Before clients can roam, they are automatically associated with their original, or anchor, Cisco Wireless LAN Controller. This anchor Cisco Wireless LAN Controller maintains the client information and ensures that the client remains connected with the same IP address across all handoffs for the duration of the client session.

Note that all the controllers in a Mobility Group must use the same Layer 2 and Layer 3 LWAPP Operation, or you will defeat the Mobility software algorithm.

Figure 1-4 shows the results of creating Mobility Group Names for two groups of Cisco Wireless LAN Controllers. The Cisco Wireless LAN Controllers in the ABC Mobility Group recognize and communicate with each other through their access points and through their shared subnets, but the ABC Mobility Group tags the XYZ access points as rogue access points. Likewise, the controllers in the XYZ Mobility Group do not recognize or communicate with the controllers in the ABC Mobility Group. This feature ensures Mobility Group isolation across the network.

Figure 1-4 Typical Mobility Group Name Application


Note Cisco recommends that you assign one set of VLANs for wireless LANs and a different set of VLANs for Management Interfaces to ensure that controllers properly route VLAN traffic.


The Cisco WLAN Solution Mobility Group feature can also be used to limit roaming between different floors, buildings, or campuses in the same enterprise by assigning different Mobility Group names to different Cisco Wireless LAN Controllers within the same wireless network.

If enabled, Radio Resource Management (RRM) operation is constrained within each Cisco WLAN Solution Mobility Group. See the "Radio Resource Management (RRM)" section for more information on RRM.


Note Because controllers communicate with each other when they are in the same mobility group, Cisco recommends that operators do not add physically separated controllers to the same static mobility group to avoid unnecessary traffic on the network.


Cisco WLAN Solution Wired Connections

The Cisco Wireless LAN Solution components communicate with each other using industry-standard Ethernet cables and connectors. The following paragraphs contain details of the Cisco WLAN Solution wired connections.

The Cisco 2000 Series Wireless LAN Controller connects to the network using from one to four 10/100BASE-T Ethernet cables.

The Cisco 4100 Series Wireless LAN Controller connects to the network using one or two fiber-optic Gigabit Ethernet cables: two redundant Gigabit Ethernet connections to bypass single network failures. At any given time one of the Cisco 4100 Series Wireless LAN Controller Gigabit Ethernet connections is active and the other is passive. Upon a network failure, the active connection becomes passive, and the passive connection becomes active.

The 4402 Cisco 4400 Series Wireless LAN Controller connects to the network using one or two two fiber-optic Gigabit Ethernet cables, and the 4404 Cisco 4400 Series Wireless LAN Controller connects to the network using one through four fiber-optic Gigabit Ethernet cables: two redundant Gigabit Ethernet connections to bypass single network failures. At any given time one of each pair of Cisco 4400 Series Wireless LAN Controller Gigabit Ethernet connections is active and the other is passive. Upon a network failure, the active connection becomes passive, and the passive connection becomes active.

Cisco 1000 series lightweight access points connects to the network using 10/100BASE-T Ethernet cables. The standard CAT-5 cable can also be used to conduct power for the Cisco 1000 series lightweight access points from a network device equipped with Power over Ethernet (PoE) capability. This power distribution plan can be used to reduce the cost of individual AP power supplies and related cabling.

Cisco WLAN Solution Wireless LANs

The Cisco Wireless LAN Solution can control up to 16 Wireless LANs for lightweight access points. Each wireless LAN has a separate wireless LAN ID (1 through 16), a separate wireless LAN SSID (wireless LAN name), and can be assigned unique security policies.

The Cisco 1000 series lightweight access points broadcast all active Cisco WLAN Solution wireless LAN SSIDs and enforce the policies defined for each wireless LAN.


Note Cisco recommends that you assign one set of VLANs for wireless LANs and a different set of VLANs for Management Interfaces to ensure that controllers properly route VLAN traffic.


If management over wireless is enabled across Cisco Wireless LAN Solution, the Cisco Wireless LAN Solution operator can manage the System across the enabled wireless LAN using CLI and Telnet, http/https, and SNMP.

To configure the Cisco WLAN Solution wireless LANs, refer to "Configuring Wireless LANs."

Access Control Lists

The operating system allows you to define up to 64 Access Control Lists (ACLs), similar to standard firewall Access Control Lists. Each ACL can have up to 64 Rules (filters).

Operators can use ACLs to control client access to multiple VPN servers within a given wireless LAN. If all the clients on a wireless LAN must access a single VPN server, use the IPSec/VPN Gateway Passthrough setting, described in the "Security Overview" section on page 3-2.

After they are defined, the ACLs can be applied to the management interface, the AP-Manager interface, or any of the operator-defined interfaces.

Refer to Access Control Lists > New in the Web User Interface Online Help for instructions on configuring Access Control Lists.

Identity Networking

Cisco Wireless LAN Controllers can have the following parameters applied to all clients associating with a particular wireless LAN: QoS, global or Interface-specific DHCP server, Layer 2 and Layer 3 Security Policies, and default Interface (which includes physical port, VLAN and ACL assignments).

However, the Cisco Wireless LAN Controller can also have individual clients (MAC addresses) override the preset wireless LAN parameters by using MAC Filtering or by Allowing AAA Override parameters. This configuration can be used, for example, to have all company clients log into the corporate wireless LAN, and then have clients connect using different QoS, DHCP server, Layer 2 and Layer 3 Security Policies, and Interface (which includes physical port, VLAN and ACL assignments) settings on a per-MAC Address basis.

When Cisco Wireless LAN Solution operators configure MAC Filtering for a client, they can assign a different VLAN to the MAC Address, which can be used to have operating system automatically reroute the client to the management interface or any of the operator-defined interfaces, each of which have their own VLAN, ACL, DHCP server, and physical port assignments. This MAC Filtering can be used as a coarse version of AAA Override, and normally takes precedence over any AAA (RADIUS or other) Override.

However, when Allow AAA Override is enabled, the RADIUS (or other AAA) server can alternatively be configured to return QoS and ACL on a per-MAC Address basis. Allow AAA Override gives the AAA Override precedence over the MAC Filtering parameters set in the Cisco Wireless LAN Controller; if there are no AAA Overrides available for a given MAC Address, the operating system uses the MAC Filtering parameters already in the Cisco Wireless LAN Controller. This AAA (RADIUS or other) Override can be used as a finer version of AAA Override, but only takes precedence over MAC Filtering when Allow AAA Override is enabled.

Note that in all cases, the Override parameters (Operator-Defined Interface and QoS, for example) must already be defined in the Cisco Wireless LAN Controller configuration.

In all cases, the operating system will use QoS and ACL provided by the AAA server or MAC Filtering regardless of the Layer 2 and/or Layer 3 authentication used.

Also note that the operating system will only move clients from the default Cisco WLAN Solution wireless LAN VLAN to a different VLAN when configured for MAC filtering, 802.1X, and/or WPA Layer 2 authentication.

To configure the Cisco WLAN Solution wireless LANs, refer to the "Configuring Wireless LANs" section.

Enhanced Integration with Cisco Secure ACS

The identity-based networking feature uses authentication, authorization, and accounting (AAA) override. When the following vendor-specific attributes are present in the RADIUS access accept message, the values override those present in the wireless LAN profile:

QoS level

802.1p value

VLAN interface name

Access control list (ACL) name

In this release, support is being added for the AAA server to return the VLAN number or name using the standard "RADIUS assigned VLAN name/number" feature defined in IETF RFC 2868 (RADIUS Attributes for Tunnel Protocol Support). To assign a wireless client to a particular VLAN, the AAA server sends the following attributes to the controller in the access accept message:

IETF 64 (Tunnel Type): VLAN

IETF 65 (Tunnel Medium Type): 802

IETF 81 (Tunnel Private Group ID): VLAN # or VLAN Name String

This enables Cisco Secure ACS to communicate a VLAN change that may be a result of a posture analysis. Benefits of this new feature include:

Integration with Cisco Secure ACS reduces installation and setup time

Cisco Secure ACS operates smoothly across both wired and wireless networks

This feature supports 2000, 4100, and 4400 series controllers and 1000, 1130, 1200 and 1500 series lightweight access points.

Dynamic Frequency Selection

The Cisco Wireless LAN solution complies with regulations in Europe and Singapore that require radio devices to use Dynamic Frequency Selection (DFS) to detect radar signals and avoid interfering with them.

When a lightweight access point with a 5-GHz radio operates on one of the 15 channels listed in Table 1-1, the controller to which the access point is associated automatically uses DFS to set the operating frequency.

When you manually select a channel for DFS-enabled 5-GHz radios, the controller checks for radar activity on the channel for 60 seconds. If there is no radar activity, the access point operates on the channel you selected. If there is radar activity on the channel you selected the controller automatically selects a different channel, and after 30 minutes, the access point re-tries the channel you selected.


Note The Rogue Location Detection Protocol (RLDP) is not supported on the channels listed in Table 1-1.



Note The maximum legal transmit power is greater for some 5-GHz channels than for others. When it randomly selects a 5-GHz channel on which power is restricted, the controller automatically reduces transmit power to comply with power limits for that channel.


Table 1-1 5-GHz Channels on Which DFS is Automatically Enabled

52 (5260 MHz)

104 (5520 MHz)

124 (5620 MHz)

56 (5280 MHz)

108 (5540 MHz)

128 (5640 MHz)

60 (5300 MHz)

112 (5560 MHz)

132 (5660 MHz)

64 (5320 MHz)

116 (5580 MHz)

136 (5680 MHz)

100 (5500 MHz)

120 (5600 MHz)

140 (5700 MHz)


Using DFS, the controller monitors operating frequencies for radar signals. If it detects radar signals on a channel, the controller takes these steps:

It changes the access point channel to a channel that has not shown radar activity. The controller selects the channel at random.

If the channel selected is one of the channels in Table 1-1, it scans the new channel for radar signals for 60 seconds. If there are no radar signals on the new channel, the controller accepts client associations.

It records the channel that showed radar activity as a radar channel and prevents activity on that channel for 30 minutes.

It generates a trap to alert the network manager.

File Transfers

The Cisco Wireless LAN Solution operator can upload and download operating system code, configuration, and certificate files to and from a Cisco Wireless LAN Controller using CLI commands, Web User Interface commands, or Cisco WCS commands.

To use CLI commands, refer to the "Transferring Files to and from a Controller" section on page 6-2.

To use Cisco WCS commands, refer to the "Using Cisco WCS to Update System Software" section on page 9-19.

Power over Ethernet

Lightweight access points can receive power via their Ethernet cables from 802.3af-compatible Power over Ethernet (PoE) devices, which can reduce the cost of discrete power supplies, additional wiring, conduits, outlets, and installer time. PoE also frees installers from having to mount Cisco 1000 series lightweight access points or other powered equipment near AC outlets, providing greater flexibility in positioning Cisco 1000 series lightweight access points for maximum coverage.

When you are using PoE, the installer runs a single CAT-5 cable from each lightweight access point to PoE-equipped network elements, such as a PoE power hub or a Cisco WLAN Solution Single-Line PoE Injector. When the PoE equipment determines that the lightweight access point is PoE-enabled, it sends 48 VDC over the unused pairs in the Ethernet cable to power the lightweight access point.

The PoE cable length is limited by the 100BASE-T or 10BASE-T specification to 100 m or 200 m, respectively.

Lightweight access points can receive power from an 802.3af-compliant device or from the external power supply.

Pico Cell Functionality

Pico Cell functionality includes optimization of the operating system (operating system) to support this functionality as follows:

The Cisco WCS Pico Cell Mode parameter reconfigures operating system parameters, allowing operating system to function efficiently in pico cell deployments. Note that when the operator is deploying a pico cell network the operating system must also have more memory allocated (512 to 2048 MB) using the config database size 2048 CLI command.

Client mobility between multiple mobility domains when such exist.

Addition of a WPA2 VFF extension to eliminate the need to re-key after every association. This allows the re-use of existing PTK and GTK.

With WPA2 PMK caching and VFF, the PMK cache is transferred as part of context transfer prior to the authentication phase. This allows expedited handoffs to work for both intra- and inter-Cisco Wireless LAN Controller roaming events.

A beacon/probe response that allows a Cisco 1000 Series lightweight access point to indicate which Cisco Wireless LAN Controller it is attached to so that reauthorization events only occur when needed, minimizing inter-Cisco Wireless LAN Controller handoffs and thus reducing CPU usage.

Allows changes to Cisco 1000 series lightweight access point sensitivity for pico cells.

Allows control of Cisco 1000 series lightweight access point fallback behavior to optimize pico cell use.

Supports heat maps for directional antennas.

Allows specific control over blacklisting events

Allows configuring and viewing basic LWAPP configuration using the Cisco 1000 series lightweight access point CLI.

Intrusion Detection Service (IDS)

Intrusion Detection Service includes the following:

Sensing Clients probing for "ANY" SSID

Sensing if Cisco 1000 series lightweight access points are being contained

Notification of MiM Attacks, NetStumbler, Wellenreiter

Management Frame Detection and RF Jamming Detection

Spoofed Deauthentication Detection (AirJack, for example)

Broadcast Deauthorization Detection

Null Probe Response Detection

Fake AP Detection

Detection of Weak WEP Encryption

MAC Spoofing Detection

AP Impersonation Detection

Honeypot AP Detection

Valid Station Protection

Misconfigured AP Protection

Rogue Access Point Detection

AD-HOC Detection and Protection

Wireless Bridge Detection

Asleep Detection / Protection

Cisco Wireless LAN Controllers

Cisco Wireless LAN Controllers are enterprise-class high-performance wireless switching platforms that support 802.11a and 802.11b/802.11g protocols. They operate under control of the operating system, which includes the Radio Resource Management (RRM), creating a Cisco WLAN Solution that can automatically adjust to real-time changes in the 802.11 RF environment. The Cisco Wireless LAN Controllers are built around high-performance network and security hardware, resulting in highly-reliable 802.11 enterprise networks with unparalleled security.

Cisco 2000 Series Wireless LAN Controllers

The Cisco 2000 Series Wireless LAN Controller is part of the Cisco Wireless LAN Solution. Each Cisco 2000 Series Wireless LAN Controller controls up to six Cisco 1000 series lightweight access points, making it ideal for smaller enterprises and low-density applications.

The Cisco 2000 Series Wireless LAN Controller is a slim 9.5 x 6.0 x 1.6 in. (241 x 152 x 41 mm) chassis that can be desktop or shelf mounted. The Cisco 2000 Series Wireless LAN Controller front panel has one POWER LED and four sets of Ethernet LAN Port status LEDs, which indicate 10 MHz or 100 MHz connections and transmit/receive Activity for the four corresponding back-panel Ethernet LAN connectors. The Cisco 2000 Series Wireless LAN Controller is shipped with four rubber desktop/shelf mounting feet.

Cisco 4100 Series Wireless LAN Controllers

The Cisco 4100 Series Wireless LAN Controllers are part of the Cisco Wireless LAN Solution. Each Cisco 4100 Series Wireless LAN Controller controls up to 36 Cisco 1000 series lightweight access points, making it ideal for medium-sized enterprises and medium-density applications.

Figure 1-5 shows the Cisco 4100 Series Wireless LAN Controller, which has two redundant front-panel SX/LC jacks. Note that the 1000BASE-SX circuits provides a 100/1000 Mbps wired connection to a network through an 850nM (SX) fiber-optic link using an LC physical connector.

Figure 1-5 4100 Series Controller

The Cisco 4100 Series Wireless LAN Controller can be factory-ordered with a VPN/Enhanced Security Module (Crypto Card) to support VPN, IPSec and other processor-intensive tasks, and contains two (Cisco 4100 Series Wireless LAN Controller) 1000BASE-SX network connectors that allow the Cisco 4100 Series Wireless LAN Controller to communicate with the network at Gigabit Ethernet speeds. The 1000BASE-SX network connectors provides 100/1000 Mbps wired connections to a network through 850nM (SX) fiber-optic links using LC physical connectors.

The two redundant Gigabit Ethernet connections on the Cisco 4100 Series Wireless LAN Controller allow the Cisco 4100 Series Wireless LAN Controller to bypass single network failures. At any given time one of the Cisco 4100 Series Wireless LAN Controller Gigabit Ethernet connections is active and the other is passive. Upon a network failure, the active connection becomes passive, and the passive connection becomes active.

Cisco 4400 Series Wireless LAN Controllers

Cisco 4400 Series Wireless LAN Controllers are part of the Cisco Wireless LAN Solution. Each Cisco 4400 Series Wireless LAN Controller controls up to 100 Cisco 1000 series lightweight access points, making it ideal for large-sized enterprises and large-density applications.

The 4402 Cisco 4400 Series Wireless LAN Controller has one set of two redundant front-panel SX/LC/T SFP modules (SFP transceiver, or Small Form-factor Plug-in), and the 4404 Cisco 4400 Series Wireless LAN Controller has two sets of two redundant front-panel SX/LC/T SFP modules:

1000BASE-SX SFP modules provide a 1000 Mbps wired connection to a network through an 850nM (SX) fiber-optic link using an LC physical connector.

1000BASE-LX SFP modules provide a 1000 Mbps wired connection to a network through a 1300nM (LX/LH) fiber-optic link using an LC physical connector.

1000BASE-T SFP modules provide a 1000 Mbps wired connection to a network through a copper link using an RJ-45 physical connector.

The one or two sets of redundant Gigabit Ethernet connections on the Cisco 4400 Series Wireless LAN Controller allow the Cisco 4400 Series Wireless LAN Controller to bypass single network failures. At any given time one of the Cisco 4400 Series Wireless LAN Controller Gigabit Ethernet connections is active and the other is passive. Upon a network failure, the active connection becomes passive, and the passive connection becomes active.

The Cisco 4400 Series Wireless LAN Controller can be equipped with one or two Cisco 4400 series power supplies. When the Cisco Wireless LAN Controller is equipped with two Cisco 4400 series power supplies, the power supplies are redundant and either power supply can continue to power the Cisco 4400 Series Wireless LAN Controller if the other power supply fails.

One Cisco 4400 series power supply is included standard with the Cisco Wireless LAN Controller, and is installed in Slot 1 at the factory. For redundancy, a second Cisco 4400 series power supply can be ordered from the factory and may be installed in Slot 2. The same power supply also fits in Slot 1 and can be used to replace a failed power supply in the field.

Cisco 2000 Series Wireless LAN Controller Model Numbers

Cisco 2000 Series Wireless LAN Controller model number is as follows:

AIR-WLC2006-K9 — The Cisco 2000 Series Wireless LAN Controller communicates with up to six Cisco 1000 series lightweight access points.


Note Cisco 2000 Series Wireless LAN Controllers come from the factory with tabletop mounting feet.


Cisco 4100 Series Wireless LAN Controller Model Numbers

Cisco 4100 Series Wireless LAN Controller model numbers are as follows:

AIR-WLC4112-K9 — The Cisco 4100 Series Wireless LAN Controller uses two redundant Gigabit Ethernet connections to bypass single network failures, and communicates with up to 12 Cisco 1000 series lightweight access points. That is, at any given time one of the Cisco 4100 Series Wireless LAN Controller Gigabit Ethernet connections is active and the other is passive. Upon a network failure, the active connection becomes passive, and the passive connection becomes active. Note that the 1000BASE-SX Network Adapters provide 100/1000 Mbps wired connections to a network through 850nM (SX) fiber-optic links using LC physical connectors.

AIR-WLC4124-K9 — The Cisco 4100 Series Wireless LAN Controller uses two redundant Gigabit Ethernet connections to bypass single network failures, and communicates with up to 24 Cisco 1000 series lightweight access points.

AIR-WLC4136-K9 — The Cisco 4100 Series Wireless LAN Controller uses two redundant Gigabit Ethernet connections to bypass single network failures, and communicates with up to 36 Cisco 1000 series lightweight access points.


Note Cisco 4100 Series Wireless LAN Controller models come from the factory with 19-inch EIA equipment rack flush-mount ears.


The following upgrade module is also available:

AIR-VPN-4100 — VPN/Enhanced Security Module: Supports VPN, L2TP, IPSec and other processor-intensive security options. This is a field-installable option for all Cisco 4100 Series Wireless LAN Controllers.

Cisco 4400 Series Wireless LAN Controller Model Numbers

Cisco 4400 Series Wireless LAN Controller model numbers are as follows:

AIR-WLC4402-12-K9 — The 4402 Cisco 4400 Series Wireless LAN Controller uses two redundant Gigabit Ethernet connections to bypass single network failures, and communicates with up to 12 Cisco 1000 series lightweight access points. That is, at any given time one of the Cisco 4400 Series Wireless LAN Controller Gigabit Ethernet connections is active and the other is passive. Upon a network failure, the active connection becomes passive, and the passive connection becomes active.

AIR-WLC4402-25-K9 — The 4402 Cisco Wireless LAN Controller uses two redundant Gigabit Ethernet connections to bypass single network failures, and communicates with up to 25 Cisco 1000 series lightweight access points.

AIR-WLC4402-50-K9 — The 4402 Cisco Wireless LAN Controller uses two redundant Gigabit Ethernet connections to bypass single network failures, and communicates with up to 50 Cisco 1000 series lightweight access points.

AIR-WLC4404-100-K9 — The 4404 Cisco Wireless LAN Controller uses four redundant Gigabit Ethernet connections to bypass one or two single network failures, and communicates with up to 100 Cisco 1000 series lightweight access points.


Note Cisco 4400 Series Wireless LAN Controller models come from the factory with integral 19-inch EIA equipment rack flush-mount ears.


The 4402 Cisco 4400 Series Wireless LAN Controller uses one set of two redundant front-panel SX/LC/T SFP modules (SFP transceiver, or Small Form-factor Plug-in), and the 4404 Cisco 4400 Series Wireless LAN Controller uses two sets of two redundant front-panel SX/LC/T SFP modules:

1000BASE-SX SFP modules provide a 1000 Mbps wired connection to a network through an 850nM (SX) fiber-optic link using an LC physical connector.

1000BASE-LX SFP modules provide a 1000 Mbps wired connection to a network through a 1300nM (LX/LH) fiber-optic link using an LC physical connector.

1000BASE-T SFP modules provide a 1000 Mbps wired connection to a network through a copper link using an RJ-45 physical connector.

The following power supply module is also available:

AIR-PWR-4400-AC — All Cisco 4400 series power supplies. One Cisco 4400 series power supply can power Cisco 4400 series power supplies can power Cisco 4400 series power supplies, the Cisco 4400 series power supplies are redundant.

Distribution System Ports

A Distribution System (DS) port is a physical port through which controller talks to access points across the network. DS ports are where packets are exchanged between the Cisco Wireless LAN Solution wireless LANs and the rest of the network.


Note The Distribution System Port cannot be assigned to a dedicated controller service port.


As described in the "Layer 2 and Layer 3 LWAPP Operation" section, when the LWAPP communications are set to Layer 2 (same subnet) operation, the Distribution System must have one management interface to control all inter-controller and all controller-to-access point communications, regardless of the number of physical Distribution System ports.

Also as described in the "Layer 2 and Layer 3 LWAPP Operation" section, when the LWAPP communications are set to Layer 3 (different subnet) operation, the Distribution System must have one management interface to control all inter-controller communications, and must have one AP-Manager interface to control all controller-to-access point communications, regardless of the number of physical Distribution System ports.

Each physical Distribution System port can also have between one and 512 operator-defined interfaces assigned to it. Each operator-defined interface is individually configured, and allows VLAN communications to exist on the distribution system port(s).

About the Management Interface

The logical Management Interface controls Layer 2 communications between Cisco Wireless LAN Controllers and Cisco 1000 series lightweight access points.


Note Cisco recommends that you assign one set of VLANs for wireless LANs and a different set of VLANs for Management Interfaces to ensure that controllers properly route VLAN traffic.


The Management Interface is assigned to one physical port through which it communicates with other network devices and other access points. However, the Management Interface can also communicate through all other physical ports except the service port as follows:

Sends messages through the Layer 2 network to autodiscover and communicate with other Cisco Wireless LAN Controllers through all physical ports except the service port.

Listens across the Layer 2 network for Cisco 1000 series lightweight access point LWAPP polling messages to autodiscover, associate with, and communicate with as many Cisco 1000 series lightweight access points as it can.


Note When a controller fails its dropped lightweight access points poll the network for another controller. When an online controller has any remaining lightweight access point ports, the Management Interface listens to the network for lightweight access point polling messages to autodiscover, associate with, and communicate with as many lightweight access points as it can. Refer to the "Cisco Wireless LAN Controller Failover Protection" section for more information.



Note The Management Interface cannot be assigned to the dedicated controller service port.


The Management Interface uses the burned-in Cisco Wireless LAN Controller Distribution System MAC address, and must be configured for the following:

VLAN assignment.

Fixed IP Address, IP netmask, and default gateway.

Physical port assignment.

Primary and Secondary DHCP Servers.

Access Control List, if required.

Refer to the "Verifying and Changing the Management Interfaces" section on page 7-2 for configuration instructions.

AP-Manager Interface

The logical AP-Manager Interface controls Layer 3 communications between Cisco Wireless LAN Controller and lightweight access points.

The AP-Manager Interface is assigned to one physical port and can be on the same subnet and physical port as the management interface. The AP-Manager Interface can communicate through any physical port except the service port as follows:

Sends Layer 3 messages through the network to autodiscover and communicate with other Cisco Wireless LAN Controllers.

Listens across the network for Layer 3 lightweight access point LWAPP polling messages to autodiscover, associate with, and communicate with as many lightweight access points as it can.


Note The AP-Manager interface cannot be assigned to the dedicated controller service port.


The AP-Manager Interface must be configured for the following:

VLAN assignment.

Fixed IP Address (must be different than the Management Interface IP address, but must be on the same subnet as the Management Interface), IP netmask, and default gateway.

Physical port assignment.

Primary and Secondary DHCP Servers.

Access Control List, if required.

Refer to the "Creating and Assigning the AP-Manager Interface" section on page 7-3 for configuration instructions.

Operator-Defined Interfaces

Each Cisco Wireless LAN Controller can support up to 512 Operator-Defined Interfaces. Each Operator-Defined Interface controls VLAN and other communications between Cisco Wireless LAN Controllers and all other network devices connected to an individual physical port. Between one and 512 Operator-Defined Interfaces can be assigned to wireless LANs, physical distribution system ports, the Layer 2 management interface, and the Layer 3 AP-Manager interface.


Note The AP-Manager interface cannot be assigned to the dedicated controller service port.



Note Operator-defined interface names cannot have spaces in them. If an operator-defined interface name contains a space, you may not be able to edit its configuration using the CLI.


Each Operator-Defined Interface must be configured for the following:

VLAN number.

Fixed IP Address, IP netmask, and default gateway.

Physical port assignment.

Primary and Secondary DHCP Servers.

Access Control List, if required.

Refer to the "Creating, Assigning, and Deleting Operator-Defined Interfaces" section on page 7-3 for configuration instructions.

Virtual Interface

The Virtual Interface controls Layer 3 Security and Mobility manager communications for Cisco Wireless LAN Controllers. It maintains the DNS Gateway hostname used by Layer 3 Security and Mobility managers to verify the source of certificates when Layer 3 Web Auth is enabled.

The Virtual Interface must be configured for the following:

Any fictitious, unassigned, unused Gateway IP Address.

DNS Gateway Host Name.

Refer to the "Verifying and Changing the Virtual Interface" section on page 7-4 for configuration instructions.

Service Port

The physical Service port on the Cisco Wireless LAN Controller is a 10/100BASE-T Ethernet port dedicated to operating system device service, and was formerly known as the Management port. The Service Port is controlled by the service-port interface.

The Service Port is configured with an IP Address, subnet mask, and IP assignment protocol different from the management interface. This allows the operator to manage the Cisco Wireless LAN Controller directly or through a dedicated operating system service network, such as 10.1.2.x, which can ensure operating system device service access during network downtime.

Cisco WLAN Solution created the Service port to remove the Cisco Wireless LAN Controller device service from the network data stream to improve security and to provide a more secure service connection.

Note that you cannot assign a Gateway to the Service port, so the port is not routable. However, you can set up dedicated routes to network management devices.

Also note that the Service Port is not auto-sensing: you must use the correct straight-through or crossover Ethernet cable to communicate with the Service Port.

Refer to the "Configuring the Service Port" section on page 4-9 for information on how to configure the Service Port.

Service-Port Interface

The Service-Port Interface controls communications through the dedicated Cisco Wireless LAN Controller service port. See the "Service Port" section for more information about the service port.


Note The service-port interface can only be assigned to the dedicated controller service port.


The Service-Port Interface uses the burned-in Cisco Wireless LAN Controller Service Port MAC address, and must be configured for the following:

Whether or not DHCP Protocol is activated.

IP Address and IP netmask.

Refer to the "Configuring the Service Port" section on page 4-9 for configuration instructions.

Startup Wizard

When an Cisco Wireless LAN Controller is powered up with a new factory operating system software load or after being reset to factory defaults, the bootup script runs the Startup Wizard, which prompts the installer for initial configuration. The Startup Wizard:

Ensures that the Cisco Wireless LAN Controller has a System Name, up to 32 characters.

Adds an Administrative username and password, each up to 24 characters.

Ensures that the Cisco Wireless LAN Controller can communicate with the CLI, Cisco WCS, or Web User interfaces (either directly or indirectly) through the service port by accepting a valid IP configuration protocol (none or DHCP), and if none, IP Address and netmask. If you do not want to use the Service port, enter 0.0.0.0 for the IP Address and netmask.

Ensures that the Cisco Wireless LAN Controller can communicate with the network (802.11 Distribution System) through the management interface by collecting a valid static IP Address, netmask, default router IP address, VLAN identifier, and physical port assignment.

Prompts for the IP address of the DHCP server used to supply IP addresses to clients, the Cisco Wireless LAN Controller Management Interface, and optionally to the Service Port Interface.

Asks for the LWAPP Transport Mode, described in the "Layer 2 and Layer 3 LWAPP Operation" section.

Collects the Virtual Gateway IP Address; any fictitious, unassigned IP address (such as 1.1.1.1) to be used by Layer 3 Security and Mobility managers.

Allows you to enter the Mobility Group (RF Group) Name.

Collects the wireless LAN 1 802.11 SSID, or Network Name.

Asks you to define whether or not clients can use static IP addresses. Yes = more convenient, but lower security (session can be hijacked), clients can supply their own IP Address, better for devices that cannot use DHCP. No = less convenient, higher security, clients must DHCP for an IP Address, works well for Windows XP devices.

If you want to configure a RADIUS server from the Startup Wizard, the RADIUS server IP address, communication port, and Secret.

Collects the Country Code.

Enables and/or disables the 802.11a, 802.11b and 802.11g Cisco 1000 series lightweight access point networks.

Enables or disables Radio Resource Management (RRM).

To use the Startup Wizard, refer to the "Using the Configuration Wizard" section on page 4-2.

Cisco Wireless LAN Controller Memory

The Cisco Wireless LAN Controller contain two kinds of memory: volatile RAM, which holds the current, active Cisco Wireless LAN Controller configuration, and NVRAM (non-volatile RAM), which holds the reboot configuration. When you are configuring the operating system in a Cisco Wireless LAN Controller, you are modifying volatile RAM; you must save the configuration from the volatile RAM to the NVRAM to ensure that the Cisco Wireless LAN Controller reboots in the current configuration.

Knowing which memory you are modifying is important when you are:

Using the Configuration Wizard

Clearing the Controller Configuration

Saving Configurations

Resetting the Controller

Logging Out of the CLI

Cisco Wireless LAN Controller Failover Protection

Each Cisco Wireless LAN Controller has a defined number of communication ports for Cisco 1000 series lightweight access points. This means that when multiple controllers with unused access point ports are deployed on the same network, if one controller fails, the dropped access points automatically poll for unused controller ports and associate with them.

During installation, Cisco recommends that you connect all lightweight access points to a dedicated controller, and configure each lightweight access point for final operation. This step configures each lightweight access point for a primary, secondary, and tertiary controller, and allows it to store the configured WLAN Solution Mobility Group information.

During failover recovery, the configured lightweight access points obtain an IP address from the local DHCP server (only in Layer 3 Operation), attempt to contact their primary, secondary, and tertiary controllers, and then attempt to contact the IP addresses of the other controllers in the Mobility group. This prevents the access points from spending time sending out blind polling messages, resulting in a faster recovery period.

In multiple-controller deployments, this means that if one controller fails, its dropped access points reboot and do the following under direction of the Radio Resource Management (RRM):

Obtain an IP address from a local DHCP server (one on the local subnet).

If the Cisco 1000 series lightweight access point has a primary, secondary, and tertiary controller assigned, it attempts to associate with that controller.

If the access point has no primary, secondary, or tertiary controllers assigned or if its primary, secondary, or tertiary controllers are unavailable, it attempts to associate with a master controller on the same subnet.

If the access point finds no master controller on the same subnet, it attempts to contact stored Mobility Group members by IP address.

Should none of the Mobility Group members be available, and if the Cisco 1000 series lightweight access point has no Primary, Secondary, and Tertiary Cisco Wireless LAN Controllers assigned and there is no master Cisco Wireless LAN Controller active, it attempts to associate with the least-loaded Cisco Wireless LAN Controller on the same subnet to respond to its discovery messages with unused ports.

This means that when sufficient controllers are deployed, should one controller fail, active access point client sessions are momentarily dropped while the dropped access point associates with an unused port on another controller, allowing the client device to immediately reassociate and reauthenticate.

Cisco Wireless LAN Controller Automatic Time Setting

Each controller can have its time manually set or can be configured to obtain the current time from one or more Network Time Protocol (NTP) servers. Each NTP server IP address is added to the controller database. Each controller searches for an NTP server and obtains the current time upon reboot and at each user-defined polling interval (daily to weekly).

Cisco Wireless LAN Controller Time Zones

Each Cisco Wireless LAN Controller can have its time zone manually set or can be configured to obtain the current time from one or more Network Time Protocol (NTP) servers. Each NTP server IP address is added to the Cisco Wireless LAN Controller database. Each Cisco Wireless LAN Controller can search for an NTP server and obtain the current time zone upon reboot and at each user-defined (daily to weekly) polling interval.

Network Connections to Cisco Wireless LAN Controllers

Regardless of operating mode, all Cisco Wireless LAN Controllers use the network as an 802.11 Distribution System. Regardless of the Ethernet port type or speed, each Cisco Wireless LAN Controller monitors and communicates with its related Cisco Wireless LAN Controllers across the network. The following sections give details of these network connections:

Cisco 2000 Series Wireless LAN Controllers

Cisco 4100 Series Wireless LAN Controllers

Cisco 4400 Series Wireless LAN Controllers

Cisco 2000 Series Wireless LAN Controllers

Cisco 2000 Series Wireless LAN Controllers can communicate with the network through any one of its physical ports, as the logical management interface can be assigned to the one of the physical ports. The physical port description follows:

Up to four 10/100BASE-T cables can plug into the four back-panel connectors on the Cisco 2000 Series Wireless LAN Controller chassis.

Figure 1-6 shows connections to the 2000 series controller.

Figure 1-6 Physical Network Connections to the 2000 Series Controller

Cisco 4100 Series Wireless LAN Controllers

Cisco 4100 Series Wireless LAN Controllers can communicate with the network through one or two physical ports, and the logical management interface can be assigned to the one or two physical ports. The physical port description follows:

Two Gigabit Ethernet 1000BASE-SX fiber-optic cables can plug into the LC connectors on the front of the Cisco 4100 Series Wireless LAN Controller, and they must be connected to the same subnet. Note that the two Gigabit Ethernet ports are redundant--the first port that becomes active is the master, and the second port becomes the backup port. If the first connection fails, the standby connection becomes the master, and the failed connection becomes the backup port.


Note The 1000BASE-SX circuits provide 100/1000 Mbps wired connections to the network through 850nM (SX) fiber-optic links using LC physical connectors.


Figure 1-7 shows connections to the 4100 series controller.

Figure 1-7 Physical Network Connections to the 4100 Series Controller

Cisco 4400 Series Wireless LAN Controllers

Cisco 4400 Series Wireless LAN Controllers can communicate with the network through one or two pairs of physical ports, and the logical management interface can be assigned to the physical ports. The physical port descriptions follows:

For the 4402 Cisco Wireless LAN Controller, up to two of the following connections are supported in any combination:

1000BASE-T (Gigabit Ethernet, front panel, RJ-45 physical port, UTP cable).

1000BASE-SX (Gigabit Ethernet, front panel, LC physical port, multi-mode 850nM (SX) fiber-optic links using LC physical connectors).

1000BASE-LX (Gigabit Ethernet, front panel, LC physical port, multi-mode 1300nM (LX/LH) fiber-optic links using LC physical connectors).

For the 4404 Cisco Wireless LAN Controller, up to four of the following connections are supported in any combination:

1000BASE-T (Gigabit Ethernet, front panel, RJ-45 physical port, UTP cable).

1000BASE-SX (Gigabit Ethernet, front panel, LC physical port, multi-mode 850nM (SX) fiber-optic links using LC physical connectors).

1000BASE-LX (Gigabit Ethernet, front panel, LX physical port, multi-mode 1300nM (LX/LH) fiber-optic links using LC physical connectors).

Figure 1-8 shows connections to the 4400 series controller.

Figure 1-8 Physical Network Connections to 4402 and 4404 Series Controllers

Cisco 4100 Series Wireless LAN Controller VPN/Enhanced Security Module

All Cisco 4100 Series Wireless LAN Controllers can be equipped with an optional VPN/Enhanced Security Module (AIR-VPN-4100), which slides into the rear panel of the Cisco 4100 Series Wireless LAN Controller. The VPN/Enhanced Security Module adds significant hardware encryption acceleration to the Cisco 4100 Series Wireless LAN Controller, which enables the following through the management interface:

Provide a built-in VPN server for mission-critical traffic.

Sustain up to 1 Gbps throughput with Layer 2 and Layer 3 encryption enabled.

Support high-speed, processor-intensive encryption, such as L2TP, IPSec and 3DES.

Figure 1-9 shows the VPN/Enhanced Security Module sliding into the rear of a Cisco 4100 Series Wireless LAN Controller.

Figure 1-9 4100 Series Controller VPN/Enhanced Security Module Location

Lightweight Access Points

This section describes Cisco lightweight access points.

Cisco 1000 Series IEEE 802.11a/b/g Lightweight Access Points

The Cisco 1000 series lightweight access point is a part of the innovative Cisco Wireless LAN Solution (Cisco Wireless LAN Solution). When associated with controllers as described below, the Cisco 1000 series lightweight access point provides advanced 802.11a and/or 802.11b/g Access Point functions in a single aesthetically pleasing plenum-rated enclosure. Figure 1-10 shows the two types of Cisco 1000 Series IEEE 802.11a/b/g lightweight access point: without and with connectors for external antennas.

Figure 1-10 1000 Series Lightweight Access Points

The Cisco WLAN Solution also offers 802.11a/b/g Cisco 1030 Remote Edge Lightweight Access Points, which are Cisco 1000 series lightweight access points designed for remote deployment, Radio Resource Management (RRM) control via a WAN link, and which include connectors for external antennas.

The Cisco 1000 series lightweight access point is manufactured in a neutral color so it blends into most environments (but can be painted), contains pairs of high-gain internal antennas for unidirectional (180-degree) or omnidirectional (360-degree) coverage, and is plenum-rated for installations in hanging ceiling spaces.

In the Cisco Wireless LAN Solution, most of the processing responsibility is removed from traditional SOHO (small office, home office) access points and resides in the Cisco Wireless LAN Controller.

Cisco 1030 Remote Edge Lightweight Access Points

The only exception to the general rule of lightweight access points being continuously controlled by Cisco Wireless LAN Controllers is the Cisco 1030 IEEE 802.11a/b/g remote edge lightweight access point (Cisco 1030 remote edge lightweight access point). The Cisco 1030 remote edge lightweight access point is intended to be located at a remote site, initially configured by a Cisco Wireless LAN Controller, and normally controlled by a Cisco Wireless LAN Controller.

However, because the Cisco 1030 remote edge lightweight access point bridges the client data (compared with other Cisco 1000 series lightweight access points, which pass all client data through their respective Cisco Wireless LAN Controller), if the WAN link breaks between the Cisco 1030 remote edge lightweight access point and its Cisco Wireless LAN Controller, the Cisco 1030 remote edge lightweight access point continues transmitting wireless LAN 1 client data through other Cisco 1030 remote edge lightweight access points on its local subnet. However, it cannot take advantage of features accessed from the Cisco Wireless LAN Controller, such as establishing new VLANs, until communication is reestablished.

The Cisco 1030 remote edge lightweight access point includes the traditional SOHO (small office, home office) AP processing power, and thus can continue operating if the WAN link to its associated Cisco Wireless LAN Controller fails. Because it is configured by its associated Cisco Wireless LAN Controller, it has the same wireless LAN configuration as the rest of the Cisco Wireless LAN Solution. As long as it remains connected to its Cisco Wireless LAN Controller, it varies its transmit power and channel selection under control of the RRM, and performs the same rogue access point location as any other Cisco 1000 series lightweight access point.

Note that the Cisco 1030 remote edge lightweight access point can support multiple wireless LANs while it is connected to its Cisco Wireless LAN Controller. However, when it loses connection to its Cisco Wireless LAN Controller, it supports only one wireless LAN on its local subnet.

Figure 1-11 shows a typical Cisco 1030 remote edge lightweight access point configuration:

Figure 1-11 Typical 1030 Lightweight Access Point Configuration

Note that the Cisco 1030 remote edge lightweight access point must have a DHCP server available on its local subnet, so it can obtain an IP address upon reboot. Also note that the Cisco 1030 remote edge lightweight access points at each remote location must be on the same subnet to allow client roaming.

Cisco 1000 Series Lightweight Access Point Part Numbers

The Cisco 1000 series lightweight access point includes one 802.11a and one 802.11b/g radio. The Cisco 1000 series lightweight access point is available in the following configurations:

AIR-AP1010-A-K9, AIR-AP1010-C-K9, AIR-AP1010-E-K9, AIR-AP1010-J-K9, AIR-AP1010-N-K9, and AIR-AP1010-S-K9 — AP1010 Cisco 1000 series lightweight access point with four high-gain internal antennas, and no external antenna adapters.

AIR-AP1020-A-K9, AIR-AP1020-C-K9, AIR-AP1020-E-K9, AIR-AP1020-J-K9, AIR-AP1020-N-K9, and AIR-AP1020-S-K9 — AP1020 Cisco 1000 series lightweight access point with four high-gain internal antennas, and one 5 GHz external antenna adapter and two 2.4 GHz external antenna adapters.

AIR-AP1030-A-K9, AIR-AP1030-C-K9, AIR-AP1030-E-K9, AIR-AP1030-J-K9, AIR-AP1030-N-K9, and AIR-AP1030-S-K9 — AP1030 Cisco 1000 series lightweight access point (Cisco 1030 remote edge lightweight access point) with four high-gain internal antennas, and one 5 GHz external antenna adapter and two 2.4 GHz external antenna adapters.

Refer to Appendix D, "Cisco WLAN Solution Supported Country Codes" for information on supported regulatory domains.

The Cisco 1000 series lightweight access point is shipped with a color-coordinated ceiling mount base and hanging-ceiling rail clips. You can also order projection- and flush-mount sheet metal wall mounting bracket kits. The base, clips, and optional brackets allow quick mounting to ceiling or wall.

The Cisco 1000 series lightweight access point can be powered by Power over Ethernet or by an external power supply. The external power supply model is:

AIR-PWR-1000 — Optional External 110-220 VAC-to-48 VDC Power Supply for any Cisco 1000 series lightweight access point.

The Single Inline PoE injector model is:

AIR-PWRINJ-1000AF — Optional Single 802.3af Inline Power over Ethernet Injector for any Cisco 1000 series lightweight access point, powered by 90-250 VAC.

The projection and flush sheet metal wall mount bracket model is:

AIR-ACC-WBRKT1000 — Optional sheet metal wall-mount bracket kit for any Cisco 1000 series lightweight access point. Includes one projection-mount and one flush-mount bracket per kit.

Cisco 1000 Series Lightweight Access Point External and Internal Antennas

The Cisco 1000 series lightweight access point enclosure contains one 802.11a or one 802.11b/g radio and four (two 802.11a and two 802.11b/g) high-gain antennas, which can be independently enabled or disabled to produce a 180-degree sectorized or 360-degree omnidirectional coverage area.


Note Cisco 1000 Series lightweight access points must use the factory-supplied internal or external antennas to avoid violating FCC requirements and voiding the user's authority to operate the equipment.


Note that the wireless LAN operator can disable either one of each pair of the Cisco 1000 series lightweight access point internal antennas to produce a 180-degree sectorized coverage area. This feature can be useful, for instance, for outside-wall mounting locations where coverage is only desired inside the building, and in a back-to-back arrangement that can allow twice as many clients in a given area.

Refer to "Antenna Patterns for 1000 Series Access Points" for antenna patterns.

External Antenna Connectors

The AP1020 and AP1030 Cisco 1000 series lightweight access points have male reverse-polarity TNC jacks for installations requiring factory-supplied external directional or high-gain antennas. The external antenna option can create more flexibility in Cisco 1000 series lightweight access point antenna placement.


Note The AP1010 Cisco 1000 Series lightweight access points are designed to be used exclusively with the internal high-gain antennas, and have no jacks for external antennas.


Note that the 802.11b/g 2.4 GHz Left external antenna connector is associated with the internal Side A antenna, and that the 2.4 GHz Right external antenna connector is associated with the internal Side B antenna. When you have 802.11b/g diversity enabled, the Left external or Side A internal antennas are diverse from the Right external or Side B internal antennas.

Also note that the 802.11a 5 GHz Left external antenna connector is separate from the internal antennas, and adds diversity to the 802.11a transmit and receive path. Note that no external 802.11a antennas are certified in FCC-regulated areas, but external 802.11a antennas may be certified for use in other countries.

Antenna Sectorization

Note that the Cisco WLAN Solution supports Antenna Sectorization, which can be used to increase the number of clients and/or client throughput a given air space. Installers can mount two Cisco 1000 series lightweight access points back-to-back, and the Network operator can disable the second antenna in both access points to create a 360-degree coverage area with two sectors.

Installers can also mount Cisco 1000 series lightweight access points on the periphery of a building and disable the Side B internal antennas. This configuration can be used to supply service to the building interior without extending coverage to the parking lot, at the cost of eliminating the internal antenna diversity function.

Refer to Appendix E: Internal Antenna Patterns for information on the radiation patterns of internal antennas in 1000 series lightweight access points.

Cisco 1000 Series Lightweight Access Point LEDs

Each Cisco 1000 series lightweight access point is equipped with four LEDs across the top of the case. They can be viewed from nearly any angle. The LEDs indicate power and fault status, 2.4 GHz (802.11b/g) Cisco Radio activity, and 5 GHz (802.11a) Cisco Radio activity.

This LED display allows the wireless LAN manager to quickly monitor the Cisco 1000 series lightweight access point status. For more detailed troubleshooting instructions, refer to the Error Messages and Access Point LEDs appendix.

Cisco 1000 Series Lightweight Access Point Connectors

The AP1020 and AP1030 Cisco 1000 series lightweight access points have the following external connectors:

One RJ-45 Ethernet jack, used for connecting the Cisco 1000 series lightweight access point to the network.

One 48 VDC power input jack, used to plug in an optional factory-supplied external power adapter.

Three male reverse-polarity TNC antenna jacks, used to plug optional external antennas into the Cisco 1000 series lightweight access point: two for an 802.11b/g radio, and one for an 802.11a radio.


Note The AP1010 Cisco 1000 Series lightweight access points are designed to be used exclusively with the internal high-gain antennas, and have no jacks for external antennas.


The Cisco 1000 series lightweight access point communicates with a Cisco Wireless LAN Controller using standard CAT-5 (Category 5) or higher 10/100 Mbps twisted pair cable with RJ-45 connectors. Plug the CAT-5 cable into the RJ-45 jack on the side of the Cisco 1000 series lightweight access point.

Note that the Cisco 1000 series lightweight access point can receive power over the CAT-5 cable from network equipment. Refer to Power over Ethernet for more information about this option.

The Cisco 1000 series lightweight access point can be powered from an optional factory-supplied external AC-to-48 VDC power adapter. If you are powering the Cisco 1000 series lightweight access point using an external adapter, plug the adapter into the 48 VDC power jack on the side of the Cisco 1000 series lightweight access point.

The Cisco 1000 series lightweight access point includes two 802.11a and two 802.11b/g high-gain internal antennas, which provide omnidirectional coverage. However, some Cisco 1000 series lightweight access points can also use optional factory-supplied external high-gain and/or directional antennas. When you are using external antennas, plug them into the male reverse-polarity TNC jacks on the side of the AP1020 and AP1030 Cisco 1000 series lightweight access points.


Note Cisco 1000 Series lightweight access points must use the factory-supplied internal or external antennas to avoid violating FCC requirements and voiding the user's authority to operate the equipment.


Cisco 1000 Series Lightweight Access Point Power Requirements

Each Cisco 1000 series lightweight access point requires a 48 VDC nominal (between 38 and 57 VDC) power source capable of providing 7 Watts. The polarity of the DC source does not matter because the Cisco 1000 series lightweight access point can use either a +48 VDC or a -48 VDC nominal source.

Cisco 1000 series lightweight access points can receive power from the external power supply (which draws power from a 110-220 VAC electrical outlet) plugged into the side of the access point case, or from Power over Ethernet.

Cisco 1000 Series Lightweight Access Point External Power Supply

The Cisco 1000 series lightweight access point can receive power from an external 110-220 VAC-to-48 VDC power supply or from Power over Ethernet equipment.

The external power supply (AIR-PWR-1000) plugs into a secure 110 through 220 VAC electrical outlet. The converter produces the required 48 VDC output for the Cisco 1000 series lightweight access point. The converter output feeds into the side of the Cisco 1000 series lightweight access point through a 48 VDC jack.

Note that the AIR-PWR-1000 external power supply can be ordered with country-specific electrical outlet power cords. Contact Cisco when ordering to receive the correct power cord.

Cisco 1000 Series Lightweight Access Point Mounting Options

Cisco 1000 Series Lightweight Access Point Mounting Options

Refer to the Internal-Antenna AP1010 Cisco 1000 Series IEEE 802.11a/b/g Lightweight Access Point Quick Start Guide or the External-Antenna AP1020 and AP1030 Cisco 1000 Series IEEE 802.11a/b/g Lightweight Access Point Quick Start Guide for the Cisco 1000 series lightweight access point mounting options.

Cisco 1000 Series Lightweight Access Point Physical Security

The side of the Cisco 1000 series lightweight access point housing includes a slot for a Kensington MicroSaver Security Cable. Refer to the Kensington website for more information about their security products, or to the Internal-Antenna AP1010 Cisco 1000 Series IEEE 802.11a/b/g Lightweight Access Point Quick Start Guide or External-Antenna AP1020 and AP1030 Cisco 1000 Series IEEE 802.11a/b/g Lightweight Access Point Quick Start Guide for installation instructions.

Cisco 1000 Series Lightweight Access Point Monitor Mode

The Cisco 1000 series lightweight access points and Cisco Wireless LAN Controllers can perform rogue access point detection and containment while providing regular service. The rogue access point detection is performed across all 801.11 channels, regardless of the Country Code selected. (Refer to Appendix D, "Cisco WLAN Solution Supported Country Codes" for more details).

However, if the administrator would prefer to dedicate specific Cisco 1000 series lightweight access points to rogue access point detection and containment, the Monitor mode should be enabled for individual Cisco 1000 series lightweight access points.

The Monitor function is set for all 802.11 Cisco Radios on a per-access point basis using any of the Cisco Wireless LAN Controller user interfaces.

Using the DNS for Controller Discovery

In Cisco Wireless LAN Solution software releases 3.0 and later, access points can discover controllers through your domain name server (DNS). To use this feature you configure your DNS to return controller IP addresses in response to CISCO-LWAPP-CONTROLLER@localdomain. When an access point receives an IP address and DNS information from a DHCP server, it contacts the DNS to resolve CISCO-LWAPP-CONTROLLER@localdomain. When the DNS sends a list of controller IP addresses, the access point sends discovery requests to the controllers.

Autonomous Access Points Converted to Lightweight Mode

You can use an upgrade conversion tool to convert autonomous Cisco Aironet 1130AG, 1200, and 1240AG Series Access Points to lightweight mode. When you upgrade one of these access points to lightweight mode, the access point communicates with a wireless LAN controller and receives a configuration and software image from the controller.

Refer to these documents for complete instructions on upgrading an autonomous access point to lightweight mode:

Release Notes for Cisco Aironet 1130AG, 1200, and 1240AG Series Access Points for Cisco IOS Release 12.3(7)JX

Application Note: Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode

Guidelines for Using Access Points Converted to Lightweight Mode

Keep these guidelines in mind when you use autonomous access points that have been converted to lightweight mode:

Converted access points support 2006 and 4400 controllers only. When you convert an autonomous access point to lightweight mode, the access point can communicate with Cisco 2006 series wireless LAN controllers and 4400 series controllers only. Cisco 4100 series, Airespace 4012 series, and Airespace 4024 series controllers are not supported because lack the memory required to support access points running Cisco IOS software.

Access points converted to lightweight mode do not support Wireless Domain Services (WDS). Converted access points communicate only with Cisco wireless LAN controllers and cannot communicate with WDS devices. However, the controller provides functionality equivalent to WDS when the access point associates to it.

Access points converted to LWAPP mode support 8 BSSIDs per radio and a total of 8 wireless LANs per access point. (Cisco 1000 series access points support 16 BSSIDs per radio and 16 wireless LANs per access point.) When a converted access point associates to a controller, only wireless LANs with IDs 1 through 8 are pushed to the access point.

Access points converted to lightweight mode do not support Layer 2 LWAPP. Access Points converted to lightweight mode must get an IP address and discover the controller using DHCP, DNS, or IP subnet broadcast.

After you convert an access point to lightweight mode, the console port provides read-only access to the unit.

Reverting from Lightweight Mode to Autonomous Mode

After you use the upgrade tool to convert an autonomous access point to lightweight mode, you can convert the access point from a lightweight unit back to an autonomous unit by loading a Cisco IOS release that supports autonomous mode (Cisco IOS release 12.3(7)JA or earlier). If the access point is associated to a controller, you can use the controller to load the Cisco IOS release. If the access point is not associated to a controller, you can load the Cisco IOS release using TFTP. In either method, the access point must be able to access a TFTP server that contains the Cisco IOS release to be loaded.

Using a Controller to Return to a Previous Release

Follow these steps to revert from lightweight mode to autonomous mode using a wireless LAN controller:


Step 1 Log into the CLI on the controller to which the access point is associated.

Step 2 Enter this command:

config ap tftp-downgrade tftp-server-ip-address filename access-point-name

Step 3 Wait until the access point reboots and reconfigure the access point using the CLI or GUI.


Using the MODE Button and a TFTP Server to Return to a Previous Release

Follow these steps to revert from lightweight mode to autonomous mode by using the access point MODE (reset) button to load a Cisco IOS release from a TFTP server:


Step 1 The PC on which your TFTP server software runs must be configured with a static IP address in the range of 10.0.0.2 to 10.0.0.30.

Step 2 Make sure that the PC contains the access point image file (such as c1200-k9w7-tar.123-7.JA.tar for a 1200 series access point) in the TFTP server folder and that the TFTP server is activated.

Step 3 Rename the access point image file in the TFTP server folder to c1200-k9w7-tar.default for a 1200 series access point.

Step 4 Connect the PC to the access point using a Category 5 (CAT5) Ethernet cable.

Step 5 Disconnect power from the access point.

Step 6 Press and hold the MODE button while you reconnect power to the access point.


Note The MODE button on the access point must be enabled. Follow the steps in the "Disabling the Reset Button on Access Points Converted to Lightweight Mode" section to check the status of the access point MODE button.


Step 7 Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds), and release the MODE button.

Step 8 Wait until the access point reboots as indicated by all LEDs turning green followed by the Status LED blinking green.

Step 9 After the access point reboots, reconfigure the access point using the GUI or the CLI.


Controllers Accept SSCs from Access Points Converted to Lightweight Mode

The lightweight access point protocol (LWAPP) secures the control communication between the access point and controller by means of a secure key distribution requiring X.509 certificates on both the access point and controller. LWAPP relies on a priori provisioning of the X.509 certificates. Factory installed certificates are referenced by the term MIC, which is an acronym for manufacturing-installed certificate. Cisco Aironet access points shipped before July 18, 2005 do not have a MIC, so these access points create a self-signed certificate (SSC) when upgraded to operate in lightweight mode. Controllers are programmed to accept SSCs for authentication of specific access points.

Using DHCP Option 43

Cisco 1000 series access points use a string format for DHCP option 43, whereas Cisco Aironet access points use the type-length-value (TLV) format for DHCP option 43. DHCP servers must be programmed to return the option based on the access point's DHCP Vendor Class Identifier (VCI) string (DHCP Option 60). Table 1-2 lists the VCI strings for Cisco access points capable of operating in lightweight mode.

Table 1-2 VCI Strings For Lightweight Access Points 

Access Point
VCI String

Cisco 1000 Series

Airespace 1200

Cisco Aironet 1130 Series

Cisco AP c1130

Cisco Aironet 1200 Series

Cisco AP c1200

Cisco Aironet 1240 Series

Cisco AP c1240


This is the format of the TLV block:

Type: 0xf1 (decimal 241)

Length: Number of controller IP addresses * 4

Value: List of the IP addresses of controller management interfaces

Refer to the the product documentation for your DHCP server for instructions on configuring DHCP Option 43. The Application Note: Upgrading Autonomous Cisco Aironet Access Points To Lightweight Mode contains example steps for configuring option 43 on a DHCP server.

Using a Controller to Send Debug Commands to Access Points Converted to Lightweight Mode

Enter this command to enable the controller to send debug commands to an access point converted to lightweight mode:

config ap remote-debug [enable | disable | exc_command] access-point-name

When this feature is enabled, the controller sends debug commands to the converted access point as character strings. You can send any debug command supported by Cisco Aironet access points that run Cisco IOS software in lightweight mode.

Converted Access Points Send Crash Information to Controller

When a converted access point unexpectedly reboots, the access point stores a crash file on its local flash memory at the time of crash. After the unit reboots, it sends the reason for the reboot to the controller. If the unit rebooted because of a crash, the controller pulls up the crash file using existing LWAPP messages and stores it in the controller flash memory. The crash info copy is removed from the access point flash memory when the controller pulls it from the access point.

Converted Access Points Send Radio Core Dumps to Controller

When a radio module in a converted access point generates a core dump, the access point stores the core dump file of the radio on its local flash memory at the time of the radio crash. It sends a notification message to the controller indicating which radio generated a core dump file. The controller sends a trap alerting the network administrator, and the administrator can retrieve the radio core file from the access point.

On the controller CLI, enter this command to pull the core file from the access point:

config ap get-radio-core-dump slot ap-name

For slot, enter the radio interface number on the access point.

The retrieved core file is stored in the controller flash and can subsequently be uploaded through TFTP to an external server for analysis. The core file is removed from the access point flash memory when the controller pulls it from the access point.

Enabling Memory Core Dumps from Converted Access Points

By default, access points converted to lightweight mode do not send memory core dumps to the controller. To enable this feature, enter this command:

config ap core-dump enable tftp-server-ip-address filename {compress | uncompress} {ap-name | all}

For tftp-server-ip-address, enter the IP address of the TFTP server to which the access point sends core files. The access point must be able to reach the TFTP server.

For filename, enter a filename that the access points uses to label the core file.

Enter compress to configure the access point to send compressed corefiles. Enter uncompress to configure the access point to send uncompressed core files.

For ap-name, enter the name of a specific access point, or enter all to enable memory core dumps from all access points converted to lightweight mode.

Display of MAC Addresses for Converted Access Points

There are some differences in the way that controllers display the MAC addresses of converted access points on information pages in the controller GUI:

On the AP Summary page, the controller lists the Ethernet MAC addresses of converted access points.

On the AP Detail page, the controller lists the BSS MAC addresses and Ethernet MAC addresses of converted access points.

On the Radio Summary page, the controller lists converted access points by radio MAC address.

Disabling the Reset Button on Access Points Converted to Lightweight Mode

You can disable the reset button on access points converted to lightweight mode. The reset button is labeled MODE on the outside of the access point.

Use this command to disable or enable the reset button on one or all converted access points associated to a controller:

config ap reset-button {enable | disable} {ap-name | all}

The reset button on converted access points is enabled by default.

Configuring a Static IP Address on an Access Point Converted to Lightweight Mode

After an access point converted to lightweight mode associates to a controller, enter this command to configure a static IP address on the access point:

config ap static-ip enable ap-name ip-address mask gateway

Rogue Access Points

Because they are inexpensive and readily available, employees sometimes plug unauthorized rogue access points into existing LANs and build ad hoc wireless networks without IT department knowledge or consent.

These rogue access points can be a serious breach of network security because they can be plugged into a network port behind the corporate firewall. Because employees generally do not enable any security settings on the rogue access point, it is easy for unauthorized users to use the access point to intercept network traffic and hijack client sessions. Even more alarming, wireless users and war chalkers frequently publish unsecure access point locations, increasing the odds of having the enterprise security breached.

Rather than using a person with a scanner to manually detect rogue access point, the Cisco Wireless LAN Solution automatically collects information on rogue access point detected by its managed access points, by MAC and IP Address, and allows the system operator to locate, tag and monitor them as described in the "Detecting and Locating Rogue Access Points" section on page 9-14. The operating system can also be used to discourage rogue access point clients by sending them deauthenticate and disassociate messages from one to four Cisco 1000 series lightweight access points. Finally, the operating system can be used to automatically discourage all clients attempting to authenticate with all rogue access point on the enterprise subnet. Because this real-time detection is automated, it saves labor costs used for detecting and monitoring rogue access point while vastly improving LAN security. Note that peer-to-peer, or ad-hoc, clients can also be considered rogue access points.

Rogue Access Point Location, Tagging, and Containment

This built-in detection, tagging, monitoring, and containment capability allows system administrators to take required actions:

Locate rogue access point as described in the "Detecting and Locating Rogue Access Points" section on page 9-14.

Receive new rogue access point notifications, eliminating hallway scans.

Monitor unknown rogue access point until they are eliminated or acknowledged.

Determine the closest authorized access point, making directed scans faster and more effective.

Contain rogue access points by sending their clients deauthenticate and disassociate messages from one to four Cisco 1000 series lightweight access points. This containment can be done for individual rogue access points by MAC address, or can be mandated for all rogue access points connected to the enterprise subnet.

Tag rogue access points:

Acknowledge rogue access point when they are outside of the LAN and do not compromise the LAN or wireless LAN security.

Accept rogue access point when they do not compromise the LAN or wireless LAN security.

Tag rogue access point as unknown until they are eliminated or acknowledged.

Tag rogue access point as contained and discourage clients from associating with the rogue access point by having between one and four Cisco 1000 series lightweight access points transmit deauthenticate and disassociate messages to all rogue access point clients. This function contains all active channels on the same rogue access point.

Rogue Detector mode detects whether or not a rogue access point is on a trusted network. It does not provide RF service of any kind, but rather receives periodic rogue access point reports from the Cisco Wireless LAN Controller, and sniffs all ARP packets. If it finds a match between an ARP request and a MAC address it receives from the Cisco Wireless LAN Controller, it generates a rogue access point alert to the Cisco Wireless LAN Controller.

To facilitate automated rogue access point detection in a crowded RF space, Cisco 1000 series lightweight access points can be configured to operate in monitor mode, allowing monitoring without creating unnecessary interference.

Web User Interface and the CLI

This section describes the controller GUI and CLI.

Web User Interface

The Web User Interface is built into each Cisco Wireless LAN Controller. The Web User Interface allows up to five users to simultaneously browse into the built-in Cisco Wireless LAN Controller http or https (http + SSL) Web server, configure parameters, and monitor operational status for the Cisco Wireless LAN Controller and its associated Access Points.


Note Cisco recommends that you enable the https: and disable the http: interfaces to ensure more robust security for your Cisco WLAN Solution.


Because the Web User Interface works with one Cisco Wireless LAN Controller at a time, the Web User Interface is especially useful when you wish to configure or monitor a single Cisco Wireless LAN Controller and its associated Cisco 1000 series lightweight access points.

Refer to the "Using the Web-Browser Interface" section for more information on the Web User Interface.

Command Line Interface

The Cisco Wireless LAN Solution command line interface (CLI) is built into each Cisco Wireless LAN Controller. The CLI allows operators to use a VT-100 emulator to locally or remotely configure, monitor and control individual Cisco Wireless LAN Controllers, and to access extensive debugging capabilities.

Because the CLI works with one Cisco Wireless LAN Controller at a time, the command line interface is especially useful when you wish to configure or monitor a single Cisco Wireless LAN Controller.

The Cisco Wireless LAN Controller and its associated Cisco 1000 series lightweight access points can be configured and monitored using the command line interface (CLI), which consists of a simple text-based, tree-structured interface that allows up to five users with Telnet-capable terminal emulators to simultaneously configure and monitor all aspects of the Cisco Wireless LAN Controller and associated Cisco 1000 series lightweight access points.

Refer to "Using the CLI" section and the Cisco Wireless LAN Solution CLI Reference for more information.

Cisco Wireless Control System

The Cisco Wireless Control System (Cisco WCS) is the Cisco Wireless LAN Solution network management tool that adds to the capabilities of the Web User interface and the CLI, moving from individual controllers to a network of controllers. WCS runs on Windows 2000, Windows 2003, and Red Hat Enterprise Linux ES servers.

The Cisco WCS includes the same configuration, performance monitoring, security, fault management, and accounting options used at the Cisco Wireless LAN Controller level, but adds a graphical view of multiple controllers and managed access points.

The Cisco WCS is offered in two versions which support different feature levels:

Cisco WCS Base, which includes wireless client data access, rogue access point containment functions, Cisco Wireless LAN Solution monitoring and control, and which allows client and rogue access point location to the nearest Cisco 1000 series lightweight access point. Refer to the "Cisco WCS Base" section for more information.

Cisco WCS Location, which includes all the features in the WCS Base, but which allows high-accuracy rogue access point and client location to within 10 meters. Refer to the "Cisco WCS Location" section for more information.

Table 1-3 lists these features.

Table 1-3 WCS Base and WCS Location Features

Features
Cisco WCS Base
Cisco WCS Location

Location and Tracking:

Low-Resolution Client Location

Yes

-

High-Resolution Client Location

-

Yes

Low-Resolution Rogue Access Point Location

Yes

-

High-Resolution Rogue Access Point Location

-

Yes

Client Data Services, Security and Monitoring:

Client Access via Cisco 1000 series lightweight access points

Yes

Yes

Multiple wireless LANs (Individual SSIDs and Policies)

Yes

Yes

Rogue Access Point Detecting and Containing using Cisco 1000 series lightweight access points

Yes

Yes

802.11a/b/g Bands

Yes

Yes

Radio Resource Management (real-time assigning channels, and detecting and containing rogue access points)

Yes

Yes

Radio Resource Management (real-time detecting and avoiding interference, controlling transmit power, assigning channels, managing client mobility, distributing client load, and detecting coverage holes)

Yes

Yes

Automated Software and Configuration Updates

Yes

Yes

Wireless Intrusion Protection

Yes

Yes

Global and Individual AP Security Policies

Yes

Yes

Controls Cisco Wireless LAN Controllers

Yes

Yes

Supported Workstations:

Windows 2000 or Windows 2003

Yes

Yes

Red Hat Enterprise Linux ES Server

Yes

Yes


The Cisco Wireless Control System runs on Windows 2000 or 2003 and Red Hat Enterprise Linux ES servers. The Windows Cisco WCS can run as a normal Windows application, or can be installed as a service, which runs continuously and resumes running after a reboot. The Linux Cisco WCS always runs as a normal Linux application.

The WCS User Interface allows Cisco WCS operators to control all permitted Cisco WLAN Solution configuration, monitoring, and control functions through Internet Explorer 6.0 on a Windows workstation (or other) web browser window. The Cisco WCS operator permissions are defined by the Cisco WCS administrator in the Cisco WCS User Interface using the Cisco WCS User Interface Admin tab, which allows the Cisco WCS administrator to administer user accounts and schedule periodic maintenance tasks.

Cisco WCS simplifies Cisco Wireless LAN Controller configuring and monitoring while decreasing data entry errors with the Cisco WCS Cisco Wireless LAN Controller Autodiscovery algorithm. The Cisco WCS uses industry-standard SNMP protocol to communicate with Cisco Wireless LAN Controllers.

The Cisco WCS also includes the Floor Plan Editor, which allows you to vectorize bitmapped campus, floor plan, and outdoor area maps, add and change wall types, and import the resulting vector wall format maps into the Cisco WCS database. The vector files allow the Cisco WCS RF Prediction Tool to make much better RF predictions based on more accurate wall and window RF attenuation values. Refer to the "Using Maps" section on page 9-4 for more information on maps in WCS.

Cisco WCS Base

The Cisco WCS Base version supports wireless client data access, rogue access point detection and containment functions, Cisco WLAN Solution monitoring and control, and includes graphical views of the following:

Auto-discovery of access points as they associate with controllers.

Auto-discovery, and containment or notification of rogue access points.

Map-based organization of Access Point coverage areas, helpful when the enterprise spans more than one geographical area. (Refer to Chapter 9, "Using Cisco WCS," and "Checking the Network Summary Page" section on page 9-2 for more information.)

User-supplied Campus, Building and Floor graphics, which show the following:

Locations and status of managed access points. (Refer to the "Adding a Cisco Wireless LAN Controller to Cisco WCS" section on page 9-2.)

Locations of rogue access points, based on signal strength received by the nearest managed Cisco 1000 series lightweight access points. (Refer to the "Detecting and Locating Rogue Access Points" section on page 9-14.)

Coverage hole alarm information for Cisco 1000 series lightweight access points is based on received signal strength from clients. This information appears in a tabular rather than map format. (Refer to the "Finding Coverage Holes" section on page 9-18.)

RF coverage maps.

System-wide control:

Network, Cisco Wireless LAN Controller, and managed Cisco 1000 series lightweight access point configuration is streamlined using customer-defined templates.

Network, Cisco Wireless LAN Controller, and managed Cisco 1000 series lightweight access point status and alarm monitoring.

Automated and manual data client monitoring and control functions.

Automated monitoring: Rogue APs, coverage holes, security violations, Cisco Wireless LAN Controllers, and Cisco 1000 series lightweight access points.

Full event logs available for data clients, rogue access points, coverage holes, security violations, Cisco Wireless LAN Controllers, and Cisco 1000 series lightweight access points.

Automatic channel and power level assignment by Radio Resource Management (RRM).

User-defined automatic Cisco Wireless LAN Controller status audits, missed trap polling, configuration backups, and policy cleanups.

Real-time location of rogue access points to the nearest Cisco 1000 series lightweight access point.

Real-time and historical location of clients to the nearest Cisco 1000 series lightweight access point.

Runs on Windows 2000 or 2003 and Red Hat Enterprise Linux ES Server workstations.

Cisco WCS Location

In addition to the graphical representations listed in the "Cisco WCS Base" section, Cisco WCS Location adds the following enhancements:

On-demand location of rogue access points to within 10 meters.

On-demand location of clients to within 10 meters.

Runs on Windows 2000 or 2003 and Red Hat Enterprise Linux ES servers.

Ability to use location appliances to collect and return historical location data viewable in the Cisco WCS Location user interface. See the "Cisco 2700 Series Location Appliances" section for more information on location appliances.

Cisco WCS User Interface

The Cisco WCS User Interface interface allows the network operator to create and configure Cisco Wireless LAN Solution coverage area layouts, configure system operating parameters, monitor real-time Cisco Wireless LAN Solution operation, and perform troubleshooting tasks using a standard HTTP or HTTPS web browser window. The Cisco WCS User Interface interface also allows a Cisco WCS administrator to create, modify and delete user accounts, change passwords, assign permissions, and schedule periodic maintenance tasks.

Cisco recommends Internet Explorer 6.0 or later on a Windows workstation web browser for full access to the Cisco WCS functionality.

The HTTPS (SSL over HTTP) interface is enabled by default, and the HTTP interface can be manually activated in the CLI, the GUI, and the WCS User Interface.

The Cisco WCS administrator creates new usernames passwords and assigns them to predefined permissions groups.

Cisco WCS User Interface operators perform their tasks as described in Chapter 9, "Using Cisco WCS."

Floor Plan Editor

Cisco WCS includes the Floor Plan Editor, which converts architectural, mechanical and technical drawings, graphics, maps and other types of line artwork from raster bitmaps to wall (vector) formats. Operators can use scanners to digitize paper drawings into supported file formats for import into Cisco WCS. The Floor Plan Editor automatically recognizes and represents the data in a wall format which can then be imported into your Cisco WCS program.

Because of its ability to create smooth straight, angled, and semi-angled outlines, the Floor Plan Editor is used to convert floor plan maps, define the wall characteristics, and import the resulting vector wall format maps into the Cisco WCS database. The vector files allow the Cisco WCS RF Prediction Tool to make much better RF predictions based on Cisco 1000 series lightweight access point signal strength, and accurate wall, window and cubicle RF attenuation.

Otherwise, you may want to save raster images in .BMP, .TIFF, .JPEG, or .PNG raster formats. Note that you can also edit existing vector map files.

The output wall files can be saved in vector (Cisco WLAN Solution wall format) for importing directly into the Cisco WCS database. The output wall files can also be saved in the following formats, but Cisco WCS does not recognize these file types: .DXF (AutoCAD), .AI (Adobe Illustrator), .EMF (enhanced metafile), .WMF (Windows metafile), and .TXT (ASCII XY).

Note that there are no restrictions on the input or output image size.


Tip The quality of Floor Plan Editor recognition is higher for higher resolution data. Use 400 to 600 dots per inch (dpi) scans whenever possible.



Tip Cisco recommends that you create images with the long axis horizontal (landscape format) to ensure the best viewing in Cisco WCS.


Refer to the "Using Maps" section on page 9-4 for information on using maps in WCS.

Cisco WCS Cisco Wireless LAN Controller Autodiscovery

Manually adding Cisco Wireless LAN Controller data to a management database can be time consuming, and is susceptible to data entry errors. Cisco WCS includes a built-in Cisco Wireless LAN Controller configuration upload function that speeds up database creation while eliminating errors.

Cisco Wireless LAN Controller Autodiscovery is limited to the Mobility Group subnets defined by the Cisco Wireless LAN Solution operator.

Cisco Wireless LAN Controller Autodiscovery allows operators to search for a single Cisco Wireless LAN Controller by IP Address. The Autodiscovery function finds the Cisco Wireless LAN Controller on the network with the specified IP Address, and automatically enters the discovered Cisco Wireless LAN Controller information into the Cisco WCS database.

As lightweight access points associate with controller, the controller immediately transmits the access point information to Cisco WCS, which automatically adds the access point to the Cisco WCS database.

After the Cisco 1000 series lightweight access point information is in the Cisco WCS database, operators can add the Cisco 1000 series lightweight access point to the appropriate spot on a Cisco WCS User Interface map, so the topological map of the air space remains current.

Cisco WCS Alarm Email Notification

Cisco WCS includes a built-in email notification function, which can notify network operators when Critical alarms occur.

Refer to the Cisco WCS Monitor All Alarms > Email Notification page to view the current alarm notification settings.

Cisco WCS Location Calibration

Cisco WCS includes a calibration tool which allows Cisco Wireless LAN Solution operators to accurately measure actual signal strength and attenuation in RF coverage areas, which creates an accurate calibration model in the Cisco WCS database. This calibration model allows more precise client and rogue access point location after calibration is completed. To save effort, the calibration model can also be reused for areas with an identical Cisco 1000 series lightweight access point layout and identical wall layout.

The calibration tool is used much like a site survey tool, and allows a technician to take a Cisco WCS-equipped laptop to multiple locations on a floor or outdoor area and measure actual signal strength at selected locations on the floor or outdoor area map. The technician then uses the calibration tool in Cisco WCS to process the collected data points for the floor or outdoor area.

Refer to the Cisco WCS Monitor RF Calibration Models page to view the current calibration models.

Cisco 2700 Series Location Appliances

The Cisco 2700 Series Location Appliance (location appliance) enhances the high-accuracy built-in Cisco WCS Location abilities by computing, collecting and storing historical location data, which can be displayed in Cisco WCS. In this role, the location appliance acts as a server to one or more Cisco WCS Servers, collecting, storing, and passing on data from its associated Cisco Wireless LAN Controllers.

After a quick command-line interface (CLI) configuration, the remaining location appliance configuration can be completed using the Cisco WCS interface.

After it is configured, each location appliance communicates directly with its associated Cisco Wireless LAN Controllers to collect operator-defined location data. The associated Cisco WCS Server operators can then communicate with each location appliance to transfer and display selected data.

The location appliance can be backed up to any Cisco WCS Server into an operator-defined FTP folder, and the location appliance can be restored from that Cisco WCS Server at any time and at defined intervals. Also, the location appliance database can be synchronized with the Cisco WCS Server database at any time.

Operators can use the location appliance features and download new application code to all associated location appliances from any Cisco WCS Server.

When Cisco WCS is enhanced with a location appliance, Cisco WCS can display historical location data for up to 1,500 Laptop Clients, Palmtop Clients, VoIP Telephone Clients, RFID (Radio Frequency IDentifier) Asset Tags, Rogue Access Points, and Rogue Access Point Clients for each location appliance in the Cisco Wireless LAN Solution.

Operators can configure location appliances to collect data for Cisco Wireless LAN Solution clients, rogue access points and clients, RFID Asset Tags, and statistics at separate operator-defined intervals.

The location appliance uses two redundant back-panel 10/100/1000BASE-T ports to connect to one or two network segments. It also features a back-panel power cord and front-panel ON/OFF switch. The location appliance includes a back-panel DB-9 console port for initial configuration using a CLI console.

Note that each location appliance can be installed in any NOC (Network Operations Center) or wiring closet from which it can communicate with its associated Cisco WCS Server(s) and Cisco Wireless LAN Controllers.


hometocprevnextglossaryfeedbacksearchhelp

Posted: Thu Sep 15 09:11:01 PDT 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.