Cisco Wireless LAN Controller Command Reference, Release 8.0
Cisco Wireless LAN Controller Command Reference, Release 8.0
0
First Published: January 22, 2014
Last Modified: October 23, 2014
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
2014
CONTENTS
Preface
Preface li
Audience li
Document Organization li
Document Conventions li
Related Documentation liv
Obtaining Documentation and Submitting a Service Request liv
CHAPTER 1
PART I
CHAPTER 2
CLI Commands 9
show Commands 9
show 802.11 cu-metrics 10
show advanced 802.11 l2roam 11
show advanced send-disassoc-on-handoff 12
show advanced sip-preferred-call-no 13
show advanced sip-snooping-ports 14
show arp kernel 15
iii
Contents
OL-31334-01
Contents
Contents
OL-31334-01
Contents
vii
Contents
OL-31334-01
Contents
ix
Contents
OL-31334-01
Contents
xi
Contents
OL-31334-01
Contents
xiii
Contents
OL-31334-01
Contents
xv
Contents
OL-31334-01
Contents
xvii
Contents
ping 603
PART II
CHAPTER 3
OL-31334-01
Contents
PART III
CHAPTER 4
xix
Contents
OL-31334-01
Contents
PART IV
CHAPTER 5
xxi
Contents
OL-31334-01
Contents
xxiii
Contents
OL-31334-01
Contents
xxv
Contents
OL-31334-01
Contents
PART V
CHAPTER 6
xxvii
Contents
OL-31334-01
Contents
xxix
Contents
OL-31334-01
Contents
xxxi
Contents
OL-31334-01
Contents
xxxiii
Contents
PART VI
CHAPTER 7
OL-31334-01
Contents
xxxv
Contents
OL-31334-01
Contents
xxxvii
Contents
OL-31334-01
Contents
xxxix
Contents
PART VII
CHAPTER 8
OL-31334-01
Contents
xli
Contents
PART VIII
CHAPTER 9
OL-31334-01
Contents
xliii
Contents
OL-31334-01
Contents
PART IX
CHAPTER 10
PART X
CHAPTER 11
xlv
Contents
OL-31334-01
Contents
PART XI
CHAPTER 12
xlvii
Contents
OL-31334-01
Contents
xlix
Contents
OL-31334-01
Preface
This preface describes the audience, organization, and conventions of the Cisco Wireless LAN Controller
Command Reference Guide. It also provides information on how to obtain other documentation. This chapter
includes the following sections:
Audience, page li
Document Organization, page li
Document Conventions, page li
Related Documentation, page liv
Obtaining Documentation and Submitting a Service Request, page liv
Audience
This publication is for experienced network administrators who configure and maintain Cisco wireless LAN
controllers and Cisco lightweight access points.
Document Organization
This document is organized into the following chapters:
Chapter
Description
Overview
CLI Commands
Provides detailed information about the CLI commands for the controller.
Document Conventions
This document uses the following conventions:
li
Preface
Document Conventions
Convention
Indication
bold font
italic font
Document titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
[]
{x | y | z }
[x|y|z]
string
A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
courier
Note
Tip
font
Terminal sessions and information the system displays appear in courier font.
<>
[]
!, #
An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Caution
Means reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Warning
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with
standard practices for preventing accidents. (To see translations of the warnings that appear in this
publication, refer to the appendix "Translated Safety Warnings.")
OL-31334-01
Preface
Document Conventions
Warning Title
Description
Waarschuwing
Varoitus
Attention
Warnung
Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die
zu einer Krperverletzung fhren knnte. Bevor Sie mit der Arbeit an irgendeinem
Gert beginnen, seien Sie sich der mit elektrischen Stromkreisen verbundenen
Gefahren und der Standardpraktiken zur Vermeidung von Unfllen bewut.
(bersetzungen der in dieser Verffentlichung enthaltenen Warnhinweise finden
Sie im Anhang mit dem Titel "Translated Safety Warnings" (bersetzung der
Warnhinweise).)
Avvertenza
Advarsel
Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan fre til
personskade. Fr du utfrer arbeid p utstyr, m du vre oppmerksom p de
faremomentene som elektriske kretser innebrer, samt gjre deg kjent med vanlig
praksis nr det gjelder unng ulykker. (Hvis du vil se oversettelser av de
advarslene som finnes i denne publikasjonen, kan du se i vedlegget "Translated
Safety Warnings" [Oversatte sikkerhetsadvarsler].)
Aviso
Este smbolo de aviso indica perigo. Encontra-se numa situao que lhe poder
causar danos fisicos. Antes de comear a trabalhar com qualquer equipamento,
familiarize-se com os perigos relacionados com circuitos elctricos, e com
quaisquer prticas comuns que possam prevenir possveis acidentes. (Para ver
as tradues dos avisos que constam desta publicao, consulte o apndice
"Translated Safety Warnings" - "Tradues dos Avisos de Segurana").
liii
Preface
Related Documentation
Warning Title
Description
Advertencia!
Este smbolo de aviso significa peligro. Existe riesgo para su integridad fsica.
Antes de manipular cualquier equipo, considerar los riesgos que entraa la
corriente elctrica y familiarizarse con los procedimientos estndar de prevencin
de accidentes. (Para ver traducciones de las advertencias que aparecen en esta
publicacin, consultar el apndice titulado "Translated Safety Warnings.")
Varning
Related Documentation
These documents provide complete information about the Cisco Unified Wireless Network solution:
Cisco Wireless LAN Controller Configuration Guide
Cisco Wireless LAN Controller System Message Guide
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points
OL-31334-01
Action
Description
Keyboard Shortcut
Change
Esc I
Esc u
Delete
Ctrl-k
All characters from the cursor to the end of the word. Esc d
Display MORE
output
q, Q, or Ctrl-C
Spacebar
Action
Description
Keyboard Shortcut
Next line. The default is one line. To display more than Enter
one line, enter the number before pressing the Enter
key.
Enter an Enter or Return key character.
Ctrl-m
Ctrl-t or Tab
Esc b
Esc f
Ctrl-a
Ctrl-e
Ctrl-l or Ctrl-r
Ctrl-z
Return to the previous mode or exit from the CLI from Exec mode.
exit command
Transpose a character at the cursor with a character to the left of the cursor. Ctrl-t
Command
help
? at the command
prompt
partial command?
OL-31334-01
Command
partial
command<Tab>
command ?
command keyword ?
command name ?
When you enter a command information request, put a space between the command name and ?.
Examples
This command shows you all the commands and levels available from the root level.
> ?
clear
config
debug
help
linktest
logout
ping
reset
save
show
transfer
OL-31334-01
To list the keywords, arguments, or both associated with the command, use the command ?.
command-name ?
There should be a space between the command and the question mark.
This example shows how to list the arguments and keyword for the command acl:
Controller >config acl ?
command keyword ?
To list the arguments that are associated with the keyword, use the command keyword ?:
command keyword ?
There should be space between the keyword and the question mark.
This example shows how to display the arguments associated with the keyword cpu:
Controller >config acl cpu ?
OL-31334-01
PART
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco wireless LAN controller and configure the controller and its associated access points.
show Commands, page 9
config Commands, page 146
Timeout Commands, page 446
Clearing Configurations, Log files, and Other Actions, page 473
Resetting the System Reboot Time, page 508
Uploading and Downloading Files and Configurations, page 513
Installing and Modifying Licenses on Cisco 5500 Series Controllers, page 539
Right to Use Licensing Commands, page 546
Troubleshooting the Controller Settings, page 554
show Commands
This section lists the show commands that you can use to display information about the controller settings
and user accounts.
show Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
0
76
0
77
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
rf-param
statistics
mac_address
None
Release
Modification
7.6
The following is a sample output of the show advanced 802.11b l2roam rf-param command:
(Cisco Controller) > show advanced 802.11b l2roam rf-param
L2Roam 802.11bg RF Parameters.....................
Config Mode.................................. Default
Minimum RSSI................................. -85
Roam Hysteresis.............................. 2
Scan Threshold............................... -72
Transition time.............................. 5
11
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
13
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
HW address
00:1A:6C:2A:09:C2
00:1E:E5:E6:DB:56
Mask
*
*
Device
dtl0
dtl0
15
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
Port
VLAN
Type
------------ ---- ------------------service port
1
service port
service port
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Release
Modification
7.4
Usage Guidelines
AVC uses the Network-Based Application Recognition (NBAR) deep packet inspection technology to classify
applications based on the protocol they use. Using AVC, the controller can detect more than 1500 Layer 4 to
Layer 7 protocols.
Examples
13
3
3
505
149
548
609
377
558
861
----
3
3
3
1
---
705
463
2639
107
-----
other
obsolete
business-and-productivity-tools
net-admin
net-admin
file-sharing
layer3-over-ip
-------------
17
show Commands
Syntax Description
Command Default
Command History
version
None
Release
Modification
7.5
Usage Guidelines
The Application Visibility and Control (AVC) protocol pack is not supported in the Cisco 2500 Series Wireless
Controllers.
Examples
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
summary
detailed
profile_name
None
Release
Modification
7.4
The following is a sample output of the show avc profile summary command.
(Cisco Controller) > show avc profile summary
Profile-Name
============
profile 1
avc_profile2
Number of Rules
==============
3
1
The following is a sample output of the show avc profile detailed command.
(Cisco Controller) > show avc profile detailed
Application-Name
================
ftp
flash-video
facebook
Application-Group-Name
=======================
file-sharing
browsing
browsing
Action
======
Drop
Mark
Mark
DSCP
====
10
10
19
show Commands
Syntax Description
Command Default
Command History
version
None
Release
Modification
7.5
Usage Guidelines
The AVC protocol pack is not supported in the Cisco 2500 Series Wireless Controllers.
Examples
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
application_name
top-users
downstream
wlan
wlan_id
upstream
None
Release
Modification
7.4
The following is a sample output of the show avc statistics application command:
(Cisco Controller) > show avc statistics application ftp top-users downstream wlan 1
Client MAC
Bytes
DSCP
(Up/Down)
(Total)
In Out
===========
=======
=== ===
00:0a:ab:15:00:9c(U)
338
0
0
(D)
6409
0
0
00:0a:ab:15:00:5a(U)
84
0
0
(D)
5869
0
0
00:0a:ab:15:00:60(U)
8666
0
0
(D)
9595
0
0
00:0a:ab:15:00:a4(U)
161
0
0
(D)
Client IP
WLAN ID
Packets
Bytes
(n secs) (n secs)
=========
======
=======
=======
Avg Pkt
Packets
Size
(Total)
======
=======
172.16.31.156
16
91
43
172.16.31.156
22
5911
268
48
172.16.31.90
39
13
172.16.31.90
12
5723
476
18
172.16.31.96
19
117
75
172.16.31.96
19
4433
233
83
172.16.31.164
18
139
21
172.16.31.164
23
4409
191
24
21
show Commands
4439
0
0
00:0a:ab:15:00:48(U)
2738
0
0
(D)
4367
0
0
00:0a:ab:15:00:87(U)
301
0
0
(D)
7755
0
0
00:0a:ab:15:00:92(U)
84
0
0
(D)
4201
0
0
00:0a:ab:15:00:31(U)
250
0
0
(D)
3755
0
0
00:0a:ab:15:00:46(U)
175
0
0
(D)
3448
0
0
00:0a:ab:15:00:b3(U)
241
0
0
172.16.31.72
21
2738
130
21
172.16.31.72
22
4367
198
22
172.16.31.135
11
47
49
172.16.31.135
12
4208
350
48
172.16.31.146
10
73
11
172.16.31.146
4168
463
11
172.16.31.49
11
95
34
172.16.31.49
18
3201
177
43
172.16.31.70
47
20
172.16.31.70
10
3162
316
23
172.16.31.179
10
85
34
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
client_MAC
application
application_name
top-apps
upstream
downstream
None
Release
Modification
7.4
The following is a sample output of the show avc statistics client command:
(Cisco Controller) > show avc statistics client 00:0a:ab:15:00:01 application http
Description
===========
Number of Packtes(n secs)
Number of Bytes(n secs)
Average Packet size(n secs)
Total Number of Packtes
Total Number of Bytes
DSCP Incoming packet
DSCP Outgoing Packet
Upstream
========
5059
170144
33
131878
6054464
16
16
Downstream
==========
6369
8655115
1358
150169
205239972
0
0
The following is a sample output of the show avc statistics client command.
(Cisco Controller) > show avc statistics client 00:0a:ab:15:00:01 top-apps
Application-Name
(Up/Down)
================
http
ggp
Packets
(n secs)
=======
(U)
6035
(D)
5420
(U)
1331
(D)
0
Bytes
Avg Pkt
(n secs) Size
======
======
637728
105
7218796
1331
1362944
1024
0
0
Packets
(Total)
=======
6035
5420
1331
0
Bytes
(Total)
======
637728
7218796
1362944
0
DSCP DSCP
In
Out
==== ====
16
16
0
0
0
0
0
0
23
show Commands
smp
vrrp
bittorrent
icmp
edonkey
dns
realmedia
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
1046
0
205
0
117
121
0
72
112
105
10
7
2
2
1071104
0
209920
0
1604
70469
0
40032
4620
33076
380
1743
158
65
1024
0
1024
0
13
582
0
556
41
315
38
249
79
32
1046
0
205
0
117
121
0
72
112
105
10
7
2
2
1071104
0
209920
0
1604
70469
0
40032
4620
33076
380
1743
158
65
0
0
0
0
0
0
0
48
0
0
0
0
24
0
0
0
0
0
0
0
0
48
0
0
0
0
24
0
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
guest-lan_id
application
application_name
top-app-groups
upstream
downstream
top-apps
None
Release
Modification
7.4
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
Packets
Bytes
Avg Pkt Packets
Bytes
(n secs) (n secs) Size
(Total)
(Total)
======= ======
======
======
=======
191464
208627
1
92208613 11138796586
63427 53440610
842
16295621
9657054635
805
72880
90
172939
11206202
911
58143
63
190900
17418653
264904 12508288
47
27493945
2837672192
319894 436915253 1365
29850934 36817587924
0
0
0
10158872 10402684928
0
0
0
0
0
1
40
40
323
98476
7262
4034576
555
2888266
1605133372
62565 64066560 1024
11992305 12280120320
0
0
0
0
0
1430
16798
11
305161
3795766
25
show Commands
irc
nntp
(D)
(U)
(D)
(U)
(D)
1555
9
11
22
22
576371
74
371
158
372
370
8
33
7
16
332290
1736
1972
1705
2047
125799465
9133
173381
9612
214391
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
remote-lan_id
application
application_name
top-app-groups
upstream
downstream
top-apps
None
Release
Modification
7.4
The following is a sample output of the show avc statistics remote-lan command.
(Cisco Controller) > show avc statistics remote-lan 1
Application-Name
(Up/Down)
================
unclassified
ftp
http
gre
icmp
ipinip
imap
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
Packets
Bytes
Avg Pkt Packets
Bytes
(n secs) (n secs) Size
(Total)
(Total)
======= ======
======
======
=======
191464
208627
1
92208613 11138796586
63427 53440610
842
16295621
9657054635
805
72880
90
172939
11206202
911
58143
63
190900
17418653
264904 12508288
47
27493945
2837672192
319894 436915253 1365
29850934 36817587924
0
0
0
10158872 10402684928
0
0
0
0
0
1
40
40
323
98476
7262
4034576
555
2888266
1605133372
62565 64066560 1024
11992305 12280120320
0
0
0
0
0
1430
16798
11
305161
3795766
27
show Commands
irc
nntp
(D)
(U)
(D)
(U)
(D)
1555
9
11
22
22
576371
74
371
158
372
370
8
33
7
16
332290
1736
1972
1705
2047
125799465
9133
173381
9612
214391
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
upstream
downstream
None
Release
Modification
7.4
The following is a sample output of the show avc statistics top-aps command:
(Cisco Controller) > show avc statistics top-apps
Application-Name
(Up/Down)
================
http
realmedia
mpls-in-ip
fire
pipe
gre
crudp
rtp
icmp
Related Commands
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
Packets
Bytes
Avg Pkt
(n secs)
(n secs) Size
=======
======= =======
204570
10610912
51
240936 327624221
1359
908
62154
68
166694 220522943
1322
77448
79306752
1024
0
0
0
70890
72591360
1024
0
0
0
68296
69935104
1024
0
0
0
60982
62445568
1024
0
0
0
26430
27064320
1024
0
0
0
0
0
0
7482
9936096
1328
0
0
0
10155
5640504
555
Packets
(Total)
=======
28272539
30750570
400698
35802836
10292787
0
10242484
0
10224255
0
10340221
0
10109812
0
0
2603923
323
2924693
Bytes
(Total)
========
2882294016
38026889010
26470359
47131836785
10539813888
0
10488303616
0
10469637120
0
10588386304
0
10352447488
0
0
3458009744
98476
1625363564
29
show Commands
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
application
application_name
top-app-groups
upstream
downstream
top-apps
None
Release
Modification
7.4
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
Packets
Bytes
Avg Pkt Packets
Bytes
(n secs) (n secs) Size
(Total)
(Total)
======= ======
======
======
=======
191464
208627
1
92208613 11138796586
63427 53440610
842
16295621
9657054635
805
72880
90
172939
11206202
911
58143
63
190900
17418653
264904 12508288
47
27493945
2837672192
319894 436915253 1365
29850934 36817587924
0
0
0
10158872 10402684928
0
0
0
0
0
1
40
40
323
98476
7262
4034576
555
2888266
1605133372
62565 64066560 1024
11992305 12280120320
0
0
0
0
0
1430
16798
11
305161
3795766
31
show Commands
irc
nntp
(D)
(U)
(D)
(U)
(D)
1555
9
11
22
22
576371
74
371
158
372
370
8
33
7
16
332290
1736
1972
1705
2047
125799465
9133
173381
9612
214391
The following is a sample output of the show avc statistics wlan command.
(Cisco Controller) >show avc statistics wlan 1 application ftp
Description
===========
Number of Packtes(n secs)
Number of Bytes(n secs)
Average Packet size(n secs)
Total Number of Packtes
Total Number of Bytes
Upstream
========
0
0
0
32459
274
Downstream
==========
0
0
0
64888
94673983
OL-31334-01
show Commands
show boot
To display the primary and backup software build numbers with an indication of which is active, use the show
boot command.
show boot
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
Each Cisco wireless LAN controller retains one primary and one backup operating system software load in
nonvolatile RAM to allow controllers to boot off the primary load (default) or revert to the backup load when
desired.
Examples
Related Commands
config boot
33
show Commands
show band-select
To display band selection information, use the show band-select command.
show band-select
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
config band-select
config wlan band-select
OL-31334-01
show Commands
show buffers
To display buffer information of the controller, use the show buffers command.
show buffers
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
35
show Commands
chunks in use:
bytes in use:
bytes requested:
Raw Pool:
chunks in use:
bytes requested:
47
192512
128258 (64254 overhead bytes)
256
289575125
OL-31334-01
show Commands
Syntax Description
Command History
Examples
802.11a
802.11b
Release
Modification
7.6
The following is a sample output of the show cac voice stats 802.11b command:
(Cisco Controller) > show cac voice stats 802.11b
WLC Voice Call Statistics for 802.11b Radio
WMM TSPEC CAC Call Stats
Total num of Calls in progress.................
Num of Roam Calls in progress..................
Total Num of Calls Admitted....................
Total Num of Roam Calls Admitted...............
Total Num of exp bw requests received..........
Total Num of exp bw requests Admitted..........
Total Num of Calls Rejected....................
Total Num of Roam Calls Rejected...............
Num of Calls Rejected due to insufficent bw....
Num of Calls Rejected due to invalid params....
Num of Calls Rejected due to PHY rate..........
Num of Calls Rejected due to QoS policy........
SIP CAC Call Stats
Total Num of Calls in progress.................
Num of Roam Calls in progress..................
Total Num of Calls Admitted....................
Total Num of Roam Calls Admitted...............
Total Num of Preferred Calls Received..........
Total Num of Preferred Calls Admitted..........
Total Num of Ongoing Preferred Calls...........
Total Num of Calls Rejected(Insuff BW).........
Total Num of Roam Calls Rejected(Insuff BW)....
KTS based CAC Call Stats
Total Num of Calls in progress.................
Num of Roam Calls in progress..................
Total Num of Calls Admitted....................
Total Num of Roam Calls Admitted...............
Total Num of Calls Rejected(Insuff BW).........
Total Num of Roam Calls Rejected(Insuff BW)....
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
37
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following is a sample output of the show cac voice summary command:
(Cisco Controller) > show cac voice summary
AP Name
Slot#
Radio BW Used/Max
----------------- ------- ----- ----------APc47d.4f3a.3547
0
11b/g
0/23437
1
11a
1072/23437
1
Calls
----0
OL-31334-01
show Commands
Syntax Description
Command History
Examples
802.11a
802.11b
Release
Modification
7.6
The following is a sample output of the show cac video stats 802.11b command:
(Cisco Controller) > show cac video stats 802.11b
WLC Video Call Statistics for 802.11b Radio
WMM TSPEC CAC Call Stats
Total num of Calls in progress.................
Num of Roam Calls in progress..................
Total Num of Calls Admitted....................
Total Num of Roam Calls Admitted...............
Total Num of Calls Rejected....................
Total Num of Roam Calls Rejected...............
Num of Calls Rejected due to insufficent bw....
Num of Calls Rejected due to invalid params....
Num of Calls Rejected due to PHY rate..........
Num of Calls Rejected due to QoS policy........
SIP CAC Call Stats
Total Num of Calls in progress.................
Num of Roam Calls in progress..................
Total Num of Calls Admitted....................
Total Num of Roam Calls Admitted...............
Total Num of Calls Rejected(Insuff BW).........
Total Num of Roam Calls Rejected(Insuff BW)....
Related Commands
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
39
show Commands
OL-31334-01
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
The following is a sample output of the show cac video summary command:
(Cisco Controller) > show cac video summary
AP Name
----------------AP001b.d571.88e0
AP5_1250
Related Commands
Slot#
------0
1
0
1
Radio
----11b/g
11a
11b/g
11a
BW Used/Max
----------0/10937
0/18750
0/10937
0/18750
Calls
----0
0
0
0
41
show Commands
show cdp
To display the status and details of the Cisco Discovery Protocol (CDP), use the show cdp command.
show cdp {neighbors [detail] | entry all | traffic}
Syntax Description
Command Default
Command History
Examples
neighbors
detail
entry all
traffic
None
Release
Modification
7.6
Related Commands
config cdp
config ap cdp
show ap cdp
OL-31334-01
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
43
show Commands
Syntax Description
Command Default
Command History
Examples
summary
ap-provision
Displays details about the access points that are provisioned using the LSC.
None
Release
Modification
7.6
The following is a sample output of the show certificate lsc summary command:
(Cisco Controller) > show certificate lsc summary
LSC Enabled...................................... Yes
LSC CA-Server.................................... http://10.0.0.1:8080/caserver
LSC AP-Provisioning.............................. Yes
Provision-List............................... Not Configured
LSC Revert Count in AP reboots............... 3
LSC Params:
Country...................................... 4
State........................................ ca
City......................................... ss
Orgn......................................... org
Dept......................................... dep
Email........................................ [email protected]
KeySize...................................... 390
LSC Certs:
CA Cert...................................... Not Configured
RA Cert...................................... Not Configured
This example shows how to display the details about the access points that are provisioned using the LSC:
(Cisco Controller) > show certificate lsc ap-provision
LSC AP-Provisioning.............................. Yes
Provision-List................................... Present
Idx Mac Address
--- ------------1 00:18:74:c7:c0:90
OL-31334-01
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
45
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
active
rejected
802.11a
802.11bg
all
None
Release
Modification
7.6
The following is a sample output of the show client calls active 802.11a command :
(Cisco Controller) > show client calls active 802.11a
Client MAC
Username
Total Call
AP Name
Duration (sec)
--------------------------------------------------00:09: ef: 02:65:70
abc
45
VJ-1240C-ed45cc
00:13: ce: cc: 51:39
xyz
45
AP1130-a416
00:40:96: af: 15:15
def
45
AP1130-a416
00:40:96:b2:69: df
def
45
AP1130-a416
Number of Active Calls ------------------------------------ 4
Radio Type
---------802.11a
802.11a
802.11a
802.11a
47
show Commands
Syntax Description
Command Default
Command History
Examples
mac_address
None
Release
Modification
7.6
OL-31334-01
show Commands
Syntax Description
Syntax Description
Command Default
Command History
None
Release
Modification
7.6
Usage Guidelines
Use show client ap command to list the status of automatically disabled clients. Use the show exclusionlist
command to display clients on the exclusion list (blacklisted).
Examples
The following example shows how to display a summary of the active clients:
(Cisco Controller) > show client summary
Number of Clients................................ 24
Number of PMIPV6 Clients......................... 200
MAC Address
AP Name
Status
WLAN/GLAN/RLAN Auth Protocol
Port
Wired PMIPV6
----------------- ----------------- ------------- -------------- ---- ---------------- -------- -----00:00:15:01:00:01
No
Yes
00:00:15:01:00:02
No
No
00:00:15:01:00:03
No
Yes
00:00:15:01:00:04
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
49
show Commands
No
Examples
No
The following example shows how to display all clients that are WindowsXP-Workstation device type:
(Cisco Controller) >show client summary WindowsXP-Workstation
Number of Clients in WLAN........................ 0
MAC Address
AP Name
Status
Auth Protocol
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following is a sample output of the show client summary guest-lan command:
(Cisco Controller) > show client summary guest-lan
Number of Clients................................ 1
MAC Address
AP Name
Status
WLAN Auth
------------------------------- ---00:16:36:40:ac:58 N/A
Associated
1
No
Related Commands
Protocol
-------802.3
Port Wired
---- ----1
Yes
51
show Commands
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b
client_mac
ap_mac
all
Specifies the list of all access points to which the client has associations.
None
Release
Modification
7.6
The following is a sample output of the show client tsm 802.11a command:
(Cisco Controller) > show client tsm 802.11a xx:xx:xx:xx:xx:xx all
AP Interface MAC: 00:0b:85:01:02:03
Client Interface Mac:
00:01:02:03:04:05
Measurement Duration:
90 seconds
Timestamp
1st Jan 2006, 06:35:80
UpLink Stats
================
Average Delay (5sec intervals)............................35
Delay less than 10 ms.....................................20
Delay bet 10 - 20 ms......................................20
Delay bet 20 - 40 ms......................................20
Delay greater than 40 ms..................................20
Total packet Count.........................................80
Total packet lost count (5sec).............................10
Maximum Lost Packet count(5sec)............................5
Average Lost Packet count(5secs)...........................2
DownLink Stats
================
Average Delay (5sec intervals)............................35
Delay less than 10 ms.....................................20
Delay bet 10 - 20 ms......................................20
Delay bet 20 - 40 ms......................................20
Delay greater than 40 ms..................................20
Total packet Count.........................................80
Total packet lost count (5sec).............................10
Maximum Lost Packet count(5sec)............................5
Average Lost Packet count(5secs)...........................2
OL-31334-01
show Commands
Related Commands
show client ap
show client detail
show client summary
53
show Commands
Syntax Description
username
Clients username.
You can view a list of the first eight clients that are in RUN state associated to
controller's access points.
Command Default
Command History
Examples
None
Release
Modification
7.6
AP Name
Status
WLAN
Auth
Protocol
Port
-----------------
-------------
----
----
----------------
----
12:22:64:64:00:01
Unknown
12:22:64:64:00:02
Unknown
12:22:64:64:00:03
Unknown
12:22:64:64:00:04
Unknown
12:22:64:64:00:05
Unknown
12:22:64:64:00:06
Unknown
12:22:64:64:00:07
Unknown
12:22:64:64:00:08
Unknown
WEB-AUTH-AP-1
Associated
Yes
802.11g
WEB-AUTH-AP-1
Associated
Yes
802.11g
WEB-AUTH-AP-1
Associated
Yes
802.11g
WEB-AUTH-AP-1
Associated
Yes
802.11g
WEB-AUTH-AP-1
Associated
Yes
802.11g
WEB-AUTH-AP-1
Associated
Yes
802.11g
WEB-AUTH-AP-1
Associated
Yes
802.11g
WEB-AUTH-AP-1
Associated
Yes
802.11g
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
quos-map
Displays information about the QoS/DSCP mapping and packet statistics in each
of the four queues: VO, VI, BE, BK. The different DSCP values are also
displayed.
roam-history
Displays information about history of the last three roamings. The output contains
the timestamp, access point associated with the roaming, the roaming reason,
and if there is a roaming failure, the reason for the roaming failure.
rssi
Displays the clients RSSI values in the last 5 seconds when voice diagnostics
are enabled.
status
tspec
None
Release
Modification
7.6
The following is a sample output of the show client voice-diag status command:
(Cisco Controller) > show client voice-diag status
Voice Diagnostics Status: FALSE
Related Commands
show client ap
show client detail
show client summary
debug voice-diag
55
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
config coredump
config coredump ftp
config coredump username
OL-31334-01
show Commands
show cpu
To display current WLAN controller CPU usage information, use the show cpu command.
show cpu
Syntax Description
Command History
Examples
Release
Modification
7.6
57
show Commands
show custom-web
To display web authentication customization information, use the show custom-web command.
show custom-web
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
PAP
Enabled
None
None
None
None
Disabled
None
OL-31334-01
show Commands
Syntax Description
Command Default
None
Examples
Related Commands
2048
2048
2
0
1
1
1
1
0
59
show Commands
show dhcp
To display the internal Dynamic Host Configuration Protocol (DHCP) server configuration, use the show
dhcp command.
show dhcp {leases | summary | scope}
Syntax Description
Command Default
Command History
Examples
leases
summary
scope
None
Release
Modification
7.6
The following example shows how to display the allocated DHCP leases:
(Cisco Controller) >show dhcp leases
No leases allocated.
The following example shows how to display the DHCP summary information:
(Cisco Controller) >show dhcp summary
Scope Name
Enabled
Address Range
003
No
0.0.0.0 -> 0.0.0.0
The following example shows how to display the DHCP information for the scope 003:
(Cisco Controller) >show dhcp 003
Enabled.......................................
Lease Time....................................
Pool Start....................................
Pool End......................................
Network.......................................
Netmask.......................................
Default Routers...............................
DNS Domain....................................
DNS...........................................
Netbios Name Servers..........................
No
0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0 0.0.0.0 0.0.0.0
0.0.0.0 0.0.0.0 0.0.0.0
0.0.0.0 0.0.0.0 0.0.0.0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Local Port
------------Capwap_Ctrl
Capwap_Data
Capwap_Ctrl
Peer IP
--------------1.100.163.210
1.100.163.210
1.100.163.209
Peer Port
------------23678
23678
59674
Ciphersuite
----------------------TLS_RSA _WITH_AES_128_CBC_SHA
TLS_RSA _WITH_AES_128_CBC_SHA
TLS_RSA _WITH_AES_128_CBC_SHA
61
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the status of DHCP proxy information:
(Cisco Controller) >show dhcp proxy
DHCP Proxy Behavior: enabled
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the DHCP timeout value:
(Cisco Controller) >show dhcp timeout
DHCP Timeout (seconds)................. 10
63
show Commands
Syntax Description
Command Default
Command History
Examples
summary
statistics
Displays the statistics of flow exporters such as the number of records sent,
or the time when the last record was sent.
None
Release
Modification
7.6
The following is a sample output of the show flow exporter summary command:
(Cisco Controller) > show flow exporter summary
Exporter-Name
Exporter-IP
Port
=============
===========
=====
expo1
9.9.120.115
800
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
Netflow record monitoring and export are used for integration with an NMS or any Netflow analysis tool.
Examples
Exporter-IP
===========
9.9.120.115
Port
====
800
Record Name
===========
65
show Commands
show guest-lan
To display the configuration of a specific wired guest LAN, use the show guest-lan command.
show guest-lan guest_lan_id
Syntax Description
Command Default
Command History
guest_lan_id
None
Release
Modification
7.6
Usage Guidelines
To display all wired guest LANs configured on the controller, use the show guest-lan summary command.
Examples
OL-31334-01
show Commands
show invalid-config
To see any ignored commands or invalid configuration values in an edited configuration file, use the show
invalid-config command.
show invalid-config
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
You can enter this command only before the clear config or save config command.
Examples
67
show Commands
show inventory
To display a physical inventory of the Cisco wireless LAN controller, use the show inventory command.
show inventory
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
Some wireless LAN controllers may have no crypto accelerator (VPN termination module) or power supplies
listed because they have no provisions for VPN termination modules or power supplies.
Examples
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
69
show Commands
Related Commands
license install
show license agent
show license detail
show license feature
show license image-level
show license summary
license modify priority
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
license install
show license all
show license detail
show license feature
show license image-level
show license summary
license modify priority
show license evaluation
71
show Commands
Syntax Description
license-name
Command Default
None.
Examples
Related Commands
license install
show license agent
show license all
show license feature
show license image-level
show license summary
license modify priority
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the details of the expiring licenses:
> show license expiring
StoreIndex: 0 Feature: wplus
Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 6 weeks 6 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 1 Feature: wplus-ap-count
Version: 1.0
License Type: Evaluation
License State: Active, In Use
Evaluation total period: 8 weeks 4 days
Evaluation period left: 2 weeks 3 days
Expiry date: Thu Jun 25 18:09:43 2009
License Count: 250/250/0
License Priority: High
StoreIndex: 2 Feature: base
Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 4 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 3 Feature: base-ap-count
Version: 1.0
License Type: Evaluation
License State: Active, Not in Use, EULA accepted
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 3 days
License Count: 250/0/0
License Priority: Low
Related Commands
license install
show license all
show license detail
show license in-use
show license summary
license modify priority
show license evaluation
73
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the details of the evaluation licenses:
> show license evaluation
StoreIndex: 0 Feature: wplus
Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 6 weeks 6 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 1 Feature: wplus-ap-count
Version: 1.0
License Type: Evaluation
License State: Active, In Use
Evaluation total period: 8 weeks 4 days
Evaluation period left: 2 weeks 3 days
Expiry date: Thu Jun 25 18:09:43 2009
License Count: 250/250/0
License Priority: High
StoreIndex: 2 Feature: base
Version: 1.0
License Type: Evaluation
License State: Inactive
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 4 days
License Count: Non-Counted
License Priority: Low
StoreIndex: 3 Feature: base-ap-count
Version: 1.0
License Type: Evaluation
License State: Active, Not in Use, EULA accepted
Evaluation total period: 8 weeks 4 days
Evaluation period left: 8 weeks 3 days
License Count: 250/0/0
License Priority: Low
Related Commands
license install
show license all
show license detail
show license expiring
show license in-use
show license summary
license modify priority
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
Evaluation
yes
yes
yes
yes
Clear Allowed
yes
yes
yes
yes
Enabled
yes
yes
no
no
license install
show license all
show license detail
show license expiring
show license image-level
show license in-use
show license summary
show license modify priority
show license evaluation
75
show Commands
Syntax Description
Examples
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
show license evaluation
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
77
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the image level license settings:
> show license image-level
Module name Image level Priority Configured Valid license
wnbu
wplus
1
YES
wplus
base
2
NO
NOTE: wplus includes two additional features: Office Extend AP, Mesh AP.
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
license modify priority
show license in-use
show license summary
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the licenses that are in use:
> show license in-use
StoreIndex: 2 Feature: wplus
Version: 1.0
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
StoreIndex: 1 Feature: wplus-ap-count
Version: 1.0
License Type: Evaluation
License State: Active, In Use
Evaluation total period: 8 weeks 4 days
Evaluation period left: 2 weeks 3 days
Expiry date: Thu Jun 25 18:09:43 2009
License Count: 250/250/0
License Priority: High
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license modify priority
show license summary
show license permanent
show license evaluation
79
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
81
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license permanent
license modify priority
show license evaluation
83
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the UDI values for licenses:
> show license udi
Device# PID
SN
UDI
------------------------------------------------------------------------------------*0
AIR-CT5508-K9
RFD000P2D27
AIR-CT5508-K9:RFD000P2D27
Related Commands
license install
show license all
show license detail
show license expiring
show license feature
show license image-level
show license in-use
show license summary
license modify priority
show license evaluation
OL-31334-01
show Commands
show load-balancing
To display the status of the load-balancing feature, use the show load-balancing command.
show load-balancing
Syntax Description
Command Default
None.
Examples
Related Commands
config load-balancing
85
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the authentication certificate information stored locally:
(Cisco Controller) > show local-auth certificates
Related Commands
OL-31334-01
show Commands
show logging
To display the syslog facility logging parameters and buffer contents, use the show logging command.
show logging
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the current settings and buffer content details:
(Cisco Controller) >show logging
(Cisco Controller) > config logging syslog host 10.92.125.52
System logs will be sent to 10.92.125.52 from now on
(Cisco Controller) > config logging syslog host 2001:9:6:40::623
System logs will be sent to 2001:9:6:40::623 from now on
(Cisco Controller) > show logging
Logging to buffer :
- Logging of system messages to buffer :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to buffer ...........
- Number of debug messages logged...............
- Number of debug messages dropped..............
- Cache of logging .............................
- Cache of logging time(mins) ...................
- Number of over cache time log dropped ........
Logging to console :
- Logging of system messages to console :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to console ..........
- Number of debug messages logged...............
- Number of debug messages dropped..............
Logging to syslog :
- Syslog facility................................
- Logging of system messages to console :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to console ..........
- Number of debug messages logged...............
- Number of debug messages dropped..............
- Logging of system messages to syslog :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
errors
1316
6892
Disabled
0
0
Disabled
10080
0
disabled
0
8243
Enabled
0
0
local0
disabled
0
8208
Enabled
0
0
errors
1316
6892
87
show Commands
Disabled
0
0
2
Disabled
10.92.125.52
2001:9:6:40::623
Disabled
Disabled
0
0
Enabled
OL-31334-01
show Commands
show loginsession
To display the existing sessions, use the show loginsession command.
show loginsession
Syntax Description
Command Default
None.
Examples
Related Commands
Idle Time
Session Time
------------ -----------00:00:00
00:19:04
89
show Commands
Syntax Description
Command Default
Command History
Examples
summary
Displays the total number of voice calls and voice bandwidth used for each mesh access
point.
bwused
voice
Displays the mesh topology and the voice bandwidth used or available.
video
Displays the mesh topology and the video bandwidth used or available.
access
callpath
rejected
cisco_ap
None
Release
Modification
7.6
The following example shows how to display a summary of the call admission control settings:
(Cisco Controller) >show mesh cac summary
AP Name
Slot#
Radio BW Used/Max Calls
----------------- ------- ----- ----------- ----SB_RAP1
0
11b/g
0/23437
0
1
11a
0/23437
0
SB_MAP1
0
11b/g
0/23437
0
1
11a
0/23437
0
SB_MAP2
0
11b/g
0/23437
0
1
11a
0/23437
0
SB_MAP3
0
11b/g
0/23437
0
1
11a
0/23437
0
The following example shows how to display the mesh topology and the voice bandwidth used or available:
(Cisco Controller) >show mesh cac bwused voice SB_MAP1
AP Name
Slot#
Radio
BW Used/Max
------------------- --------------SB_RAP1
0
11b/g
0/23437
1
11a
0/23437
OL-31334-01
show Commands
SB_MAP1
||
SB_MAP2
||| SB_MAP3
0
1
0
1
0
1
11b/g
11a
11b/g
11a
11b/g
11a
0/23437
0/23437
0/23437
0/23437
0/23437
0/23437
The following example shows how to display the access voice calls in progress in a tree topology:
(Cisco Controller) >show mesh cac access 1524_Map1
AP Name
Slot#
Radio
Calls
------------------- --------1524_Rap
0
11b/g
0
1
11a
0
2
11a
0
|
1524_Map1
0
11b/g
0
1
11a
0
2
11a
0
|| 1524_Map2
0
11b/g
0
1
11a
0
2
11a
0
91
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.5
Ethernet MAC
---------------cc:ef:48:72:0d:d9
00:22:bd:df:04:68
Number of Vlans
----------------0
2
VlanIdentifiers
-----------------Not applicable
124,122
The following table describes the significant fields shown in the display.
Table 3: show mdns ap summary Field Descriptions
Field
Description
AP Name
Ethernet MAC
Number of VLANs
VLAN Identifiers
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Release
Modification
7.5
Usage Guidelines
Each service advertisement contains a record that maps the domain name of the service provider to the IP
address. The mapping also contains details such as the client MAC address, VLAN ID, Time to Live (TTL),
and IPv4 address.
Examples
The following is a sample output of the show mdns domain-name-ip summary command:
(Cisco Controller) > show mdns domain-name-ip summary
Number of Domain Name-IP Entries................. 1
DomainName
MAC Address
IP Address
Vlan Id Type
-------------
-------------
-----------
tixp77.local.
00:50:b6:4f:69:70
209.165. 202.128
TTL
Time left
mDNSAP 4725
906
The following table describes the significant fields shown in the display.
Table 4: show mdns domain-name-ip summary Field Descriptions
Field
Description
Domain Name
MAC Address
IP Address
VLAN ID
93
show Commands
Field
Description
Type
TTL
Time Left
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
summary
detailed
profile-name
None
Release
Modification
7.4
This example shows how to display a summary of all the mDNS profiles:
> show mdns profile summary
Number of Profiles............................... 2
ProfileName
-------------------------------default-mdns-profile
profile1
No. Of Services
--------------5
2
This example shows how to display the detailed information of an mDNS profile:
> show mdns profile detailed default-mdns-profile
Related Commands
Profile Name.....................................
Profile Id.......................................
No of Services...................................
Services.........................................
default-mdns-profile
1
5
AirPrint
AppleTV
HP_Photosmart_Printer_1
HP_Photosmart_Printer_2
Printer
0
0
1
1
95
show Commands
OL-31334-01
show Commands
Syntax Description
summary
detailed
service-name
not-learnt
Command Default
Command History
Examples
None
Release
Modification
7.4
7.5
LSS Origin
-------------Yes Wireless
Yes Wireless
Yes Wireless
No
Wired
No
Wired
No SP Service-string
------------1
_ipp._tcp.local.
1
_airplay._tcp.local.
1
_universal._sub._ipp._tcp.local.
0
_cups._sub._ipp._tcp.local.
0
_printer._tcp.local.
The following is a sample output of the show mnds service detailed command:
Device > show mdns service detailed AirPrint
Service
Service
Service
Service
Service
Name.....................................
Id.......................................
query status.............................
LSS status...............................
learn origin.............................
AirPrint
1
Enabled
Disabled
Wired
97
show Commands
Number of Profiles............................... 2
Profile.......................................... student-profile, guest-profile
Number of Service Providers ..................... 2
Service Provider MAC-Address
AP Radio MAC
VLAN ID
---------------- ---------------------------user1
60:33:4b:2b:a6:9a ----104
laptopa
00:21:1b:ea:36:60 3c:ce:73:1e:69:20 105
Type
---Wired
Wireless
TTL
Time left
---------------4500
4484
4500
4484
MAC Address
------------------44:03:a7:a3:04:45
AP group name
-------------AP_floor1
TTL
TTL left
(sec)
------
Client MAC
AP-MAC
(sec)
------------------
------------------
105
00:21:6a:76:88:04
04:da:d2:b3:11:00
112
00:21:6a:78:ff:82
04:da:d2:b3:11:00
75
119
00:21:6a:78:ff:82
00:21:6a:78:ff:82
04:da:d2:b3:11:00
04:da:d2:b3:11:00
OL-31334-01
show Commands
show mgmtuser
To display the local management user accounts on the Cisco wireless LAN controller, use the show mgmtuser
command.
show mgmtuser
Syntax Description
Command Default
None.
Examples
Related Commands
Permissions
-----------read-write
Description
--------------
Password Strength
-----------------Weak
99
show Commands
Syntax Description
hash
Command Default
None
Command History
Examples
Displays the hash keys of the mobility group members in the same domain.
Release
Modification
7.6
The following example shows how to display the hash keys of the mobility group members:
(Cisco Controller) >show mobility group member hash
Default Mobility Domain.......................... new-mob
IP Address
Hash Key
--------------------------------------------------------9.2.115.68
a819d479dcfeb3e0974421b6e8335582263d9169
9.6.99.10
0974421b6e8335582263d9169a819d479dcfeb3e
9.7.7.7
feb3e0974421b6e8335582263d9169a819d479dc
OL-31334-01
show Commands
show netuser
To display the configuration of a particular user in the local user database, use the show netuser command.
show netuser {detail user_name | guest-roles | summary}
Syntax Description
Command Default
Command History
Examples
detail
user_name
Network user.
guest_roles
summary
None
Release
Modification
7.6
Related Commands
101
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display a QoS role for the guest network user:
> show netuser guest-roles
Role Name.............................. Contractor
Average Data Rate.................. 10
Burst Data Rate.................... 10
Average Realtime Rate.............. 100
Burst Realtime Rate................ 100
Role Name.............................. Vendor
Average Data Rate.................. unconfigured
Burst Data Rate.................... unconfigured
Average Realtime Rate.............. unconfigured
Burst Realtime Rate................ unconfigured
Related Commands
OL-31334-01
show Commands
show network
To display the current status of 802.3 bridging for all WLANs, use the show network command.
show network
Syntax Description
Command Default
None.
Examples
Related Commands
config network
show network summary
show network multicast mgid detail
show network multicast mgid summary
103
show Commands
Syntax Description
Command Default
None.
Examples
RF
Disable
Enable
Disable
Disable
Disable
Disabled
Enable
Enable
Disable
Mode: Ucast
Disable
Disable
Disable
Unicast
Disabled
60 seconds
20 seconds
Disabled
60 seconds
20 seconds
300 seconds
Disable
300 seconds
Disabled
Disable
Disable
Disable
Enable
EAP
Enable
Disable
Enable
Disable
Disabled
80
Disable
Disable
Enable
Disabled
Enabled
Enabled
Disable
Disable
Enable
Disabled
15 minutes
Red
OL-31334-01
show Commands
Related Commands
config network
show network multicast mgid summary
show network multicast mgid detail
show network
105
show Commands
Syntax Description
mgid_value
Command Default
None.
Examples
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display a summary of multicast groups and their MGIDs:
> show network multicast mgid summary
Layer2 MGID Mapping:
------------------InterfaceName
vlanId
MGID
----------------------------- ------ ----management
0
0
test
0
9
wired
20
8
Layer3 MGID Mapping:
------------------Number of Layer3 MGIDs ................ 1
Group address
Vlan
MGID
------------------ ---------239.255.255.250
0
550
Related Commands
107
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
OL-31334-01
show Commands
Syntax Description
summary
connection all
Command Default
None.
Examples
0
0
0
0
0
0
2
1
0
0
0
0
0
0
0
0
0
0
0
0
0
This example shows how to display all the connection-specific NMSP counters:
> show nmsp statistics connection all
NMSP Connection Counters
Connection 1 :
Connection status: UP
Freed Connection:
0
Nmsp Subscr Req:
0
NMSP Subscr Resp:
Info Req:
1
Info Resp:
Measure Req:
2
Measure Resp:
Stats Req:
2
Stats Resp:
Info Notify:
0
Measure Notify:
Loc Capability:
2
Location Req:
0
Location Rsp:
Loc Subscr Req:
0
Loc Subscr Rsp:
Loc Notif:
0
Loc Unsubscr Req:
0
Loc Unsubscr Rsp:
IDS Get Req:
0
IDS Get Resp:
0
1
2
2
0
0
0
0
0
109
show Commands
IDS Notif:
IDS Set Req:
Related Commands
0
0
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the status of the active NMSP connections:
> show nmsp status
LocServer IP
TxEchoResp RxEchoReq TxData RxData
-------------- ----------- --------- ------- ------171.71.132.158 21642
21642
51278
21253
Related Commands
111
show Commands
Syntax Description
Command Default
Command History
Examples
summary
detail
Displays details for all of the NMSP services to which the controller is subscribed.
ip-addr
Details only for the NMSP services subscribed to by a specific IPv4 or IPv6
address.
None
Release
Modification
7.6
8.0
This example shows how to display a summary of all the NMSP services to which the controller is subscribed:
> show nmsp subscription summary
Mobility Services Subscribed:
Server IP
Services
---------------10.10.10.31
RSSI, Info, Statistics
This example shows how to display details of all the NMSP services:
> show nmsp subscription detail 10.10.10.31
Mobility Services Subscribed by 10.10.10.31
Services
Sub-services
------------------RSSI
Mobile Station, Tags,
Info
Mobile Station,
Statistics
Mobile Station, Tags,
> show nmsp subscription detail 2001:9:6:40::623
Mobility Services Subscribed by 2001:9:6:40::623
Services
Sub-services
------------------RSSI
Mobile Station, Tags,
Info
Mobile Station,
Statistics
Mobile Station, Tags,
OL-31334-01
show Commands
show ntp-keys
To display network time protocol authentication key details, use the show ntp-keys command.
show ntp-keys
Syntax Description
Command Default
None.
Examples
Related Commands
113
show Commands
show qos
To display quality of service (QoS) information, use the show qos command.
show qos {bronze | gold | platinum | silver}
Syntax Description
bronze
gold
platinum
silver
Command Default
None.
Examples
This example shows how to display QoS information for the silver profile:
> show qos
Description......................................
Maximum Priority.................................
Unicast Default Priority.........................
Multicast Default Priority.......................
Per-SSID Rate Limits.............................
Average Data Rate................................
Average Realtime Data Rate.......................
Burst Data Rate..................................
Burst Realtime Data Rate.........................
Per-Client Rate Limits...........................
Average Data Rate................................
Average Realtime Data Rate.......................
Burst Data Rate..................................
Burst Realtime Data Rate.........................
protocol.........................................
Related Commands
OL-31334-01
show Commands
show queue-info
To display all the message queue information pertaining to the system, use the show queue-info command.
show queue-info
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.5
The following table describes the significant fields shown in the display.
Table 5: show queue-info Field Descriptions
Field
Description
Queue Name
Allocated
InUse
115
show Commands
Field
Description
MaxUsed
OL-31334-01
show Commands
show reset
To display the scheduled system reset parameters, use the show reset command.
show reset
Syntax Description
Command Default
None.
Examples
This example shows how to display the scheduled system reset parameters:
> show reset
System reset is scheduled for Mar 27 01 :01 :01 2010
Current local time and date is Mar 24 02:57:44 2010
A trap will be generated 10 minutes before each scheduled system reset.
Use reset system cancel to cancel the reset.
Configuration will be saved before the system reset.
Related Commands
reset system at
reset system in
reset system cancel
reset system notify-time
117
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the kernel route cache information:
> show route kernel
Iface Destination
dtl0
14010100
dtl0
28282800
dtl0
34010100
eth0
02020200
dtl0
33010100
dtl0
0A010100
dtl0
32010100
dtl0
0A000000
lo
7F000000
dtl0
00000000
Related Commands
Gateway
00000000
00000000
00000000
00000000
00000000
00000000
00000000
0202020A
00000000
0A010109
Flags
0001
0001
0001
0001
0001
0001
0001
0003
0001
0003
RefCnt
0
0
0
0
0
0
0
0
0
0
Use
0
0
0
0
0
0
0
0
0
0
Metric
Mask
0
FFFFFF00
0
FFFFFF00
0
FFFFFF00
0
FFFFFF00
0
FFFFFF00
0
FFFFFF00
0
FFFFFF00
0
FF000000
0
FF000000
0
00000000
MTU
0
0
0
0
0
0
0
0
0
0
Window
0
0
0
0
0
0
0
0
0
0
IRTT
0
0
0
0
0
0
0
0
0
0
clear ap
debug arp
show arp kernel
config route add
config route delete
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Examples
Related Commands
config route
119
show Commands
show run-config
To display a comprehensive view of the current Cisco wireless LAN controller configuration, use the show
run-config command.
show run-config [no-ap | commands]
Syntax Description
Command Default
Command History
Usage Guidelines
no-ap
commands
None
Release
Modification
7.6
Examples
Cisco Controller
FLS0923003B
xx:xx:xx:xx:xx:xx
Absent
Absent
Absent
Present, OK
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
run-config
startup-commands
None
Release
Modification
8.0
Usage Guidelines
The configuration commands on the Wireless LAN controller are uploaded to the TFTP or NCS servers using
the transfer upload process. The show run-config startup-commands command enables the Wireless LAN
controller to generate running-configuration in CLI format. The configuration commands generated can be
used as backup configuration to restore the network.
Examples
AirPrint
AirTunes
AppleTV
HP_Photosmart_Printer_1
HP_Photosmart_Printer_2
Printer
121
show Commands
show sessions
To display the console port login timeout and maximum number of simultaneous command-line interface
(CLI) sessions, use the show sessions command.
show sessions
Syntax Description
Command Default
5 minutes, 5 sessions.
Examples
This example shows how to display the CLI session configuration setting:
> show sessions
CLI Login Timeout (minutes)............ 0
Maximum Number of CLI Sessions......... 5
The response indicates that the CLI sessions never time out and that the Cisco wireless LAN controller can
host up to five simultaneous CLI sessions.
Related Commands
OL-31334-01
show Commands
show snmpcommunity
To display Simple Network Management Protocol (SNMP) community entries, use the show snmpcommunity
command.
show snmpcommunity
Syntax Description
Command Default
None.
Examples
Related Commands
Client IP Mask
----------------0.0.0.0
0.0.0.0
Access Mode
----------Read Only
Read/Write
Status
-------Enable
Enable
123
show Commands
show snmpengineID
To display the SNMP engine ID, use the show snmpengineID command.
show snmpengineID
Syntax Description
Command Default
None.
Examples
Related Commands
OL-31334-01
show Commands
show snmptrap
To display Cisco wireless LAN controller Simple Network Management Protocol (SNMP) trap receivers and
their status, use the show snmptrap command.
show snmptrap
Syntax Description
Command Default
None.
Examples
This example shows how to display SNMP trap receivers and their status:
> show snmptrap
SNMP Trap Receiver Name
-----------------------xxx.xxx.xxx.xxx
Related Commands
IP Address
Status
----------------- -------xxx.xxx.xxx.xxx
Enable
125
show Commands
show snmpv3user
To display Simple Network Management Protocol (SNMP) version 3 configuration, use the show snmpv3user
command.
show snmpv3user
Syntax Description
Command Default
None.
Examples
Related Commands
OL-31334-01
show Commands
show snmpversion
To display which versions of Simple Network Management Protocol (SNMP) are enabled or disabled on your
controller, use the show snmpversion command.
show snmpversion
Syntax Description
Command Default
Enable.
Examples
Related Commands
127
show Commands
show switchconfig
To display parameters that apply to the Cisco wireless LAN controller, use the show switchconfig command.
show switchconfig
Syntax Description
Command Default
Enabled.
Examples
This example shows how to display parameters that apply to the Cisco wireless LAN controller:
> show switchconfig
802.3x Flow Control Mode.........................
FIPS prerequisite features.......................
Boot Break.......................................
secret obfuscation...............................
Strong Password Check Features:
case-check ...........Disabled
consecutive-check ....Disabled
default-check .......Disabled
username-check ......Disabled
Related Commands
Disabled
Enabled
Enabled
Enabled
OL-31334-01
show Commands
show sysinfo
To display high-level Cisco wireless LAN controller information, use the show sysinfo command.
show sysinfo
Syntax Description
Command Default
None.
Examples
Related Commands
config sysname
129
show Commands
Syntax Description
Command Default
Command History
Examples
detail
summary
None
Release
Modification
8.0
The following is a sample output of the show system iostat summary command:
(Cisco Controller) >show system iostat summary
Linux 2.6.21_mvlcge500-octeon-mips64_octeon_v2_be (localhost)
avg-cpu:
%user
1.13
Device:
cfa
MB_read/s
0.02
%steal
0.00
MB_wrtn/s
0.00
10/11/13
%idle
98.52
MB_read
15
MB_wrtn
0
The following is a sample output of the show system iostat detail command:
(Cisco Controller) >show system iostat detail
Linux 2.6.21_mvlcge500-octeon-mips64_octeon_v2_be (localhost)
avg-cpu:
Device:
svctm
cfa
7.20
%user
0.87
%steal
0.00
10/11/13
%idle
98.86
rrqm/s
wrqm/s
r/s
w/s
rMB/s
8.42
0.15
0.84
0.09
0.01
await
%util
0.00
28.79
0.02
23.41
0.67
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
8.0
USER
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
PR NI
15
0
18
0
RT
0
RT
0
-51
0
-51
0
-51
0
-51
0
-51
0
-51
0
-51
0
-51
0
RT
0
15 -10
RT
0
RT
0
-51
0
-51
0
-51
0
-51
0
-51
0
-51
0
-51
0
-51
0
VIRT RES
2556 1116
4420 752
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
SHR
816
628
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
S %CPU %MEM
R
7 0.1
S
0 0.1
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
S
0 0.0
TIME+
0:00.07
0:09.11
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.02
0:00.00
0:00.00
COMMAND
top
init
migration/0
posix_cpu_timer
softirq-high/0
softirq-timer/0
softirq-net-tx/
softirq-net-rx/
softirq-block/0
softirq-tasklet
softirq-sched/0
softirq-rcu/0
watchdog/0
desched/0
migration/1
posix_cpu_timer
softirq-high/1
softirq-timer/1
softirq-net-tx/
softirq-net-rx/
softirq-block/1
softirq-tasklet
softirq-sched/1
softirq-rcu/1
131
show Commands
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
RT
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
0
-10
0
0
0
0
0
0
0
0
0
0
0
-10
0
0
0
0
0
0
0
0
0
0
0
-10
0
0
0
0
0
0
0
0
0
0
0
-10
0
0
0
0
0
0
0
0
0
0
0
-10
0
0
0
0
0
0
0
0
0
0
0
-10
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:01.19
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.72
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:02.20
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:01.43
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.20
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.84
0:00.00
0:00.00
0:00.00
watchdog/1
desched/1
migration/2
posix_cpu_timer
softirq-high/2
softirq-timer/2
softirq-net-tx/
softirq-net-rx/
softirq-block/2
softirq-tasklet
softirq-sched/2
softirq-rcu/2
watchdog/2
desched/2
migration/3
posix_cpu_timer
softirq-high/3
softirq-timer/3
softirq-net-tx/
softirq-net-rx/
softirq-block/3
softirq-tasklet
softirq-sched/3
softirq-rcu/3
watchdog/3
desched/3
migration/4
posix_cpu_timer
softirq-high/4
softirq-timer/4
softirq-net-tx/
softirq-net-rx/
softirq-block/4
softirq-tasklet
softirq-sched/4
softirq-rcu/4
watchdog/4
desched/4
migration/5
posix_cpu_timer
softirq-high/5
softirq-timer/5
softirq-net-tx/
softirq-net-rx/
softirq-block/5
softirq-tasklet
softirq-sched/5
softirq-rcu/5
watchdog/5
desched/5
migration/6
posix_cpu_timer
softirq-high/6
softirq-timer/6
softirq-net-tx/
softirq-net-rx/
softirq-block/6
softirq-tasklet
softirq-sched/6
softirq-rcu/6
watchdog/6
desched/6
migration/7
posix_cpu_timer
softirq-high/7
softirq-timer/7
softirq-net-tx/
softirq-net-rx/
softirq-block/7
softirq-tasklet
softirq-sched/7
softirq-rcu/7
watchdog/7
OL-31334-01
show Commands
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
165
166
167
168
169
170
171
172
173
174
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
799
857
868
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
root
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
5
RT
RT
-51
-51
-51
-51
-51
-51
-51
-51
RT
5
-2
-2
-2
-2
-2
-2
-2
-2
-2
-2
15
15
20
10
10
10
10
10
15
10
20
10
21
15
16
10
10
10
10
10
10
10
10
10
10
16
16
16
16
16
16
16
20
20
20
25
10
10
-10
0
0
0
0
0
0
0
0
0
0
0
-10
0
0
0
0
0
0
0
0
0
0
0
-10
-20
-20
-20
-20
-20
-20
-20
-20
-20
-20
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
0
0
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
-5
0
-5
-5
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.07
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:01.10
0:00.00
0:00.00
0:00.00
0:00.00
0:01.14
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.03
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
0:00.04
0:00.00
desched/7
migration/8
posix_cpu_timer
softirq-high/8
softirq-timer/8
softirq-net-tx/
softirq-net-rx/
softirq-block/8
softirq-tasklet
softirq-sched/8
softirq-rcu/8
watchdog/8
desched/8
migration/9
posix_cpu_timer
softirq-high/9
softirq-timer/9
softirq-net-tx/
softirq-net-rx/
softirq-block/9
softirq-tasklet
softirq-sched/9
softirq-rcu/9
watchdog/9
desched/9
events/0
events/1
events/2
events/3
events/4
events/5
events/6
events/7
events/8
events/9
khelper
kthread
kblockd/0
kblockd/1
kblockd/2
kblockd/3
kblockd/4
kblockd/5
kblockd/6
kblockd/7
kblockd/8
kblockd/9
pdflush
pdflush
kswapd0
flush_filesd/0
flush_filesd/1
flush_filesd/2
flush_filesd/3
flush_filesd/4
flush_filesd/5
flush_filesd/6
flush_filesd/7
flush_filesd/8
flush_filesd/9
aio/0
aio/1
aio/2
aio/3
aio/4
aio/5
aio/6
aio/7
aio/8
aio/9
mtdblockd
kjournald
kjournald
133
show Commands
907
920
991
1014
1076
1079
1238
1245
1254
1554
root
root
root
root
root
root
root
root
root
root
15
0
0
0
0 S
18
0 4420 804 628 D
23
0
0
0
0 S
15
0 4560 992 748 S
19
0 4484 880 748 S
20
0 896m 480m 20m S
16 -5
0
0
0 S
0 -20
0
0
0 S
25
0 25880 3308 2556 S
16
0 4420 836 708 S
0 0.0
0 0.1
0 0.0
0 0.1
0 0.1
0 49.0
0 0.0
0 0.0
0 0.3
0 0.1
0:00.00
0:00.00
0:00.00
0:00.00
0:00.00
1:42.23
0:00.00
0:00.00
0:00.62
0:00.00
OL-31334-01
show Commands
show tech-support
To display Cisco wireless LAN controller variables frequently requested by Cisco Technical Assistance Center
(TAC), use the show tech-support command.
show tech-support
Syntax Description
Command Default
None.
Examples
0%
4608
4604
4
152
3
152
3
747040 Secs
127552 Kbytes
19540 Kbytes
0 Kbytes
460 Kbytes
135
show Commands
show time
To display the Cisco wireless LAN controller time and date, use the show time command.
show time
Syntax Description
Command Default
None.
Examples
This example shows how to display the controller time and date when authentication is not enabled:
> show time
Time............................................. Wed Apr 13 09:29:15 2011
Timezone delta................................... 0:0
Timezone location........................ (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata
NTP Servers
NTP Polling Interval.........................
3600
Index
NTP Key Index
NTP Server
NTP Msg Auth Status
------- --------------------------------------------------------------1
0
9.2.60.60
AUTH DISABLED
This example shows successful authentication of NTP Message results in the AUTH Success:
> show time
Time............................................. Thu Apr 7 13:56:37 2011
Timezone delta................................... 0:0
Timezone location........................ (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata
NTP Servers
NTP Polling Interval.........................
3600
Index
NTP Key Index
NTP Server
NTP Msg Auth Status
------- --------------------------------------------------------------1
1
9.2.60.60
AUTH SUCCESS
This example shows that if the packet received has errors, then the NTP Msg Auth status will show AUTH
Failure:
> show time
Time............................................. Thu Apr 7 13:56:37 2011
Timezone delta................................... 0:0
Timezone location........................ (GMT +5:30) Colombo, New Delhi, Chennai, Kolkata
NTP Servers
NTP Polling Interval.........................
3600
Index
NTP Key Index
NTP Server
NTP Msg Auth Status
------- --------------------------------------------------------------1
10
9.2.60.60
AUTH FAILURE
This example shows that if there is no response from NTP server for the packets, the NTP Msg Auth status
will be blank:
> show time
Time............................................. Thu Apr 7 13:56:37 2011
Timezone delta................................... 0:0
Timezone location................................ (GMT +5:30) Colombo, New Delhi, Chennai,
Kolkata
NTP Servers
NTP Polling Interval.........................
3600
Index
NTP Key Index
NTP Server
NTP Msg Auth Status
OL-31334-01
show Commands
------1
Related Commands
--------------------------------------------------------------11
9.2.60.60
137
show Commands
show trapflags
To display the Cisco wireless LAN controller Simple Network Management Protocol (SNMP) trap flags, use
the show trapflags command.
show trapflags
Syntax Description
Command Default
None.
Examples
OL-31334-01
show Commands
auth failure....................................
child excluded parent...........................
parent change...................................
child moved.....................................
excessive parent change.........................
onset SNR.......................................
abate SNR.......................................
console login...................................
excessive association...........................
default bridge group name.......................
excessive hop count.............................
excessive children..............................
sec backhaul change.............................
Related Commands
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Disabled
Enabled
Disabled
139
show Commands
show traplog
To display the Cisco wireless LAN controller Simple Network Management Protocol (SNMP) trap log, use
the show traplog command.
show traplog
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
show Commands
show queue-info
To display all the message queue information pertaining to the system, use the show queue-info command.
show queue-info
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.5
The following table describes the significant fields shown in the display.
Table 6: show queue-info Field Descriptions
Field
Description
Queue Name
Allocated
InUse
141
show Commands
Field
Description
MaxUsed
OL-31334-01
show Commands
Syntax Description
Command Default
None.
Usage Guidelines
When the RFID tag is not in client mode, the above fields are blank.
Examples
This example shows how to display the RFID tag that is associated to the controller as clients:
> show rfid client
-----------------RFID Mac
-----------------00:14:7e:00:0b:b1
Related Commands
143
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display the current RFID configuration settings:
> show rfid config
RFID Tag Data Collection ...............................
RFID Tag Auto-Timeout ..................................
RFID Client Data Collection ............................
RFID Data Timeout ......................................
Related Commands
Enabled
Enabled
Disabled
200 seconds
OL-31334-01
show Commands
Syntax Description
mac_address
Command Default
None.
Examples
Related Commands
145
config Commands
Syntax Description
Command Default
None.
Examples
Related Commands
config Commands
This section lists the config commands that you can use to configure the controller settings, and manage user
accounts.
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
loud
quiet
disable
None
Release
7.6
Modification
This command was introduced in a release earlier than Release 7.6.
The loud and quiet parameters were introduced in Release 7.6.
Examples
147
config Commands
Syntax Description
Command Default
Command History
Examples
value
None
Release
Modification
7.6
The following example shows how to configure the 802.11h power constraint to 5:
(Cisco Controller) > config 802.11h powerconstraint 5
Related Commands
show 802.11h
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure a new channel using the 802.11h channel:
(Cisco Controller) > config 802.11h setchannel ap02
Related Commands
show 802.11h
149
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the 802.11n support on an 802.11a network:
(Cisco Controller) > config 802.11a 11nsupport enable
Related Commands
OL-31334-01
config Commands
Syntax Description
0-7
Specifies the aggregated MAC protocol data unit priority level between 0 through
7.
all
enable
Specifies the traffic associated with the priority level uses A-MPDU transmission.
disable
Specifies the traffic associated with the priority level uses A-MSDU transmission.
Command Default
Usage Guidelines
Aggregation is the process of grouping packet data frames together rather than transmitting them separately.
Two aggregation methods are available: Aggregated MAC Protocol Data Unit (A-MPDU) and Aggregated
MAC Service Data Unit (A-MSDU). A-MPDU is performed in the software whereas A-MSDU is performed
in the hardware.
Aggregated MAC Protocol Data Unit priority levels assigned per traffic type are as follows:
1Background
2Spare
0Best effort
3Excellent effort
4Controlled load
5Video, less than 100-ms latency and jitter
6Voice, less than 10-ms latency and jitter
7Network control
allConfigure all of the priority levels at once.
Note
Configure the priority levels to match the aggregation method used by the clients.
151
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure all the priority levels at once so that the traffic associated
with the priority level uses A-MSDU transmission:
(Cisco Controller) > config 802.11a 11nsupport a-mpdu tx priority all enable
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
timeout rt
timeout-value
Command Default
None
Usage Guidelines
Ensure that the 802.11 network is disabled before you enter this command.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the A-MPDU transmit aggregation scheduler realtime traffic
timeout of 100 milliseconds:
(Cisco Controller) > config 802.11 11nsupport a-mpdu tx scheduler timeout rt 100
Related Commands
153
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
Access point.
A/B/C/D
enable
disable
None
Release
Modification
7.6
The following example shows how to configure transmission to a single antenna for legacy orthogonal
frequency-division multiplexing:
(Cisco Controller) > config 802.11 11nsupport antenna AP1 C enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
any
long
None
Release
Modification
7.6
Related Commands
155
config Commands
Syntax Description
11nsupport
mcs tx
Command Default
enable
disable
None
OL-31334-01
config Commands
Command History
Examples
Release
Modification
7.6
Related Commands
157
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
Related Commands
OL-31334-01
config Commands
Note
Syntax Description
Disable the 802.11 network before using this command. See the Usage Guidelines section.
time_units
Command Default
None
Usage Guidelines
In Cisco wireless LAN solution 802.11 networks, all Cisco lightweight access point wireless LANs broadcast
a beacon at regular intervals. This beacon notifies clients that the 802.11a service is available and allows the
clients to synchronize with the lightweight access point.
Before you change the beacon period, make sure that you have disabled the 802.11 network by using the
config 802.11 disable command. After changing the beacon period, enable the 802.11 network by using the
config 802.11 enable command.
Command History
Examples
Release
Modification
7.6
This example shows how to configure an 802.11a network for a beacon period of 120 time units:
(Cisco Controller) > config 802.11 beacon period 120
Related Commands
show 802.11a
config 802.11b beaconperiod
config 802.11a disable
config 802.11a enable
159
config Commands
Syntax Description
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
This example shows how to configure the default CAC parameters for the 802.11a network:
(Cisco Controller) > config 802.11 cac defaults
Related Commands
OL-31334-01
config Commands
161
config Commands
Syntax Description
enable
disable
Command Default
The default video CAC settings for the 802.11a or 802.11b/g network is disabled.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable, or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the video CAC for the 802.11a network:
(Cisco Controller) > config 802.11 cac video acm enable
OL-31334-01
config Commands
The following example shows how to disable the video CAC for the 802.11b network:
(Cisco Controller) > config 802.11 cac video acm disable
Related Commands
163
config Commands
Syntax Description
static
Enables the static CAC method for video applications on the 802.11a
or 802.11b/g network.
Static or bandwidth-based CAC enables the client to specify how much
bandwidth or shared medium time is required to accept a new video
request and in turn enables the access point to determine whether it is
capable of accommodating the request.
load-based
Command Default
Static.
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
OL-31334-01
config Commands
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Video CAC consists of two parts: Unicast Video-CAC and MC2UC CAC. If you need only Unicast Video-CAC,
you must configure only static mode. If you need only MC2UC CAC, you must configure Static or Load-based
CAC. Load-based CAC is not supported if SIP-CAC is enabled.
Command History
Examples
Release
Modification
7.6
This example shows how to enable the static CAC method for video applications on the 802.11a network:
(Cisco Controller) > config 802.11 cac video cac-method static
Related Commands
165
config Commands
Syntax Description
enable
disable
Command Default
Disabled.
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Video CAC consists of two parts: Unicast Video-CAC and MC2UC CAC. If you need only Unicast Video-CAC,
you must configure only static mode. If you need only MC2UC CAC, you must configure Static or Load-based
CAC. Load-based CAC is not supported if SIP-CAC is enabled.
OL-31334-01
config Commands
Note
Command History
Examples
Release
Modification
7.6
This example shows how to enable load-based CAC method for video applications on the 802.11a network:
(Cisco Controller) > config 802.11 cac video load-based enable
Related Commands
167
config Commands
Syntax Description
bandwidth
Command Default
The default maximum bandwidth allocated to clients for video applications on the 802.11a or 802.11b/g
network is 0%.
Usage Guidelines
The maximum radio frequency (RF) bandwidth cannot exceed 85% for voice and video. Once the client
reaches the value specified, the access point rejects new calls on this network.
Note
If this parameter is set to zero (0), the controller assumes that you do not want to allocate any bandwidth
and allows all bandwidth requests.
Call Admission Control (CAC) commands require that the WLAN you are planning to modify is configured
for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable, or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
OL-31334-01
config Commands
Examples
The following example shows how to specify the percentage of the maximum allocated bandwidth for video
applications on the selected radio band:
(Cisco Controller) > config 802.11 cac video max-bandwidth 50
Related Commands
169
config Commands
Syntax Description
multicast-direct
max-retry-percent
retry-percentage
min-client-rate
dot11-rate
Command Default
The default value for the maximum retry percent is 80. If it exceeds 80, either the video will not start or the
client might be classified as a bad client. The bad client video will be demoted for better effort QoS or is
subject to denial.
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
OL-31334-01
config Commands
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the maximum retry percent for multicast-direct media streams
as 90 on a 802.11a network:
(Cisco Controller) > config 802.11 cac media-stream multicast-direct max-retry-percent 90
Related Commands
171
config Commands
Syntax Description
max-bandwidth
bandwidth
Command Default
The default maximum bandwidth allocated to Wi-Fi Multimedia (WMM) clients for voice and video applications
on the 802.11a or 802.11b/g network is 85%.
Usage Guidelines
Call Admission Control (CAC) commands for video applications on the 802.11a or 802.11b/g network require
that the WLAN you are planning to modify is configured for Wi-Fi Multimedia (WMM) protocol and the
quality of service (QoS) level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
OL-31334-01
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the percentage of the maximum bandwidth allocated to WMM
clients for voice and video applications on the 802.11a network:
(Cisco Controller) > config 802.11 cac multimedia max-bandwidth 80
Related Commands
173
config Commands
Syntax Description
bandwidth
Command Default
The maximum allocated bandwidth reserved for roaming video clients on the 802.11a or 802.11b/g network
is 0%.
Usage Guidelines
The controller reserves the specified bandwidth from the maximum allocated bandwidth for roaming video
clients.
Note
If this parameter is set to zero (0), the controller assumes that you do not want to do any bandwidth
allocation and, therefore, allows all bandwidth requests.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11 {a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11 {a |
b} cac voice acm enable or config 802.11 {a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Examples
The following example shows how to specify the percentage of the maximum allocated bandwidth reserved
for roaming video clients on the selected radio band:
(Cisco Controller) > config 802.11 cac video roam-bandwidth 10
OL-31334-01
config Commands
Related Commands
175
config Commands
Syntax Description
enable
Enables video CAC for non-TSPEC SIP clients using video applications
on the 802.11a or 802.11b/g network.
When you enable video CAC for non-TSPEC SIP clients, you can use
applications like Facetime and CIUS video calls.
disable
Command Default
None
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11 {a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Enable call snooping on the WLAN on which the SIP client is present by entering the config wlan
call-snoop enable wlan_id command.
Examples
The following example shows how to enable video CAC for non-TSPEC SIP clients using video applications
on the 802.11a network:
(Cisco Controller) > config 802.11 cac video sip enable
OL-31334-01
config Commands
Related Commands
177
config Commands
Syntax Description
ab
enable
ignore
Command Default
The default CAC WMM TSPEC inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Examples
This example shows how to process the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout enable
This example shows how to ignore the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout ignore
Related Commands
OL-31334-01
config Commands
179
config Commands
Syntax Description
enable
disable
Command Default
The default bandwidth-based voice CAC for the 802.11a or 802.11b/g network id disabled.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Examples
Related Commands
OL-31334-01
config Commands
Syntax Description
bandwidth
Command Default
The default maximum bandwidth allocated to clients for voice applications on the 802.11a or 802.11b/g
network is 0%.
Usage Guidelines
The maximum radio frequency (RF) bandwidth cannot exceed 85% for voice and video. Once the client
reaches the value specified, the access point rejects new calls on this network.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to specify the percentage of the maximum allocated bandwidth for voice
applications on the selected radio band:
(Cisco Controller) > config 802.11a cac voice max-bandwidth 50
181
config Commands
Related Commands
OL-31334-01
config Commands
Syntax Description
bandwidth
Command Default
The default CAC maximum allocated bandwidth reserved for roaming voice clients on the 802.11a or 802.11b/g
network is 85%.
Usage Guidelines
The maximum radio frequency (RF) bandwidth cannot exceed 85% for voice and video. The controller reserves
the specified bandwidth from the maximum allocated bandwidth for roaming voice clients.
Note
If this parameter is set to zero (0), the controller assumes you do not want to allocate any bandwidth and
therefore allows all bandwidth requests.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
183
config Commands
Examples
The following example shows how to configure the percentage of the maximum allocated bandwidth reserved
for roaming voice clients on the selected radio band:
(Cisco Controller) > config 802.11 cac voice roam-bandwidth 10
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
ignore
Command Default
The default WMM TSPEC inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
Call Admission Control (CAC) commands require that the WLAN you are planning to modify is configured
for Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the voice TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11 cac voice tspec-inactivity-timeout enable
185
config Commands
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
Command Default
The default load-based CAC for the 802.11a or 802.11b/g network is disabled.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the voice load-based CAC parameters:
(Cisco Controller) > config 802.11a cac voice load-based enable
187
config Commands
The following example shows how to disable the voice load-based CAC parameters:
(Cisco Controller) > config 802.11a cac voice load-based disable
Related Commands
OL-31334-01
config Commands
Do not use the config 802.11 cac voice max-calls command if the SIP call snooping feature is disabled
and if the SIP based Call Admission Control (CAC) requirements are not met.
To configure the maximum number of voice call supported by the radio, use the config 802.11 cac voice
max-calls command.
config 802.11{a | b} cac voice max-calls number
Syntax Description
number
Command Default
The default maximum number of voice call supported by the radio is 0, which means that there is no maximum
limit check for the number of calls.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
189
config Commands
Examples
The following example shows how to configure the maximum number of voice calls supported by radio:
(Cisco Controller) > config 802.11 cac voice max-calls 10
Related Commands
OL-31334-01
config Commands
SIP bandwidth and sample intervals are used to compute per call bandwidth for the SIP-based Call
Admission Control (CAC).
To configure the bandwidth that is required per call for the 802.11a or 802.11b/g network, use the config
802.11 cac voice sip bandwidth command.
config 802.11{a | b} cac voice sip bandwidth bw_kbps sample-interval number_msecs
Syntax Description
bw_kbps
Bandwidth in kbps.
sample-interval
number_msecs
Packetization sample interval in msecs. The sample interval for SIP codec is 20
seconds.
Command Default
None
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
191
config Commands
Examples
The following example shows how to configure the bandwidth and voice packetization interval for a SIP
codec:
(Cisco Controller) > config 802.11 cac voice sip bandwidth 10 sample-interval 40
Related Commands
OL-31334-01
config Commands
Syntax Description
g711
g729
sample-interval
number_msecs
Packetization interval in msecs. The sample interval for SIP codec value is 20
seconds.
Command Default
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
193
config Commands
Examples
The following example shows how to configure the codec name and sample interval as parameters for SIP
G711 codec:
(Cisco Controller) >
This example shows how to configure the codec name and sample interval as parameters for SIP G729 codec:
(Cisco Controller) > config 802.11a cac voice sip codec g729 sample-interval 40
Related Commands
OL-31334-01
config Commands
Syntax Description
stream-size
stream_size
number
mean_datarate
max-streams
mean_datarate
Command Default
The default number of streams is 2 and the mean data rate of a stream is 84 kbps.
Usage Guidelines
Call Admission Control (CAC) commands require that the WLAN you are planning to modify is configured
for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
195
config Commands
Examples
The following example shows how to configure the number of aggregated voice traffic specifications stream
with the stream size 5 and the mean data rate of 85000 kbps:
(Cisco Controller) > config 802.11 cac voice stream-size 5 max-streams size 85
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
network
cisco_ap
Release
Modification
7.6
You must use this command to disable the network before using many config 802.11 commands.
This command can be used any time that the CLI interface is active.
Examples
The following example shows how to disable the entire 802.11a network:
(Cisco Controller) >config 802.11a disable network
The following example shows how to disable access point AP01 802.11b transmissions:
(Cisco Controller) >config 802.11b disable AP01
197
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable DTPC for an 802.11a network:
(Cisco Controller) > config 802.11a dtpc disable
OL-31334-01
config Commands
Syntax Description
network
cisco_ap
Command Default
Usage Guidelines
Use this command with the config 802.11 disable command when configuring 802.11 settings.
This command can be used any time that the CLI interface is active.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable radio transmission for the entire 802.11a network:
(Cisco Controller) > config 802.11a enable network
The following example shows how to enable radio transmission for AP1 on an 802.11b network:
(Cisco Controller) > config 802.11b enable AP1
Related Commands
199
config Commands
Syntax Description
enable
disable
Command Default
Usage Guidelines
When this command is enabled, the controller configures all joining access points for this feature.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the CCX expedited bandwidth settings:
(Cisco Controller) > config 802.11a exp-bwreq enable
Cannot change Exp Bw Req mode while 802.11a network is operational.
The following example shows how to disable the CCX expedited bandwidth settings:
(Cisco Controller) > config 802.11a exp-bwreq disable
Related Commands
show 802.11a
show ap stats 802.11a
OL-31334-01
config Commands
Note
Syntax Description
Command Default
Command History
Examples
This command can only be used when the network is disabled using the config 802.11 disable command.
threshold
None.
Release
Modification
7.6
This example shows how to configure the fragmentation threshold on an 802.11a network with the threshold
number of 6500 bytes:
(Cisco Controller) > config 802.11a fragmentation 6500
Related Commands
201
config Commands
Syntax Description
default
custom
min_rssi
roam_hyst
scan_thresh
trans_time
OL-31334-01
config Commands
Command Default
The default minimum RSSI is -85 dBm. The default signal strength of a neighboring access point is 2 dB.
The default scan threshold value is -72 dBm. The default time allowed for the client to detect a suitable
neighboring access point to roam to and to complete the roam is 5 seconds.
Usage Guidelines
For high-speed client roaming applications in outdoor mesh environments, we recommend that you set the
trans_time to 1 second.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure custom Layer 2 client roaming parameters on an 802.11a
network:
(Cisco Controller) > config 802.11 l2roam rf-params custom 80 2 70 7
Related Commands
203
config Commands
Syntax Description
Command Default
Command History
Examples
max-clients
max-clients
Maximum number of client connections per access point. The range is from 1
to 200.
None
Release
Modification
7.6
The following example shows how to set the maximum number of clients at 22:
(Cisco Controller) > config 802.11 max-clients 22
Related Commands
OL-31334-01
config Commands
Syntax Description
data_rate
Minimum multicast data rates. The options are 6, 9, 12, 18, 24, 36, 48, 54. Enter
0 to specify that APs will dynamically adjust the number of the buffer allocated
for multicast.
ap_name
default
Command Default
The default is 0 where the configuration is disabled and the multicast rate is the lowest mandatory data rate
and unicast client data rate.
Usage Guidelines
When you configure the data rate without the AP name or default keyword, you globally reset all the APs to
the new value and update the controller global default with this new data rate value. If you configure the data
rate with default keyword, you only update the controller global default value and do not reset the value of
the APs that are already joined to the controller. The APs that join the controller after the new data rate value
is set receives the new data rate value.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure minimum multicast data rate settings:
(Cisco Controller) > config 802.11 multicast data-rate 12
205
config Commands
Syntax Description
disabled
mandatory
Specifies that a client supports the data rate in order to use the network.
supported
Specifies to allow any associated client that supports the data rate to use the
network.
rate
Command Default
None
Usage Guidelines
The data rates set with this command are negotiated between the client and the Cisco wireless LAN controller.
If the data rate is set to mandatory, the client must support it in order to use the network. If a data rate is set
as supported by the Cisco wireless LAN controller, any associated client that also supports that rate may
communicate with the Cisco lightweight access point using that rate. It is not required that a client is able to
use all the rates marked supported in order to associate.
Command History
Examples
Release
Modification
7.6
The following example shows how to set the 802.11b transmission at a mandatory rate at 12 Mbps:
(Cisco Controller) > config 802.11b rate mandatory 12
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
rssi-check
enable
disable
None
Release
Modification
7.5
Service providers can use the RSSI Low Check feature to prevent clients from connecting to their Wi-Fi
network unless the client has a viable connection. In many scenarios, even though clients can hear beacons
and connect to Wi-Fi, the signal might not be strong enough to support a stable connection. Use this feature
to determine how strong a client must be heard for it to associate with the Wi-Fi network.
If you enable the RSSI Low Check feature, when a client sends an association request to the AP, the controller
gets the RSSI value from the association message and compares it with the RSSI threshold that is configured.
If the RSSI value from the association message is less than the RSSI threshold value, the controller rejects
the association request. Note that this is only for association frames, and not for other messages.
The default RSSI Low Check value is 80 dBm, which means an association request from a client can be
rejected if the AP hears a client with a signal that is weaker than 80 dBm. If you lower the value to 90 dBm,
clients are allowed to connect at a further distance, but there is also a higher probability of the connection
quality being poor. We recommend that you do not go higher than 80 dBm, for example 70 dBm, because
this makes the cell size significantly smaller.
207
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
rssi-threshold
value-in-dBm
Release
Modification
7.5
Service providers can use the RSSI Low Check feature to prevent clients from connecting to their Wi-Fi
network unless the client has a viable connection. In many scenarios, even though clients can hear beacons
and connect to Wi-Fi, the signal might not be strong enough to support a stable connection. Use this feature
to determine how strong a client must be heard for it to associate with the Wi-Fi network.
If you enable the RSSI Low Check feature, when a client sends an association request to the AP, the controller
gets the RSSI value from the association message and compares it with the RSSI threshold that is configured.
If the RSSI value from the association message is less than the RSSI threshold value, the controller rejects
the association request. Note that this is only for association frames, and not for other messages.
The default RSSI Low Check value is 80 dBm, which means an association request from a client can be
rejected if the AP hears a client with a signal that is weaker than 80 dBm. If you lower the value to 90 dBm,
clients are allowed to connect at a further distance, but there is also a higher probability of the connection
quality being poor. We recommend that you do not go higher than 80 dBm, for example 70 dBm, because
this makes the cell size significantly smaller.
Examples
The following example shows how to configure the RSSI threshold value to 70 dBm for an 802.11a network:
(Cisco Controller) > config 802.11a rssi-threshold 70
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the video TSM option for the 802.11b/g network:
(Cisco Controller) > config 802.11b tsm enable
The following example shows how to disable the video TSM option for the 802.11b/g network:
(Cisco Controller) > config 802.11b tsm disable
Related Commands
show ap stats
show client tsm
209
config Commands
Syntax Description
Command Default
Command History
Examples
call-admission-limit
G711-CU-Quantum
Configures the value supplied by the infrastructure indicating the current number
of channel utilization units that would be used by a single G.711-20ms call.
limit
quantum
None.
Release
Modification
7.6
This example shows how to configure the call admission limit for 7920 VISE parameters:
(Cisco Controller) > config advanced 802.11 7920VSIEConfig call-admission-limit 4
OL-31334-01
config Commands
Syntax Description
wmm-default
svp-voice
optimized-voice
optimized-video-voice
custom-voice
Command Default
Command History
Release
Modification
7.6
211
config Commands
Examples
Related Commands
show 802.11a
config advanced 802.11b edca-parameters
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the fastpath fast cache control:
(Cisco Controller) > config advanced fastpath fastcache enable
Related Commands
213
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the fastpath packet capture:
(Cisco Controller) > config advanced fastpath pkt-capture enable
Related Commands
OL-31334-01
config Commands
Syntax Description
call_index
call_number
none
Command Default
None
Usage Guidelines
Before you configure voice prioritization, you must complete the following prerequisites:
Set the voice to the platinum QoS level by entering the config wlan qos wlan-id platinum command.
Enable the admission control (ACM) to this radio by entering the config 802.11 {a | b} cac {voice |
video} acm enable command.
Enable the call-snooping feature for a particular WLAN by entering the config wlan call-snoop enable
wlan-id command.
To view statistics about preferred calls, enter the show ap stats {802.11{a | b} | wlan} cisco_ap command.
Command History
Examples
Release
Modification
7.6
The following example shows how to add a new preferred call for index 2:
(Cisco Controller) > config advanced sip-preferred-call-no 2 0123456789
Related Commands
215
config Commands
Syntax Description
Usage Guidelines
start_port
end_port
If you need only a single port for call snooping, configure the start and end port with the same number.
The port used by the CIUS tablet is 5060 and the port range used by Facetime is from 16384 to16402.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the call snooping ports:
(Cisco Controller) > config advanced sip-snooping-ports 4000 4500
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
profile_name
create
None
Release
Modification
7.4
Usage Guidelines
You can configure up to 16 AVC profiles on a controller and associate an AVC profile with multiple WLANs.
You can configure only one AVC profile per WLAN and each AVC profile can have up to 32 rules. Each
rule states a Mark or Drop action for an application, which allows you to configure up to 32 application actions
per WLAN.
Examples
Related Commands
217
config Commands
Syntax Description
Command Default
Command History
Examples
profile_name
delete
Release
Modification
7.4
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
profile_name
rule
add
remove
application
application_name
drop
Drops the upstream and downstream packets that correspond to the chosen
application.
mark
Marks the upstream and downstream packets that correspond to the chosen
application with the Differentiated Services Code Point (DSCP) value that you
specify in the drop-down list. The DSCP value helps you provide differentiated
services based on the QoS levels.
dscp
Packet header code that is used to define the QoS across the Internet. The range
is from 0 to 63.
None
Release
Modification
7.4
The following example shows how to configure a rule for an AVC profile:
(Cisco Controller) > config avc profile avcprofile1 rule add application gmail mark 10
Related Commands
219
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
count
None
Release
Modification
7.6
The following example shows how to set the probe cycle count for band select to 8:
(Cisco Controller) > config band-select cycle-count 8
Related Commands
221
config Commands
Syntax Description
Command Default
Command History
Examples
threshold
None
Release
Modification
7.6
The following example shows how to set the time threshold for a new scanning cycle with threshold value of
700 milliseconds:
(Cisco Controller) > config band-select cycle-threshold 700
Related Commands
OL-31334-01
config Commands
Syntax Description
suppression
dual-band
seconds
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to set the suppression expire to 70 seconds:
(Cisco Controller) > config band-select expire suppression 70
Related Commands
223
config Commands
Syntax Description
rssi
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to set the RSSI threshold for band select to 70:
(Cisco Controller) > config band-select client-rssi 70
Related Commands
OL-31334-01
config Commands
config boot
To change a Cisco wireless LAN controller boot option, use the config boot command.
config boot {primary | backup}
Syntax Description
Command Default
Command History
primary
backup
Release
Modification
7.6
Usage Guidelines
Each Cisco wireless LAN controller can boot off the primary, last-loaded operating system image (OS) or
boot off the backup, earlier-loaded OS image.
Examples
The following example shows how to set the primary image as active so that the LAN controller can boot off
the primary, last loaded image:
(Cisco Controller) > config boot primary
The following example shows how to set the backup image as active so that the LAN controller can boot off
the backup, earlier loaded OS image:
(Cisco Controller) > config boot backup
Related Commands
show boot
225
config Commands
config cdp
To configure the Cisco Discovery Protocol (CDP) on the controller, use the config cdp command.
config cdp {enable | disable | advertise-v2 {enable | disable} | timerseconds | holdtime holdtime_interval}
Syntax Description
Command Default
enable
disable
advertise-v2
timer
seconds
holdtime
holdtime_interval
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the CDP maximum hold timer to 150 seconds:
(Cisco Controller) > config cdp timer 150
Related Commands
config ap cdp
show cdp
show ap cdp
OL-31334-01
config Commands
config certificate
To configure Secure Sockets Layer (SSL) certificates, use the config certificate command.
config certificate {generate {webadmin | webauth} | compatibility {on | off}}
Syntax Description
Command Default
Command History
Examples
generate
webadmin
webauth
compatibility
Specifies the compatibility mode for inter-Cisco wireless LAN controller IPsec settings.
on
off
None
Release
Modification
7.6
The following example shows how to generate a new web administration SSL certificate:
(Cisco Controller) > config certificate generate webadmin
Creating a certificate may take some time. Do you wish to continue? (y/n)
The following example shows how to configure the compatibility mode for inter-Cisco wireless LAN controller
IPsec settings:
(Cisco Controller) > config certificate compatibility
Related Commands
227
config Commands
Syntax Description
enable
disable
ca-server
http://url:port/path
ca-cert
add
delete
subject-params
other-params
keysize
Value from 384 to 2048 (in bits); the default value is 2048.
ap-provision
auth-list
ap_mac
MAC address of access point to be added or deleted from the provision list.
revert-cert
Specifies the number of times the access point attempts to join the controller
using an LSC before reverting to the default certificate.
retries
If you set the number of retries to 0 and the access point fails to join the
controller using an LSC, the access point does not attempt to join the
controller using the default certificate. If you are configuring LSC for
the first time, we recommend that you configure a nonzero value.
OL-31334-01
config Commands
Command Default
Command History
Usage Guidelines
The default value of keysize is 2048 bits. The default value of retries is 3.
Release
Modification
7.6
You can configure only one CA server. To configure a different CA server, delete the configured CA server
by using the config certificate lsc ca-server delete command, and then configure a different CA server.
If you configure an access point provision list, only the access points in the provision list are provisioned
when you enable AP provisioning (in Step 8). If you do not configure an access point provision list, all access
points with an MIC or SSC certificate that join the controller are LSC provisioned.
Examples
This example shows how to enable the LSC settings for Certificate Authority (CA) server settings:
(Cisco Controller) >config certificate lsc ca-server http://10.0.0.1:8080/caserver
The following example shows how to add a CA certificate from the CA server and add it to the controllers
certificate database:
(Cisco Controller) >config certificate lsc ca-cert add
The following example shows how to configure an LSC certificate with the keysize of 2048 bits:
(Cisco Controller) >config certificate lsc keysize 2048
229
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
hash
validation
enable
disable
Release
Modification
7.6
When you enable the SSC hash validation, an AP validates the SSC certificate of the virtual controller. When
an AP validates the SSC certificate, it checks if the hash key of the virtual controller matches the hash key
stored in its flash. If a match is found, the validation passes and the AP moves to the Run state. If a match is
not found, the validation fails and the AP disconnects from the controller and restarts the discovery process.
By default, hash validation is enabled. Hence, an AP must have the virtual controller hash key in its flash
before associating with the virtual controller. If you disable hash validation of the SSC certificate, the AP
bypasses the hash validation and directly moves to the Run state.
APs can associate with a physical controller, download the hash keys and then associate with a virtual controller.
If the AP is associated to a physical controller and if hash validation is disabled, it joins any virtual controller
without hash validation.
Examples
The following example shows how to enable hash validation of the SSC certificate:
(Cisco Controller) > config certificate ssc hash validation enable
Related Commands
OL-31334-01
config Commands
231
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to use a device certificate for web administration:
(Cisco Controller) > config certificate use-device-certificate webadmin
Use device certificate for web administration. Do you wish to continue? (y/n) y
Using device certificate for web administration.
Save configuration and restart controller to use new certificate.
Related Commands
config certificate
show certificate compatibility
show certificate lsc
show certificate ssc
show certificate summary
show local-auth certificates
OL-31334-01
config Commands
config coredump
To enable or disable the controller to generate a core dump file following a crash, use the config cordump
command.
config coredump {enable | disable}
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the controller to generate a core dump file following a crash:
(Cisco Controller) > config coredump enable
Related Commands
233
config Commands
Syntax Description
Command Default
Command History
server_ip_address
IP address of the FTP server to which the controller sends its core dump file.
filename
None
Release
Modification
7.6
8.0
Usage Guidelines
The controller must be able to reach the FTP server to use this command.
Examples
The following example shows how to configure the controller to upload a core dump file named
core_dump_controller to an FTP server at network address 192.168.0.13:
(Cisco Controller) > config coredump ftp 192.168.0.13 core_dump_controller
Related Commands
config coredump
config coredump username
show coredump summary
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
ftp_username
ftp_password
None
Release
Modification
7.6
Usage Guidelines
The controller must be able to reach the FTP server to use this command.
Examples
The following example shows how to specify a FTP server username of admin and password adminpassword
for the core dump file upload:
(Cisco Controller) > config coredump username admin password adminpassword
Related Commands
235
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the external URL web-based client authorization:
(Cisco Controller) > config custom-web ext-webauth-mode enable
Related Commands
OL-31334-01
config Commands
Syntax Description
URL
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the complete external web authentication URL
http://www.AuthorizationURL.com/ for the web-based client authorization:
(Cisco Controller) > config custom-web ext-webauth-url http://www.AuthorizationURL.com/
Related Commands
237
config Commands
Syntax Description
Command Default
Command History
Examples
add
index
Index of the external web server in the list of external web server. The index
must be a number between 1 and 20.
IP_address
delete
None
Release
Modification
7.6
8.0
The following example shows how to add the index of the external web server 2 to the IP address of the
external web server 192.23.32.19:
(Cisco Controller) > config custom-web ext-webserver add 2 192.23.32.19
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables the custom web authentication logout popup. This page appears after a
successful login or a redirect of the custom web authentication page.
disable
None
Release
Modification
7.6
The following example shows how to disable the custom web authentication logout popup:
(Cisco Controller) > config custom-web logout-popup disable
Related Commands
239
config Commands
Syntax Description
Command Default
Command History
Examples
chap
md5chap
pap
None
Release
Modification
7.6
The following example shows how to configure the RADIUS web authentication method as MD5-CHAP:
(Cisco Controller) > config custom-web radiusauth md5chap
Related Commands
OL-31334-01
config Commands
Syntax Description
URL
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the URL that is redirected to abc.com:
(Cisco Controller) > config custom-web redirectUrl abc.com
Related Commands
241
config Commands
Syntax Description
Command Default
Command History
Examples
delete
Deletes a web-authenticated sleeping client with the help of the client MAC
address.
mac_address
Release
Modification
7.5
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
internal
customized
external
Release
Modification
7.6
The following example shows how to configure the type of the web authentication type to internal:
(Cisco Controller) > config custom-web webauth-type internal
Related Commands
243
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the web authentication logo:
(Cisco Controller) > config custom-web weblogo enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
message
None
Release
Modification
7.6
The following example shows how to configure the message text Thisistheplace for webauthentication:
(Cisco Controller) > config custom-web webmessage Thisistheplace
Related Commands
245
config Commands
Syntax Description
title
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to set the custom title text Helpdesk for web authentication:
(Cisco Controller) > config custom-web webtitle Helpdesk
Related Commands
OL-31334-01
config Commands
config dhcp
To configure the internal DHCP, use the config dhcp command.
config dhcp {address-pool scope start end | create-scope scope | default-router scope router_1 [router_2]
[router_3] | delete-scope scope | disable scope | dns-servers scope dns1 [dns2] [dns3] | domain scope
domain | enable scope | lease scope lease_duration | netbios-name-server scope wins1 [wins2] [wins3] |
networkscope network netmask}
config dhcpopt-82 remote-id {ap_mac | ap_mac:ssid | ap-ethmac | apname:ssid | ap-group-name |
flex-group-name | ap-location | apmac-vlan_id | apname-vlan_id | ap-ethmac-ssid }
Syntax Description
create-scope name
delete-scope scope
disable scope
enable scope
247
config Commands
opt-82 remote-id
ap_mac
ap_mac:ssid
ap-ethmac
apname:ssid
ap-group-name
flex-group-name
ap-location
apmac-vlan_id
apname-vlan_id
Remote ID format as AP
Name:VLAN_ID.
ap-ethmac-ssid
OL-31334-01
config Commands
Command Default
The default value for ap-group-name is default-group, and for ap-location, the default value is default location.
If ap-group-name and flex-group-name are null, the system MAC is sent as the remote ID field.
Command History
Release
Modification
7.6
Usage Guidelines
Use the show dhcp command to display the internal DHCP configuration.
Examples
The following example shows how to configure the DHCP lease for the scope 003:
(Cisco Controller) >config dhcp lease 003
249
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
bootp-broadcast
DHCP is enabled.
Release
Modification
7.6
Use the show dhcp proxy command to display the status of DHCP proxy handling.
To enable third-party WGB support, you must enable the passive-client feature on the wirless LAN by entering
the config wlan passive-client enable command.
Examples
The following example shows how to disable the DHCP packet modification:
(Cisco Controller) >config dhcp proxy disable
The following example shows how to enable the DHCP BootP broadcast option:
(Cisco Controller) >config dhcp proxy disable bootp-broadcast enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
timeout-value
Release
Modification
7.6
The following example shows how to set the DHCP timeout to 10 seconds:
(Cisco Controller) >config dhcp timeout 10
251
config Commands
config flow
To configure the NetFlow monitor and exporter, use the config flow command.
config flow {add | delete} monitor monitor_name {exporter exporter_name| recordrecord_name}
Syntax Description
Command Default
Command History
add
delete
monitor
monitor_name
exporter
exporter_name
record
record_name
None
Release
Modification
7.6
Usage Guidelines
An exporter is a network entity that exports the template with the IP traffic information. The controller acts
as an exporter. A NetFlow record in the controller contains the information about the traffic in a given flow
such as client MAC address, client source IP address, WLAN ID, incoming and outgoing bytes of data,
incoming and outgoing packets, incoming and outgoing DSCP.
Examples
The following example shows how to configure the flow monitor and exporter:
(Cisco Controller) > config flow add monitor monitor1 exporter exporter1
OL-31334-01
config Commands
Related Commands
253
config Commands
config guest-lan
To create, delete, enable or disable a wireless LAN, use the config guest-lan command.
config guest-lan {create | delete} guest_lan_id interface_name | {enable | disable} guest_lan_id
Syntax Description
Command Default
Command History
Examples
create
delete
guest_lan_id
interface_name
enable
disable
None
Release
Modification
7.6
The following example shows how to enable a wireless LAN with the LAN ID 16:
(Cisco Controller) > config guest-lan enable 16
Related Commands
show wlan
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
ext_web_url
guest_lan_id
None
Release
Modification
7.6
The following example shows how to enable a wireless LAN with the LAN ID 16:
(Cisco Controller) > config guest-lan custom-web ext-webauth-url
http://www.AuthorizationURL.com/ 1
Related Commands
config guest-lan
config guest-lan create
config guest-lan custom-web login_page
255
config Commands
Syntax Description
Command Default
Command History
guest_lan_id
None
Release
Modification
7.6
Usage Guidelines
If you enter the config guest-lan custom-web global enable guest_lan_id command, the custom web
authentication configuration at the global level is used.
Examples
The following example shows how to disable the global web configuration for guest LAN ID 1:
(Cisco Controller) > config guest-lan custom-web global disable 1
Related Commands
config guest-lan
config guest-lan create
config guest-lan custom-web ext-webauth-url
config guest-lan custom-web login_page
config guest-lan custom-web webauth-type
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
page_name
guest_lan_id
None
Release
Modification
7.6
The following example shows how to customize a web login page custompage1 for guest LAN ID 1:
(Cisco Controller) > config guest-lan custom-web login_page custompage1 1
Related Commands
config guest-lan
config guest-lan create
config guest-lan custom-web ext-webauth-url
257
config Commands
Syntax Description
Command Default
Command History
Examples
internal
Displays the default web login page for the controller. This is the default value.
customized
Displays the custom web login page that was previously configured.
external
guest_lan_id
Release
Modification
7.6
The following example shows how to configure the guest LAN with the webauth-type as internal for guest
LAN ID 1:
(Cisco Controller) > config guest-lan custom-web webauth-type internal 1
Related Commands
config guest-lan
config guest-lan create
config guest-lan custom-web ext-webauth-url
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
guest_lan_id
interface_name
Interface name.
None
Release
Modification
7.6
The following example shows how to provide a path between the wired guest client and the controller with
guest LAN ID 1 and the interface name guest01:
(Cisco Controller) > config guest-lan ingress-interface 1 guest01
Related Commands
259
config Commands
Syntax Description
Command Default
Command History
Examples
guest_lan_id
interface_name
Interface name.
None
Release
Modification
7.6
The following example shows how to configure an egress interface to transmit guest traffic out of the controller
for guest LAN ID 1 and interface name guest01:
(Cisco Controller) > config guest-lan interface 1 guest01
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
Guest LAN Id
IP addr
None
Release
Modification
7.6
8.0
The following example shows how to delete a mobility anchor for WAN ID 4 and the anchor IP 192.168.0.14:
(Cisco Controller) > config guest-lan mobility anchor delete 4 192.168.0.14
261
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
guest_lan_id
None
Release
Modification
7.6
The following example shows how to enable the NAC out-of-band support for guest LAN ID 3:
(Cisco Controller) > config guest-lan nac enable 3
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
web-auth
enable
disable
acl
server-precedence
guest_lan_id
web-passthrough
email-input
The default security policy for the wired guest LAN is web authentication.
Release
Modification
7.6
The following example shows how to configure the security web authentication policy for guest LAN ID 1:
(Cisco Controller) > config guest-lan security web-auth enable 1
Related Commands
263
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
Examples
base
wplus
auto
None
Release
Modification
7.6
If you enter auto, the licensing software automatically chooses the license level to use on the next reboot. It
generally chooses permanent licenses over evaluation licenses and wplus licenses over base licenses.
Note
If you are considering upgrading from a base license to a wplus license, you can try an evaluation wplus
license before upgrading to a permanent wplus license. To activate the evaluation license, you need to set
the image level to wplus in order for the controller to use the wplus evaluation license instead of the base
permanent license.
Note
To prevent disruptions in operation, the controller does not switch licenses when an evaluation license
expires. You must reboot the controller in order to return to a permanent license. Following a reboot, the
controller defaults to the same feature set level as the expired evaluation license. If no permanent license
at the same feature set level is installed, the controller uses a permanent license at another level or an
unexpired evaluation license.
The following example shows how to set the license boot settings to wplus:
(Cisco Controller) > config license boot wplus
OL-31334-01
config Commands
Related Commands
license install
show license in-use
license modify priority
265
config Commands
config load-balancing
To globally configure aggressive load balancing on the controller, use the config load-balancing command.
config load-balancing {window client_count | status {enable | disable} | denial denial_count}
config load-balancing uplink-threshold traffic_threshold
Syntax Description
Command Default
Command History
Usage Guidelines
window
client_count
status
enable
disable
denial
denial_count
uplink-threshold
traffic_threshold
Release
Modification
7.6
Load-balancing-enabled WLANs do not support time-sensitive applications like voice and video because of
roaming delays.
OL-31334-01
config Commands
When you use Cisco 7921 and 7920 Wireless IP Phones with controllers, make sure that aggressive load
balancing is disabled on the voice WLANs for each controller. Otherwise, the initial roam attempt by the
phone might fail, causing a disruption in the audio path.
Clients can only be load balanced across access points joined to the same controller. The WAN utilization is
calculated as a percentage using the following formula: (Transmitted Data Rate (per second) + Received Data
Rate (per second))/(1000Mbps TX + 1000Mbps RX) * 100
Examples
The following example shows how to enable the aggressive load-balancing settings:
(Cisco Controller) > config load-balancing aggressive enable
Related Commands
show load-balancing
config wlan load-balance
267
config Commands
config location
To configure a location-based system, use the config location command.
config location {add location [description] | delete location | enable | disable | description location
description | algorithm {simple | rssi-average} | {rssi-half-life | expiry} [client | calibrating-client | tags
| rogue-aps] seconds | notify-threshold [client | tags | rogue-aps] threshold | interface-mapping {add |
delete} location wlan_id interface_name | plm {client {enable | disable} burst_interval | calibrating {enable
| disable} {uniband | multiband}}}
Syntax Description
add
location
description
Element description. Optional with the add command, and required with the
description command.
delete
enable
disable
algorithm
Note
simple
Specifies a faster algorithm that requires low CPU overhead but provides less
accuracy.
rssi-average
rssi-half-life
Note
expiry
Note
client
calibrating-client
tags
rogue-aps
OL-31334-01
config Commands
Command Default
Command History
Examples
seconds
Time value (0, 1, 2, 5, 10, 20, 30, 60, 90, 120, 180, 300 seconds).
notify-threshold
Note
threshold
Threshold parameter. The range is 0 to 10 dB, and the default value is 0 dB.
interface-mapping
wlan_id
interface_name
plm
Specifies the path loss measurement (S60) request for normal clients or calibrating
clients.
client
burst_interval
Burst interval. The range is from 1 to 3600 seconds, and the default value is 60
seconds.
calibrating
uniband
multiband
See the Syntax Description section for default values of individual arguments and keywords.
Release
Modification
7.6
The following example shows how to specify the simple algorithm for averaging RSSI and SNR values on a
location-based controller:
(Cisco Controller) > config location algorithm simple
Related Commands
269
config Commands
Syntax Description
security_level
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to set the controller buffer severity level for logging messages to 4:
(Cisco Controller) > config logging buffered 4
Related Commands
OL-31334-01
config Commands
Syntax Description
security_level
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to set the controller console severity level for logging messages to 3:
(Cisco Controller) > config logging console 3
Related Commands
271
config Commands
Syntax Description
Command Default
Command History
Examples
buffered
console
syslog
enable
disable
The console command is enabled and the buffered and syslog commands are disabled by default.
Release
Modification
7.6
The following example shows how to save the debug messages to the controller console:
(Cisco Controller) > config logging debug console enable
Related Commands
show logging
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Prevents the controller from displaying information about the source file in the
message logs.
None
Release
Modification
7.6
The following example shows how to enable the controller to include information about the source file in the
message logs:
(Cisco Controller) > config logging fileinfo enable
Related Commands
show logging
273
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Prevents the controller from displaying process information in the message logs.
None
Release
Modification
7.6
The following example shows how to enable the controller to include the process information in the message
logs:
(Cisco Controller) > config logging procinfo enable
Related Commands
show logging
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to disable the controller to include the traceback information in the message
logs:
(Cisco Controller) > config logging traceinfo disable
Related Commands
show logging
275
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
ip_addr
None
Release
Modification
7.6
8.0
To configure a remote host for sending syslog messages, use the config logging syslog host ip_addr
command.
To remove a remote host that was configured for sending syslog messages, use the config logging syslog
host ip_addr delete command.
To display the configured syslog servers on the controller, use the show logging command.
Examples
The following example shows how to configure two remote hosts 10.92.125.52 and 2001:9:6:40::623 for
sending the syslog messages and displaying the configured syslog servers on the controller:
(Cisco Controller) > config logging syslog host 10.92.125.52
System logs will be sent to 10.92.125.52 from now on
(Cisco Controller) > config logging syslog host 2001:9:6:40::623
System logs will be sent to 2001:9:6:40::623 from now on
(Cisco Controller) > show logging
Logging to buffer :
- Logging of system messages to buffer :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to buffer ...........
- Number of debug messages logged...............
- Number of debug messages dropped..............
- Cache of logging .............................
- Cache of logging time(mins) ...................
- Number of over cache time log dropped ........
Logging to console :
- Logging of system messages to console :
- Logging filter level..........................
errors
1316
6892
Disabled
0
0
Disabled
10080
0
disabled
OL-31334-01
config Commands
0
8243
Enabled
0
0
local0
disabled
0
8208
Enabled
0
0
errors
1316
6892
Disabled
0
0
2
Disabled
10.92.125.52
2001:9:6:40::623
Disabled
Disabled
0
0
Enabled
The following example shows how to remove two remote hosts 10.92.125.52 and 2001:9:6:40::623 that were
configured for sending syslog messages and displaying that the configured syslog servers were removed from
the controller:
(Cisco Controller) > config logging syslog host 10.92.125.52 delete
System logs will not be sent to 10.92.125.52 anymore
(Cisco Controller) > config logging syslog host 2001:9:6:40::623 delete
System logs will not be sent to 2001:9:6:40::623 anymore
(Cisco Controller) > show logging
Logging to buffer :
- Logging of system messages to buffer :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to buffer ...........
- Number of debug messages logged...............
- Number of debug messages dropped..............
- Cache of logging .............................
- Cache of logging time(mins) ...................
- Number of over cache time log dropped ........
Logging to console :
- Logging of system messages to console :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to console ..........
- Number of debug messages logged...............
- Number of debug messages dropped..............
Logging to syslog :
- Syslog facility................................
- Logging of system messages to syslog :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to syslog ...........
- Number of debug messages logged...............
errors
1316
6895
Disabled
0
0
Disabled
10080
0
disabled
0
8211
Enabled
0
0
local0
errors
1316
6895
Disabled
0
277
config Commands
0
0
Disabled
Disabled
Disabled
0
0
Enabled
errors
Enabled
Enabled
Date and Time
OL-31334-01
config Commands
Syntax Description
facility_code
279
config Commands
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to set the facility for outgoing syslog messages to authorization:
(Cisco Controller) > config logging syslog facility authorization
Related Commands
OL-31334-01
config Commands
Syntax Description
severity_level
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to set the severity level for syslog messages to 3:
(Cisco Controller) > config logging syslog level 3
Related Commands
281
config Commands
Syntax Description
Command Default
Command History
Examples
session_id
all
None
Release
Modification
7.6
The following example shows how to close all active Telnet sessions:
(Cisco Controller) > config loginsession close all
Related Commands
show loginsession
OL-31334-01
config Commands
config mdns ap
To configure multicast Domain Name System (mDNS) snooping on an access point, use the config mdns ap
command.
config mdns ap {enable {ap_name | all} [vlan vlan_id] | disable {ap_name | all} | vlan {add | delete} vlan
ap_name}
Syntax Description
Command Default
Command History
Usage Guidelines
enable
ap_name
all
vlan
(Optional) Configures the VLAN on which the access point snoops and
forwards the mDNS packets.
vlan_id
VLAN identifier.
disable
add
Adds a VLAN from which the access point snoops and forwards the mDNS
packets to the Cisco Wireless LAN Controller (WLC). You can configure
up to 10 VLANs for an mDNS access point.
delete
Deletes a VLAN from which the access point snoops and forwards the
mDNS packets to the Cisco WLC.
The mDNS-enabled access point snoops the access or native VLANs by default.
Release
Modification
7.5
Enabling mDNS snooping on access points allows the access points to snoop the wired services on VLANs
that are invisible to the Cisco WLC. mDNS snooping is supported only on local-mode and monitor-mode
access points. The access point must be in the access mode or trunk mode. If the access point is in the trunk
mode, you must configure the VLAN on the Cisco WLC on which the access point snoops and forwards the
mDNS packets. You must also configure the native VLAN from the Cisco WLC for the access point to snoop
and send mDNS queries on. The access point also tags the packets with the native VLAN.
Global mDNS snooping overrides mDNS access point snooping.
283
config Commands
Examples
The following example shows how to enable mDNS snooping on an access point and the VLAN on which it
must snoop for mDNS packets:
(Cisco Controller) > config mdns ap enable vlan 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
create
delete
service
add
delete
service -name
profile_name
By default, the controller has an mDNS profile, default-mdns-profile. You cannot delete this default profile.
Release
Modification
7.4
After creating a new profile, you must map the profile to an interface group, an interface, or a WLAN. Clients
receive service advertisements only for the services associated with the profile. The controller gives the highest
priority to the profiles associated to interface groups, followed by the interface profiles, and then the WLAN
profiles. Each client is mapped to a profile based on the order of priority.
By default, the controller has an mDNS profile, default-mdns-profile. You cannot delete this default profile.
Examples
The following example shows how to add the Apple TV mDNS service to the mDNS profile1.
(Cisco Controller) > config mdns profile create profile1 Apple TV
Related Commands
285
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
interval_value
mDNS query interval, in minutes, that you can set. The query interval is the frequency
at which the controller sends periodic queries to all the services defined in the Master
Services database. The range is from 10 to 120.
Release
Modification
7.4
Usage Guidelines
The controller snoops and learns about the mDNS service advertisements only if the service is available in
the Master Services database. mDNS uses the multicast IP address 224.0.0.251 as the destination address and
5353 as UDP destination port.
Examples
The following example shows how to configure the query interval for mDNS services as 20 minutes.
(Cisco Controller) > config mdns query interval 20
Related Commands
287
config Commands
OL-31334-01
config Commands
Syntax Description
create
service_name
Name of the mDNS service, for example, Air Tunes, iTunes Music Sharing,
FTP, Apple File Sharing Protocol (AFP).
service_string
delete
query
enable
disable
origin
Configures the origin of the mDNS service. You can restrict the origin of
the service as wired or wireless.
Wireless
Wired
All
lss
all
priority-mac
Configures the MAC address of a service provider device. This device gets
a priority even if the service provider database is full.
289
config Commands
add
Command Default
Command History
Usage Guidelines
delete
Deletes the MAC address of a service provider device from the priority
list.
priority-mac
MAC address of a service provider device that needs priority. The MAC
address must be unique for each service.
ap-group
Configures the access point group for wired service providers. These service
providers get priority over others. When a client mNDS query originates
from this AP group, the wired entries with priority MAC addresses and
access point groups are listed first in the aggregated response.
ap-group-name
Name of the access point group to which the service provider belongs.
By default, LSS is disabled, but it is enabled for all the discovered services.
Release
Modification
7.4
7.5
This command was modified. The origin, Wireless, Wired, All, lss, priority-mac,
add, delete, ap-group keywords and priority-mac ap-group-name arguments were
added.
In Release 7.5 and later releases, the maximum number of service providers for different controller models
are as follows:
Cisco 5500 Series Controller and Cisco 2500 Series Controller6400
Cisco Wireless Services Module 26400
Cisco 8500 Series Controller and Cisco 7500 Series Controller16000
You cannot change the services with the origin set to Wireless to Wired if LSS is enabled for the service.
Examples
The following example shows how to add the HTTP mDNS service to the Master Services database, configure
the origin as wireless, and enable LSS for the service:
(Cisco Controller) > config mdns service create http _http._tcp.local. origin wireless lss
enable
OL-31334-01
config Commands
The following example shows how to add a priority MAC address of a HTTP service provider device:
(Cisco Controller) >config mdns service priority-mac add 44:03:a7:a3:04:45 http
291
config Commands
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.4
Usage Guidelines
mDNS service discovery provides a way to announce and discover services on the local network. mDNS
perform DNS queries over IP multicast. mDNS supports zero configuration IP networking.
Examples
Related Commands
OL-31334-01
config Commands
293
config Commands
Syntax Description
Command Default
Command History
policy
enable
disable
None
Release
Modification
8.0
Usage Guidelines
Examples
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
create
delete
service-group-name
None
Release
Modification
8.0
295
config Commands
Syntax Description
Command Default
Command History
Examples
device-mac
add
service-group-name
device-name
location type
[AP_LOCATION | AP_NAME |
AP_GROUP]
device-location
None
Release
Modification
8.0
The following example shows how to configure a location type of a service provider device.
(Cisco Controller) >config mdns policy service-group location type [AP_LOCATION | AP_NAME
| AP_GROUP]
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
user-name
service-group-name
user-name
None
Release
Modification
8.0
The following example show how to add user name for a mDNS service group
(Cisco Controller) >config mdns policy service-group user-name add <service-group-name>
<user-role-name>
297
config Commands
Syntax Description
Command Default
Command History
Examples
user-role
service-group-name
user-role-name
None
Release
Modification
8.0
The following example show how to add user role details for a mDNS service group
(Cisco Controller) >config mdns policy service-group user-role add <service-group-name>
<user-role-name>
OL-31334-01
config Commands
Caution
Syntax Description
Command Default
Command History
The config memory monitor commands can be disruptive to your system and should be run only when
you are advised to do so by the Cisco TAC.
enable
disable
Release
Modification
7.6
Usage Guidelines
Be cautious about changing the defaults for the config memory monitor command unless you know what
you are doing, you have detected a problem, or you are collecting troubleshooting information.
Examples
The following example shows how to enable monitoring for memory errors and leaks for a controller:
(Cisco Controller) > config memory monitor errors enable
Related Commands
299
config Commands
Caution
Syntax Description
Command Default
Command History
The config memory monitor commands can be disruptive to your system and should be run only when
you are advised to do so by the Cisco TAC.
low_thresh
Value below which free memory cannot fall without crashing. This value cannot
be set lower than 10000 KB.
high_thresh
Value below which the controller enters auto-leak-analysis mode. See the Usage
Guidelines section.
The default value for low_thresh is 10000 KB; the default value for high_thresh is 30000 KB.
Release
Modification
7.6
Usage Guidelines
Note
Be cautious about changing the defaults for the config memory monitor command unless you know what
you are doing, you have detected a problem, or you are collecting troubleshooting information.
Use this command if you suspect that a memory leak has occurred.
If the free memory is lower than the low_thresh threshold, the system crashes, generating a crash file. The
default value for this parameter is 10000 KB, and you cannot set it below this value.
Set the high_thresh threshold to the current free memory level or higher so that the system enters
auto-leak-analysis mode. After the free memory reaches a level lower than the specified high_thresh threshold,
the process of tracking and freeing memory allocation begins. As a result, the debug memory events enable
command shows all allocations and frees, and the show memory monitor detail command starts to detect
any suspected memory leaks.
OL-31334-01
config Commands
Examples
The following example shows how to set the threshold values for auto-leak-analysis mode to 12000 KB for
the low threshold and 35000 KB for the high threshold:
(Cisco Controller) > config memory monitor leaks 12000 35000
Related Commands
301
config Commands
Syntax Description
Command Default
Command History
Examples
username
password
read-write
read-only
description
None
Release
Modification
7.6
The following example shows how to create a management user account with read-write access.
(Cisco Controller) > config mgmtuser add admin admin read-write Main account
Related Commands
show mgmtuser
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
username
Release
Modification
7.6
The following example shows how to delete a management user account admin from the controller.
(Cisco Controller) > config mgmtuser delete admin
Deleted user admin
Related Commands
show mgmtuser
303
config Commands
Syntax Description
Command Default
Command History
Examples
username
description
Release
Modification
7.6
The following example shows how to add a description master-user to the management user admin:
(Cisco Controller) > config mgmtuser description admin "master user"
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
username
password
None
Release
Modification
7.6
The following example shows how to change the password of the management user admin with the new
password 5rTfm:
(Cisco Controller) > config mgmtuser password admin 5rTfm
Related Commands
show mgmtuser
305
config Commands
Syntax Description
Command Default
Command History
user_name
enable
Enables a local management user to use Telnet to connect to the Cisco WLC.
You can enter up to 24 alphanumeric characters.
disable
Disables a local management user from using Telnet to connect to the Cisco
WLC.
Local management users can use Telnet to connect to the Cisco WLC.
Release
Modification
7.5
Usage Guidelines
You must enable global Telnet to enable this command. Secure Shell (SSH) connection is not affected when
you enable this option.
Examples
The following example shows how to enable a local management user to use Telnet to connect to the Cisco
WLC:
(Cisco Controller) > config mgmtuser telnet admin1 enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
add
MAC-addr
IP-addr
group_name
delete
hash
key
none
None
Release
Modification
7.6
8.0
The following example shows how to add a mobility group member with an IPv4 address to the list:
(Cisco Controller) >config mobility group member add 11:11:11:11:11:11 209.165.200.225
307
config Commands
The following example shows how to add a mobility group member with an IPv6 address to the list:
(Cisco Controller) >config mobility group member add 11:11:11:11:11:11 2001:DB8::1
The following example shows how to configure the hash key of a virtual controller in the same domain:
Note
OL-31334-01
config Commands
Syntax Description
username
password
wlan
Specifies the wireless LAN identifier to associate with or zero for any wireless
LAN.
wlan_id
Wireless LAN identifier assigned to the user. A zero value associates the user
with any wireless LAN.
guestlan
Specifies the guest LAN identifier to associate with or zero for any wireless
LAN.
guestlan_id
userType
guest
lifetime
lifetime
description
Command Default
Command History
Usage Guidelines
None
Release
Modification
7.6
Local network usernames must be unique because they are stored in the same database.
309
config Commands
Examples
The following example shows how to add a permanent username Jane to the wireless network for 1 hour:
(Cisco Controller) > config netuser add jane able2 1 wlan_id 1 userType permanent
The following example shows how to add a guest username George to the wireless network for 1 hour:
(Cisco Controller) > config netuser add george able1 guestlan 1 3600
Related Commands
show netuser
config netuser delete
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
username
wlan-id
None
Release
Modification
7.6
Local network usernames must be unique because they are stored in the same database.
When a WLAN associated with network users is deleted, the system prompts to delete all network users
associated with the WLAN first. After deleting the network users, you can delete the WLAN.
The following example shows how to delete an existing username named able1 from the network:
(Cisco Controller) > config netuser delete able1
Deleted user able1
Related Commands
show netuser
311
config Commands
Syntax Description
Command Default
Command History
Examples
username
description
None
Release
Modification
7.6
The following example shows how to add a user description HQ1 Contact to an existing network user named
able 1:
(Cisco Controller) > config netuser description able1 HQ1 Contact
Related Commands
show netuser
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
username
lan_id
Wired guest LAN identifier to associate with the user. A zero value associates
the user with any wired LAN.
None
Release
Modification
7.6
The following example shows how to configure a wired LAN ID 2 to associate with the user named aire1:
(Cisco Controller) > config netuser guest- lan-id aire1 2
Related Commands
show netuser
show wlan summary
313
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
username
role_name
None
Release
Modification
7.6
If you do not assign a QoS role to a guest user, the Role field in the User Details shows the role as default.
The bandwidth contracts for this user are defined in the QoS profile for the WLAN.
If you want to unassign a QoS role from a guest user, use the config netuser guest-role apply username
default. This user now uses the bandwidth contracts defined in the QoS profile for the WLAN.
Examples
The following example shows how to apply a QoS role to a guest user jsmith with the QoS guest role named
Contractor:
(Cisco Controller) > config netuser guest-role apply jsmith Contractor
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
role name
None
Release
Modification
7.6
Usage Guidelines
To delete a QoS role, use the config netuser guest-role delete role-name .
Examples
The following example shows how to create a QoS role for the guest user named guestuser1:
(Cisco Controller) > config netuser guest-role create guestuser1
Related Commands
315
config Commands
Syntax Description
Command Default
Command History
Examples
role name
None
Release
Modification
7.6
The following example shows how to delete a quality of service (QoS) role for guestuser1:
(Cisco Controller) > config netuser guest-role delete guestuser1
Related Commands
OL-31334-01
config Commands
Syntax Description
role_name
rate
Command Default
None
Usage Guidelines
For the role_name parameter in each of these commands, enter a name for the new QoS role. The name
uniquely identifies the role of the QoS user (such as contractor, vendor, and so on.). For the rate parameter,
you can enter a value between 0 and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction
on the QoS role.
Examples
The following example shows how to configure an average rate for the QoS guest named guestuser1:
(Cisco Controller) > config netuser guest-role qos data-rate average-data-rate guestuser1
0
Related Commands
317
config Commands
Syntax Description
role_name
rate
Command Default
None
Usage Guidelines
For the role_name parameter in each of these commands, enter a name for the new QoS role. The name
uniquely identifies the role of the QoS user (such as contractor, vendor, and so on.). For the rate parameter,
you can enter a value between 0 and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction
on the QoS role.
Examples
The following example shows how to configure an average data rate for the QoS guest user named guestuser1
with the rate for TCP traffic of 0 Kbps:
(Cisco Controller) > config netuser guest-role qos data-rate average-realtime-rate guestuser1
0
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
role_name
rate
None
Release
Modification
7.6
The burst data rate should be greater than or equal to the average data rate. Otherwise, the QoS policy may
block traffic to and from the wireless client.
For the role_name parameter in each of these commands, enter a name for the new QoS role. The name
uniquely identifies the role of the QoS user (such as contractor, vendor, and so on.). For the rate parameter,
you can enter a value between 0 and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction
on the QoS role.
Examples
The following example shows how to configure the peak data rate for the QoS guest named guestuser1 with
the rate for TCP traffic of 0 Kbps:
(Cisco Controller) > config netuser guest-role qos data-rate burst-data-rate guestuser1 0
Related Commands
319
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
role_name
rate
None
Release
Modification
7.6
The burst real-time rate should be greater than or equal to the average real-time rate. Otherwise, the quality
of service (QoS) policy may block traffic to and from the wireless client.
For the role_name parameter in each of these commands, enter a name for the new QoS role. The name
uniquely identifies the role of the QoS user (such as contractor, vendor, and so on.). For the rate parameter,
you can enter a value between 0 and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction
on the QoS role.
Examples
The following example shows how to configure a burst real-time rate for the QoS guest user named guestuser1
with the rate for TCP traffic of 0 Kbps:
(Cisco Controller) > config netuser guest-role qos data-rate burst-realtime-rate guestuser1
0
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
username
time
None
Release
Modification
7.6
The following example shows how to configure lifetime for a guest network user:
(Cisco Controller) > config netuser lifetime guestuser1 22450
Related Commands
show netuser
show wlan summary
321
config Commands
Syntax Description
Command Default
Command History
Examples
count
Maximum number of login sessions for a single user. The allowed values are
from 0 (unlimited) to 8.
By default, the maximum number of login sessions for a single user is 0 (unlimited).
Release
Modification
7.6
The following example shows how to configure the maximum number of login sessions for a single user to
8:
(Cisco Controller) > config netuser maxUserLogin 8
Related Commands
show netuser
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
username
password
None
Release
Modification
7.6
The following example shows how to change the network user password from aire1 to aire2:
(Cisco Controller) > config netuser password aire1 aire2
Related Commands
show netuser
323
config Commands
Syntax Description
Command Default
Command History
Examples
username
wlan_id
Wireless LAN identifier to associate with the user. A zero value associates the
user with any wireless LAN.
None
Release
Modification
7.6
The following example shows how to configure a wireless LAN ID 2 to associate with the user named aire1:
(Cisco Controller) > config netuser wlan-id aire1 2
Related Commands
show netuser
show wlan summary
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
Release
Modification
7.6
In controller software release 5.2, the software-based forwarding architecture for Cisco 2100 Series Controllers
is being replaced with a new forwarding plane architecture. As a result, Cisco 2100 Series Controllers and
the Cisco wireless LAN controller Network Module for Cisco Integrated Services Routers bridge 802.3 packets
by default. Therefore, 802.3 bridging can now be disabled only on Cisco 4400 Series Controllers, the Cisco
WiSM, and the Catalyst 3750G Wireless LAN Controller Switch.
To determine the status of 802.3 bridging, enter the show netuser guest-roles command.
Examples
Related Commands
325
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to configure an old bridge access point to associate with the switch:
> config network allow-old-bridge-aps enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
Release
Modification
7.6
If the config interface nat-address management command is set, this command controls which address(es)
are sent in the CAPWAP discovery responses.
If all APs are on the outside of the NAT gateway of the controller, enter the config network ap-discovery
nat-ip-only enable command, and only the management NAT address is sent.
If the controller has both APs on the outside and the inside of its NAT gateway, enter the config network
ap-discovery nat-ip-only disable command, and both the management NAT address and the management
inside address are sent. Ensure that you have entered the config ap link-latency disable all command to avoid
stranding APs.
Examples
327
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the Cisco lightweight access point fallback:
> config network ap-fallback enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the lightweight access point priority reauthorization:
> config network ap-priority enable
329
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
Timeout in seconds. The minimum value is 10 seconds. The default value is 300
seconds.
Release
Modification
7.6
This example shows how to set the ARP entry timeout value to 240 seconds:
(Cisco Controller) > config network arptimeout 240
Related Commands
331
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
shared_secret
Release
Modification
7.6
This command creates a secret that encrypts backhaul user data for the mesh access points that connect to the
switch.
The zero-touch configuration must be enabled for this command to work.
Examples
The following example shows how to configure the bridging shared secret string shhh1:
(Cisco Controller) > config network bridging-shared-secret shhh1
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
enable
disable
Release
Modification
7.6
This command allows you to enable or disable broadcasting. You must enable multicast mode before enabling
broadcast forwarding. Use the config network multicast mode command to configure multicast mode on
the controller.
The default multicast mode is unicast in case of all controllers except for Cisco 2106 Controllers. The
broadcast packets and multicast packets can be independently controlled. If multicast is off and broadcast
is on, broadcast packets still reach the access points, based on the configured multicast mode.
Related Commands
333
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
None
Release
Modification
7.6
When you enable the Fast SSID Change feature, the controller allows clients to move between SSIDs. When
the client sends a new association for a different SSID, the client entry in the controller connection table is
cleared before the client is added to the new SSID.
When you disable the FastSSID Change feature, the controller enforces a delay before clients are allowed to
move to a new SSID.
Examples
The following example shows how to enable the fast SSID changing for mobile stations:
(Cisco Controller) > config network fast-ssid-change enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
enable
Enables the validation of the source IP address to MAC address binding in clients
packets.
disable
Disables the validation of the source IP address to MAC address binding in clients
packets.
The validation of the source IP address to MAC address binding in clients packets is enabled by default.
Release
Modification
7.6
In controller software release 5.2, the controller enforces strict IP address-to-MAC address binding in client
packets. The controller checks the IP address and MAC address in a packet, compares them to the addresses
that are registered with the controller, and forwards the packet only if they both match. In previous releases,
the controller checks only the MAC address of the client and ignores the IP address.
You might want to disable this binding check if you have a routed network behind a workgroup bridge
(WGB).
The following example shows how to validate the source IP and MAC address within client packets:
(Cisco Controller) > config network ip-mac-binding enable
335
config Commands
Syntax Description
enable
disable
Command Default
Disabled
Command History
Release
Modification
8.0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
Enables the Cisco wireless LAN controller acting as a Cisco lightweight access
point default master.
disable
Disables the Cisco wireless LAN controller acting as a Cisco lightweight access
point default master.
None
Release
Modification
7.6
Usage Guidelines
This setting is only used upon network installation and should be disabled after the initial network configuration.
Because the Master Cisco wireless LAN controller is normally not used in a deployed network, the Master
Cisco wireless LAN controller setting can be saved from 6.0.199.0 or later releases.
Examples
The following example shows how to enable the Cisco wireless LAN controller as a default master:
(Cisco Controller) > config network master-base enable
337
config Commands
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.6
Usage Guidelines
This feature allows wireless clients to manage only the Cisco wireless LAN controller associated with the
client and the associated Cisco lightweight access point. That is, clients cannot manage another Cisco wireless
LAN controller with which they are not associated.
Examples
This example shows how to configure switch management from a wireless interface:
(Cisco Controller) > config network mgmt-via-wireless enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.6
Usage Guidelines
The config network broadcast {enable | disable} command allows you to enable or disable broadcasting
without enabling or disabling multicasting as well. This command uses the multicast mode configured on the
controller (by using the config network multicast mode command) to operate.
Examples
The following example shows how to enable the global multicast support:
(Cisco Controller) > config network multicast global enable
Related Commands
339
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
value
Frequency at which controller sends IGMP query messages. The range is from
15 to 2400 seconds.
Release
Modification
7.6
Examples
The following example shows how to configure the IGMP query interval at 20 seconds:
(Cisco Controller) > config network multicast igmp query interval 20
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable internet IGMP snooping settings:
(Cisco Controller) > config network multicast igmp snooping enable
Related Commands
341
config Commands
Syntax Description
Command Default
Command History
value
None
Release
Modification
7.6
Usage Guidelines
You can enter a timeout value between 30 and 7200 seconds. The controller sends three queries in one timeout
value at an interval of timeout/3 to see if any clients exist for a particular multicast group. If the controller
does not receive a response through an IGMP report from the client, the controller times out the client entry
from the MGID table. When no clients are left for a particular multicast group, the controller waits for the
IGMP timeout value to expire and then deletes the MGID entry from the controller. The controller always
generates a general IGMP query (to destination address 224.0.0.1) and sends it on all WLANs with an MGID
value of 1.
Examples
The following example shows how to configure the timeout value 50 for IGMP network settings:
(Cisco Controller) > config network multicast igmp timeout 50
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
all
interface-name
None
Release
Modification
7.6
The following example shows how to enable Layer 2 multicast for all interfaces:
(Cisco Controller) > config network multicast l2mcast enable all
Related Commands
343
config Commands
Syntax Description
Command Default
Command History
Examples
query interval
interval-value
snooping
enable
disable
timeout
timeout-value
None
Release
Modification
7.6
The following example shows how to set a query interval of 20 seconds for MLD query messages:
(Cisco Controller) > config network multicast mld query interval 20
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the multicast mode to send a single copy of data to multiple
receivers:
(Cisco Controller) > config network multicast mode multicast
Related Commands
345
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the controller to use the unicast mode:
(Cisco Controller) > config network multicast mode unicast
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables Ethernet port 3 of Cisco OfficeExtend 600 Series access points to operate
as a remote LAN port in addition to port 4.
disable
Resets the Ethernet port 3 Cisco OfficeExtend 600 Series access points to function
as a local LAN port.
Release
Modification
7.6
The following example shows how to enable the Ethernet port 3 of Cisco OfficeExtend 600 Series access
points to operate as a remote LAN port:
> config network oeap-600 dual-rlan-ports enable
347
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables access to the local network for the Cisco 600 Series OfficeExtend access
points.
disable
Disables access to the local network for the Cisco 600 Series OfficeExtend access
points.
Access to the local network for the Cisco 600 Series OEAPs is disabled.
Release
Modification
7.6
The following example shows how to enable access to the local network for the Cisco 600 Series OfficeExtend
access points:
> config network oeap-600 local-network enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
349
config Commands
Syntax Description
Command Default
Command History
Examples
name
None
Release
Modification
7.6
The following example shows how to set the RF-network name to travelers:
(Cisco Controller) > config network rf-network-name travelers
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.6
Usage Guidelines
This command allows management users to access the controller GUI using an http://ip-address. Web mode
is not a secure connection.
Examples
The following example shows how to enable the secure web interface settings for management users:
(Cisco Controller) > config network secureweb enable
You must reboot for the change to take effect.
Related Commands
351
config Commands
Syntax Description
Command Default
Command History
high
sslv2
rc4-preference
enable
disable
The default is disable for secure web mode with increased security and enable for SSL v2.
Release
Modification
7.6
Usage Guidelines
Note
The config network secureweb cipher-option command allows users to access the controller GUI using
an http://ip-address but only from browsers that support 128-bit (or larger) ciphers.
When cipher-option sslv2 is disabled, users cannot connect using a browser configured with SSLv2 only.
They must use a browser that is configured to use a more secure protocol such as SSLv3 or later.
In RC4-SHA based cipher suites, RC4 is used for encryption and SHA is used for message authentication.
Examples
The following example shows how to enable secure web mode with increased security:
(Cisco Controller) > config network secureweb cipher-option
OL-31334-01
config Commands
Related Commands
353
config Commands
Syntax Description
enable
disable
Command Default
Examples
The following example shows how to enable the new SSH session:
(Cisco Controller) > config network ssh enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
By default, the new Telnet session is disallowed and the value is disable.
Release
Modification
7.6
The following example shows how to configure the new Telnet sessions:
(Cisco Controller) > config network telnet enable
Related Commands
config ap telnet
show network summary
355
config Commands
Syntax Description
seconds
Command Default
The default timeout value for idle client session is 300 seconds.
Usage Guidelines
Use this command to set the idle client session duration on the Cisco wireless LAN controller. The minimum
duration is 90 seconds.
Examples
The following example shows how to configure the idle session timeout to 1200 seconds:
(Cisco Controller) > config network usertimeout 1200
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
Command Default
None
Examples
The following example shows how to configure the controller to support bypass of captive portals:
(Cisco Controller) > config network web-auth captive-bypass enable
Related Commands
357
config Commands
Syntax Description
enable
disable
Command Default
None
Examples
Related Commands
OL-31334-01
config Commands
Syntax Description
port
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure an additional port number 1200 to be redirected for web
authentication:
(Cisco Controller) > config network web-auth port 1200
Related Commands
359
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable proxy redirect support for web authentication clients:
(Cisco Controller) > config network web-auth proxy-redirect enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.6
Usage Guidelines
Note
Examples
If you configure the secure web (https) authentication for clients using the config network web-auth
secureweb disable command, then you must reboot the Cisco WLC to implement the change.
The following example shows how to enable the secure web (https) authentication for clients:
(Cisco Controller) > config network web-auth secureweb enable
Related Commands
361
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
8.0
The following example shows how to enable proxy redirect support for web authentication clients:
(Cisco Controller) > config network web-auth https-redirect enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
default
Specifies the default web color theme for the controller GUI.
red
Specifies the web color theme as red for the controller GUI.
Default
Release
Modification
8.0
Usage Guidelines
If you are changing the web color theme from the controller CLI, you need to reload the controller GUI to
apply your changes.
Examples
The following example shows how to configure the web interface color as red for the controller GUI:
(Cisco Controller) > config network webcolor red
363
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable the web interface mode:
(Cisco Controller) > config network webmode disable
Related Commands
OL-31334-01
config Commands
Syntax Description
port
port-number
proxy-redirect
enable
disable
Command Default
Command History
Release
Modification
7.6
Usage Guidelines
You must reset the system for the configuration to take effect.
Examples
The following example shows how to enable proxy redirect support for web authentication clients:
(Cisco Controller) > config network web-auth proxy-redirect enable
Related Commands
365
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the bridge access point ZeroConfig support:
> config network zero-config enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
client
rfid
Modifies the interval for active radio frequency identification (RFID) tags.
rogue
Modifies the interval for rogue access points and rogue clients.
interval
None
Release
Modification
7.6
Usage Guidelines
The TCP port (16113) that the controller and location appliance communicate over must be open (not blocked)
on any firewall that exists between the controller and the location appliance for NMSP to function.
Examples
The following example shows how to modify the NMSP notification interval for the active RFID tags to 25
seconds:
(Cisco Controller) > config nmsp notify-interval measurement rfid 25
Related Commands
367
config Commands
config paging
To enable or disable scrolling of the page, use the config paging command.
config paging {enable | disable}
Syntax Description
enable
disable
Command Default
Usage Guidelines
Commands that produce a huge number of lines of output with the scrolling of the page disabled might result
in the termination of SSH/Telnet connection or user session on the console.
Examples
Related Commands
show run-config
OL-31334-01
config Commands
config passwd-cleartext
To enable or disable temporary display of passwords in plain text, use the config passwd-cleartext command.
config passwd-cleartext {enable | disable}
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
Release
Modification
7.6
This command must be enabled if you want to see user-assigned passwords displayed in clear text when using
the show run-config command.
To execute this command, you must enter an admin password. This command is valid only for this particular
session. It is not saved following a reboot.
Examples
The following example shows how to enable display of passwords in plain text:
(Cisco Controller) > config passwd-cleartext enable
The way you see your passwds will be changed
You are being warned.
Enter admin password:
Related Commands
show run-config
369
config Commands
config prompt
To change the CLI system prompt, use the config prompt command.
config prompt prompt
Syntax Description
Command Default
Command History
prompt
New CLI system prompt enclosed in double quotes. The prompt can be up to 31 alphanumeric
characters and is case sensitive.
Release
Modification
7.6
Usage Guidelines
Because the system prompt is a user-defined variable, it is omitted from the rest of this documentation.
Examples
The following example shows how to change the CLI system prompt to Cisco 4400:
(Cisco Controller) > config prompt Cisco 4400
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
gold
platinum
per-ssid
Configures the rate limit for an SSID per radio. The combined traffic
of all clients will not exceed this limit.
per-client
Configures the rate limit for each client associated with the SSID.
downstream
upstream
rate
Average data rate for TCP traffic per user. A value between 0 and
51,2000 Kbps (inclusive). A value of 0 imposes no bandwidth
restriction on the QoS profile.
None
Release
Modification
7.6
The following example shows how to configure the average data rate 0 Kbps for the queue gold per SSID:
(Cisco Controller) > config qos average-data-rate gold per ssid downstream 0
Related Commands
371
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
Specifies the average real-time data rate for the queue bronze.
silver
Specifies the average real-time data rate for the queue silver.
gold
Specifies the average real-time data rate for the queue gold.
platinum
Specifies the average real-time data rate for the queue platinum.
per-ssid
Configures the rate limit for an SSID per radio. The combined traffic of all
clients will not exceed this limit.
per-client
Configures the rate limit for each client associated with the SSID.
downstream
upstream
rate
Average real-time data rate for UDP traffic per user. A value between 0 and
51,2000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction on
the QoS profile.
None
Release
Modification
7.6
The following example shows how to configure the average real-time actual rate for queue gold:
(Cisco Controller) > config qos average-realtime-rate gold per ssid downstream 10
Related Commands
373
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
gold
platinum
per-ssid
Configures the rate limit for an SSID per radio. The combined traffic
of all clients will not exceed this limit.
per-client
Configures the rate limit for each client associated with the SSID.
downstream
upstream
rate
Peak data rate for TCP traffic per user. A value between 0 and
51,2000 Kbps (inclusive). A value of 0 imposes no bandwidth
restriction on the QoS profile.
None
Release
Modification
7.6
The following example shows how to configure the peak rate 30000 Kbps for the queue gold:
(Cisco Controller) > config qos burst-data-rate gold per ssid downstream 30000
Related Commands
375
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
Specifies the burst real-time data rate for the queue silver.
gold
Specifies the burst real-time data rate for the queue gold.
platinum
per-ssid
per-client
downstream
upstream
rate
Burst real-time data rate for UDP traffic per user. A value
between 0 and 51,2000 Kbps (inclusive). A value of 0
imposes no bandwidth restriction on the QoS profile.
None
Release
Modification
7.6
The following example shows how to configure the burst real-time actual rate 2000 Kbps for the queue gold:
(Cisco Controller) > config qos burst-realtime-rate gold per ssid downstream
Related Commands
2000
377
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
gold
platinum
description
None
Release
Modification
7.6
The following example shows how to configure the QoS profile description description for the queue gold:
(Cisco Controller) > config qos description gold abc
Related Commands
379
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
gold
platinum
usage-percentage
None
Release
Modification
7.6
The following example shows how to specify the maximum percentage of RF usage for the queue gold:
(Cisco Controller) > config qos max-rf-usage gold 20
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
gold
platinum
dot1p_tag
None
Release
Modification
7.6
The following example shows how to configure the a QoS 802.1p tag for the queue gold with the dot1p tag
value of 5:
(Cisco Controller) > config qos dot1p-tag gold 5
Related Commands
381
config Commands
Syntax Description
bronze
silver
gold
platinum
maximum-priority
default-unicast-priority
default-multicast-priority
Command History
Release
Modification
7.6
OL-31334-01
config Commands
Usage Guidelines
The maximum priority level should not be lower than the default unicast and multicast priority levels.
Examples
The following example shows how to configure the QoS priority for a gold profile of the WLAN with voice
as the maximum priority, video as the default unicast priority, and besteffort as the default multicast priority.
(Cisco Controller) > config qos priority gold voice video besteffort
Related Commands
383
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
gold
platinum
none
dot1p
None
Release
Modification
7.6
The following example shows how to configure the QoS protocol type silver:
(Cisco Controller) > config qos protocol-type silver dot1p
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
bronze
silver
gold
platinum
queue_length
None
Release
Modification
7.6
The following example shows how to configure the QoS length for the queue gold with the maximum queue
length value as 12:
(Cisco Controller) > config qos queue_length gold 12
Related Commands
show qos
385
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable an automatic timeout of RFID tags:
(Cisco Controller) > config rfid auto-timeout enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to configure RFID tag tracking settings:
(Cisco Controller) > config rfid status enable
Related Commands
387
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
None
Release
Modification
7.6
The following example shows how to configure a static RFID tag data timeout of 60 seconds:
(Cisco Controller) > config rfid timeout 60
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
debug
log
datetime
disable
Release
Modification
7.6
The following example shows how to configure time-stamp message logs with the standard date and time:
(Cisco Controller) > config service timestamps log datetime
The following example shows how to prevent message logs being time-stamped:
(Cisco Controller) > config service timestamps debug disable
Related Commands
show logging
389
config Commands
Syntax Description
Command Default
Command History
session_num
The default number of Telnet CLI sessions allowed by the Cisco WLC is 5.
Release
Modification
7.6
Usage Guidelines
Up to five sessions are possible while a setting of zero prohibits any Telnet CLI sessions.
Examples
The following example shows how to configure the number of allowed CLI sessions to 2:
(Cisco Controller) > config sessions maxsessions 2
Related Commands
show sessions
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
timeout
Release
Modification
7.6
The following example shows how to configure the inactivity timeout for Telnet sessions to 20 minutes:
(Cisco Controller) > config sessions timeout 20
Related Commands
show sessions
391
config Commands
Syntax Description
enable
Enables the breaking into boot prompt by pressing the Esc key at system startup.
disable
Disables the breaking into boot prompt by pressing the Esc key at system startup.
Command Default
By default, the breaking into boot prompt by pressing the Esc key at system startup is disabled.
Usage Guidelines
You must enable the features that are prerequisites for the Federal Information Processing Standard (FIPS)
mode before enabling or disabling the breaking into boot prompt.
Examples
The following example shows how to enable the breaking into boot prompt by pressing the Esc key at system
startup:
(Cisco Controller) > config switchconfig boot-break enable
Related Commands
show switchconfig
config switchconfig flowcontrol
config switchconfig mode
config switchconfig secret-obfuscation
config switchconfig fips-prerequisite
config switchconfig strong-pwd
OL-31334-01
config Commands
Syntax Description
enable
Enables the features that are prerequisites for the FIPS mode.
disable
Disables the features that are prerequisites for the FIPS mode.
Command Default
By default, the features that are prerequisites for the FIPS mode are disabled.
Usage Guidelines
You must configure the FIPS authorization secret before you can enable or disable the FIPS prerequisite
features.
Examples
The following example shows how to enable the features that are prerequisites for the FIPS mode:
(Cisco Controller) > config switchconfig fips-prerequisite enable
Related Commands
show switchconfig
config switchconfig flowcontrol
config switchconfig mode
config switchconfig secret-obfuscation
config switchconfig boot-break
config switchconfig strong-pwd
393
config Commands
Syntax Description
case-check
consecutive-check
default-check
username-check
position-check
case-digit-check
minimum
upper-case
lower-case
digits
special-chars
min-length
password_length
OL-31334-01
config Commands
Command Default
Command History
lockout
mgmtuser
snmpv3user
time
attempts
lifetime
mgmtuser
snmpv3user
lifetime
all-checks
enable
disable
None
Release
Modification
7.6
395
config Commands
Examples
The following example shows how to enable the Strong Password Check feature:
(Cisco Controller) > config switchconfig strong-pwd case-check enable
Related Commands
show switchconfig
config switchconfig flowcontrol
config switchconfig mode
config switchconfig secret-obfuscation
config switchconfig fips-prerequisite
config switchconfig boot-break
OL-31334-01
config Commands
Syntax Description
enable
disable
Command Default
Examples
The following example shows how to enable 802.3x flow control on Cisco wireless LAN controller parameters:
(Cisco Controller) > config switchconfig flowcontrol enable
Related Commands
show switchconfig
397
config Commands
Syntax Description
Command Default
Command History
Examples
L2
L3
Release
Modification
7.6
The following example shows how to configure LWAPP transport mode to Layer 3:
(Cisco Controller) > config switchconfig mode L3
Related Commands
show switchconfig
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
Secrets and user passwords are obfuscated in the exported XML configuration file.
Release
Modification
7.6
Usage Guidelines
To keep the secret contents of your configuration file secure, do not disable secret obfuscation. To further
enhance the security of the configuration file, enable configuration file encryption.
Examples
Related Commands
show switchconfig
399
config Commands
config sysname
To set the Cisco wireless LAN controller system name, use the config sysname command.
config sysname name
Syntax Description
Command Default
Command History
Examples
name
None
Release
Modification
7.6
The following example shows how to configure the system named Ent_01:
(Cisco Controller) > config sysname Ent_01
Related Commands
show sysinfo
OL-31334-01
config Commands
Syntax Description
Command Default
ro
rw
name
Command History
Examples
Client IP Address
----------------0.0.0.0
0.0.0.0
Client IP Mask
---------------0.0.0.0
0.0.0.0
Access Mode
----------Read Only
Read/Write
Status
-----Enable
Enable
Release
Modification
7.6
The following example shows how to configure read/write access mode for SNMP community:
(Cisco Controller) > config snmp community accessmode rw private
Related Commands
401
config Commands
Syntax Description
Command Default
Command History
name
None
Release
Modification
7.6
Usage Guidelines
Use this command to create a new community with the default configuration.
Examples
The following example shows how to create a new SNMP community named test:
(Cisco Controller) > config snmp community create test
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
name
None
Release
Modification
7.6
The following example shows how to delete an SNMP community named test:
(Cisco Controller) > config snmp community delete test
Related Commands
403
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
IP addr
SNMP community IP mask (IPv4 mask or IPv6 Prefix length). The IPv6 prefix
length is from 0 to 128.
name
None
Release
Modification
7.6
8.0
Examples
The following example shows how to configure an SNMP community with the IPv4 address 10.10.10.10,
IPv4 mask 255.255.255.0, and SNMP community named comaccess:
(Cisco Controller) > config snmp community ipaddr 10.10.10.10 255.255.255.0 comaccess
The following example shows how to configure an SNMP community with the IPv6 address 2001:9:2:16::1,
IPv6 prefix length 64, and SNMP community named comaccess:
(Cisco Controller) > config snmp community ipaddr 2001:9:2:16::1 64 comaccess
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
name
None
Release
Modification
7.6
The following example shows how to enable the SNMP community named public:
(Cisco Controller) > config snmp community mode disable public
Related Commands
405
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
engine_id
default
None
Release
Modification
7.6
The SNMP engine ID is a unique string used to identify the device for administration purposes. You do need
to specify an engine ID for the device because a default string is automatically generated using Ciscos
enterprise number and the MAC address of the first interface on the device.
If you change the engine ID, then a reboot is required for the change to take effect.
Caution If you change the value of the SNMP engine ID, then the password of the user entered on the command
line is converted to an MD5 (Message-Digest algorithm 5) or SHA (Secure Hash Algorithm) security digest.
This digest is based on both the password and the local engine ID. The command line password is then deleted.
Because of this deletion, if the local value of the engine ID changes, the security digests of the SNMP users
will become invalid, and the users will have to be reconfigured.
Examples
The following example shows how to configure the SNMP engine ID with the value fffffffffff:
(Cisco Controller) > config snmp engineID fffffffffff
Related Commands
show snmpengineID
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
contact
None
Release
Modification
7.6
The following example shows how to set the SMNP system contact named Cisco WLAN
Solution_administrator:
(Cisco Controller) > config snmp syscontact Cisco WLAN Solution_administrator
Related Commands
show snmpcommunity
407
config Commands
Syntax Description
Command Default
Command History
Examples
location
None
Release
Modification
7.6
The following example shows how to configure the SNMP system location name to Building_2a:
(Cisco Controller) > config snmp syslocation Building_2a
Related Commands
show snmpcommunity
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
name
IP addr
None
Release
Modification
7.6
8.0
Usage Guidelines
The IPv4 or IPv6 address must be valid for the command to add the new server.
Examples
The following example shows how to add a new SNMP trap receiver with the SNMP trap receiver named
test and IP address 10.1.1.1:
(Cisco Controller) > config snmp trapreceiver create test 10.1.1.1
The following example shows how to add a new SNMP trap receiver with the SNMP trap receiver named
test and IP address 2001:10:1:1::1:
(Cisco Controller) > config snmp trapreceiver create test 2001:10:1:1::1
409
config Commands
Syntax Description
Command Default
Command History
Examples
name
None
Release
Modification
7.6
The following example shows how to delete a server named test from the SNMP trap receiver list:
(Cisco Controller) > config snmp trapreceiver delete test
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
name
None
Release
Modification
7.6
Usage Guidelines
This command enables or disables the Cisco wireless LAN controller from sending the traps to the selected
server.
Examples
The following example shows how to disable an SNMP trap receiver from sending traps to a server named
server1:
(Cisco Controller) > config snmp trapreceiver mode disable server1
Related Commands
411
config Commands
Syntax Description
Command Default
username
ro
rw
none
hmacmd5
hmacsha
none
des
aescfb128
auth_key
encrypt_key
OL-31334-01
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to add an SNMP username named test with read-only privileges and no
encryption or authentication:
(Cisco Controller) > config snmp v3user create test ro none none
Related Commands
show snmpv3user
413
config Commands
Syntax Description
Command Default
Command History
Examples
username
Username to delete.
None
Release
Modification
7.6
The following example shows how to remove an SNMP user named test:
(Cisco Controller) > config snmp v3user delete test
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
v1
v2
v3
enable
disable
Release
Modification
7.6
Related Commands
show snmpversion
415
config Commands
Syntax Description
Command Default
Command History
Examples
MM/DD/YY
Date.
HH:MM:SS
Time.
None
Release
Modification
7.6
The following example shows how to configure the system date to 04/04/2010 and time to 15:29:00:
(Cisco Controller) > config time manual 04/04/2010 15:29:00
Related Commands
show time
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
auth
enable
server-index
key-index
disable
interval
interval
NTP polling interval in seconds. The range is from 3600 and 604800 seconds.
key-auth
add
md5
ascii
hex
key
delete
server
IP Address
None
Release
Modification
7.6
417
config Commands
Usage Guidelines
Release
Modification
8.0
To add the NTP server to the controller, use the config time ntp server index IP Address command.
To delete the NTP server (IPv4) from the controller, use the config time ntp serverindex 0.0.0.0
command.
To delete the NTP server (IPv6) from the controller, use the config time ntp serverindex :: command.
To display configured NTP server on the controller, use the show time command.
Examples
The following example shows how to configure the NTP polling interval to 7000 seconds:
(Cisco Controller) > config time ntp interval 7000
The following example shows how to enable NTP authentication where the server index is 4 and the key index
is 1:
(Cisco Controller) > config time ntp auth enable 4 1
The following example shows how to add an NTP authentication key of value ff where the key format is in
hexadecimal characters and the key index is 1:
(Cisco Controller) > config time ntp key-auth add 1 md5 hex ff
The following example shows how to add an NTP authentication key of value ff where the key format is in
ASCII characters and the key index is 1:
(Cisco Controller) > config time ntp key-auth add 1 md5 ascii ciscokey
The following example shows how to add NTP servers and display the servers configured to controllers:
(Cisco Controller) > config time ntp server 1 10.92.125.52
(Cisco Controller) > config time ntp server 2 2001:9:6:40::623
(Cisco Controller) > show time
Time............................................. Fri May 23 12:04:18 2014
Timezone delta................................... 0:0
Timezone location................................ (GMT +5:30) Colombo, New Delhi, Chennai,
Kolkata
NTP Servers
NTP Polling Interval......................... 3600
Index NTP Key Index NTP Server NTP
Msg Auth Status
------- -------------------------------------------------1
1
10.92.125.52
AUTH SUCCESS
2
1
2001:9:6:40::623
AUTH SUCCESS
The following example shows how to delete NTP servers and verify that the servers are deleted removed from
the NTP server list:
(Cisco Controller) > config time ntp server
(Cisco Controller) > config time ntp server
(Cisco Controller) > show time
1 0.0.0.0
2 ::
OL-31334-01
config Commands
419
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
delta_hours
delta_mins
None
Release
Modification
7.6
The following example shows how to enable the daylight saving time:
(Cisco Controller) > config time timezone enable 2 0
Related Commands
show time
OL-31334-01
config Commands
421
config Commands
Syntax Description
location_index
Number representing the time zone required. The time zones are as follows:
(GMT-12:00) International Date Line West
(GMT-11:00) Samoa
(GMT-10:00) Hawaii
(GMT-9:00) Alaska
(GMT-8:00) Pacific Time (US and Canada)
(GMT-7:00) Mountain Time (US and Canada)
(GMT-6:00) Central Time (US and Canada)
(GMT-5:00) Eastern Time (US and Canada)
(GMT-4:00) Atlantic Time (Canada)
(GMT-3:00) Buenos Aires (Argentina)
(GMT-2:00) Mid-Atlantic
(GMT-1:00) Azores
(GMT) London, Lisbon, Dublin, Edinburgh (default value)
(GMT +1:00) Amsterdam, Berlin, Rome, Vienna
(GMT +2:00) Jerusalem
(GMT +3:00) Baghdad
(GMT +4:00) Muscat, Abu Dhabi
(GMT +4:30) Kabul
(GMT +5:00) Karachi, Islamabad, Tashkent
(GMT +5:30) Colombo, Kolkata, Mumbai, New Delhi
(GMT +5:45) Katmandu
(GMT +6:00) Almaty, Novosibirsk
(GMT +6:30) Rangoon
(GMT +7:00) Saigon, Hanoi, Bangkok, Jakatar
(GMT +8:00) Hong Kong, Bejing, Chongquing
(GMT +9:00) Tokyo, Osaka, Sapporo
(GMT +9:30) Darwin
(GMT+10:00) Sydney, Melbourne, Canberra
(GMT+11:00) Magadan, Solomon Is., New Caledonia
(GMT+12:00) Kamchatka, Marshall Is., Fiji
(GMT+12:00) Auckland (New Zealand)
OL-31334-01
config Commands
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to set the location of the time zone in order to set the daylight saving time
to location index 10 automatically:
(Cisco Controller) > config time timezone location 10
Related Commands
show time
423
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable the 802.11 security related traps:
(Cisco Controller) > config trapflags 802.11-Security wepDecryptError disable
Related Commands
show trapflags
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
auth
Enables trap sending when an AAA authentication failure occurs for management
user, net user, or MAC filter.
servers
enable
disable
Release
Modification
7.6
The following example shows how to enable the sending of AAA server-related traps:
(Cisco Controller) > config trapflags aaa auth enable
Related Commands
show watchlist
425
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables trap notifications when a rogue access point is detected at the adjacent
channel.
disable
Disables trap notifications when a rogue access point is detected at the adjacent
channel.
None
Release
Modification
7.6
The following example shows how to enable trap notifications when a rogue access point is detected at the
adjacent channel:
(Cisco Controller) > config trapflags adjchannel-rogueap enable
Related Commands
OL-31334-01
config Commands
show trapflags
427
config Commands
config trapflags ap
To enable or disable the sending of Cisco lightweight access point traps, use the config trapflags ap command.
config trapflags ap {register | interfaceUp} {enable | disable}
Syntax Description
Command Default
Command History
Examples
register
Enables sending a trap when a Cisco lightweight access point registers with Cisco
switch.
interfaceUp
enable
disable
Release
Modification
7.6
The following example shows how to prevent traps from sending access point-related traps:
(Cisco Controller) > config trapflags ap register disable
Related Commands
show trapflags
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to prevent sending traps on invalid SNMP access:
(Cisco Controller) > config trapflags authentication disable
Related Commands
show trapflags
429
config Commands
Syntax Description
Command Default
Command History
Examples
802.11-associate
802.11-disassociate
802.11-deauthenticate
802.11-authfail
802.11-assocfail
authentication
excluded
enable
disable
Release
Modification
7.6
The following example shows how to enable the sending of Dot11 disassociation trap to clients:
(Cisco Controller) > config trapflags client 802.11-disassociate enable
Related Commands
show trapflags
OL-31334-01
config Commands
Syntax Description
threshold
Configures the threshold percentage value of the number of clients that associate
with the controller, after which an SNMP trap and a syslog message is sent to the
controller. The range is from 80 to 100.
The minimum interval between two warnings is 10 mins You cannot configure this
interval.
Command Default
Command History
Usage Guidelines
enable
disable
The default threshold value of the number of clients that associate with the controller is 90 %.
Release
Modification
7.6
This table lists the maximum number of clients for different controllers.
Table 7: Maximum Number of Clients Supported on Different Controllers
Controller
7000
500
15000
64000
64000
30000
431
config Commands
Examples
The following example shows how to configure the threshold value of the number of clients that associate
with the controller:
(Cisco Controller) > config trapflags client max-warning-threshold 80
Related Commands
show trapflags
config trapflags client
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the sending of configuration-saved traps:
(Cisco Controller) > config trapflags configsave enable
Related Commands
show trapflags
433
config Commands
Syntax Description
Command Default
Command History
Examples
esp-auth
Enables the sending of IPsec traps when an ESP authentication failure occurs.
esp-reply
Enables the sending of IPsec traps when an ESP replay failure occurs.
invalidSPI
Enables the sending of IPsec traps when an ESP invalid SPI is detected.
ike-neg
Enables the sending of IPsec traps when an IKE negotiation failure occurs.
suite-neg
Enables the sending of IPsec traps when a suite negotiation failure occurs.
invalid-cookie
Enables the sending of IPsec traps when a Isakamp invalid cookie is detected.
enable
disable
Release
Modification
7.6
The following example shows how to enable the sending of IPsec traps when ESP authentication failure
occurs:
(Cisco Controller) > config trapflags IPsec esp-auth enable
Related Commands
show trapflags
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables Cisco wireless LAN controller level link up/down trap flags.
disable
Disables Cisco wireless LAN controller level link up/down trap flags.
By default, the Cisco WLC level link up/down trap flags are enabled.
Release
Modification
7.6
The following example shows how to enable the Cisco wireless LAN controller level link up/down trap:
(Cisco Controller) > config trapflags linkmode disable
Related Commands
show trapflags
435
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable trap notifications when a mesh access point is detected:
(Cisco Controller) > config trapflags mesh enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
By default, the sending of traps when multiple logins are active is enabled.
Release
Modification
7.6
The following example shows how to disable the sending of traps when multiple logins are active:
(Cisco Controller) > config trapflags multiusers disable
Related Commands
show trapflags
437
config Commands
Syntax Description
threshold
Configures the threshold percentage value of the maximum number of RFID tags,
after which an SNMP trap and a syslog message is sent to the controller. The range
is from 80 to 100.
The traps and syslog messages are generated every 10 minutes. You cannot configure
this interval.
Command Default
Command History
Usage Guidelines
enable
disable
Release
Modification
7.6
The following table shows the maximum number of RFID tags supported on different controllers:
Table 8: Maximum Number of RFID Tags Supported on Different Controllers
Controller
5000
500
10000
50000
50000
3000
OL-31334-01
config Commands
Examples
The following example shows how to configure the threshold value of the maximum number of RFID tags:
(Cisco Controller) > config trapflags rfid 80
Related Commands
439
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable the sending of rogue access point detection traps:
(Cisco Controller) > config trapflags rogueap disable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
tx-power
Enables trap sending when the RF manager automatically changes the tx-power
level for the Cisco lightweight access point interface.
channel
Enables trap sending when the RF manager automatically changes the channel
for the Cisco lightweight access point interface.
antenna
Enables trap sending when the RF manager automatically changes the antenna
for the Cisco lightweight access point interface.
enable
disable
Release
Modification
7.6
The following example shows how to enable the sending of RRM parameter-related traps:
(Cisco Controller) > config trapflags rrm-params tx-power enable
Related Commands
show trapflags
441
config Commands
Syntax Description
Command Default
Command History
Examples
load
Enables trap sending when the load profile maintained by the RF manager fails.
noise
Enables trap sending when the noise profile maintained by the RF manager fails.
interference
Enables trap sending when the interference profile maintained by the RF manager
fails.
coverage
Enables trap sending when the coverage profile maintained by the RF manager
fails.
enable
disable
Release
Modification
7.6
The following example shows how to disable the sending of RRM profile-related traps:
(Cisco Controller) > config trapflags rrm-profile load disable
Related Commands
show trapflags
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable the sending of spanning tree traps:
(Cisco Controller) > config trapflags stpmode disable
Related Commands
show trapflags
443
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable trap notifications for strong password checks:
(Cisco Controller) > config trapflags strong-pwdcheck enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable the WPS traps sending:
(Cisco Controller) > config trapflags wps disable
Related Commands
show trapflags
445
Timeout Commands
save config
To save the controller configurations, use the save config command.
save config
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Timeout Commands
This section lists the timeout commands of the controller:
OL-31334-01
Timeout Commands
Syntax Description
ab
enable
ignore
Command Default
The default CAC WMM TSPEC inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Examples
This example shows how to process the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout enable
This example shows how to ignore the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout ignore
Related Commands
447
Timeout Commands
OL-31334-01
Timeout Commands
Syntax Description
enable
ignore
Command Default
The default WMM TSPEC inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
Call Admission Control (CAC) commands require that the WLAN you are planning to modify is configured
for Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the voice TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11 cac voice tspec-inactivity-timeout enable
449
Timeout Commands
Related Commands
OL-31334-01
Timeout Commands
Syntax Description
ap-discovery-timeout
discovery-timeout
ap-fast-heartbeat
Configures the fast heartbeat timer, which reduces the amount of time it
takes to detect a controller failure in access points.
local
Configures the fast heartbeat interval for access points in local mode.
flexconnect
all
Configures the fast heartbeat interval for all the access points.
enable
disable
fast_heartbeat_seconds
ap-heartbeat-timeout
heartbeat_seconds
ap-primed-join-timeout
primed_join_timeout
auth-timeout
451
Timeout Commands
auth_timeout
pkt-fwd-watchdog
watchdog_timer
default
eap-identity-request-delay
eap_identity_request_delay
eap-timeout
eap_timeout
Command Default
Command History
Usage Guidelines
Release
Modification
7.6
The Cisco lightweight access point discovery timeout indicates how often a Cisco WLC attempts to discover
unconnected Cisco lightweight access points.
The Cisco lightweight access point heartbeat timeout controls how often the Cisco lightweight access point
sends a heartbeat keepalive signal to the Cisco Wireless LAN Controller.
Examples
The following example shows how to configure an access point discovery timeout with a timeout value of
20:
(Cisco Controller) >config advanced timers ap-discovery-timeout 20
OL-31334-01
Timeout Commands
The following example shows how to enable the fast heartbeat interval for an access point in FlexConnect
mode:
(Cisco Controller) >config advanced timers ap-fast-heartbeat flexconnect enable 8
The following example shows how to configure the authentication timeout to 20 seconds:
(Cisco Controller) >config advanced timers auth-timeout 20
453
Timeout Commands
Syntax Description
Command Default
Command History
Examples
timeout-value
Release
Modification
7.6
The following example shows how to set the DHCP timeout to 10 seconds:
(Cisco Controller) >config dhcp timeout 10
OL-31334-01
Timeout Commands
config ldap
To configure the Lightweight Directory Access Protocol (LDAP) server settings, use the config ldap command.
config ldap {add | delete | enable | disable | retransmit-timeout | retry | user | security-mode | simple-bind}
index
config ldap add index server_ip_address port user_base user_attr user_type[ secure]
config ldap retransmit-timeout index retransmit-timeout
config ldap retry attempts
config ldap user {attr index user-attr | base index user-base | typeindex user-type}
config ldap security-mode {enable | disable}index
config ldap simple-bind {anonymous index | authenticated index username password}
Syntax Description
add
delete
enable
disable
retransmit-timeout
retry
user
security-mode
simple-bind
anonymous
authenticated
index
server_ip_address
port
Port number.
455
Timeout Commands
Command Default
Command History
user_base
user_attr
user_type
secure
retransmit-timeout
attempts
attr
base
type
username
password
None
Release
Modification
7.6
7.6
Usage Guidelines
When you enable secure LDAP, the controller does not validate the server certificate.
Examples
The following example shows how to enable LDAP server index 10:
(Cisco Controller) > config ldap enable 10
Related Commands
OL-31334-01
Timeout Commands
457
Timeout Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
seconds
None
Release
Modification
7.6
The following example shows how to configure the client session timeout to 6000 seconds for a remote LAN
with ID 1:
(Cisco Controller) >config remote-lan session-timeout 1 6000
OL-31334-01
Timeout Commands
Syntax Description
seconds
Command Default
The default timeout value for idle client session is 300 seconds.
Usage Guidelines
Use this command to set the idle client session duration on the Cisco wireless LAN controller. The minimum
duration is 90 seconds.
Examples
The following example shows how to configure the idle session timeout to 1200 seconds:
(Cisco Controller) > config network usertimeout 1200
Related Commands
459
Timeout Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure retransmission timeout value 5 seconds between the
retransmission:
(Cisco Controller) > config radius acct retransmit-timeout 5
Related Commands
OL-31334-01
Timeout Commands
Syntax Description
Command Default
Command History
Examples
index
retransmit-timeout
None
Release
Modification
7.6
The following example shows how to configure a default RADIUS server retransmission timeout for
management users:
(Cisco Controller) > config radius auth mgmt-retransmit-timeout 1 10
Related Commands
461
Timeout Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure a retransmission timeout of 5 seconds for a RADIUS
authentication server:
(Cisco Controller) > config radius auth retransmit-timeout 5
Related Commands
OL-31334-01
Timeout Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
Release
Modification
7.6
The following example shows how to configure a server timeout value of 2 seconds for RADIUS authentication
server index 10:
(Cisco Controller) > config radius auth retransmit-timeout 2 10
Related Commands
463
Timeout Commands
Syntax Description
Command Default
Command History
Examples
seconds
The default number of seconds after which the rogue access point and client entries expire is 1200 seconds.
Release
Modification
7.6
The following example shows how to set an expiration time for entries in the rogue access point and client
list to 2400 seconds:
(Cisco Controller) > config rogue ap timeout 2400
Related Commands
OL-31334-01
Timeout Commands
465
Timeout Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure a default TACACS+ authorization server timeout for
management users:
(Cisco Controller) > config tacacs athr mgmt-server-timeout 1 10
Related Commands
OL-31334-01
Timeout Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure a default TACACS+ authentication server timeout for
management users:
(Cisco Controller) > config tacacs auth mgmt-server-timeout 1 10
Related Commands
467
Timeout Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable an automatic timeout of RFID tags:
(Cisco Controller) > config rfid auto-timeout enable
Related Commands
OL-31334-01
Timeout Commands
Syntax Description
Command Default
Command History
Examples
seconds
None
Release
Modification
7.6
The following example shows how to configure a static RFID tag data timeout of 60 seconds:
(Cisco Controller) > config rfid timeout 60
Related Commands
469
Timeout Commands
Syntax Description
wlan_id
foreignAp
seconds
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure the client timeout to 6000 seconds for WLAN ID 1:
(Cisco Controller) >config wlan session-timeout 1 6000
OL-31334-01
Timeout Commands
Syntax Description
Command Default
Command History
timeout
Timeout for idle client sessions for a WLAN. If the client sends traffic less than
the threshold, the client is removed on timeout. The range is from 15 to 100000
seconds.
wlan_id
Release
Modification
7.6
Usage Guidelines
The timeout value that you configure here overrides the global timeout that you define using the command
config network usertimeout.
Examples
The following example shows how to configure the idle client sessions for a WLAN:
(Cisco Controller) >config wlan usertimeout 100 1
471
Timeout Commands
Syntax Description
over-the-air
over-the-ds
psk
reassociation-timeout
Command Default
Command History
Examples
seconds
enable
disable
wlan_id
None
Release
Modification
7.6
The following example shows how to configure authentication key-management using 802.11r fast transition:
(Cisco Controller) >config wlan security wpa akm ft reassociation-timeout 25 1
OL-31334-01
Syntax Description
Command Default
Command History
enable
disable
reassociation-timeout
timeout-in-seconds
wlan_id
None
Release
Modification
7.6
Usage Guidelines
Ensure that you have disabled the WLAN before you proceed.
Examples
The following example shows how to enable 802.11r fast transition roaming support on WLAN 2:
(Cisco Controller) >config wlan security ft enable 2
The following example shows how to set the reassociation timeout value of 20 seconds for 802.11r fast
transition roaming support on WLAN 2:
(Cisco Controller) >config wlan security ft reassociation-timeout 20 2
473
Syntax Description
Command Default
Command History
acl_name
ACL name.
None
Release
Modification
7.6
Usage Guidelines
Note
Examples
ACL counters are available only on the following controllers: Cisco 4400 Series Controller, Cisco WiSM,
and Catalyst 3750G Integrated Wireless LAN Controller Switch.
The following example shows how to clear the current counters for acl1:
(Cisco Controller) > clear acl counters acl1
Related Commands
OL-31334-01
clear ap config
To clear (reset to the default values) a lightweight access points configuration settings, use the clear ap config
command.
clear ap config ap_name
Syntax Description
Command Default
Command History
ap_name
None
Release
Modification
7.6
Usage Guidelines
Entering this command does not clear the static IP address of the access point.
Examples
The following example shows how to clear the access points configuration settings for the access point named
ap1240_322115:
(Cisco Controller) >clear ap config ap1240_322115
Clear ap-config will clear ap config and reboot the AP. Are you sure you want continue?
(y/n)
475
clear ap eventlog
To delete the existing event log and create an empty event log file for a specific access point or for all access
points joined to the controller, use the clear ap eventlog command.
clear ap eventlog {specific ap_name | all}
Syntax Description
Command Default
Command History
Examples
specific
ap_name
Name of the access point for which the event log file will be emptied.
all
Deletes the event log for all access points joined to the controller.
None
Release
Modification
7.6
The following example shows how to delete the event log for all access points:
(Cisco Controller) >clear ap eventlog all
This will clear event log contents for all APs. Do you want continue? (y/n) :y
Any AP event log contents have been successfully cleared.
OL-31334-01
Syntax Description
Command Default
Command History
Examples
all
ap_mac
None
Release
Modification
7.6
The following example shows how to clear the join statistics of all the access points:
(Cisco Controller) >clear ap join stats all
477
clear arp
To clear the Address Resolution Protocol (ARP) table, use the clear arp command.
clear arp
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download serverip
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
clear stats port
OL-31334-01
Syntax Description
Command Default
Command History
Examples
client
all
client-mac
guest-lan
all
guest-lan-id
remote-lan
all
remote-lan-id
wlan
all
wlan-id
None
Release
Modification
7.6
The following example shows how to clear the AVC statistics of a client:
(Cisco Controller) > clear avc statistics client 00:21:1b:ea:36:60
Related Commands
479
OL-31334-01
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b
client_mac
ap_mac
all
None
Release
Modification
7.6
The following example shows how to clear the TSM for the MAC address 00:40:96:a8:f7:98:
(Cisco Controller) > clear client tsm 802.11a 00:40:96:a8:f7:98 all
Related Commands
481
clear config
To reset configuration data to factory defaults, use the clear config command.
clear config
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to reset the configuration data to factory defaults:
(Cisco Controller) > clear config
Are you sure you want to clear the configuration? (y/n)
n
Configuration not cleared!
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download serverip
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
clear stats port
OL-31334-01
clear ext-webauth-url
To clear the external web authentication URL, use the clear ext-webauth-url command.
clear ext-webauth-url
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the external web authentication URL:
(Cisco Controller) > clear ext-webauth-url
URL cleared.
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download serverip
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
clear stats port
483
Syntax Description
Command Default
Command History
Examples
mac_address
all
None
Release
Modification
7.6
The following example shows how to clear all of the RFID tags in the database:
(Cisco Controller) > clear location rfid all
Related Commands
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
config location
show location
show location statistics rfid
485
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the statistics related to LOCP:
(Cisco Controller) > clear locp statistics
Related Commands
OL-31334-01
clear login-banner
To remove the login banner file from the controller, use the clear login-banner command.
clear login-banner
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the login banner file:
(Cisco Controller) > clear login-banner
Related Commands
487
Syntax Description
Command Default
None
Command History
Usage Guidelines
Release
Modification
7.6
Note
Examples
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
The following example shows how to clear an access points current LWAPP private configuration:
ap_console >clear lwapp private-config
removing the reap config file flash:/lwapp_reap.cfg
OL-31334-01
Syntax Description
Command Default
Command History
all
service-name
Name of the mDNS service. The Cisco WLC clears the details of the mDNS
service.
None
Release
Modification
7.6
Usage Guidelines
The Cisco WLC snoops and learns about the mDNS service advertisements only if the service is available in
the Master Services database.
Examples
The following example shows how to clear the mDNS service database:
(Cisco Controller) > clear mdns service-database all
Related Commands
489
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to delete the NMSP statistics log file:
(Cisco Controller) >
Related Commands
491
Syntax Description
Command Default
Command History
Examples
index
all
None
Release
Modification
7.6
The following example shows how to clear the RADIUS accounting statistics:
(Cisco Controller) > clear radius acc statistics
Related Commands
OL-31334-01
clear session
To clear the sessions that are created when user logs in through Telnet or SSH, use the clear session command.
clear sessionsession-id
Command Default
Command History
None
Release
Modification
8.0
Usage Guidelines
The session ID for clearing the session should be taken from the show login-session command.
Examples
493
Syntax Description
Command Default
Command History
Examples
index
all
None
Release
Modification
7.6
The following example shows how to clear the RADIUS authentication server statistics:
(Cisco Controller) > clear tacacs auth statistics
Related Commands
OL-31334-01
clear redirect-url
To clear the custom web authentication redirect URL on the Cisco Wireless LAN Controller, use the clear
redirect-url command.
clear redirect-url
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the custom web authentication redirect URL:
(Cisco Controller) >
URL cleared.
Related Commands
clear redirect-url
clear transfer
clear download datatype
clear download filename
clear download mode
clear download path
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
495
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to clear the WLAN configuration elements of the access point cisco_ap:
(Cisco Controller) >clear stats ap wlan cisco_ap
WLAN statistics cleared.
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the local EAP statistics:
(Cisco Controller) > clear stats local-auth
Local EAP Authentication Stats Cleared.
Related Commands
497
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
Syntax Description
port
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the statistics counters for port 9:
(Cisco Controller) > clear stats port 9
Related Commands
clear transfer
clear download datatype
clear download datatype
clear download filename
clear download mode
clear download serverip
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
clear stats port
499
Syntax Description
Command Default
Command History
Examples
auth
acct
index
all
None
Release
Modification
7.6
The following example shows how to clear the statistics for all RADIUS authentication servers:
(Cisco Controller) > clear stats radius auth all
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download serverip
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
OL-31334-01
501
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear all switch statistics counters:
(Cisco Controller) > clear stats switch
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download path
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
OL-31334-01
Syntax Description
Command Default
Command History
Examples
auth
athr
acct
index
all
None
Release
Modification
7.6
The following example shows how to clear the TACACS+ accounting server statistics for index 1:
(Cisco Controller) > clear stats tacacs acct 1
Related Commands
503
clear transfer
To clear the transfer information, use the clear transfer command.
clear transfer
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
OL-31334-01
clear traplog
To clear the trap log, use the clear traplog command.
clear traplog
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download path
clear download serverip
clear download start
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
505
clear webimage
To clear the custom web authentication image, use the clear webimage command.
clear webimage
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the custom web authentication image:
(Cisco Controller) > clear webimage
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download path
clear download serverip
clear download start
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
OL-31334-01
clear webmessage
To clear the custom web authentication message, use the clear webmessage command.
clear webmessage
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the custom web authentication message:
(Cisco Controller) > clear webmessage
Message cleared.
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download path
clear download serverip
clear download start
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
507
clear webtitle
To clear the custom web authentication title, use the clear webtitle command.
clear webtitle
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the custom web authentication title:
(Cisco Controller) > clear webtitle
Title cleared.
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download path
clear download serverip
clear download start
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
OL-31334-01
reset system at
To reset the system at a specified time, use the reset system at command.
reset system at YYYY-MM-DD HH:MM:SS image {no-swap|swap} reset-aps [save-config]
Syntax Description
Command Default
Command History
Examples
YYYY-MM-DD
HH: MM: SS
image
swap
no-swap
reset-aps
save-config
None
Release
Modification
7.6
The following example shows how to reset the system at 2010-03-29 and 12:01:01 time:
(Cisco Controller) > reset system at 2010-03-29 12:01:01 image swap reset-aps save-config
509
reset system in
To specify the amount of time delay before the devices reboot, use the reset system in command.
reset system in HH:MM:SS image {swap | no-swap} reset-aps save-config
Syntax Description
Command Default
Command History
Examples
HH :MM :SS
image
swap
no-swap
reset-aps
save-config
None
Release
Modification
7.6
The following example shows how to reset the system after a delay of 00:01:01:
(Cisco Controller) > reset system in 00:01:01 image swap reset-aps save-config
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
511
Syntax Description
Command Default
Command History
Examples
minutes
The default time period to configure the trap generation prior to scheduled resets is 10 minutes.
Release
Modification
7.6
The following example shows how to configure the trap generation to 10 minutes before the scheduled resets:
(Cisco Controller) > reset system notify-time 55
OL-31334-01
reset peer-system
To reset the peer controller, use the reset peer-system command.
reset peer-system
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
513
Syntax Description
Command Default
Command History
Examples
private_key_password
None
Release
Modification
7.6
The following example shows how to transfer a file to the switch with the certificates private key password
certpassword:
(Cisco Controller) > transfer download certpassword
Clearing password
OL-31334-01
Syntax Description
Command Default
Command History
avc-protocol-pack
code
config
eapcacert
eapdevcert
icon
image
ipseccacert
ipsecdevcert
login-banner
radius-avplist
Downloads the RADIUS AVPs in the XML file format from the
FTP server.
signature
webadmincert
webauthbundle
webauthcert
None
Release
Modification
7.6
515
Examples
Release
Modification
8.0
The following example shows how to download an executable image to the system:
(Cisco Controller) > transfer download datatype code
OL-31334-01
Syntax Description
Command Default
Command History
filename
None
Release
Modification
7.6
Usage Guidelines
You cannot use special characters such as \ : * ? " < > | for the filename.
Examples
517
Syntax Description
Command Default
Command History
Examples
ftp
tftp
sftp
None
Release
Modification
7.6
The following example shows how to transfer a file using the TFTP mode:
(Cisco Controller) > transfer download mode tftp
OL-31334-01
Syntax Description
Command Default
Command History
Examples
password
Password.
None
Release
Modification
7.6
The following example shows how to set the password for FTP transfer to pass01:
(Cisco Controller) > transfer download password pass01
519
Syntax Description
path
Directory path.
Note
Command Default
Command History
Path names on a TFTP or FTP server are relative to the servers default
or root directory. For example, in the case of the Solarwinds TFTP
server, the path is /.
None
Release
Modification
7.6
Usage Guidelines
You cannot use special characters such as \ : * ? " < > | for the file path.
Examples
The following example shows how to transfer a file to the path c:\install\version2:
(Cisco Controller) > transfer download path c:\install\version2
OL-31334-01
Syntax Description
Command Default
Command History
Examples
port
FTP port.
Release
Modification
7.6
The following example shows how to specify FTP port number 23:
(Cisco Controller) > transfer download port 23
521
Syntax Description
Command Default
Command History
Examples
IP addr
None
Release
Modification
7.6
8.0
The following example shows how to configure the IPv4 address of the TFTP server:
(Cisco Controller) > transfer download serverip 175.34.56.78
The following example shows how to configure the IPv6 address of the TFTP server:
(Cisco Controller) > transfer download serverip 2001:10:1:1::1
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
TFTP
Site Cert
172.16.16.78
directory path
webadmincert_name
523
Syntax Description
Command Default
Command History
Examples
timeout
None
Release
Modification
7.6
The following example shows how to transfer a file with the TFTP packet timeout of 55 seconds:
(Cisco Controller) > transfer download tftpPktTimeout 55
OL-31334-01
Syntax Description
Command Default
Command History
Examples
retries
None
Release
Modification
7.6
The following example shows how to set the number of allowed TFTP packet retries to 55:
(Cisco Controller) > transfer download tftpMaxRetries 55
525
Syntax Description
Command Default
Command History
Examples
username
Username.
None
Release
Modification
7.6
The following example shows how to set the FTP username to ftp_username:
(Cisco Controller) > transfer download username ftp_username
OL-31334-01
transfer encrypt
To configure encryption for configuration file transfers, use the transfer encrypt command.
transfer encrypt {enable | disable | set-key key}
Syntax Description
Command Default
Command History
Examples
enable
disable
set-key
key
None
Release
Modification
7.6
527
Syntax Description
ap-crash-data
config
coredump
crashfile
debug-file
eapcacert
eapdevcert
errorlog
invalid-config
ipseccacert
ipsecdevcert
pac
packet-capture
panic-crash-file
radio-core-dump
radius-avplist
Uploads the XML file from the controller to the RADIUS server.
rrm-log
run-config
signature
systemtrace
traplog
OL-31334-01
Command Default
Command History
Examples
watchdog-crash-file
webadmincert
webauthbundle
webauthcert
None
Release
Modification
7.6
8.0
The following example shows how to upload the system error log file:
(Cisco Controller) > transfer upload datatype errorlog
529
Syntax Description
Command Default
Command History
filename
None
Release
Modification
7.6
Usage Guidelines
You cannot use special characters such as \ : * ? " < > | for the filename.
Examples
OL-31334-01
Syntax Description
Command Default
Command History
Examples
ftp
tftp
sftp
None
Release
Modification
7.6
The following example shows how to set the transfer mode to TFTP:
(Cisco Controller) > transfer upload mode tftp
531
Syntax Description
Command Default
Command History
username
validity
password
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to upload a PAC with the username user1, validity period 53, and password
pass01:
(Cisco Controller) > transfer upload pac user1 53 pass01
OL-31334-01
Syntax Description
password
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure the password for the FTP transfer to pass01:
(Cisco Controller) > transfer upload password pass01
533
Syntax Description
path
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
You cannot use special characters such as \ : * ? " < > | for the file path.
Examples
The following example shows how to set the upload path to c:\install\version2:
(Cisco Controller) > transfer upload path c:\install\version2
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to start uploading a file to the peer controller:
> transfer upload peer-start
Mode.............................................
FTP Server IP....................................
FTP Server Port..................................
FTP Path.........................................
FTP Filename.....................................
FTP Username.....................................
FTP Password.....................................
Data Type........................................
FTP
209.165.201.1
21
/builds/nimm/
AS_5500_7_4_1_20.aes
wnbu
*********
Error Log
Are you sure you want to start upload from standby? (y/N) n
Transfer Canceled
535
Syntax Description
Command Default
Command History
Examples
port
Port number.
Release
Modification
7.6
OL-31334-01
Syntax Description
Command Default
Command History
Examples
IP addr
None
Release
Modification
7.6
8.0
The following example shows how to set the IPv4 address of the TFTP server to 175.31.56.78:
(Cisco Controller) > transfer upload serverip 175.31.56.78
The following example shows how to set the IPv6 address of the TFTP server to 175.31.56.78:
(Cisco Controller) > transfer upload serverip 2001:10:1:1::1
537
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
TFTP
172.16.16.78
c:\find\off/
wps_2_0_75_0.aes
Code
OL-31334-01
Syntax Description
Command Default
Command History
Examples
username
Username required to access the FTP server. The username can contain up to 31
characters.
None
Release
Modification
7.6
The following example shows how to set the FTP username to ftp_username:
(Cisco Controller) > transfer upload username ftp_username
Note
Some license commands are available only on the Cisco 5500 Series Controller. Right to Use (RTU)
licensing is not supported on Cisco 5500 Series Controllers.
Note
For detailed information on installing and rehosting licenses on the Cisco 5500 Series Controller, see the
Installing and Configuring Licenses section in Chapter 4 of the Cisco Wireless LAN Controller
Configuration Guide.
539
license clear
To remove a license from the Cisco 5500 Series Controller, use the license clear command.
license clear license_name
Syntax Description
Command Default
Command History
license_name
None
Release
Modification
7.6
Usage Guidelines
You can delete an expired evaluation license or any unused license. You cannot delete unexpired evaluation
licenses, the permanent base image license, or licenses that are in use by the controller.
Examples
The following example shows how to remove the license settings of the license named wplus-ap-count:
(Cisco Controller) > license clear wplus-ap-count
OL-31334-01
license comment
To add comments to a license or delete comments from a license on the Cisco 5500 Series Controller, use the
license comment command.
license comment {add | delete} license_name comment_string
Syntax Description
Command Default
Command History
Examples
add
Adds a comment.
delete
Deletes a comment.
license_name
comment_string
License comment.
None
Release
Modification
7.6
The following example shows how to add a comment wplus ap count license to the license name
wplus-ap-count:
(Cisco Controller) > license comment add wplus-ap-count Comment for wplus ap count license
541
license install
To install a license on the Cisco 5500 Series Controller, use the license install command.
license install url
Syntax Description
url
Command Default
None
Command History
Usage Guidelines
Release
Modification
7.6
We recommend that the access point count be the same for the base-ap-count and wplus-ap-count licenses
installed on your controller. If your controller has a base-ap-count license of 100 and you install a
wplus-ap-count license of 12, the controller supports up to 100 access points when the base license is in use
but only a maximum of 12 access points when the wplus license is in use.
You cannot install a wplus license that has an access point count greater than the controller's base license. For
example, you cannot apply a wplus-ap-count 100 license to a controller with an existing base-ap-count 12
license. If you attempt to register for such a license, an error message appears indicating that the license
registration has failed. Before upgrading to a wplus-ap-count 100 license, you would first have to upgrade
the controller to a base-ap-count 100 or 250 license.
Examples
The following example shows how to install a license on the controller from the URL
tftp://10.10.10.10/path/license.lic:
(Cisco Controller) > license install tftp://10.10.10.10/path/license.lic
OL-31334-01
Syntax Description
Command Default
Command History
Usage Guidelines
license_name
high
low
None
Release
Modification
7.6
If you are considering upgrading to a license with a higher access point count, you can try an evaluation license
before upgrading to a permanent version of the license. For example, if you are using a permanent license
with a 50 access point count and want to try an evaluation license with a 100 access point count, you can try
out the evaluation license for 60 days.
AP-count evaluation licenses are set to low priority by default so that the controller uses the ap-count permanent
license. If you want to try an evaluation license with an increased access point count, you must change its
priority to high. If you no longer want to have this higher capacity, you can lower the priority of the ap-count
evaluation license, which forces the controller to use the permanent license.
Note
You can set the priority only for ap-count evaluation licenses. AP-count permanent licenses always have
a medium priority, which cannot be configured.
Note
If the ap-count evaluation license is a wplus license and the ap-count permanent license is a base license,
you must also change the feature set to wplus.
543
Note
Examples
To prevent disruptions in operation, the controller does not switch licenses when an evaluation license
expires. You must reboot the controller in order to return to a permanent license. Following a reboot, the
controller defaults to the same feature set level as the expired evaluation license. If no permanent license
at the same feature set level is installed, the controller uses a permanent license at another level or an
unexpired evaluation license.
The following example shows how to set the priority of the wplus-ap-count to high:
(Cisco Controller) > license modify priority wplus-ap-count high
OL-31334-01
license revoke
To rehost a license on a Cisco 5500 Series WLC, use the license revoke command.
license revoke {permission_ticket_url | rehost rehost_ticket_url}
Syntax Description
Command Default
Command History
Usage Guidelines
permission_ticket_url
rehost
rehost_ticket_url
None
Release
Modification
7.6
Before you revoke a license, save the device credentials by using the license save credential url command.
You can rehost all permanent licenses except the permanent base image license. Evaluation licenses and the
permanent base image license cannot be rehosted.
In order to rehost a license, you must generate credential information from the controller and use it to obtain
a permission ticket to revoke the license from the Cisco licensing site, https://tools.cisco.com/SWIFT/
LicensingUI/Quickstart. Next, you must obtain a rehost ticket and use it to obtain a license installation file
for the controller on which you want to install the license.
For detailed information on rehosting licenses, see the Installing and Configuring Licenses section in the
Cisco Wireless LAN Controller Configuration Guide.
Examples
The following example shows how to revoke the license settings from the saved permission ticket URL
tftp://10.10.10.10/path/permit_ticket.lic:
(Cisco Controller) > license revoke tftp://10.10.10.10/path/permit_ticket.lic
The following example shows how to revoke the license settings from the saved rehost ticket URL
tftp://10.10.10.10/path/rehost_ticket.lic:
(Cisco Controller) > license revoke rehost tftp://10.10.10.10/path/rehost_ticket.lic
545
license save
To save a backup copy of all installed licenses or license credentials on the Cisco 5500 Series Controller, use
the license save command.
license save credential url
Syntax Description
Command Default
Command History
credential
url
None
Release
Modification
7.6
Usage Guidelines
Save the device credentials before you revoke the license by using the license revoke command.
Examples
The following example shows how to save a backup copy of all installed licenses or license credentials on
tftp://10.10.10.10/path/cred.lic:
(Cisco Controller) > license save credential tftp://10.10.10.10/path/cred.lic
OL-31334-01
Syntax Description
Command Default
By default, in release 7.3 Cisco Flex 7500 Series Controllers and Cisco 8500 Series Wireless LAN Controllers
support 6000 APs.
Command History
Release
Modification
7.6
Usage Guidelines
When you activate this license, the controller prompts you to accept or reject the End User License Agreement
(EULA) for the given license. If you activate a license that supports a smaller number of APs than the current
number of APs connected to the controller, the activation command fails.
Examples
The following example shows how to activate an evaluation AP-count license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) > license activate ap-count eval
547
Syntax Description
Command Default
Command History
Examples
license_name
None
Release
Modification
7.6
The following example shows how to activate a data DTLS feature license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) > license activate feature data-DTLS
OL-31334-01
Syntax Description
Command Default
Command History
Usage Guidelines
count
Number of APs that the AP license supports. The range is from 1 to the maximum
number of APs that the controller can support. The count must be a multiple of 5.
None
Release
Modification
7.6
Right to Use (RTU) licensing allows you to enable a desired AP license count on the controller after accepting
the End User License Agreement (EULA). You can now easily add AP counts on a controller without using
external tools. RTU licensing is available only on Cisco Flex 7500 and 8500 series Wireless LAN controllers.
You can use this command to increase the count of an existing AP license. When you activate a license that
supports a smaller number of APs than the current number of APs connected to the controller, the activation
command fails.
Examples
The following example shows how to configure the count of an AP license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) > license add ap-count 5000
549
Syntax Description
Command Default
Command History
Examples
license_name
None
Release
Modification
7.6
The following example shows how to add a DTLS feature license on a Cisco Flex 7500 Series controller:
(Cisco Controller) > license add feature data_DTLS
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to deactivate an evaluation AP license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) > license deactivate ap-count eval
551
Syntax Description
Command Default
Command History
Examples
license_name
None
Release
Modification
7.6
The following example shows how to deactivate a data DTLS feature license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) > license deactivate feature data_DTLS
OL-31334-01
Syntax Description
Command Default
Command History
Examples
count
Number of APs that the AP license supports. The range is from 1 to the maximum
number of APs that the controller can support. The count must be a multiple of 5.
None
Release
Modification
7.6
The following example shows how to delete an AP count license on a Cisco Flex 7500 Series controller:
(Cisco Controller) > license delete ap-count 5000
553
Syntax Description
Command Default
Command History
Examples
license_name
None
Release
Modification
7.6
The following example shows how to delete the High Availability feature license on a Cisco Flex 7500 Series
controller:
(Cisco Controller) > license delete feature high_availability
OL-31334-01
debug arp
To configure the debugging of Address Resolution Protocol (ARP) options, use the debug arp command.
debug arp {all | detail | events | message} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
detail
error
message
enable
disable
None
Release
Modification
7.6
Related Commands
debug disable-all
show sysinfo
555
debug avc
To configure the debugging of Application Visibility and Control (AVC) options, use the debug avc error
command.
debug avc {events | error} {enable | disable}
Syntax Description
Command Default
Command History
Examples
events
error
enable
disable
Release
Modification
7.6
The following example shows how to enable the debugging of AVC errors:
(Cisco Controller) > debug avc error enable
Related Commands
OL-31334-01
debug cac
To configure the debugging of Call Admission Control (CAC) options, use the debug cac command.
debug cac {all | event | packet} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
event
packet
kts
enable
disable
Release
Modification
7.6
Related Commands
557
debug cdp
To configure debugging of CDP, use the debug cdp command.
debug cdp {events | packets} {enable | disable}
Syntax Description
Command Default
Command History
Examples
events
packets
enable
disable
None
Release
Modification
7.6
The following example shows how to enable CDP event debugging in a Cisco controller:
(Cisco Controller) > debug cdp
OL-31334-01
debug crypto
To configure the debugging of the hardware cryptographic options, use the debug crypto command.
debug crypto {all | sessions | trace | warning} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
sessions
trace
warning
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of hardware crypto sessions:
(Cisco Controller) > debug crypto sessions enable
Related Commands
debug disable-all
show sysinfo
559
debug dhcp
To configure the debugging of DHCP, use the debug dhcp command.
debug dhcp {message | packet} {enable | disable}
Syntax Description
message
packet
enable
disable
Command Default
None
Examples
The following example shows how to enable the debugging of DHCP messages:
(Cisco Controller) >debug dhcp message enable
OL-31334-01
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of DHCP packets on a service port:
(Cisco Controller) >debug dhcp service-port enable
561
debug disable-all
To disable all debug messages, use the debug disable-all command.
debug disable-all
Syntax Description
Command Default
Disabled.
Command History
Release
Modification
7.6
Examples
OL-31334-01
debug fastpath
To debug the issues in the 10-Gigabit Ethernet interface of the controller and to view details of all the
management and control features of the controller, use the debug fastpath command.
debug fastpath [disable| enable| errors| events| warning| log| status| dump| audit| clear]
debug fastpath log [{error | events | show}]
debug fastpath dump [{stats DP_number} | {fpapoolDP_number} | {ownerdb}|{portdb} |{tun4db| index|
DP_number} | {scbdb| index| DP_number} | {cfgtool -- dump.sfp} |{vlandb} | { dpcp-stats} | { clear|
stats} | {systemdb} | {debug| {wlanappstats| wlan_id}} | { appqosdb}]
Syntax Description
disable
enable
errors
events
warnings
log
errors
events
show
status
dump
stats
563
DP_number
fpapool
DP_number
ownerdb
portdb
tun4db
index
DP_number
OL-31334-01
scbdb
index
DP_number
Command Default
cfgtool -- dump.sfp
vlandb
dpcp-stats
clear stats
systemdb
debug
wlanappstats
wlan_id
appqosdb
clear
Clear command.
None
565
Command History
Release
Modification
7.6
Usage Guidelines
None
Examples
Examples
The following is an example of the SX/LC/T small form-factor plug-in (SFP) modules model/type with the
respective OUI Partnumber.
(Cisco Controller) >debug fastpath status
Pr Type
SFPType
-- ---------------1 Normal
1000BaseTX
2 Normal
1000BaseTX
STP
Stat
Admin
Mode
Physical
Mode
Physical
Status
Link
Status
Link
Trap
POE
Auto
1000 Full
Up
Enable
N/A
Forw Enable
Auto
1000 Full
Up
Enable
N/A
The following is an example of the fastpath status displayed while you execute the status command.
(Cisco Controller) >debug fastpath status
FP0.03:(119115)Received
FP0.00:(119115)Received
FP0.06:(119115)Received
FP0.05:(119115)Received
FP0.06:(119115)Received
FP0.03:(119115)Received
FP0.06:(119115)Received
FP0.07:(119125)Received
FP0.04:(119125)Received
FP0.03:(119125)Received
command:
command:
command:
command:
command:
command:
command:
command:
command:
command:
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
FP_CMD_ACL_COUNTER_GET
The following is an example of the fastpath errors displayed while you execute the debug fastpath log errors
command.
(Cisco Controller) >debug fastpath log errors
FP0.04:(873365)[fp_ingress_capwap:429]Discarding Control/Data
Plane DTLS-Application packets after Lookup Failed
FP0.02:(873418)Change logDebugLevel from: 0x1e to 0x9
The following is an example of the fastpath events displayed while you execute the debug fastpath log events
command.
(Cisco Controller) >debug fastpath log events
FP0.09:(873796)[fp_ingress_capwap:429]Discarding Control/Dat
a Plane DTLS-Application packets after Lookup Failed
FP0.06:(873921)Change logDebugLevel from: 0x9 to 0x1e
OL-31334-01
The following is an example displayed while you execute the debug fastpath log show command.
(Cisco Controller) >debug fastpath log show
567
debug l2age
To configure the debugging of Layer 2 age timeout messages, use the debug l2age command.
debug l2age {enable | disable}
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of Layer2 age settings:
(Cisco Controller) > debug l2age enable
Related Commands
debug disable-all
OL-31334-01
debug mac
To configure the debugging of the client MAC address, use the debug mac command.
debug mac {disable | addr MAC}
Syntax Description
Command Default
Command History
Examples
disable
addr
MAC
None
Release
Modification
7.6
The following example shows how to configure the debugging of the client using the MAC address:
(Cisco Controller) > debug mac addr 00.0c.41.07.33.a6
Related Commands
debug disable-all
569
Syntax Description
Command Default
Command History
Examples
enable
disable
By default, the debugging of all mDNS messages, details, and errors is disabled.
Release
Modification
7.4
The following example shows how to enable debugging of all mDNS messages, details, and errors:
(Cisco Controller) > debug mdns all enable
Related Commands
OL-31334-01
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.4
The following example shows how to enable the debugging of mDNS details:
(Cisco Controller) > debug mdns detail enable
Related Commands
571
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.4
The following example shows how to enable the debugging of mDNS errors.
(Cisco Controller) > debug mdns error enable
Related Commands
OL-31334-01
Syntax Description
enable
disable
Command Default
Disabled.
Command History
Release
Modification
7.4
Examples
The following example shows how to enable the debugging of mDNS messages:
(Cisco Controller) > debug mdns message enable
Related Commands
573
debug mdns ha
To debug all the multicast Domain Name System (mDNS) High Availability (HA) messages, use the debug
mdns ha command.
debug mdns ha {enable | disable}
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.5
Usage Guidelines
This command is automatically enabled when the debug mdns all command is enabled.
Examples
The following example shows how to enable debugging of all the mDNS HA messages:
(Cisco Controller) > debug mdns ha enable
OL-31334-01
debug memory
To enable or disable the debugging of errors or events during the memory allocation of the Cisco WLC, use
the debug memory command.
debug memory {errors | events} {enable | disable}
Syntax Description
Command Default
Command History
Examples
errors
events
enable
disable
By default, the debugging of errors or events during the memory allocation of the Cisco WLC is disabled.
Release
Modification
7.6
The following example shows how to enable the debugging of memory leak events:
(Cisco Controller) > debug memory events enable
Related Commands
575
debug nmsp
To configure the debugging of the Network Mobility Services Protocol (NMSP), use the debug nmsp command.
debug nmsp {all | connection | detail | error | event | message | packet}
Syntax Description
Command Default
Command History
Examples
all
connection
detail
error
event
message
packet
None
Release
Modification
7.6
The following example shows how to configure the debugging of NMSP connection events:
(Cisco Controller) > debug nmsp connection
Related Commands
OL-31334-01
debug ntp
To configure the debugging of the Network Time Protocol (NTP), use the debug ntp command.
debug ntp {detail | low | packet} {enable | disable}
Syntax Description
Command Default
Command History
Examples
detail
low
packet
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of NTP settings:
(Cisco Controller) > debug ntp packet enable
Related Commands
debug disable-all
577
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of the packets sent to the Cisco WLC CPU:
(Cisco Controller) > debug packet error enable
OL-31334-01
Syntax Description
acl
disable
enable
rx
tx
all
packet_count
display_size
format
hex2pcap
text2pcap
clear-all
driver
rule_index
action
579
npu_encap
port
eoip-eth
dst
src
type
Two-byte type code, such as 0x800 for IP, 0x806 for Address
Resolution Protocol (ARP). You can also enter a few common
string values such as ip (for 0x800) or arp (for 0x806).
vlan
eoip-ip
proto
Protocol. Valide values are: ip, icmp, igmp, ggp, ipencap, st, tcp,
egp, pup, udp, hmp, xns-idp, rdp, iso-tp4, xtp, ddp, idpr-cmtp, rspf,
vmtp, ospf, ipip, and encap.
src_port
dst_port
eth
ip
lwapp-dot11
bssid
lwapp-ip
OL-31334-01
Command Default
Command History
Examples
None
Release
Modification
7.6
581
debug poe
To configure the debugging of Power over Ethernet (PoE), use the debug poe command.
debug poe {detail | message | error} {enable | disable}
Syntax Description
Command Default
Command History
Examples
detail
error
message
enable
disable
None
Release
Modification
7.6
Related Commands
debug disable-all
OL-31334-01
debug rbcp
To configure Router Blade Control (RBCP) debug options, use the debug rbcp command.
debug rbcp {all | detail | errors | packet} {enable | disable}
Syntax Description
all
detail
errors
packet
enable
disable
Command Default
None
Examples
The following example shows how to enable the debugging of RBCP settings:
(Cisco Controller) > debug rbcp packet enable
Related Commands
debug disable-all
583
debug rfid
To configure radio frequency identification (RFID) debug options, use the debug rfid command.
debug rfid {all | detail | errors | nmsp | receive} {enable | disable}
Syntax Description
all
detail
errors
nmsp
receive
enable
disable
Command Default
None
Examples
The following example shows how to enable the debugging of RFID error messages:
(Cisco Controller) > debug rfid errors enable
Related Commands
debug disable-all
OL-31334-01
debug snmp
To configure SNMP debug options, use the debug snmp command.
debug snmp {agent | all | mib | trap} {enable | disable}
Syntax Description
agent
all
mib
trap
enable
disable
Command Default
None
Examples
Related Commands
debug disable-all
585
debug transfer
To configure transfer debug options, use the debug transfer command.
debug transfer {all | tftp | trace} {enable | disable}
Syntax Description
all
tftp
trace
enable
disable
Command Default
None
Examples
The following example shows how to enable the debugging of transfer messages:
(Cisco Controller) > debug transfer trace enable
Related Commands
debug disable-all
OL-31334-01
debug voice-diag
To trace call or packet flow, use the debug voice-diag command.
debug voice-diag {enable client_mac1 [client_mac2] [verbose] | disable}
Syntax Description
enable
Enables the debugging of voice diagnostics for voice clients involved in a call.
client_mac1
client_mac2
verbose
Note
Disables the debugging of voice diagnostics for voice clients involved in a call.
disable
Command Default
None
Usage Guidelines
Follow these guidelines when you use the debug voice-diag command:
When the command is entered, the validity of the clients is not checked.
A few output messages of the command are sent to the NCS or Prime Infrastructure.
The command expires automatically after 60 minutes.
The command provides the details of the call flow between a pair of client MACs involved in an active
call.
Note
Examples
Voice diagnostics can be enabled for a maximum of two voice clients at a time.
Related Commands
587
show debug
To determine if the MAC address and other flag debugging is enabled or disabled, sse the show debug
command.
show debug [packet]
Syntax Description
packet
Command Default
None.
Examples
disabled
0
0
text2pcap
OL-31334-01
[5]: disabled
[6]: disabled
LWAPP-Dot11 ACL:
[1]: disabled
[2]: disabled
[3]: disabled
[4]: disabled
[5]: disabled
[6]: disabled
LWAPP-IP ACL:
[1]: disabled
[2]: disabled
[3]: disabled
[4]: disabled
[5]: disabled
[6]: disabled
Related Commands
debug mac
589
show eventlog
To display the event log, use the show eventlog command.
show eventlog
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
File
Line TaskID
Code
bootos.c 788 125CEBCC AAAAAAAA
bootos.c 788 125CEBCC AAAAAAAA
bootos.c 788 125C597C AAAAAAAA
bootos.c 788 125C597C AAAAAAAA
bootos.c 788 125C597C AAAAAAAA
bootos.c 788 125C597C AAAAAAAA
bootos.c 788 125C597C AAAAAAAA
bootos.c 788 125C597C AAAAAAAA
bootos.c 788 1216C36C AAAAAAAA
bootos.c 788 1216C36C AAAAAAAA
bootos.c 788 1216C36C AAAAAAAA
bootos.c 788 1216C36C AAAAAAAA
d
0
0
0
0
0
0
0
0
0
0
0
0
Time
h m s
0 0 6
0 0 6
0 0 6
0 0 6
0 0 6
0 0 6
0 0 6
0 0 6
0 0 6
0 0 6
0 0 6
0 0 11
OL-31334-01
Syntax Description
Command Default
Command History
detail
None
Release
Modification
7.6
Usage Guidelines
Be careful when changing the defaults for the config memory monitor command unless you know what you
are doing, you have detected a problem, or you are collecting troubleshooting information.
Examples
The following is a sample output of the show memory monitor detail command:
(Cisco Controller) > show memory monitor detail
Memory error detected. Details:
------------------------------------------------ Corruption detected at pmalloc entry address:
(0x179a7ec0)
- Corrupt entry:headerMagic(0xdeadf00d),trailer(0xabcd),poison(0xreadceef),
entrysize(128),bytes(100),thread(Unknown task name,task id = (332096592)),
file(pmalloc.c),line(1736),time(1027)
Previous 1K memory dump from error location.
-----------------------------------------------(179a7ac0): 00000000 00000000 00000000 ceeff00d readf00d 00000080 00000000 00000000
(179a7ae0): 17958b20 00000000 1175608c 00000078 00000000 readceef 179a7afc 00000001
(179a7b00): 00000003 00000006 00000001 00000004 00000001 00000009 00000009 0000020d
(179a7b20): 00000001 00000002 00000002 00000001 00000004 00000000 00000000 5d7b9aba
(179a7b40): cbddf004 192f465e 7791acc8 e5032242 5365788c a1b7cee6 00000000 00000000
(179a7b60): 00000000 00000000 00000000 00000000 00000000 ceeff00d readf00d 00000080
(179a7b80): 00000000 00000000 17958dc0 00000000 1175608c 00000078 00000000 readceef
(179a7ba0): 179a7ba4 00000001 00000003 00000006 00000001 00000004 00000001 00003763
(179a7c00): 1722246c 1722246c 00000000 00000000 00000000 00000000 00000000 ceeff00d
(179a7c20): readf00d 00000080 00000000 00000000 179a7b78 00000000 1175608c 00000078
...
591
show run-config
To display a comprehensive view of the current Cisco wireless LAN controller configuration, use the show
run-config command.
show run-config [no-ap | commands]
Syntax Description
Command Default
Command History
Usage Guidelines
no-ap
commands
None
Release
Modification
7.6
Examples
Cisco Controller
FLS0923003B
xx:xx:xx:xx:xx:xx
Absent
Absent
Absent
Present, OK
OL-31334-01
show process
To display how various processes in the system are using the CPU at that instant in time, use the show process
command.
show process {cpu | memory}
Syntax Description
cpu
Displays how various system tasks are using the CPU at that moment.
memory
Command Default
None.
Usage Guidelines
This command is helpful in understanding if any single task is monopolizing the CPU and preventing other
tasks from being performed.
Examples
This example shows how to display various tasks in the system that are using the CPU at a given moment:
> show process cpu
Name
Priority
CPU Use
Reaper
reaperWatcher
( 3/124)
0 %
( 0/ 0)%
I
osapiReaper
(10/121)
0 %
( 0/ 0)%
I
TempStatus
(255/ 1)
0 %
( 0/ 0)%
I
emWeb
(255/ 1)
0 %
( 0/ 0)%
T 300
cliWebTask
(255/ 1)
0 %
( 0/ 0)%
I
UtilTask
(255/ 1)
0 %
( 0/ 0)%
T 300
This example shows how to display the allocation and deallocation of memory from various processes at a
given moment:
> show process memory
Name
Priority
BytesinUse
Reaper
reaperWatcher
( 3/124)
0
( 0/ 0)%
osapiReaper
(10/121)
0
( 0/ 0)%
TempStatus
(255/ 1)
308
( 0/ 0)%
emWeb
(255/ 1)
294440
( 0/ 0)%
cliWebTask
(255/ 1)
738
( 0/ 0)%
UtilTask
(255/ 1)
308
( 0/ 0)%
Related Commands
I
I
I
T 300
I
T 300
debug memory
transfer upload datatype
593
show tech-support
To display Cisco wireless LAN controller variables frequently requested by Cisco Technical Assistance Center
(TAC), use the show tech-support command.
show tech-support
Syntax Description
Command Default
None.
Examples
0%
4608
4604
4
152
3
152
3
747040 Secs
127552 Kbytes
19540 Kbytes
0 Kbytes
460 Kbytes
OL-31334-01
Caution
Syntax Description
Command Default
Command History
The config memory monitor commands can be disruptive to your system and should be run only when
you are advised to do so by the Cisco TAC.
enable
disable
Release
Modification
7.6
Usage Guidelines
Be cautious about changing the defaults for the config memory monitor command unless you know what
you are doing, you have detected a problem, or you are collecting troubleshooting information.
Examples
The following example shows how to enable monitoring for memory errors and leaks for a controller:
(Cisco Controller) > config memory monitor errors enable
Related Commands
595
Caution
Syntax Description
Command Default
Command History
The config memory monitor commands can be disruptive to your system and should be run only when
you are advised to do so by the Cisco TAC.
low_thresh
Value below which free memory cannot fall without crashing. This value cannot
be set lower than 10000 KB.
high_thresh
Value below which the controller enters auto-leak-analysis mode. See the Usage
Guidelines section.
The default value for low_thresh is 10000 KB; the default value for high_thresh is 30000 KB.
Release
Modification
7.6
Usage Guidelines
Note
Be cautious about changing the defaults for the config memory monitor command unless you know what
you are doing, you have detected a problem, or you are collecting troubleshooting information.
Use this command if you suspect that a memory leak has occurred.
If the free memory is lower than the low_thresh threshold, the system crashes, generating a crash file. The
default value for this parameter is 10000 KB, and you cannot set it below this value.
Set the high_thresh threshold to the current free memory level or higher so that the system enters
auto-leak-analysis mode. After the free memory reaches a level lower than the specified high_thresh threshold,
the process of tracking and freeing memory allocation begins. As a result, the debug memory events enable
command shows all allocations and frees, and the show memory monitor detail command starts to detect
any suspected memory leaks.
OL-31334-01
Examples
The following example shows how to set the threshold values for auto-leak-analysis mode to 12000 KB for
the low threshold and 35000 KB for the high threshold:
(Cisco Controller) > config memory monitor leaks 12000 35000
Related Commands
597
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
The message log always collects and displays critical messages, regardless of the message log level setting.
Examples
The following example shows how to configure the message log severity level and display critical messages:
(Cisco Controller) > config msglog level critical
Related Commands
show msglog
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to reset the message log to collect and display critical and noncritical error
messages:
(Cisco Controller) > config msglog level error
Related Commands
show msglog
599
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to reset the message log so that it collects and display critical, noncritical,
and authentication or security-related errors:
(Cisco Controller) > config msglog level security
Related Commands
show msglog
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to reset the message logs so that it collects and display all messages:
(Cisco Controller) > config msglog level verbose
Related Commands
show msglog
601
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to reset the message log so that it collects and displays warning messages
in addition to critical, noncritical, and authentication or security-related errors:
(Cisco Controller) > config msglog level warning
Related Commands
show msglog
OL-31334-01
ping
To send ICMP echo packets to a specified IP address, use the ping command:
ping ip-addr interface-name
Syntax Description
Command Default
Command History
Examples
ip-addr
IP address of the interface that you are trying to send ICMP echo packets
to
interface-name
Name of the interface to which you are trying to send ICMP echo packets
None
Release
Modification
7.6
The following example shows how to send ICMP echo packets to an interface:
(Cisco Controller) >ping 209.165.200.225 dyn-interface-1
603
OL-31334-01
PART
II
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands, page 607
config Commands, page 625
show Commands
This section lists the show commands that you can use to display information about the controller ports and
interfaces.
607
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
summary
None
Release
Modification
7.6
8.0
The following example displays the summary of the local IPv4 interfaces:
(Cisco Controller) > show interface summary
Number of Interfaces.......................... 6
Interface Name
-------------------------------dyn59
management
redundancy-management
redundancy-port
service-port
virtual
Examples
Port
---LAG
LAG
LAG
N/A
N/A
Vlan Id
-------59
56
56
untagged
N/A
N/A
IP Address
--------------9.10.59.66
9.10.56.60
0.0.0.0
0.0.0.0
2.2.2.2
1.2.3.4
Type
------Dynamic
Static
Static
Static
Static
Static
Ap Mgr
-----No
Yes
No
No
No
No
Guest
----No
No
No
No
No
No
The following example displays the summary of the local IPv6 interfaces:
show ipv6 interface summary
Number of Interfaces.......................... 2
Interface Name
Port Vlan Id IPv6 Address/Prefix Length
----------------------- ---- -------- -----------------------------------------management
LAG 56
fe80::224:97ff:fe69:69af/64
LAG 56
2001:9:10:56::60/64
service-port
N/A N/A
fe80::224:97ff:fe69:69a1/64
N/A N/A
::/128
609
show Commands
Syntax Description
Command Default
Command History
Examples
detailed
interface_name
management
redundancy-management
redundancy-port
service-port
virtual
None
Release
Modification
7.6
8.0
The following example shows how to display the detailed interface information:
(Cisco Controller) > show interface detailed management
Interface Name...................................
MAC Address......................................
IP Address.......................................
IP Netmask.......................................
IP Gateway.......................................
External NAT IP State............................
External NAT IP Address..........................
Link Local IPv6 Address..........................
STATE ...........................................
Primary IPv6 Address.............................
STATE ...........................................
management
00:24:97:69:69:af
9.10.56.60
255.255.255.0
9.10.56.1
Disabled
0.0.0.0
fe80::224:97ff:fe69:69af/64
REACHABLE
2001:9:10:56::60/64
REACHABLE
OL-31334-01
show Commands
Note
fe80::aea0:16ff:fe4f:2242
ac:a0:16:4f:22:42
REACHABLE
56
0
Building1
LAG (13)
LAG (13)
Unconfigured
Global
9.1.0.100
Unconfigured
Disabled
Disabled
Unconfigured
Unconfigured
Unconfigured
Yes
No
Enabled
Some WLAN controllers may have only one physical port listed because they have only one physical
port.
The following example shows how to display the detailed redundancy management interface information:
(Cisco Controller) > show interface detailed redundancy-management
Interface Name...................................
MAC Address......................................
IP Address.......................................
Virtual DNS Host Name............................
AP Manager.......................................
Guest Interface..................................
virtual
88:43:e1:7e:0b:20
1.1.1.1
Disabled
No
No
611
show Commands
Syntax Description
Command Default
Command History
Examples
summary
detailed
interface_group_name
None
Release
Modification
7.6
The following example shows how to display a summary of local interface groups:
(Cisco Controller) > show interface group summary
The following example shows how to display the detailed interface group information:
(Cisco Controller) > show interface group detailed mygroup1
Interface Group Name.............................
Quarantine ......................................
Number of Wlans using the Interface Group........
Number of AP Groups using the Interface Group....
Number of Interfaces Contained...................
mygroup1
No
0
0
1
Vlan
----
Interface Name
--------------------------------
OL-31334-01
show Commands
42
testabc
613
show Commands
Syntax Description
Command Default
Command History
Examples
dest_MAC
source_MAC
None
Release
Modification
7.6
The following example shows how to display the physical port used for a specific MAC address:
(Cisco Controller) > show lag eth-port-hash 11:11:11:11:11:11
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Usage Guidelines
dest_IP
source_IP
None
Release
Modification
7.6
8.0
For CAPWAP packets, enter the IP address of the access points. For EOIP packets, enter the IP address of
the controller. For WIRED_GUEST packets, enter its IP address. For non tunneled IP packets from WLC,
enter the destination IP address. For other non tunneled IP packets, enter both destination and source IP
addresses.
This command is applicable for both IPv4 and IPv6 addresses.
Examples
The following example shows how to display the physical port used for a specific IP address:
(Cisco Controller) > show lag ip-port-hash 192.168.102.138
615
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the current status of the LAG configuration:
(Cisco Controller) > show lag summary
LAG Enabled
OL-31334-01
show Commands
show port
To display the Cisco wireless LAN controller port settings on an individual or global basis, use the show port
command.
show port {port | summary}
Syntax Description
Command Default
Command History
Examples
port
summary
None
Release
Modification
7.6
The following example shows how to display information about an individual wireless LAN controller port:
(Cisco Controller) > show port 1
STP
Admin
Physical
Physical
Link
Link
Mcast
Pr Type
Stat
Mode
Mode
Status
Status Trap
Appliance
POE
-- ------- ---- ------- ---------- ---------- ------ ------- --------------1 Normal Disa Enable Auto
1000 Full Down
Enable Enable
N/A
Note
Some WLAN controllers may not have multicast or Power over Ethernet (PoE) listed because they do not
support those features.
The following example shows how to display a summary of all ports:
(Cisco Controller) > show port summary
STP
Admin
Physical
Physical
Link
Link
Mcast
Pr Type
Stat
Mode
Mode
Status
Status Trap
Appliance
POE
SFPType
-- ------- ---- ------- ---------- ---------- ------ ------- --------------------1 Normal Forw Enable Auto
1000 Full Up
Enable Enable
N/A
NotPresent
2 Normal Disa Enable Auto
1000 Full Down
Enable Enable
N/A
NotPresent
3 Normal Disa Enable Auto
1000 Full Down
Enable Enable
N/A
NotPresent
617
show Commands
Note
Auto
1000 Full
Down
Enable
Enable
N/A
Some WLAN controllers may have only one port listed because they have only one physical port.
OL-31334-01
show Commands
show serial
To display the serial (console) port configuration, use the show serial command.
show serial
Syntax Description
Command Default
The default values for Baud rate, Character, Flow Control, Stop Bits, Parity type of the port configuration are
9600, 8, off, 1, none.
Command History
Examples
Release
Modification
7.6
The following example shows how to display EIA-232 parameters and the serial port inactivity timeout:
(Cisco Controller) > show serial
45
9600
8
Disable
1
none
619
show Commands
Syntax Description
port
Command Default
Command History
Usage Guidelines
Note
Examples
The default SPT configuration output values are 800C, Disabled, 802.1D, 128, 100, Auto.
Release
Modification
7.6
When the a Cisco 4400 Series wireless LAN controller is configured for port redundancy, the Spanning Tree
Protocol (STP) must be disabled for all ports on the Cisco 4400 Series Wireless LAN Controller. STP can
remain enabled on the switch connected to the Cisco 4400 Series Wireless LAN Controller.
The following example shows how to display spanning tree values on a per port basis:
(Cisco Controller) > show spanningtree port 3
STP
STP
STP
STP
STP
STP
Port
Port
Port
Port
Port
Port
ID.................................
State..............................
Administrative Mode................
Priority...........................
Path Cost..........................
Path Cost Mode.....................
800C
Disabled
802.1D
128
100
Auto
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to display spanning tree values on a per switch basis:
(Cisco Controller) > show spanningtree switch
STP Specification......................
STP Base MAC Address...................
Spanning Tree Algorithm................
STP Bridge Priority....................
STP Bridge Max. Age (seconds)..........
STP Bridge Hello Time (seconds)........
STP Bridge Forward Delay (seconds).....
IEEE 802.1D
00:0B:85:02:0D:20
Disable
32768
20
2
15
621
show Commands
Syntax Description
detailed
summary
port
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display the port summary information:
(Cisco Controller) > show stats port summary
399958
0
8350
106060
0
0
2 day 11 hr 16 min 23 sec
The following example shows how to display the detailed port information:
(Cisco Controller) > show stats port detailed 1
OL-31334-01
show Commands
623
show Commands
Syntax Description
Command Default
Command History
Examples
detailed
summary
None
Release
Modification
7.6
136410
18805
0
78002
3340
2
26
1
2 day 11 hr 22 min 17 sec
RECEIVE
Octets...........................................
Total Pkts.......................................
Unicast Pkts.....................................
Multicast Pkts...................................
Broadcast Pkts...................................
Pkts Discarded...................................
TRANSMIT
Octets...........................................
Total Pkts.......................................
Unicast Pkts.....................................
Multicast Pkts...................................
Broadcast Pkts...................................
Pkts Discarded...................................
19351718
183468
180230
3219
19
0
354251
5882
5875
0
7
0
OL-31334-01
config Commands
ADDRESS ENTRIES
Most Ever Used...................................
Currently In Use.................................
VLAN ENTRIES
Maximum..........................................
Most Ever Used...................................
Static In Use....................................
Dynamic In Use...................................
VLANs Deleted....................................
Time Since Ctrs Last Cleared.....................
sec
1
1
128
1
1
0
0
2 day 0 hr 43 min 22
config Commands
This section lists the config commands to configure controller ports and interfaces.
625
config Commands
Syntax Description
Command Default
Command History
ap-manager
management
interface_name
Interface name.
ACL
none
Specifies none.
None
Release
Modification
7.6
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless
LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL
under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series
Wireless LAN Controllers.
Examples
The following example shows how to configure an access control list with a value None:
(Cisco Controller) > config interface acl management none
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
ap-manager
IP_address
netmask
Network mask.
gateway
management
service-port
virtual
interface-name
interface-name
Interface name.
redundancy-management
peer-redundancy-management
None
Release
Modification
7.6
For Cisco 5500 Series Controllers, you are not required to configure an AP-manager interface. The management
interface acts like an AP-manager interface by default.
627
config Commands
Usage Guidelines
Ensure that the management interfaces of both controllers are in the same subnet. Ensure that the Redundant
Management IP address for both controllers is the same. Likewise, ensure that the Peer Redundant Management
IP address for both the controllers is the same.
Examples
The following example shows how to configure an access point manager interface with IP address
209.165.201.31, network mask 255.255.0.0, and gateway address 209.165.201.30:
(Cisco Controller) > config interface address ap-manager 209.165.201.31 255.255.0.0
209.165.201.30
The following example shows how to configure a redundancy management interface on the controller:
(Cisco Controller) > config interface address redundancy-management 209.4.120.5
peer-redundancy-management 209.4.120.6
Related Commands
show interface
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
IP_address
netmask
Network mask.
gateway
None
Release
Modification
7.6
Usage Guidelines
You can use this command to check the Active-Standby reachability when the keep-alive fails.
Examples
The following example shows how to configure the management IP addresses of the controller:
(Cisco Controller) > config interface address redundancy-management 209.165.201.31 255.255.0.0
209.165.201.30
Related Commands
629
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
management
interface_name
enable
disable
None
Release
Modification
7.6
Use the management option to enable or disable dynamic AP management for the management interface.
For Cisco 5500 Series Controllers, the management interface acts like an AP-manager interface by default.
If desired, you can disable the management interface as an AP-manager interface and create another dynamic
interface as an AP manager.
When you enable this feature for a dynamic interface, the dynamic interface is configured as an AP-manager
interface (only one AP-manager interface is allowed per physical port). A dynamic interface that is marked
as an AP-manager interface cannot be used as a WLAN interface.
Examples
The following example shows how to disable an access point manager myinterface:
(Cisco Controller) > config interface ap-manager myinterface disable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
interface_name
Interface name.
vlan-id
VLAN identifier.
None
Release
Modification
7.6
The following example shows how to create a dynamic interface with the interface named lab2 and VLAN
ID 6:
(Cisco Controller) > config interface create lab2 6
631
config Commands
Syntax Description
Command Default
Command History
Examples
interface-name
interface-nameInterface name.
None
Release
Modification
7.6
The following example shows how to delete a dynamic interface named VLAN501:
(Cisco Controller) > config interface delete VLAN501
OL-31334-01
config Commands
Syntax Description
ap-manager
primary
dhcp_server
secondary
option-82
enable
disable
management
service-port
dynamic-interface
name
proxy-mode
enable
disable
global
linksel {enable | disable | relaysrc} interface-name Configures link select suboption 5 on a dynamic or
management interface.
633
config Commands
vpnsel {enable | disable | vrfname vrf-name | vpnid Configures VPN select suboption 151 on a dynamic
or management interface.
vpn-id }
Command Default
Command History
Usage Guidelines
None
Release
Modification
7.6
8.0
8.0
Examples
The following example shows how to configure ap-manager server with the primary DHCP server 10.21.15.01
and secondary DHCP server 10.21.15.25:
(Cisco Controller) > config interface dhcp ap-manager server-1 10.21.15.01 server-2
10.21.15.25
The following example shows how to configure DHCP option 82 on the ap-manager:
(Cisco Controller) > config interface dhcp ap-manager option-82 enable
The following example shows how to enable the DHCP for the out-of-band service port:
(Cisco Controller) > config interface dhcp service-port enable
Related Commands
config dhcp
config dhcp proxy
config interface dhcp
config wlan dhcp_server
debug dhcp
debug dhcp service-port
debug disable-all
show dhcp
show dhcp proxy
show interface
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
management
Management interface
dynamic-interface
Dynamic interface
dynamic-interface-name
option-82
bridge-mode-insertion
Release
Modification
8.0
635
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
dynamic-interface
dynamic_interface
IP_address
netmask
gateway
management
redundancy-management
peer-redundancy-management
service-port
virtual
None
Release
Modification
7.6
Ensure that the management interfaces of both controllers are in the same subnet. Ensure that the redundant
management IP address for both controllers is the same and that the peer redundant management IP address
for both the controllers is the same.
OL-31334-01
config Commands
Examples
The following example shows how to configure a redundancy management interface on the controller:
(Cisco Controller) >config interface address redundancy-management 209.4.120.5
peer-redundancy-management 209.4.120.6
Related Commands
637
config Commands
Syntax Description
Command Default
Command History
Examples
interface_name
Interface name.
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the guest LAN feature on the interface named myinterface:
(Cisco Controller) > config interface guest-lan myinterface enable
Related Commands
OL-31334-01
config Commands
Syntax Description
virtual
DNS_host
Command Default
Command History
Examples
DNS hostname.
None
Release
Modification
7.6
The following example shows how to configure virtual gateway interface to use the specified virtual address
of the fully qualified DNS hostname DNS_Host:
(Cisco Controller) > config interface hostname virtual DNS_Host
639
config Commands
Syntax Description
NAS-ID
Command Default
Command History
none
interface_name
None
Release
Modification
7.6
Usage Guidelines
The NAS-ID configured on the controller for AP group or WLAN or interface is used for authentication. The
NAS-ID is not propagated across controllers.
Examples
The following example shows how to configure the NAS-ID for the interface:
(Cisco Controller) > config interface nasid
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
management
dynamic-interface interface_name
enable
disable
public_IP_address
None
Release
Modification
7.6
These NAT commands can be used only on Cisco 5500 Series Controllers and only if the management interface
is configured for dynamic AP management.
These commands are supported for use only with one-to-one-mapping NAT, where each private client has a
direct and fixed mapping to a global address. They do not support one-to-many NAT, which uses source port
mapping to enable a group of clients to be represented by a single IP address.
Examples
The following example shows how to enable one-to-one mapping NAT on the management interface:
(Cisco Controller) > config interface nat-address management enable
The following example shows how to set the external NAP IP address 10.10.10.10 on the management
interface:
(Cisco Controller) > config interface nat-address management set 10.10.10.10
641
config Commands
Syntax Description
Command Default
Command History
management
interface_name
Interface name.
redundancy-management
primary_port
secondary_port
None
Release
Modification
7.6
Usage Guidelines
You can use the management option for all controllers except the Cisco 5500 Series Controllers.
Examples
The following example shows how to configure the primary port number of the LAb02 interface to 3:
(Cisco Controller) > config interface port lab02 3
OL-31334-01
config Commands
Syntax Description
interface-name
Interfaces name.
vlan_id
VLAN identifier.
Note
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure a quarantine VLAN on the quarantine interface with the
VLAN ID 10:
(Cisco Controller) > config interface quarantine vlan quarantine 10
643
config Commands
Syntax Description
Command Default
Command History
ap-manager
management
interface_name
Interface name.
vlan
VLAN identifier.
redundancy-management
None
Release
Modification
7.6
Usage Guidelines
You cannot change the redundancy management VLAN when the system redundancy management interface
is mapped to the redundancy port. You must configure the redundancy management port first.
Examples
The following example shows how to configure VLAN ID 10 on the management interface:
(Cisco Controller) > config interface vlan management 10
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
all
interface-group-name
Name of the interface group to which the mDNS profile has to be associated.
The interface group name can be up to 32 case-sensitive, alphanumeric
characters.
profile-name
none
Removes all existing mDNS profiles from the interface group. You cannot
configure mDNS profiles on the interface group.
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to configure an mDNS profile for an interface group floor1:
(Cisco Controller) > config interface group mdns-profile floor1 profile1
Related Commands
645
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
management
all
interface-name
Name of the interface on which the mDNS profile has to be configured. The
interface name can be up to 32 case-sensitive, alphanumeric characters.
profile-name
none
Removes all existing mDNS profiles from the interface. You cannot configure
mDNS profiles on the interface.
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to configure an mDNS profile for an interface lab1:
(Cisco Controller) > config interface mdns-profile lab1 profile1
Related Commands
647
config Commands
OL-31334-01
config Commands
config lag
To enable or disable link aggregation (LAG), use the config lag command.
config lag {enable | disable}
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
Enabling LAG will map your current interfaces setting to LAG interface,
All dynamic AP Manager interfaces and Untagged interfaces will be deleted
All WLANs will be disabled and mapped to Mgmt interface
Are you sure you want to continue? (y/n)
You must now reboot for the settings to take effect.
The following example shows how to disable LAG settings:
(Cisco Controller) > config lag disable
649
config Commands
Syntax Description
add
MAC_addr
wlan_id
interface_name
description
IP Address
Command Default
Command History
Usage Guidelines
None
Release
Modification
7.6
8.0
Use the config macfilter add command to add a client locally to a wireless LAN on the Cisco wireless LAN
controller. This filter bypasses the RADIUS authentication process.
As on release 7.6, the optional macfilter_IP supports only IPv4 address.
Examples
The following example shows how to add a MAC filter entry 00:E0:77:31:A3:55 with the wireless LAN ID
1, interface name labconnect, and MAC filter IP 10.92.125.51 on the controller:
(Cisco Controller) > config macfilter add 00:E0:77:31:A3:55 1 lab02 labconnect 10.92.125.51
OL-31334-01
config Commands
Related Commands
show macfilter
config macfilter ip-address
651
config Commands
Syntax Description
Command Default
Command History
Examples
MAC addr
description
None
Release
Modification
7.6
The following example shows how to configure the description MAC filter 01 to MAC address
11:11:11:11:11:11:
(Cisco Controller) > config macfilter description 11:11:11:11:11:11 MAC Filter 01
Related Commands
show macfilter
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
MAC addr
interface
None
Release
Modification
7.6
The following example shows how to configure a MAC filer interface Lab01 on client 11:11:11:11:11:11:
(Cisco Controller) > config macfilter interface 11:11:11:11:11:11 Lab01
Related Commands
show macfilter
653
config Commands
Syntax Description
Command Default
Command History
Examples
MAC_addr
IP Address
None
Release
Modification
7.6
8.0
The following example shows how to add an IP address for a passive client:
(Cisco Controller) > config macfilter ip-address aa-bb-cc-dd-ee-ff 10.92.125.51
Related Commands
show macfilter
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
none
colon
hyphen
single-hyphen
Release
Modification
7.6
The following example shows how to have the operating system send MAC addresses to the RADIUS server
in the form aa:bb:cc:dd:ee:ff:
(Cisco Controller) > config macfilter mac-delimiter colon
The following example shows how to have the operating system send MAC addresses to the RADIUS server
in the form aa-bb-cc-dd-ee-ff:
(Cisco Controller) > config macfilter mac-delimiter hyphen
The following example shows how to have the operating system send MAC addresses to the RADIUS server
in the form aabbccddeeff:
(Cisco Controller) > config macfilter mac-delimiter none
Related Commands
show macfilter
655
config Commands
Syntax Description
Command Default
Command History
Examples
cisco
free
other
Other
Release
Modification
7.6
8.0
The following example shows how to configure the Cisco ACS compatibility mode to other:
(Cisco Controller) > config macfilter radius-compat other
Related Commands
show macfilter
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
MAC addr
WLAN_id
None
Release
Modification
7.6
The following example shows how to modify client wireless LAN ID 2 for a MAC filter 11:11:11:11:11:11:
(Cisco Controller) > config macfilter wlan-id 11:11:11:11:11:11 2
Related Commands
show macfilter
show wlan
657
config Commands
Syntax Description
Command Default
Command History
Examples
all
port
enable
disable
Enabled
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
all
port
enable
disable
Release
Modification
7.6
Usage Guidelines
You must disable port auto-configuration before you make physical mode manual settings by using the config
port physicalmode command. The config port autoneg command overrides settings that you made using
the config port physicalmode command.
Examples
The following example shows how to turn on physical port autonegotiation for all front-panel Ethernet ports:
(Cisco Controller) > config port autoneg all enable
The following example shows how to disable physical port autonegotiation for front-panel Ethernet port 19:
(Cisco Controller) > config port autoneg 19 disable
659
config Commands
Syntax Description
Command Default
Command History
Examples
all
port
enable
disable
The default value for down link traps for a specific controller port or for all ports is enabled.
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
all
port
enable
disable
The default multicast appliance service for a specific controller port or for all ports is enabled.
Release
Modification
7.6
The following example shows how to enable multicast appliance service on all ports:
(Cisco Controller) > config port multicast appliance all enable
The following example shows how to disable multicast appliance service on port 8:
(Cisco Controller) > config port multicast appliance 8 disable
661
config Commands
Syntax Description
Command Default
Command History
Examples
all
port
Port number.
enable
disable
Enabled
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
ip_address
Network IP address.
netmask
gateway
Command Default
None
Usage Guidelines
Command History
Examples
Release
Modification
7.6
The following example shows how to configure a network route to a dedicated workstation IP address 10.1.1.0,
subnet mask 255.255.255.0, and gateway 10.1.1.1:
(Cisco Controller) > config route add 10.1.1.0 255.255.255.0 10.1.1.1
663
config Commands
Syntax Description
ip_address
Network IP address.
Command Default
None
Usage Guidelines
Command History
Examples
Release
Modification
7.6
8.0
The following example shows how to delete a route from the network IP address 10.1.1.0:
(Cisco Controller) > config route delete 10.1.1.0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
1200
2400
4800
9600
19200
38400
57600
Release
Modification
7.6
The following example shows how to configure a serial baud rate with the default connection speed of 9600:
(Cisco Controller) > config serial baudrate 9600
665
config Commands
Syntax Description
Command Default
Command History
minutes
0 (no timeout)
Release
Modification
7.6
Usage Guidelines
Use this command to set the timeout for a serial connection to the front of the Cisco wireless LAN controller
from 0 to 160 minutes where 0 is no timeout.
Examples
The following example shows how to configure the timeout of a serial port session to 10 minutes:
(Cisco Controller) > config serial timeout 10
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
off
802.1d
fast
port
all
Release
Modification
7.6
When the Cisco 4400 Series Wireless LAN Controller is configured for port redundancy, STP must be disabled
for all ports on the controller. STP can remain enabled on the switch connected to the controller.
Entering this command allows the controller to set up STP, detect logical network loops, place redundant
ports on standby, and build a network with the most efficient pathways.
Examples
The following example shows how to disable STP for all Ethernet ports:
(Cisco Controller) > config spanningtree port mode off all
The following example shows how to turn on STP 802.1D mode for Ethernet port 24:
(Cisco Controller) > config spanningtree port mode 802.1d 24
The following example shows how to turn on fast STP mode for Ethernet port 2:
(Cisco Controller) > config spanningtree port mode fast 2
667
config Commands
Syntax Description
Command Default
Command History
cost
auto
port
all
Release
Modification
7.6
Usage Guidelines
When the Cisco 4400 Series Wireless LAN Controller is configured for port redundancy, STP must be disabled
for all ports on the controller. STP can remain enabled on the switch that is connected to the controller.
Examples
The following example shows how to have the STP algorithm automatically assign a path cost for all ports:
(Cisco Controller) > config spanningtree port pathcost auto all
The following example shows how to have the STP algorithm use a port cost of 200 for port 22:
(Cisco Controller) > config spanningtree port pathcost 200 22
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
priority_num
port
Release
Modification
7.6
Usage Guidelines
When the Cisco 4400 Series Wireless LAN Controller is configured for port redundancy, STP must be disabled
for all ports on the controller. STP can remain enabled on the switch connected to the controller.
Examples
The following example shows how to set Ethernet port 2 to STP priority 100:
(Cisco Controller) > config spanningtree port priority 100 2
669
config Commands
Syntax Description
Command Default
Command History
priority_num
Release
Modification
7.6
Usage Guidelines
Note
When the Cisco 4400 Series Wireless LAN Controller is configured for port redundancy, STP must be
disabled for all ports on the controller. STP can remain enabled on the switch connected to the controller.
The value of the writable portion of the Bridge ID, that is, the first two octets of the (8 octet long) Bridge ID.
The other (last) 6 octets of the Bridge ID are given by the value of Bridge MAC address. The value may be
specified as a number between 0 and 65535.
Examples
The following example shows how to configure spanning tree values on a per switch basis with the bridge
priority 40230:
(Cisco Controller) > config spanningtree switch bridgepriority 40230
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
seconds
Release
Modification
7.6
Usage Guidelines
The value that all bridges use for forward delay when this bridge is acting as the root. 802.1D-1990 specifies
that the range for this setting is related to the value of the STP bridge maximum age. The granularity of this
timer is specified by 802.1D-1990 to be 1 second. An agent may return a badValue error if a set is attempted
to a value that is not a whole number of seconds. The default is 15. Valid values are 4 through 30 seconds.
Examples
The following example shows how to configure spanning tree values on a per switch basis with the bridge
timeout as 20 seconds:
(Cisco Controller) > config spanningtree switch forwarddelay 20
671
config Commands
Syntax Description
Command Default
Command History
seconds
Release
Modification
7.6
Usage Guidelines
All bridges use this value for HelloTime when this bridge is acting as the root. The granularity of this timer
is specified by 802.1D- 1990 to be 1 second. Valid values are 1 through 10 seconds.
Examples
The following example shows how to configure the STP hello time to 4 seconds:
(Cisco Controller) > config spanningtree switch hellotime 4
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
seconds
Release
Modification
7.6
Usage Guidelines
All bridges use this value for MaxAge when this bridge is acting as the root. 802.1D-1990 specifies that the
range for this parameter is related to the value of Stp Bridge Hello Time. The granularity of this timer is
specified by 802.1D-1990 to be 1 second. Valid values are 6 through 40 seconds.
Examples
The following example shows how to configure the STP bridge maximum age to 30 seconds:
(Cisco Controller) > config spanningtree switch maxage 30
673
config Commands
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.6
Usage Guidelines
Using this command allows the controller to set up STP, detect logical network loops, place redundant ports
on standby, and build a network with the most efficient pathways.
Examples
The following example shows how to support STP on all Cisco wireless LAN controller ports:
(Cisco Controller) > config spanningtree switch mode enable
clear Commands
This section lists the clear commands to clear the configurations on the controller ports and interfaces.
OL-31334-01
config Commands
Syntax Description
port
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the statistics counters for port 9:
(Cisco Controller) > clear stats port 9
Related Commands
clear transfer
clear download datatype
clear download datatype
clear download filename
clear download mode
clear download serverip
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
clear stats port
675
config Commands
OL-31334-01
PART
III
VideoStream Commands
CLI Commands, page 679
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands, page 679
config Commands, page 685
show Commands
This section lists the show commands to display information about your VideoStream configuration settings.
679
show Commands
show 802.11
To display basic 802.11a, 802.11b/g, or 802.11h network settings, use the show 802.11 command.
show 802.11{a | b | h}
Syntax Description
Command Default
None.
Examples
Enabled
Enabled
Enabled
Enabled
Enabled
Mandatory
Supported
Mandatory
Supported
Mandatory
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Enabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
OL-31334-01
show Commands
Related Commands
802.11h
......................................... powerconstraint : 0
......................................... channelswitch : Disable
......................................... channelswitch mode : 0
show ap stats
show ap summary
show client summary
show network
show network summary
show port
show wlan
681
show Commands
Syntax Description
media_stream_name
Command Default
None.
Examples
Related Commands
Enabled
Disabled
Enabled
Auto
Auto
0
75
85
6000
80
OL-31334-01
show Commands
Syntax Description
media-stream_name
summary
Command Default
None.
Examples
Related Commands
QoS
Status
------ ------Video Admitted
683
show Commands
Syntax Description
media-stream_name
Command Default
None.
Examples
Related Commands
abc
227.8.8.8
227.9.9.9
1200
300
Admit
periodic
Video
Multicast-direct
5
drop
OL-31334-01
config Commands
Syntax Description
Command Default
None.
Examples
Related Commands
config Commands
This section lists the config commands to configure VideoStream settings on the controller.
685
config Commands
Syntax Description
enable
disable
Command Default
The default video CAC settings for the 802.11a or 802.11b/g network is disabled.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable, or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the video CAC for the 802.11a network:
(Cisco Controller) > config 802.11 cac video acm enable
OL-31334-01
config Commands
The following example shows how to disable the video CAC for the 802.11b network:
(Cisco Controller) > config 802.11 cac video acm disable
Related Commands
687
config Commands
Syntax Description
static
Enables the static CAC method for video applications on the 802.11a
or 802.11b/g network.
Static or bandwidth-based CAC enables the client to specify how much
bandwidth or shared medium time is required to accept a new video
request and in turn enables the access point to determine whether it is
capable of accommodating the request.
load-based
Command Default
Static.
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
OL-31334-01
config Commands
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Video CAC consists of two parts: Unicast Video-CAC and MC2UC CAC. If you need only Unicast Video-CAC,
you must configure only static mode. If you need only MC2UC CAC, you must configure Static or Load-based
CAC. Load-based CAC is not supported if SIP-CAC is enabled.
Command History
Examples
Release
Modification
7.6
This example shows how to enable the static CAC method for video applications on the 802.11a network:
(Cisco Controller) > config 802.11 cac video cac-method static
Related Commands
689
config Commands
Syntax Description
enable
disable
Command Default
Disabled.
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Video CAC consists of two parts: Unicast Video-CAC and MC2UC CAC. If you need only Unicast Video-CAC,
you must configure only static mode. If you need only MC2UC CAC, you must configure Static or Load-based
CAC. Load-based CAC is not supported if SIP-CAC is enabled.
OL-31334-01
config Commands
Note
Command History
Examples
Release
Modification
7.6
This example shows how to enable load-based CAC method for video applications on the 802.11a network:
(Cisco Controller) > config 802.11 cac video load-based enable
Related Commands
691
config Commands
Syntax Description
bandwidth
Command Default
The default maximum bandwidth allocated to clients for video applications on the 802.11a or 802.11b/g
network is 0%.
Usage Guidelines
The maximum radio frequency (RF) bandwidth cannot exceed 85% for voice and video. Once the client
reaches the value specified, the access point rejects new calls on this network.
Note
If this parameter is set to zero (0), the controller assumes that you do not want to allocate any bandwidth
and allows all bandwidth requests.
Call Admission Control (CAC) commands require that the WLAN you are planning to modify is configured
for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable, or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
OL-31334-01
config Commands
Examples
The following example shows how to specify the percentage of the maximum allocated bandwidth for video
applications on the selected radio band:
(Cisco Controller) > config 802.11 cac video max-bandwidth 50
Related Commands
693
config Commands
Syntax Description
multicast-direct
max-retry-percent
retry-percentage
min-client-rate
dot11-rate
Command Default
The default value for the maximum retry percent is 80. If it exceeds 80, either the video will not start or the
client might be classified as a bad client. The bad client video will be demoted for better effort QoS or is
subject to denial.
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
OL-31334-01
config Commands
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the maximum retry percent for multicast-direct media streams
as 90 on a 802.11a network:
(Cisco Controller) > config 802.11 cac media-stream multicast-direct max-retry-percent 90
Related Commands
695
config Commands
Syntax Description
max-bandwidth
bandwidth
Command Default
The default maximum bandwidth allocated to Wi-Fi Multimedia (WMM) clients for voice and video applications
on the 802.11a or 802.11b/g network is 85%.
Usage Guidelines
Call Admission Control (CAC) commands for video applications on the 802.11a or 802.11b/g network require
that the WLAN you are planning to modify is configured for Wi-Fi Multimedia (WMM) protocol and the
quality of service (QoS) level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
OL-31334-01
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the percentage of the maximum bandwidth allocated to WMM
clients for voice and video applications on the 802.11a network:
(Cisco Controller) > config 802.11 cac multimedia max-bandwidth 80
Related Commands
697
config Commands
Syntax Description
bandwidth
Command Default
The maximum allocated bandwidth reserved for roaming video clients on the 802.11a or 802.11b/g network
is 0%.
Usage Guidelines
The controller reserves the specified bandwidth from the maximum allocated bandwidth for roaming video
clients.
Note
If this parameter is set to zero (0), the controller assumes that you do not want to do any bandwidth
allocation and, therefore, allows all bandwidth requests.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11 {a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11 {a |
b} cac voice acm enable or config 802.11 {a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Examples
The following example shows how to specify the percentage of the maximum allocated bandwidth reserved
for roaming video clients on the selected radio band:
(Cisco Controller) > config 802.11 cac video roam-bandwidth 10
OL-31334-01
config Commands
Related Commands
699
config Commands
Syntax Description
enable
Enables video CAC for non-TSPEC SIP clients using video applications
on the 802.11a or 802.11b/g network.
When you enable video CAC for non-TSPEC SIP clients, you can use
applications like Facetime and CIUS video calls.
disable
Command Default
None
Usage Guidelines
CAC commands for video applications on the 802.11a or 802.11b/g network require that the WLAN you are
planning to modify is configured for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS)
level be set to Gold.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11 {a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable command.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Enable call snooping on the WLAN on which the SIP client is present by entering the config wlan
call-snoop enable wlan_id command.
Examples
The following example shows how to enable video CAC for non-TSPEC SIP clients using video applications
on the 802.11a network:
(Cisco Controller) > config 802.11 cac video sip enable
OL-31334-01
config Commands
Related Commands
701
config Commands
Syntax Description
ab
enable
ignore
Command Default
The default CAC WMM TSPEC inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Examples
This example shows how to process the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout enable
This example shows how to ignore the response to TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11a cac video tspec-inactivity-timeout ignore
Related Commands
OL-31334-01
config Commands
703
config Commands
Syntax Description
enable
disable
Command Default
The default bandwidth-based voice CAC for the 802.11a or 802.11b/g network id disabled.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Examples
Related Commands
OL-31334-01
config Commands
Syntax Description
bandwidth
Command Default
The default maximum bandwidth allocated to clients for voice applications on the 802.11a or 802.11b/g
network is 0%.
Usage Guidelines
The maximum radio frequency (RF) bandwidth cannot exceed 85% for voice and video. Once the client
reaches the value specified, the access point rejects new calls on this network.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to specify the percentage of the maximum allocated bandwidth for voice
applications on the selected radio band:
(Cisco Controller) > config 802.11a cac voice max-bandwidth 50
705
config Commands
Related Commands
OL-31334-01
config Commands
Syntax Description
bandwidth
Command Default
The default CAC maximum allocated bandwidth reserved for roaming voice clients on the 802.11a or 802.11b/g
network is 85%.
Usage Guidelines
The maximum radio frequency (RF) bandwidth cannot exceed 85% for voice and video. The controller reserves
the specified bandwidth from the maximum allocated bandwidth for roaming voice clients.
Note
If this parameter is set to zero (0), the controller assumes you do not want to allocate any bandwidth and
therefore allows all bandwidth requests.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
707
config Commands
Examples
The following example shows how to configure the percentage of the maximum allocated bandwidth reserved
for roaming voice clients on the selected radio band:
(Cisco Controller) > config 802.11 cac voice roam-bandwidth 10
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
ignore
Command Default
The default WMM TSPEC inactivity timeout received from an access point is disabled (ignore).
Usage Guidelines
Call Admission Control (CAC) commands require that the WLAN you are planning to modify is configured
for Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the voice TSPEC inactivity timeout messages received from an
access point:
(Cisco Controller) > config 802.11 cac voice tspec-inactivity-timeout enable
709
config Commands
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
Command Default
The default load-based CAC for the 802.11a or 802.11b/g network is disabled.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the voice load-based CAC parameters:
(Cisco Controller) > config 802.11a cac voice load-based enable
711
config Commands
The following example shows how to disable the voice load-based CAC parameters:
(Cisco Controller) > config 802.11a cac voice load-based disable
Related Commands
OL-31334-01
config Commands
Do not use the config 802.11 cac voice max-calls command if the SIP call snooping feature is disabled
and if the SIP based Call Admission Control (CAC) requirements are not met.
To configure the maximum number of voice call supported by the radio, use the config 802.11 cac voice
max-calls command.
config 802.11{a | b} cac voice max-calls number
Syntax Description
number
Command Default
The default maximum number of voice call supported by the radio is 0, which means that there is no maximum
limit check for the number of calls.
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
713
config Commands
Examples
The following example shows how to configure the maximum number of voice calls supported by radio:
(Cisco Controller) > config 802.11 cac voice max-calls 10
Related Commands
OL-31334-01
config Commands
SIP bandwidth and sample intervals are used to compute per call bandwidth for the SIP-based Call
Admission Control (CAC).
To configure the bandwidth that is required per call for the 802.11a or 802.11b/g network, use the config
802.11 cac voice sip bandwidth command.
config 802.11{a | b} cac voice sip bandwidth bw_kbps sample-interval number_msecs
Syntax Description
bw_kbps
Bandwidth in kbps.
sample-interval
number_msecs
Packetization sample interval in msecs. The sample interval for SIP codec is 20
seconds.
Command Default
None
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
715
config Commands
Examples
The following example shows how to configure the bandwidth and voice packetization interval for a SIP
codec:
(Cisco Controller) > config 802.11 cac voice sip bandwidth 10 sample-interval 40
Related Commands
OL-31334-01
config Commands
Syntax Description
g711
g729
sample-interval
number_msecs
Packetization interval in msecs. The sample interval for SIP codec value is 20
seconds.
Command Default
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
717
config Commands
Examples
The following example shows how to configure the codec name and sample interval as parameters for SIP
G711 codec:
(Cisco Controller) >
This example shows how to configure the codec name and sample interval as parameters for SIP G729 codec:
(Cisco Controller) > config 802.11a cac voice sip codec g729 sample-interval 40
Related Commands
OL-31334-01
config Commands
Syntax Description
stream-size
stream_size
number
mean_datarate
max-streams
mean_datarate
Command Default
The default number of streams is 2 and the mean data rate of a stream is 84 kbps.
Usage Guidelines
Call Admission Control (CAC) commands require that the WLAN you are planning to modify is configured
for the Wi-Fi Multimedia (WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
Disable all WLANs with WMM enabled by entering the config wlan disable wlan_id command.
Disable the radio network you want to configure by entering the config 802.11{a | b} disable network
command.
Save the new configuration by entering the save config command.
Enable voice or video CAC for the network you want to configure by entering the config 802.11{a |
b} cac voice acm enable or config 802.11{a | b} cac video acm enable commands.
For complete instructions, see the Configuring Voice and Video Parameters section in the Configuring
Controller Settings chapter of the Cisco Wireless LAN Controller Configuration Guide for your release.
Command History
Release
Modification
7.6
719
config Commands
Examples
The following example shows how to configure the number of aggregated voice traffic specifications stream
with the stream size 5 and the mean data rate of 85000 kbps:
(Cisco Controller) > config 802.11 cac voice stream-size 5 max-streams size 85
Related Commands
OL-31334-01
config Commands
Syntax Description
wmm-default
svp-voice
optimized-voice
optimized-video-voice
custom-voice
Command Default
Command History
Release
Modification
7.6
721
config Commands
Examples
Related Commands
show 802.11a
config advanced 802.11b edca-parameters
OL-31334-01
config Commands
Syntax Description
802.11a
802.11b
admission-besteffort
enable
disable
client-maximum
radio-maximum
value
no-limit
Command Default
None.
Usage Guidelines
Before you configure the media stream multicast-direct parameters on a 802.11 network, ensure that the
network is nonoperational.
Examples
This example shows how to enable a media stream multicast-direct settings on an 802.11a network:
> config 802.11a media-stream multicast-direct enable
This example shows how to admit the media stream to the best-effort queue:
> config 802.11a media-stream multicast-direct admission-besteffort enable
This example shows how to set the maximum number of streams allowed on a client:
> config 802.11a media-stream multicast-direct client-maximum 10
723
config Commands
Related Commands
OL-31334-01
config Commands
Syntax Description
802.11a
802.11b
enable
disable
Command Default
None.
Usage Guidelines
Before you configure the media stream video-redirect on a 802.11 network, ensure that the network is
nonoperational.
Examples
This example shows how to enable media stream traffic redirection on an 802.11a network:
> config 802.11a media-stream video-redirect enable
Related Commands
725
config Commands
Syntax Description
enable
disable
Command Default
None.
Usage Guidelines
Media-stream multicast-direct requires load based Call Admission Control (CAC) to run.
Examples
Related Commands
OL-31334-01
config Commands
Syntax Description
state
enable
disable
url
url
phone
phone_number
note
note
Command Default
Disabled.
Usage Guidelines
Examples
This example shows how to enable the session announcement message state:
config media-stream message state enable
This example shows how to configure the session announcement e-mail address:
>
>
Related Commands
config media-stream
show 802.11a media-stream name
show media-stream group summary
727
config Commands
OL-31334-01
config Commands
Syntax Description
multicast-direct
media_stream_name
Media-stream name.
start-IP
end-IP
template
very coarse
coarse
ordinary
low-resolution
med-resolution
high-resolution
detail
bandwidth
packet-size
periodic
initial
qos
priority
Media-stream priority.
drop
fallback
729
config Commands
Command Default
None.
Usage Guidelines
Examples
Related Commands
OL-31334-01
config Commands
Syntax Description
media_stream_name
Command Default
None.
Usage Guidelines
When you try to allow traffic for the media stream group, you will be prompted that IGMP snooping will be
disabled and enabled again, and all clients might observe a glitch on the multicast traffic.
Examples
This example shows how to allow traffic for a media stream group:
> config media-stream admit MymediaStream
Related Commands
731
config Commands
Syntax Description
media_stream_name
Command Default
None.
Usage Guidelines
When you try to block traffic for the media stream group, you will be prompted that IGMP snooping will be
disabled and enabled again, and all clients might observe a glitch on the multicast traffic.
Examples
This example shows how to block traffic for a media stream group:
> config media-stream deny MymediaStream
Related Commands
OL-31334-01
config Commands
Syntax Description
media_stream_name
Media-stream name.
Command Default
None.
Usage Guidelines
Examples
This example shows how to configure the media stream named abc:
> config media-stream delete abc
Related Commands
733
config Commands
Syntax Description
Command Default
Command History
multicast-direct
wlan_id
all
enable
disable
None
Release
Modification
7.6
Usage Guidelines
Media stream multicast-direct requires load based Call Admission Control (CAC) to run. WLAN quality of
service (QoS) needs to be set to either gold or platinum.
Examples
The following example shows how to enable the global multicast-direct media stream with WLAN ID 2:
(Cisco Controller) >config wlan media-stream multicast-direct 2 enable
OL-31334-01
PART
IV
Security Commands
CLI Commands, page 737
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands , page 738
config Commands, page 834
clear Commands, page 993
debug Commands, page 1001
737
show Commands
show Commands
This section lists the show commands to display information about your security configuration settings for
the controller.
OL-31334-01
show Commands
show 802.11
To display basic 802.11a, 802.11b/g, or 802.11h network settings, use the show 802.11 command.
show 802.11{a | b | h}
Syntax Description
Command Default
None.
Examples
Enabled
Enabled
Enabled
Enabled
Enabled
Mandatory
Supported
Mandatory
Supported
Mandatory
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Enabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
739
show Commands
Related Commands
802.11h
......................................... powerconstraint : 0
......................................... channelswitch : Disable
......................................... channelswitch mode : 0
show ap stats
show ap summary
show client summary
show network
show network summary
show port
show wlan
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the configuration settings for the AAA authentication server
database:
(Cisco Controller) > show aaa auth
Related Commands
741
show Commands
show acl
To display the access control lists (ACLs) that are configured on the controller, use the show acl command.
show acl {cpu | detailed acl_name | summary | layer2 { summary | detailed acl_name } }
Syntax Description
Command Default
Command History
Examples
cpu
detailed
acl_name
summary
layer2
None
Release
Modification
7.6
The following example shows how to display the access control lists on the CPU.
(Cisco Controller) >show acl cpu
OL-31334-01
show Commands
Source
Destination
Source Port Dest Port
I Dir IP Address/Netmask IP Address/Netmask Prot
Range
Range
DSCP
Action Counter
- --- ------------------ ------------------ ---- --------- --------- ---------- ------1
Any 0.0.0.0/0.0.0.0
0.0.0.0/0.0.0.0
Any 0-65535 0-65535
0
Deny
0
2
In 0.0.0.0/0.0.0.0
200.200.200.0/
6
80-80 0-65535
Any Permit
0
255.255.255.0
DenyCounter :
0
Note
Related Commands
The Counter field increments each time a packet matches an ACL rule, and the DenyCounter field
increments each time a packet does not match any of the rules.
743
show Commands
Syntax Description
Command Default
Command History
Examples
acl_name
None
Release
Modification
7.6
The following is a sample output of the show acl detailed acl_name command.
(Cisco Controller) > show acl detailed android
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
summary
None
Release
Modification
7.6
745
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Related Commands
1
20
0
enable
1
20
1000
2
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
mac_address
None
Release
Modification
7.6
The following is a sample output of the show client detail mac_address command.
(Cisco Controller) > show client detail 01:35:6x:yy:21:00
747
show Commands
APSD ACs....................................... BK BE VI VO
Power Save....................................... ON
Current Rate..................................... m7
Supported Rates..................................
6.0,9.0,12.0,18.0,24.0,36.0,
............................................. 48.0,54.0
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. SUPPLICANT_PROVISIONING
Policy Manager Rule Created...................... Yes
AAA Override ACL Name............................ android
AAA Override ACL Applied Status.................. Yes
AAA Override Flex ACL Name....................... none
AAA Override Flex ACL Applied Status............. Unavailable
AAA URL redirect.................................
https://10.0.0.3:8443/guestportal/gateway?sessionId=0a68aa72000000015272404e&action=nsp
Audit Session ID................................. 0a68aa72000000015272404e
AAA Role Type.................................... none
Local Policy Applied............................. p1
IPv4 ACL Name.................................... none
FlexConnect ACL Applied Status................... Unavailable
IPv4 ACL Applied Status.......................... Unavailable
IPv6 ACL Name.................................... none
IPv6 ACL Applied Status.......................... Unavailable
Layer2 ACL Name.................................. none
Layer2 ACL Applied Status........................ Unavailable
Client Type...................................... SimpleIP
mDNS Status...................................... Enabled
mDNS Profile Name................................ default-mdns-profile
No. of mDNS Services Advertised.................. 0
Policy Type...................................... WPA2
Authentication Key Management.................... 802.1x
Encryption Cipher................................ CCMP (AES)
Protected Management Frame ...................... No
Management Frame Protection...................... No
EAP Type......................................... PEAP
Interface......................................
.. management
VLAN............................................. 0
Quarantine VLAN.................................. 0
Access VLAN...................................... 0
Client Capabilities:
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 10
Fast BSS Transition........................ Not implemented
Client Wifi Direct Capabilities:
WFD capable................................ No
Manged WFD capable......................... No
Cross Connection Capable................... No
Support Concurrent Operation............... No
Fast BSS Transition Details:
Client Statistics:
Number of Bytes Received................... 123659
Number of Bytes Sent....................... 120564
Number of Packets Received................. 1375
Number of Packets Sent..................... 276
OL-31334-01
show Commands
0
0
0
2
0
0
0
82
0
0
0
0
0
0
0
-51 dBm
46 dB
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
-33 dBm
-35 dBm
-41 dBm
-44 dBm
-30 dBm
-36 dBm
-43 dBm
-45 dBm
0.0.0.0
0.0.0.0
749
show Commands
209.165.200.232
209.165.200.233
209.165.200.234
209.165.200.235
209.165.200.236
209.165.200.237
209.165.200.238
209.165.201.1
209.165.201.2
209.165.201.3
209.165.201.4
209.165.201.5
209.165.201.6
209.165.201.7
209.165.201.8
209.165.201.9
209.165.201.10
OL-31334-01
show Commands
Syntax Description
Command Default
None
Examples
Related Commands
2048
2048
2
0
1
1
1
1
0
751
show Commands
show exclusionlist
To display a summary of all clients on the manual exclusion list (blacklisted) from associating with this Cisco
wireless LAN controller, use the show exclusionlist command.
show exclusionlist
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
Examples
Related Commands
----------00:40:96:b4:82:55
-----------------------51
---------------802.1X Failure
config exclusionlist
OL-31334-01
show Commands
show ike
To display active Internet Key Exchange (IKE) security associations (SAs), use the show ike command.
show ike {brief | detailed} IP_or_MAC_address
Syntax Description
Command Default
Command History
Examples
brief
detailed
IP_or_MAC_address
None
Release
Modification
7.6
The following example shows how to display the active Internet Key Exchange security associations:
(Cisco Controller) > show ike brief 209.165.200.254
753
show Commands
show IPsec
To display active Internet Protocol Security (IPsec) security associations (SAs), use the show IPsec command.
show IPsec {brief | detailed} IP_or_MAC_address
Syntax Description
Command Default
Command History
Examples
brief
detailed
IP_or_MAC_address
None
Release
Modification
7.6
The following example shows how to display brief information about the active Internet Protocol Security
(IPsec) security associations (SAs):
(Cisco Controller) > show IPsec brief 209.165.200.254
Related Commands
OL-31334-01
show Commands
755
show Commands
Syntax Description
Command Default
Command History
Examples
acl_name
detailed
None
Release
Modification
7.6
The following example shows how to display the detailed information of the access control lists:
(Cisco Controller) >show ipv6 acl detailed acl6
Rule Index.......................................
Direction........................................
IPv6 source prefix...............................
IPv6 destination prefix..........................
Protocol.........................................
Source Port Range................................
Destination Port Range...........................
DSCP.............................................
Flow label.......................................
Action...........................................
Counter..........................................
Deny Counter................................... 0
1
Any
::/0
::/0
Any
0-65535
0-65535
Any
0
Permit
0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example displays the output of the show ipv6 summary command:
(Cisco Controller) >show ipv6 summary
Global Config...............................
Reachable-lifetime value....................
Stale-lifetime value........................
Down-lifetime value.........................
RA Throttling...............................
RA Throttling allow at-least................
RA Throttling allow at-most.................
RA Throttling max-through...................
RA Throttling throttle-period...............
RA Throttling interval-option...............
NS Mulitcast CacheMiss Forwarding...........
NA Mulitcast Forwarding.....................
IPv6 Capwap UDP Lite........................
Operating System IPv6 state ................
Enabled
30
300
300
Disabled
1
no-limit
5
600
ignore
Enabled
Enabled
Enabled
Enabled
757
show Commands
show l2tp
To display Layer 2 Tunneling Protocol (L2TP) sessions, use the show l2tp command.
show l2tp {summary | ip_address}
Syntax Description
Command Default
Command History
Examples
summary
ip_address
IP address.
None
Release
Modification
7.6
The following example shows how to display a summary of all L2TP sessions:
(Cisco Controller) > show l2tp summary
OL-31334-01
show Commands
show ldap
To display the Lightweight Directory Access Protocol (LDAP) server information for a particular LDAP
server, use the show ldap command.
show ldap index
Syntax Description
Command Default
Command History
Examples
index
None
Release
Modification
7.6
The following example shows how to display the detailed LDAP server information:
(Cisco Controller) > show ldap 1
Server Index.....................................
Address..........................................
Port.............................................
Enabled..........................................
User DN..........................................
User Attribute...................................
User Type........................................
Retransmit Timeout...............................
Bind Method .....................................
Related Commands
1
2.3.1.4
389
Yes
name1
attr1
username1
3 seconds
Anonymous
config ldap
config ldap add
config ldap simple-bind
show ldap statistics
show ldap summary
759
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
The following example shows how to display the LDAP server statistics:
(Cisco Controller) > show ldap statistics
Server Index.....................................
Server statistics:
Initialized OK.................................
Initialization failed..........................
Initialization retries.........................
Closed OK......................................
Request statistics:
Received.......................................
Sent...........................................
OK.............................................
Success........................................
Authentication failed..........................
Server not found...............................
No received attributes.........................
No passed username.............................
Not connected to server........................
Internal error.................................
Retries........................................
Server Index.....................................
...
Related Commands
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
config ldap
config ldap add
config ldap simple-bind
show ldap
show ldap summary
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of configured LDAP servers:
(Cisco Controller) > show ldap summary
Idx
--1
2
Related Commands
Server Address
--------------2.3.1.4
10.10.20.22
Port
---389
389
Enabled
------Yes
Yes
config ldap
config ldap add
config ldap simple-bind
show ldap statistics
show ldap
761
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the authentication certificate information stored locally:
(Cisco Controller) > show local-auth certificates
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the local authentication configuration information:
(Cisco Controller) > show local-auth config
763
show Commands
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the local authentication certificate statistics:
(Cisco Controller) > show local-auth statistics
Related Commands
14
14
0
0
0
0
2
0
2
0
0
0
0
0
0
765
show Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display detailed statistics of network access control settings:
(Cisco Controller) > show nac statistics
Server Index.......................................................
Server Address.....................................................
xxx.xxx.xxx.xxx
Number of requests sent............................................
Number of retransmissions..........................................
Number of requests received........................................
Number of malformed requests received..............................
Number of bad auth requests received...............................
Number of pending requests.........................................
Number of timed out requests.......................................
Number of misc dropped request received............................
Number of requests sent............................................
Related Commands
1
0
0
0
0
0
0
0
0
0
767
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary information of network access control settings:
(Cisco Controller) > show nac summary
Related Commands
OL-31334-01
show Commands
show netuser
To display the configuration of a particular user in the local user database, use the show netuser command.
show netuser {detail user_name | guest-roles | summary}
Syntax Description
Command Default
Command History
Examples
detail
user_name
Network user.
guest_roles
summary
None
Release
Modification
7.6
Related Commands
769
show Commands
Syntax Description
Command Default
None.
Examples
This example shows how to display a QoS role for the guest network user:
> show netuser guest-roles
Role Name.............................. Contractor
Average Data Rate.................. 10
Burst Data Rate.................... 10
Average Realtime Rate.............. 100
Burst Realtime Rate................ 100
Role Name.............................. Vendor
Average Data Rate.................. unconfigured
Burst Data Rate.................... unconfigured
Average Realtime Rate.............. unconfigured
Burst Realtime Rate................ unconfigured
Related Commands
OL-31334-01
show Commands
show network
To display the current status of 802.3 bridging for all WLANs, use the show network command.
show network
Syntax Description
Command Default
None.
Examples
Related Commands
config network
show network summary
show network multicast mgid detail
show network multicast mgid summary
771
show Commands
Syntax Description
Command Default
None.
Examples
RF
Disable
Enable
Disable
Disable
Disable
Disabled
Enable
Enable
Disable
Mode: Ucast
Disable
Disable
Disable
Unicast
Disabled
60 seconds
20 seconds
Disabled
60 seconds
20 seconds
300 seconds
Disable
300 seconds
Disabled
Disable
Disable
Disable
Enable
EAP
Enable
Disable
Enable
Disable
Disabled
80
Disable
Disable
Enable
Disabled
Enabled
Enabled
Disable
Disable
Enable
Disabled
15 minutes
Red
OL-31334-01
show Commands
Related Commands
config network
show network multicast mgid summary
show network multicast mgid detail
show network
773
show Commands
show ntp-keys
To display network time protocol authentication key details, use the show ntp-keys command.
show ntp-keys
Syntax Description
Command Default
None.
Examples
Related Commands
OL-31334-01
show Commands
show policy
To display the summary of the configured policies, and the details and statistics of a policy, use the show
policy command.
show policy {summary | policy-name [statistics]}
Syntax Description
Command Default
Command History
Examples
summary
policy-name
statistics
None
Release
Modification
7.5
Number of Policies............................. 2
Policy Index
-----------1
2
Policy Name
---------------student-FullAccess
teacher-FullAccess
Policy Index.....................................
Match Role.......................................
Match Eap Type...................................
ACL..............................................
QOS..............................................
Average Data Rate................................
Average Real Time Rate...........................
Burst Data Rate..................................
Burst Real Time Rate.............................
Vlan Id..........................................
Session Timeout..................................
Sleeping client timeout..........................
1
<none>
EAP-TLS
<none>
<none>
0
0
0
0
155
1800
12
Active Hours
------------
775
show Commands
Start Time
----------
End Time
--------
Day
---
Policy Index.....................................
Matching Attributes None.........................
No Policy Match..................................
Device Type Match................................
EAP Type Match...................................
Role Type Match..................................
Client Disconnected..............................
Acl Applied......................................
Vlan changed.....................................
Session Timeout Applied..........................
QoS Applied......................................
Avg Data Rate Applied............................
Avg Real Time Rate Applied.......................
Burst Data Rate Applied..........................
Burst Real Time Rate Applied.....................
Sleeping-Client-Timeout Applied..................
student-FullAccess
619
224
0
0
0
4
0
614
4
0
0
0
0
0
0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.5
The following is a sample output of the show profiling policy summary command:
(Cisco Controller) > show profiling policy summary
None
30
Yes
1 Apple-Device
None
10
Yes
2 Apple-MacBook
20
Yes
3 Apple-iPad
20
Yes
4 Apple-iPhone
20
Yes
5 Apple-iPod
20
Yes
6 Aruba-Device
None
10
Yes
7 Avaya-Device
None
10
Yes
20
Yes
None
20
Yes
10 Brother-Device
None
10
Yes
11 Canon-Device
None
10
Yes
12 Cisco-Device
None
10
Yes
13 Cisco-IP-Phone
12
20
Yes
14 Cisco-IP-Phone-7945G
13
70
Yes
15 Cisco-IP-Phone-7975
13
70
Yes
8 Avaya-IP-Phone
9 BlackBerry
777
show Commands
16 Cisco-IP-Phone-9971
13
70
Yes
17 Cisco-DMP
12
20
Yes
18 Cisco-DMP-4400
17
70
Yes
19 Cisco-DMP-4310
17
70
Yes
20 Cisco-DMP-4305
17
70
Yes
21 DLink-Device
None
10
Yes
22 Enterasys-Device
None
10
Yes
23 HP-Device
None
10
Yes
23
30
Yes
None
10
Yes
25
30
Yes
27 Microsoft-Device
None
10
Yes
28 Netgear-Device
None
10
Yes
29 NintendoWII
None
10
Yes
30 Nortel-Device
None
10
Yes
30
20
Yes
32 SonyPS3
None
10
Yes
33 XBOX360
27
20
Yes
None
10
Yes
34
30
Yes
20
Yes
37 Cisco-Access-Point
12
10
Yes
38 Cisco-IP-Conference-Station-7935
13
70
Yes
39 Cisco-IP-Conference-Station-7936
13
70
Yes
40 Cisco-IP-Conference-Station-7937
13
70
Yes
24 HP-JetDirect-Printer
25 Lexmark-Device
26 Lexmark-Printer-E260dn
31 Nortel-IP-Phone-2000-Series
34 Xerox-Device
35 Xerox-Printer-Phaser3250
36 Aruba-AP
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
radius_index
None
Release
Modification
8.0
The following example shows how to display RADIUS accounting server information:
(Cisco Controller) > show radius acct detailed 5
Radius Index........5
NAI Realms..........LAB.VTV.BLR.cisco.co.in
779
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display RADIUS accounting server statistics:
(Cisco Controller) > show radius acct statistics
Accounting Servers:
Server Index.....................................
Server Address...................................
Msg Round Trip Time..............................
First Requests...................................
Retry Requests...................................
Accounting Responses.............................
Malformed Msgs...................................
Bad Authenticator Msgs...........................
Pending Requests.................................
Timeout Requests.................................
Unknowntype Msgs.................................
Other Drops......................................
Related Commands
1
10.1.17.10
0 (1/100 second)
0
0
0
0
0
0
0
0
0
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
radius_index
None
Release
Modification
8.0
The following example shows how to display RADIUS authentication server information:
(Cisco Controller) > show radius auth detailed 1
Radius Index........1
NAI Realms..........LAB.VTV.BLR.cisco.co.in
781
show Commands
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display RADIUS authentication server statistics:
(Cisco Controller) > show radius auth statistics
Authentication Servers:
Server Index.....................................
Server Address...................................
Msg Round Trip Time..............................
First Requests...................................
Retry Requests...................................
Accept Responses.................................
Reject Responses.................................
Challenge Responses..............................
Malformed Msgs...................................
Bad Authenticator Msgs...........................
Pending Requests.................................
Timeout Requests.................................
Unknowntype Msgs.................................
Other Drops......................................
Related Commands
1
1.1.1.1
0 (1/100 second)
0
0
0
0
0
0
0
0
0
0
0
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
profile-name
None
Release
Modification
8.0
783
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a RADIUS authentication server summary:
(Cisco Controller) > show radius summary
Related Commands
OL-31334-01
show Commands
show rules
To display the active internal firewall rules, use the show rules command.
show rules
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display active internal firewall rules:
(Cisco Controller) > show rules
-------------------------------------------------------Rule ID.............: 3
Ref count...........: 0
Precedence..........: 99999999
Flags...............: 00000001 ( PASS )
Source IP range:
(Local stack)
Destination IP range:
(Local stack)
-------------------------------------------------------Rule ID.............: 25
Ref count...........: 0
Precedence..........: 99999999
Flags...............: 00000001 ( PASS )
Service Info
Service name........: GDB
Protocol............: 6
Source port low.....: 0
Source port high....: 0
Dest port low.......: 1000
Dest port high......: 1000
Source IP range:
IP High............: 0.0.0.0
Interface..........: ANY
Destination IP range:
(Local stack)
--------------------------------------------------------
785
show Commands
show switchconfig
To display parameters that apply to the Cisco wireless LAN controller, use the show switchconfig command.
show switchconfig
Syntax Description
Command Default
Enabled.
Examples
This example shows how to display parameters that apply to the Cisco wireless LAN controller:
> show switchconfig
802.3x Flow Control Mode.........................
FIPS prerequisite features.......................
Boot Break.......................................
secret obfuscation...............................
Strong Password Check Features:
case-check ...........Disabled
consecutive-check ....Disabled
default-check .......Disabled
username-check ......Disabled
Related Commands
Disabled
Enabled
Enabled
Enabled
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display details of custom rogue ad-hoc rogue access points:
(Cisco Controller) > show rogue adhoc custom summary
Number of Adhocs............................0
MAC Address
State
# APs # Clients Last Heard
----------------- ------------------ ----- -------------------------------
Related Commands
787
show Commands
Syntax Description
Command Default
Command History
Examples
MAC_address
None
Release
Modification
7.6
The following example shows how to display detailed ad-hoc rogue MAC address information:
(Cisco Controller) > show rogue adhoc client detailed 02:61:ce:8e:a8:8c
Related Commands
OL-31334-01
show Commands
789
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display information about friendly rogue ad-hoc rogue access points:
(Cisco Controller) > show rogue adhoc friendly summary
Number of Adhocs............................0
MAC Address
State
# APs # Clients Last Heard
----------------- ------------------ ----- -------------------------------
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display details of malicious rogue ad-hoc rogue access points:
(Cisco Controller) > show rogue adhoc malicious summary
Number of Adhocs............................0
MAC Address
State
# APs # Clients Last Heard
----------------- ------------------ ----- -------------------------------
Related Commands
791
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display information about unclassified rogue ad-hoc rogue access points:
(Cisco Controller) > show rogue adhoc unclassified summary
Number of Adhocs............................0
MAC Address
State
# APs # Clients Last Heard
----------------- ------------------ ----- -------------------------------
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of all ad-hoc rogues:
(Cisco Controller) > show rogue adhoc summary
Related Commands
793
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display details of custom rogue ad-hoc rogue access points:
(Cisco Controller) > show rogue ap custom summary
Number of APs............................0
MAC Address
State
# APs # Clients Last Heard
----------------- ------------------ ----- -------------------------------
Related Commands
OL-31334-01
show Commands
795
show Commands
Syntax Description
Command Default
Command History
Examples
ap_mac_address
None
Release
Modification
7.6
The following example shows how to display details of rogue access point clients:
(Cisco Controller) > show rogue ap clients xx:xx:xx:xx:xx:xx
Related Commands
OL-31334-01
show Commands
797
show Commands
Syntax Description
Command Default
Command History
Examples
ap_mac_address
None
Release
Modification
7.6
The following example shows how to display detailed information of a rogue access point:
(Cisco Controller) > show rogue ap detailed xx:xx:xx:xx:xx:xx
OL-31334-01
show Commands
Related Commands
Contained
Rogue Rule
Mon Jun 4 10:31:18
Mon Jun
4 10:31:18
c4:0a:cb:a1:18:80
SHIELD-3600-2027
802.11g
sri
11
-87 dBm
4 dB
Enabled
Enabled
Enabled
Mon Jun 4 10:31:18
799
show Commands
Syntax Description
Command Default
Command History
Examples
ssid
channel
None
Release
Modification
7.6
8.0
The following example shows how to display a summary of all rogue access points:
(Cisco Controller) > show rogue ap summary
Rogue
Rogue
Rogue
Rogue
Valid
Rogue
Rogue
Rogue
Rogue
Rogue
Total
Total
MAC Address
----------------xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
Classification
-----------------friendly
malicious
malicious
malicious
# APs
----1
1
1
1
Disabled
1200
Disabled
Disabled
Disabled
1200
10
-128
0
0
2000
729
# Clients
--------0
0
0
0
Last Heard
----------------------Thu Aug 4 18:57:11 2005
Thu Aug 4 19:00:11 2005
Thu Aug 4 18:57:11 2005
Thu Aug 4 18:57:11 2005
The following example shows how to display a summary of all rogue access points with SSID as extended
parameter.
(Cisco Controller) > show rogue ap summary ssid
MAC Address
Class
State
SSID
Security
OL-31334-01
show Commands
-------------------------------------------------------------------------------------xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
Unclassified
Unclassified
Pending
Unclassified
Alert
Alert
Pending
Alert
xxx
xxx
xxx
xxx
Open
Open
Open
WEP/WPA
The following example shows how to display a summary of all rogue access points with channel as extended
parameter.
(Cisco Controller) > show rogue ap summary channel
MAC Address
Class
State Det RadioType
Channel RSSIlast/Max)
-------------------------------------------------------------------------------------------------------------------xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
xx:xx:xx:xx:xx:xx
Unclassified
Unclassified
Unclassified
Unclassified
Unclassified
Alert
Alert
Alert
Alert
Alert
802.11g
802.11g
802.11a
802.11a
802.11a
11
11
149
149
149
-53 / -48
-53 / -48
-74 / -69
-74 / -69
-74 / -69
The following example shows how to display a summary of all rogue access points with both SSID and channel
as extended parameters.
(Cisco Controller) > show rogue ap summary ssid channel
MAC Address
Class
State
SSID
Security Det RadioType
Channel RSSI(last/Max)
----------------------------------------------------------------------------------------------------------------xx:xx:xx:xx:xx:xx Unclassified Alert
dd
WEP/WPA
802.11n5G
56
-73 / -62
xx:xx:xx:xx:xx:xx Unclassified Alert
SSID IS HIDDEN
Open
802.11a
149
-68 / -66
xx:xx:xx:xx:xx:xx Unclassified Alert
wlan16
WEP/WPA
802.11n5G
149
-71 / -71
xx:xx:xx:xx:xx:xx Unclassified Alert
wlan15
WEP/WPA
802.11n5G
149
-71 / -71
xx:xx:xx:xx:xx:xx Unclassified Alert
wlan14
WEP/WPA
802.11n5G
149
-71 / -71
xx:xx:xx:xx:xx:xx Unclassified Alert
wlan13
WEP/WPA
802.11n5G
149
-71 / -70
xx:xx:xx:xx:xx:xx Unclassified Alert
wlan12
WEP/WPA
802.11n5G
149
-71 / -71
Related Commands
801
show Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of all friendly rogue access points:
(Cisco Controller) > show rogue ap friendly summary
Number of APs.................................... 1
MAC Address
State
# APs # Clients Last Heard
----------------- ------------------ ----- ----------------------------------XX:XX:XX:XX:XX:XX Internal
1
0 Tue Nov 27 13:52:04 2007
Related Commands
803
show Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of all malicious rogue access points:
(Cisco Controller) > show rogue ap malicious summary
Number of APs.................................... 2
MAC Address
State
# APs # Clients Last Heard
----------------- ------------------ ----- ----------------------------------XX:XX:XX:XX:XX:XX Alert
1
0 Tue Nov 27 13:52:04 2007
XX:XX:XX:XX:XX:XX Alert
1
0 Tue Nov 27 13:52:04 2007
Related Commands
805
show Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a list of all unclassified rogue access points:
(Cisco Controller) > show rogue ap unclassified summary
Number of APs.................................... 164
MAC Address
State # APs # Clients Last Heard
----------------- ------------- ----- --------- --------------XX:XX:XX:XX:XX:XX Alert
1
0
Fri Nov 30 11:12:52 2007
XX:XX:XX:XX:XX:XX Alert
1
0
Fri Nov 30 11:29:01 2007
XX:XX:XX:XX:XX:XX Alert
1
0
Fri Nov 30 11:26:23 2007
XX:XX:XX:XX:XX:XX Alert
1
0
Fri Nov 30 11:26:23 2007
807
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display information about rogue auto-containment:
(Cisco Controller) > show rogue auto-contain
Containment Level................................ 3
monitor_ap_only.................................. false
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
MAC_address
None
Release
Modification
7.6
The following example shows how to display detailed information for a rogue client:
(Cisco Controller) > show rogue client detailed xx:xx:xx:xx:xx:xx
Rogue BSSID...................................... 00:0b:85:23:ea:d1
State............................................ Alert
First Time Rogue was Reported.................... Mon Dec 3 21:50:36 2007
Last Time Rogue was Reported..................... Mon Dec 3 21:50:36 2007
Rogue Client IP address.......................... Not known
Reported By
AP 1
MAC Address.............................. 00:15:c7:82:b6:b0
Name..................................... AP0016.47b2.31ea
Radio Type............................... 802.11a
RSSI..................................... -71 dBm
SNR...................................... 23 dB
Channel.................................. 149
Last reported by this AP.............. Mon Dec 3 21:50:36 2007
Related Commands
809
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a list of all rogue clients:
(Cisco Controller) > show rogue client summary
Validate rogue clients against AAA............... Disabled
Total Rogue Clients supported.................... 2500
Total Rogue Clients present...................... 3
MAC Address
State
# APs Last Heard
----------------- ------------------ ----- ----------------------xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:00:08 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:09:11 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:03:11 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:03:11 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:09:11 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 18:57:08 2005
xx:xx:xx:xx:xx:xx Alert
1
Thu Aug 4 19:12:08 2005
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a list of all rogue access points that are configured to be ignored.
(Cisco Controller) > show rogue ignore-list
MAC Address
----------------xx:xx:xx:xx:xx:xx
Related Commands
811
show Commands
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
rule_name
None
Release
Modification
7.6
The following example shows how to display detailed information on a specific rogue classification rule:
(Cisco Controller) > show rogue rule detailed Rule2
Priority......................................... 2
Rule Name........................................ Rule2
State............................................ Enabled
Type............................................. Malicious
Severity Score................................... 1
Class Name....................................... Very_Malicious
Notify........................................... All
State ........................................... Contain
Match Operation.................................. Any
Hit Count........................................ 352
Total Conditions................................. 2
Condition 1
type......................................... Client-count
value........................................ 10
Condition 2
type......................................... Duration
value (seconds).............................. 2000
Condition 3
type......................................... Managed-ssid
value........................................ Enabled
Condition 4
type......................................... No-encryption
value........................................ Enabled
Condition 5
type......................................... Rssi
value (dBm).................................. -50
Condition 6
type......................................... Ssid
SSID Count................................... 1
SSID 1.................................... test
Related Commands
813
show Commands
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a list of all rogue rules that are configured on the controller:
(Cisco Controller) > show rogue rule summary
Priority
-------1
2
Rule Name
----------------------mtest
asdfasdf
State
-------Enabled
Enabled
Type
------------Malicious
Malicious
Match
----All
All
Hit Count
--------0
0
The following example shows how to display a list of all rogue rules that are configured on the controller:
(Cisco Controller) > show rogue rule summary
Priority
Rule Name
Rule state Class Type
Notify
State
Match Hit Count
-------- -------------------------------- ----------- ----------- --------------- ------ --------1
rule2
Enabled
Friendly
Global
Alert
All
234
2
rule1
Enabled
Custom
Global
Alert
All
0
Related Commands
815
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Accounting Servers:
Server Index.....................................
Server Address...................................
Msg Round Trip Time..............................
First Requests...................................
Retry Requests...................................
Accounting Response..............................
Accounting Request Success.......................
Accounting Request Failure.......................
Malformed Msgs...................................
Bad Authenticator Msgs...........................
Pending Requests.................................
Timeout Requests.................................
Unknowntype Msgs.................................
Other Drops......................................
Related Commands
1
10.0.0.0
0 (1/100 second)
1
0
0
0
0
0
0
-1
1
0
0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display TACACS server authorization statistics:
(Cisco Controller) > show tacacs athr statistics
Authorization Servers:
Server Index.....................................
Server Address...................................
Msg Round Trip Time..............................
First Requests...................................
Retry Requests...................................
Received Responses...............................
Authorization Success............................
Authorization Failure............................
Challenge Responses..............................
Malformed Msgs...................................
Bad Authenticator Msgs...........................
Pending Requests.................................
Timeout Requests.................................
Unknowntype Msgs.................................
Other Drops......................................
Related Commands
3
10.0.0.3
0 (1/100 second)
0
0
0
0
0
0
0
0
0
0
0
0
817
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display TACACS server authentication statistics:
(Cisco Controller) > show tacacs auth statistics
Authentication Servers:
Server Index.....................................
Server Address...................................
Msg Round Trip Time..............................
First Requests...................................
Retry Requests...................................
Accept Responses.................................
Reject Responses.................................
Error Responses..................................
Restart Responses................................
Follow Responses.................................
GetData Responses................................
Encrypt no secret Responses......................
Challenge Responses..............................
Malformed Msgs...................................
Bad Authenticator Msgs...........................
Pending Requests.................................
Timeout Requests.................................
Unknowntype Msgs.................................
Other Drops......................................
Related Commands
2
10.0.0.2
0 (msec)
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display TACACS server summary information:
(Cisco Controller) > show tacacs summary
Authentication Servers
Idx Server Address
--- ---------------2
10.0.0.1
Accounting Servers
Idx Server Address
--- ---------------1
10.0.0.0
Authorization Servers
Idx Server Address
--- ---------------3
10.0.0.3
Idx Server Address
--- ---------------4
2001:9:6:40::623
...
Related Commands
Port
-----49
State
-------Enabled
Tout
---30
Port
-----49
State
-------Enabled
Tout
---5
Port
-----49
Port
-----49
State
-------Enabled
State
-------Enabled
Tout
---5
Tout
---5
819
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of the Wireless Protection System (WPS) access
point neighbor authentication:
(Cisco Controller) > show wps ap-authentication summary
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
summary
detail
index
None
Release
Modification
7.6
The following example shows how to display all settings for the selected sensor:
(Cisco Controller) > show wps cids-sensor detail1
IP Address.......................................
Port.............................................
Query Interval...................................
Username.........................................
Cert Fingerprint.................................
00:00:00:00:00:00:00:00:
00:00:00:00:00:00:00:00:00:00:00:00
Query State......................................
Last Query Result................................
Number of Queries Sent...........................
Related Commands
10.0.0.51
443
60
Sensor_user1
SHA1:
Disabled
Unknown
0
821
show Commands
Syntax Description
Command Default
Command History
Examples
summary
statistics
None
Release
Modification
7.6
The following example shows how to display a summary of the MFP configuration and status:
(Cisco Controller) > show wps mfp summary
Down
Full
Full
OL-31334-01
show Commands
BSSID
Radio Validator AP
Last Source Addr Found
Error Type
Count
Frame Types
----------------- ----- -------------------- ----------------- ------------------ ---------- ----------no errors
Related Commands
823
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the IDS system sensor shun list:
(Cisco Controller) > show wps shun-list
Related Commands
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
sig-id
None
Release
Modification
7.6
This example shows how to display information on the attacks detected by standard signature 1:
(Cisco Controller) > show wps signature detail 1
Signature-ID.....................................
Precedence.......................................
Signature Name...................................
Type.............................................
FrameType........................................
State............................................
Action...........................................
Tracking.........................................
Signature Frequency..............................
Signature Mac Frequency..........................
Interval.........................................
Quiet Time.......................................
Description......................................
Patterns:
0(Header):0x0:0x0
4(Header):0x0:0x0
Related Commands
1
1
Bcast deauth
standard
management
enabled
report
per Signature and Mac
500 pkts/interval
300 pkts/interval
10 sec
300 sec
Broadcast Deauthentication Frame
825
show Commands
Syntax Description
Command Default
Command History
Examples
summary
standard
custom
precedenceID
detailed
None
Release
Modification
7.6
The following example shows how to display the number of attacks detected by all enabled signatures:
(Cisco Controller) > show wps signature events summary
Precedence
---------1
2
Signature Name
-------------------Bcast deauth
NULL probe resp 1
Type
-------Standard
Standard
# Events
-------2
1
This example shows how to display a summary of information on the attacks detected by standard signature
1:
(Cisco Controller) > show wps signature events standard 1 summary
Precedence....................................... 1
Signature Name................................... Bcast deauth
Type............................................. Standard
Number of active events.......................... 2
Source MAC Addr
Track Method
Frequency # APs Last Heard
----------------- -------------- --------- ----- -----------------------00:a0:f8:58:60:dd Per Signature 50
1
Wed Oct 25 15:03:05
2006
OL-31334-01
show Commands
00:a0:f8:58:60:dd
2006
Related Commands
Per Mac
30
827
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of all of the standard and custom signatures:
(Cisco Controller) > show wps signature summary
Signature-ID.....................................
Precedence.......................................
Signature Name...................................
Type.............................................
FrameType........................................
State............................................
Action...........................................
Tracking.........................................
Signature Frequency..............................
Signature Mac Frequency..........................
Interval.........................................
Quiet Time.......................................
Description......................................
Deauthentication Frame
Patterns:
0(Header):0x00c0:0x00ff
4(Header):0x01:0x01
...
Related Commands
1
1
Bcast deauth
standard
management
enabled
report
per Signature and Mac
50 pkts/interval
30 pkts/interval
1 sec
300 sec
Broadcast
OL-31334-01
show Commands
829
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Auto-Immune
Auto-Immune....................................
Client Exclusion Policy
Excessive 802.11-association failures..........
Excessive 802.11-authentication failures.......
Excessive 802.1x-authentication................
IP-theft.......................................
Excessive Web authentication failure...........
Trusted AP Policy
Management Frame Protection....................
Mis-configured AP Action.......................
Enforced encryption policy...................
Enforced preamble policy.....................
Enforced radio type policy...................
Validate SSID................................
Alert if Trusted AP is missing.................
Trusted AP timeout.............................
Untrusted AP Policy
Rogue Location Discovery Protocol..............
RLDP Action..................................
Rogue APs
Rogues AP advertising my SSID................
Detect and report Ad-Hoc Networks............
Rogue Clients
Validate rogue clients against AAA...........
Detect trusted clients on rogue APs..........
Rogue AP timeout...............................
Signature Policy
Signature Processing...........................
...
Disabled
Enabled
Enabled
Enabled
Enabled
Enabled
Disabled
Alarm Only
none
none
none
Disabled
Disabled
120
Disabled
Alarm Only
Alarm Only
Enabled
Enabled
Alarm Only
1300
Enabled
OL-31334-01
show Commands
Related Commands
831
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the statistics of the wIPS operation:
(Cisco Controller) > show wps wips statistics
Related Commands
1
1
0
0
0
0
13572
8376
0
0
1001
0
0
22950
0
1377
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of the wIPS configuration:
(Cisco Controller) > show wps wips summary
Related Commands
833
config Commands
config Commands
This section lists the config commands to configure security settings for the controller.
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
long
short
Release
Modification
7.6
Usage Guidelines
Note
You must reboot the Cisco Wireless LAN Controller (reset system) with save to implement this command.
This parameter must be set to long to optimize this Cisco wireless LAN controller for some clients, including
SpectraLink NetLink telephones.
This command can be used any time that the CLI interface is active.
Examples
The following example shows how to change the 802.11b preamble to short:
(Cisco Controller) > config 802.11b preamble short
(Cisco Controller) > (reset system with save)
Related Commands
show 802.11b
835
config Commands
Syntax Description
Command Default
Command History
mgmt
aaa_server_type
None
Release
Modification
7.6
Usage Guidelines
You can enter two AAA server types as long as one of the server types is local. You cannot enter radius and
tacacs together.
Examples
The following example shows how to configure the AAA authentication search order for controller management
users by the authentication server type local:
(Cisco Controller) > config aaa auth radius local
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
radius
tacacs
None
Release
Modification
7.6
The following example shows how to configure the order of authentication for the RADIUS server:
(Cisco Controller) > config aaa auth mgmt radius
The following example shows how to configure the order of authentication for the TACACS server:
(Cisco Controller) > config aaa auth mgmt tacacs
Related Commands
837
config Commands
Syntax Description
Command Default
Command History
rule_name
None
Release
Modification
7.6
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless
LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL
under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series
Wireless LAN Controllers.
Examples
The following example shows how to apply an ACL to the data path:
(Cisco Controller) > config acl apply acl01
Related Commands
show acl
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
start
stop
None
Release
Modification
7.6
Usage Guidelines
ACL counters are available only on the following controllers: 4400 series, Cisco WiSM, and Catalyst 3750G
Integrated Wireless LAN Controller Switch.
Examples
The following example shows how to enable ACL counters on your controller:
(Cisco Controller) > config acl counter start
Related Commands
839
config Commands
Syntax Description
Command Default
Command History
rule_name
None
Release
Modification
7.6
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless
LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL
under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series
Wireless LAN Controllers.
Examples
Related Commands
show acl
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
rule_name
wired
wireless
both
None
Release
Modification
7.6
Usage Guidelines
This command allows you to control the type of packets reaching the CPU.
Examples
The following example shows how to create an ACL named acl101 on the CPU and apply it to wired traffic:
(Cisco Controller) > config acl cpu acl01 wired
Related Commands
841
config Commands
Syntax Description
Command Default
Command History
rule_name
None
Release
Modification
7.6
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless
LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL
under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series
Wireless LAN Controllers.
Examples
The following example shows how to delete an ACL named acl101 on the CPU:
(Cisco Controller) > config acl delete acl01
Related Commands
show acl
OL-31334-01
config Commands
Syntax Description
apply
acl_name
create
delete
rule
action
index
permit
deny
add
change index
old_index
new_index
delete
etherType
etherType
etherTypeMask
swap index
index1 index2
843
config Commands
Command Default
Command History
Command History
Usage Guidelines
Release
Modification
7.6
Release
Modification
7.5
Examples
OL-31334-01
config Commands
Syntax Description
action
rule_name
rule_index
permit
deny
add
change
index
delete
Deletes a rule.
destination address
ip_address
netmask
start_port
end_port
direction
in
out
845
config Commands
Command Default
Command History
any
dscp
dscp
protocol
protocol
source address
swap
None
Release
Modification
7.6
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless
LAN for the external web server. This ACL should then be set as a wireless LAN pre-authentication ACL
under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series
Wireless LAN Controllers.
Examples
Related Commands
show acl
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
domain_name
acl_name
None
Release
Modification
7.6
The following example shows how to add a new URL domain for the access control list:
(Cisco Controller) > config acl url-domain add cisco.com android
The following example shows how to delete an existing URL domain from the access control list:
(Cisco Controller) > config acl url-domain delete play.google.com android
847
config Commands
Syntax Description
Command Default
Command History
Examples
mic
ssc
AP_MAC
AP_key
None
Release
Modification
7.6
The following example shows how to create an authorized access point entry with a manufacturer-installed
certificate on MAC address 00:0b:85:02:0d:20:
(Cisco Controller) > config auth-list add 00:0b:85:02:0d:20
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
authorize-ap enable
authorize-ap disable
ssc enable
ssc disable
None
Release
Modification
7.6
The following example shows how to enable an access point authorization policy:
(Cisco Controller) > config auth-list ap-policy authorize-ap enable
The following example shows how to enable an access point with a self-signed certificate to connect:
(Cisco Controller) > config auth-list ap-policy ssc disable
Related Commands
849
config Commands
Syntax Description
Command Default
Command History
Examples
AP_MAC
None
Release
Modification
7.6
The following example shows how to delete an access point entry for MAC address 00:1f:ca:cf:b6:60:
(Cisco Controller) > config auth-list delete 00:1f:ca:cf:b6:60
Related Commands
OL-31334-01
config Commands
Syntax Description
bcast-key-interval seconds
eapol-key-timeout timeout
eapol-key-retries retries
identity-request- retries
key-index index
max-login-ignore- identity-response
851
config Commands
enable
disable
request-timeout
request-retries
Command Default
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the key index used for dynamic wired equivalent privacy
(WEP):
(Cisco Controller) > config advanced eap key-index 0
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
Release
Modification
7.6
The following example shows how to configure the authentication timeout to 20 seconds:
(Cisco Controller) >config advanced timers auth-timeout 20
853
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
None
Release
Modification
7.6
The following example shows how to configure the EAP expiration timeout to 10 seconds:
(Cisco Controller) >config advanced timers eap-timeout 10
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
None
Release
Modification
7.6
The following example shows how to configure the advanced EAP identity request delay to 8 seconds:
(Cisco Controller) >config advanced timers eap-identity-request-delay 8
855
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
connection
delete
peer
ip-address
default password
password
retry period
time-in-seconds
None
Release
Modification
7.6
For release 8.0, only IPv4 is supported for TrustSec SXP configuration.
OL-31334-01
config Commands
Examples
The following example shows how to configure a peer for a CTS connection:
> config cts sxp connection peer 209.165.200.224
Related Commands
857
config Commands
Syntax Description
Command Default
Command History
count
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to configure the size of the local database:
(Cisco Controller) > config database size 1024
Related Commands
show database
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
binary
ascii
None
Release
Modification
7.6
The following example shows how to configure the format of DHCP option 82 payload:
(Cisco Controller) > config dhcp opt-82 format binary
859
config Commands
Syntax Description
Command Default
Command History
ap_mac
ap_mac:ssid
ap-ethmac
apname:ssid
ap-group-name
flex-group-name
ap-location
apmac-vlan-id
apname-vlan-id
ap-ethmac-ssid
None
Release
Modification
7.6
OL-31334-01
config Commands
Examples
The following example shows how to configure the remote ID of DHCP option 82 payload:
(Cisco Controller) > config dhcp opt-82 remote-id apgroup1
861
config Commands
config exclusionlist
To create or delete an exclusion list entry, use the config exclusionlist command.
config exclusionlist {add MAC [description] | delete MAC | description MAC [description]}
Syntax Description
Command Default
Command History
Examples
config exclusionlist
add
delete
description
MAC
description
None
Release
Modification
7.6
The following example shows how to create a local exclusion list entry for the MAC address xx:xx:xx:xx:xx:xx:
(Cisco Controller) > config exclusionlist add xx:xx:xx:xx:xx:xx lab
The following example shows how to delete a local exclusion list entry for the MAC address xx:xx:xx:xx:xx:xx:
(Cisco Controller) > config exclusionlist delete xx:xx:xx:xx:xx:xx lab
Related Commands
show exclusionlist
OL-31334-01
config Commands
config ldap
To configure the Lightweight Directory Access Protocol (LDAP) server settings, use the config ldap command.
config ldap {add | delete | enable | disable | retransmit-timeout | retry | user | security-mode | simple-bind}
index
config ldap add index server_ip_address port user_base user_attr user_type[ secure]
config ldap retransmit-timeout index retransmit-timeout
config ldap retry attempts
config ldap user {attr index user-attr | base index user-base | typeindex user-type}
config ldap security-mode {enable | disable}index
config ldap simple-bind {anonymous index | authenticated index username password}
Syntax Description
add
delete
enable
disable
retransmit-timeout
retry
user
security-mode
simple-bind
anonymous
authenticated
index
server_ip_address
port
Port number.
863
config Commands
Command Default
Command History
user_base
user_attr
user_type
secure
retransmit-timeout
attempts
attr
base
type
username
password
None
Release
Modification
7.6
7.6
Usage Guidelines
When you enable secure LDAP, the controller does not validate the server certificate.
Examples
The following example shows how to enable LDAP server index 10:
(Cisco Controller) > config ldap enable 10
Related Commands
OL-31334-01
config Commands
865
config Commands
Syntax Description
Command Default
Command History
Examples
timeout
Release
Modification
7.6
The following example shows how to specify the active timeout to authenticate wireless clients using EAP
to 500 seconds:
(Cisco Controller) > config local-auth active-timeout 500
Related Commands
OL-31334-01
config Commands
Syntax Description
add
delete
profile_name
cert-issuer
cisco
vendor
method
method
local-cert
enable
disable
client-cert
peer-verify
867
config Commands
Command Default
Command History
Examples
ca-issuer
cn-verify
date-valid
None
Release
Modification
7.6
The following example shows how to create a local EAP profile named FAST01:
(Cisco Controller) > config local-auth eap-profile add FAST01
The following example shows how to add the EAP-FAST method to a local EAP profile:
(Cisco Controller) > config local-auth eap-profile method add fast FAST01
The following example shows how to specify Cisco as the issuer of the certificates that will be sent to the
client for an EAP-FAST profile:
(Cisco Controller) > config local-auth eap-profile method fast cert-issuer cisco
The following example shows how to specify that the incoming certificate from the client be validated against
the CA certificates on the controller:
(Cisco Controller) > config local-auth eap-profile method fast peer-verify ca-issuer enable
Related Commands
OL-31334-01
config Commands
869
config Commands
Syntax Description
Command Default
Command History
Examples
anon-prov
enable
disable
authority-id
auth_id
pac-ttl
days
server-key
key_value
None
Release
Modification
7.6
The following example shows how to disable the controller to allows anonymous provisioning:
(Cisco Controller) > config local-auth method fast anon-prov disable
OL-31334-01
config Commands
The following example shows how to configure the authority identifier 0125631177 of the local EAP-FAST
server:
(Cisco Controller) > config local-auth method fast authority-id 0125631177
The following example shows how to configure the number of days to 10 for the PAC to remain viable:
(Cisco Controller) > config local-auth method fast pac-ttl 10
Related Commands
871
config Commands
Syntax Description
Command Default
Command History
local
ldap
None
Release
Modification
7.6
Usage Guidelines
The order of the specified database parameters indicate the database search order.
Examples
The following example shows how to specify the order in which the local EAP authentication database is
searched:
(Cisco Controller) > config local-auth user credentials local lda
In the above example, the local database is searched first and then the LDAP database.
Related Commands
OL-31334-01
config Commands
Syntax Description
apply name
cpu name
cpu none
create
delete
Configures rules in the IPv6 ACL to either permit or deny access. IPv6
ACL name can contains up to 32 alphanumeric characters and IPv6 ACL
rule index can be between 1 and 32.
{permit|deny}
873
config Commands
Configure a rule's destination port range. Enter IPv6 ACL name and set an
rule index for it.
Configures a rules DSCP. For rule index of DSCP, select a number between
0 and 63, or any.
protocol name index protocol Configures a rules protocol. Enter a name and set an index between 0 and
255 or any
source address name index
ip_address prefix-len
source port range name index Configures a rules source port range.
start_port end_port
swap index name index_1
index_2
Command Default
Command History
After adding an ACL, the config ipv6 acl cpu is by default configured as enabled.
Release
Modification
7.6
8.0
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless
LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL
under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series
Wireless LAN Controllers.
Examples
The following example shows how to configure an IPv6 ACL to permit access:
(Cisco Controller) >config ipv6 acl rule action lab1 4 permit
OL-31334-01
config Commands
Examples
Related Commands
875
config Commands
Syntax Description
username
password
wlan
Specifies the wireless LAN identifier to associate with or zero for any wireless
LAN.
wlan_id
Wireless LAN identifier assigned to the user. A zero value associates the user
with any wireless LAN.
guestlan
Specifies the guest LAN identifier to associate with or zero for any wireless
LAN.
guestlan_id
userType
guest
lifetime
lifetime
description
Command Default
Command History
Usage Guidelines
None
Release
Modification
7.6
Local network usernames must be unique because they are stored in the same database.
OL-31334-01
config Commands
Examples
The following example shows how to add a permanent username Jane to the wireless network for 1 hour:
(Cisco Controller) > config netuser add jane able2 1 wlan_id 1 userType permanent
The following example shows how to add a guest username George to the wireless network for 1 hour:
(Cisco Controller) > config netuser add george able1 guestlan 1 3600
Related Commands
show netuser
config netuser delete
877
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
username
wlan-id
None
Release
Modification
7.6
Local network usernames must be unique because they are stored in the same database.
When a WLAN associated with network users is deleted, the system prompts to delete all network users
associated with the WLAN first. After deleting the network users, you can delete the WLAN.
The following example shows how to delete an existing username named able1 from the network:
(Cisco Controller) > config netuser delete able1
Deleted user able1
Related Commands
show netuser
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
username
description
None
Release
Modification
7.6
The following example shows how to add a user description HQ1 Contact to an existing network user named
able 1:
(Cisco Controller) > config netuser description able1 HQ1 Contact
Related Commands
show netuser
879
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
shared_secret
Release
Modification
7.6
This command creates a secret that encrypts backhaul user data for the mesh access points that connect to the
switch.
The zero-touch configuration must be enabled for this command to work.
Examples
The following example shows how to configure the bridging shared secret string shhh1:
(Cisco Controller) > config network bridging-shared-secret shhh1
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
Command Default
None
Examples
The following example shows how to configure the controller to support bypass of captive portals:
(Cisco Controller) > config network web-auth captive-bypass enable
Related Commands
881
config Commands
Syntax Description
port
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure an additional port number 1200 to be redirected for web
authentication:
(Cisco Controller) > config network web-auth port 1200
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable proxy redirect support for web authentication clients:
(Cisco Controller) > config network web-auth proxy-redirect enable
Related Commands
883
config Commands
Syntax Description
Command Default
Command History
enable
disable
Release
Modification
7.6
Usage Guidelines
Note
Examples
If you configure the secure web (https) authentication for clients using the config network web-auth
secureweb disable command, then you must reboot the Cisco WLC to implement the change.
The following example shows how to enable the secure web (https) authentication for clients:
(Cisco Controller) > config network web-auth secureweb enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable the web interface mode:
(Cisco Controller) > config network webmode disable
Related Commands
885
config Commands
Syntax Description
port
port-number
proxy-redirect
enable
disable
Command Default
Command History
Release
Modification
7.6
Usage Guidelines
You must reset the system for the configuration to take effect.
Examples
The following example shows how to enable proxy redirect support for web authentication clients:
(Cisco Controller) > config network web-auth proxy-redirect enable
Related Commands
OL-31334-01
config Commands
config policy
To configure a native profiling policy on the Cisco Wireless LAN Controller (WLC), use the config policy
command.
config policypolicy_name {action {acl {enable | disable} acl_name | {average-data-rate |
average-realtime-rate | burst-data-rate | burst-realtime-rate | qos | session-timeout | sleeping-client-timeout
| avc-profile-name {enable avc_profile_name | disable} | vlan} {enable | disable}}} | active {add hours
start _time end _time days day | delete days day} | create | delete | match {device-type {add | delete}
device-type | eap-type {add | delete} {eap-fast | eap-tls | leap | peap} | role {role_name | none}}
Syntax Description
policy_name
action
acl
enable
disable
acl_name
Name of an ACL.
average-data-rate
average-realtime-rate
burst-data-rate
burst-realtime-rate
qos
session-timeout
sleeping-client-timeout
avc-profile-name
vlan
active
add
hours
start _time
end _time
887
config Commands
days
day
Day of the week, such as mon, tue, wed, thu, fri, sat,
sun. You can also specify daily or weekdays for the
policy to occur daily or on all weekdays.
delete
create
Creates a policy.
match
device-type
device-type
eap-type
eap-fast
eap-tls
leap
peap
role
role_name
none
Command Default
Command History
Usage Guidelines
Release
Modification
7.5
OL-31334-01
config Commands
Examples
889
config Commands
Syntax Description
add
index
IP addr
port
ascii
hex
secret
enable
disable
delete
ipsec
authentication
hmac-md5
hmac-sha1
disable
enable
encryption
OL-31334-01
config Commands
256-aes
3des
aes
des
ike
auth-mode
pre-shared-key
certificate
dh-group
2048bit-group-14
group-1
group-2
group-5
lifetime seconds
phase1
aggressive
main
mac-delimiter
colon
hyphen
none
single-hyphen
network
891
config Commands
group
none
provincial
retransmit-timeout
seconds
realm
add
delete
Command Default
When adding a RADIUS server, the port number defaults to 1813 and the state is enabled.
Usage Guidelines
Command History
Examples
Release
Modification
7.6
8.0
The following example shows how to configure a priority 1 RADIUS accounting server at 10.10.10.10 using
port 1813 with a login password of admin:
(Cisco Controller) > config radius acct add 1 10.10.10.10 1813 ascii admin
The following example shows how to configure a priority 1 RADIUS accounting server at 2001:9:6:40::623
using port 1813 with a login password of admin:
(Cisco Controller) > config radius acct add 1 2001:9:6:40::623 1813 ascii admin
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
hmac-md5
hmac-sha1
index
None
Release
Modification
7.6
The following example shows how to configure the IPsec hmac-md5 authentication service on the RADIUS
accounting server index 1:
(Cisco Controller) > config radius acct ipsec authentication hmac-md5 1
Related Commands
893
config Commands
Syntax Description
Command Default
Command History
Examples
index
None
Release
Modification
7.6
The following example shows how to disable the IPsec support for RADIUS accounting server index 1:
(Cisco Controller) > config radius acct ipsec disable 1
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
None
Release
Modification
7.6
The following example shows how to enable the IPsec support for RADIUS accounting server index 1:
(Cisco Controller) > config radius acct ipsec enable 1
Related Commands
895
config Commands
Syntax Description
Command Default
Command History
Examples
256-aes
3des
aes
des
index
None
Release
Modification
7.6
The following example shows how to configure the IPsec 3DES encryption for RADIUS server index value
3:
(Cisco Controller) > config radius acct ipsec encryption 3des 3
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
dh-group
group-1
group-2
group-5
group-5
lifetime
seconds
phase1
aggressive
main
index
None
Release
Modification
7.6
The following example shows how to configure an IKE lifetime of 23 seconds for RADIUS server index 1:
(Cisco Controller) > config radius acct ipsec ike lifetime 23 1
Related Commands
897
config Commands
Syntax Description
Command Default
Command History
Examples
colon
hyphen
single-hyphen
none
Release
Modification
7.6
The following example shows how to set the delimiter hyphen to be used in the MAC addresses that are sent
to the RADIUS accounting server for the network users:
(Cisco Controller) > config radius acct mac-delimiter hyphen
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
enable
disable
None
Release
Modification
7.6
The following example shows how to configure a default RADIUS accounting server for the network users
with RADIUS server index1:
(Cisco Controller) > config radius acct network 1 enable
Related Commands
899
config Commands
Syntax Description
Command Default
Command History
Examples
radius_server
add
delete
realm_string
None
Release
Modification
8.0
The following example shows how add realm to the RADIUS accounting server:
(Cisco Controller) > config radius acct realm add 3 test
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure retransmission timeout value 5 seconds between the
retransmission:
(Cisco Controller) > config radius acct retransmit-timeout 5
Related Commands
901
config Commands
Syntax Description
enable
disable
delete
index
add
IP addr
port
ascii/hex
secret
callStationIdType
ipsec
keywrap
ascii/hex
OL-31334-01
config Commands
kek
mack
mac-delimiter
management
mgmt-retransmit-timeout
network
realm
region
retransmit-timeout
rfc3576
Command Default
When adding a RADIUS server, the port number defaults to 1812 and the state is enabled.
Usage Guidelines
Command History
Examples
Release
Modification
7.6
8.0
The following example shows how to configure a priority 3 RADIUS authentication server at 10.10.10.10
using port 1812 with a login password of admin:
(Cisco Controller) > config radius auth add 3 10.10.10.10 1812 ascii admin
The following example shows how to configure a priority 3 RADIUS authentication server at 2001:9:6:40::623
using port 1812 with a login password of admin:
(Cisco Controller) > config radius auth add 3 2001:9:6:40::623 1812 ascii admin
903
config Commands
Syntax Description
Command Default
Command History
Examples
hmac-md5
hmac-shal
index
None
Release
Modification
7.6
The following example shows how to configure the IPsec hmac-md5 support for RADIUS authentication
server index 1:
(Cisco Controller) > config radius auth IPsec authentication hmac-md5 1
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
index
None
Release
Modification
7.6
This example shows how to enable the IPsec support for RADIUS authentication server index 1:
(Cisco Controller) > config radius auth ipsec enable 1
This example shows how to disable the IPsec support for RADIUS authentication server index 1:
(Cisco Controller) > config radius auth ipsec disable 1
Related Commands
905
config Commands
Syntax Description
Command Default
Command History
Examples
256-aes
3des
aes
des
index
None
Release
Modification
7.6
8.0
The following example shows how to configure IPsec 3dec encryption RADIUS authentication server index
3:
(Cisco Controller) > config radius auth ipsec encryption 3des 3
Related Commands
OL-31334-01
config Commands
Syntax Description
auth-mode
pre-shared-key
index
ascii
hex
shared-secret
certificate
dh-group
2048bit-group-14
group-1
group-2
group-5
lifetime
seconds
phase1
aggressive
main
index
907
config Commands
Command Default
Command History
Examples
By default, preshared key is used for IPsec sessions and IKE lifetime is 28800 seconds.
Release
Modification
7.6
The following example shows how to configure IKE lifetime of 23 seconds for RADIUS authentication server
index 1:
(Cisco Controller) > config radius auth ipsec ike lifetime 23 1
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
add
ascii
hex
kek
mack
delete
index
None
Release
Modification
7.6
The following example shows how to enable the AES key wrap for a RADIUS authentication server:
(Cisco Controller) > config radius auth keywrap enable
Related Commands
909
config Commands
Syntax Description
Command Default
Command History
Examples
colon
hyphen
single-hyphen
none
Release
Modification
7.6
The following example shows how to specify a delimiter hyphen to be used for a RADIUS authentication
server:
(Cisco Controller) > config radius auth mac-delimiter hyphen
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
enable
disable
None
Release
Modification
7.6
The following example shows how to configure a RADIUS server for management users:
(Cisco Controller) > config radius auth management 1 enable
Related Commands
911
config Commands
Syntax Description
Command Default
Command History
Examples
index
retransmit-timeout
None
Release
Modification
7.6
The following example shows how to configure a default RADIUS server retransmission timeout for
management users:
(Cisco Controller) > config radius auth mgmt-retransmit-timeout 1 10
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
enable
disable
None
Release
Modification
7.6
The following example shows how to configure a default RADIUS server for network users:
(Cisco Controller) > config radius auth network 1 enable
Related Commands
913
config Commands
Syntax Description
Command Default
Command History
Examples
radius_server
add
delete
realm_string
None
Release
Modification
8.0
The following example shows how add realm to the RADIUS authentication server:
(Cisco Controller) > config radius auth realm add 3 test
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure a retransmission timeout of 5 seconds for a RADIUS
authentication server:
(Cisco Controller) > config radius auth retransmit-timeout 5
Related Commands
915
config Commands
Syntax Description
Command Default
Command History
enable
disable
index
None
Release
Modification
7.6
Usage Guidelines
RFC 3576, which is an extension to the RADIUS protocol, allows dynamic changes to a user session. RFC
3576 includes support for disconnecting users and changing authorizations applicable to a user session.
Disconnect messages cause a user session to be terminated immediately; CoA messages modify session
authorization attributes such as data filters.
Examples
The following example shows how to enable the RADIUS RFC-3576 support for a RADIUS authentication
server:
(Cisco Controller) > config radius auth rfc3576 enable 2
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
Release
Modification
7.6
The following example shows how to configure a server timeout value of 2 seconds for RADIUS authentication
server index 10:
(Cisco Controller) > config radius auth retransmit-timeout 2 10
Related Commands
917
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the controller to mark a RADIUS server as down:
(Cisco Controller) > config radius aggressive-failover disabled
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
Command Default
Enabled.
Command History
Release
Modification
7.6
Examples
The following example shows how to enable the RADIUS backward compatibility settings:
(Cisco Controller) > config radius backward compatibility disable
Related Commands
919
config Commands
Syntax Description
legacy
lower
upper
Command Default
Enabled.
Command History
Release
Modification
7.6
Examples
The following example shows how to send the call station ID in lowercase:
(Cisco Controller) > config radius callStationIdCase lower
Related Commands
OL-31334-01
config Commands
Syntax Description
ipaddr
macaddr
ap-macaddr-only
ap-macaddr-ssid
ap-ethmac-only
ap-ethmac-ssid
ap-group-name
flex-group-name
ap-name
ap-name-ssid
ap-location
vlan-id
921
config Commands
ap-label-address
ap-label-address-ssid
Command Default
Usage Guidelines
The controller sends the Called Station ID attribute to the RADIUS server in all authentication and accounting
packets. The Called Station ID attribute can be used to classify users to different groups based on the attribute
value. The command is applicable only for the Called Station and not for the Calling Station.
You cannot send only the SSID as the Called-Station-ID, you can only combine the SSID with either the
access point MAC address or the access point name.
Command History
Release
Modification
7.6
7.6
8.0
Examples
The following example shows how to configure the call station ID type to use the IP address:
(Cisco Controller) > config radius callStationIdType ipaddr
The following example shows how to configure the call station ID type to use the systems MAC address:
(Cisco Controller) > config radius callStationIdType macaddr
The following example shows how to configure the call station ID type to use the access points MAC address:
(Cisco Controller) > config radius callStationIdType ap-macaddr-only
OL-31334-01
config Commands
Syntax Description
global
Configures the global port and secret to retrieve the RADIUS IP information from
a DNS server.
port
Port number for authentication. The range is from 1 to 65535. All the DNS servers
should use the same authentication port.
ascii
hex
secret
query
Configures the fully qualified domain name (FQDN) of the RADIUS server and
DNS timeout.
url
timeout
Maximum time that the Cisco WLC waits for, in days, before timing out the request
and resending it. The range is from 1 to 180.
serverip
ip_address
disable
enable
Enables the Cisco WLC to retrieve the RADIUS IP information from a DNS
server.
When you enable a DNS query, the static configurations are overridden, that is,
the DNS list overrides the static AAA list.
Command Default
Command History
You cannot configure the global port and secret to retrieve the RADIUS IP information.
Release
Modification
7.5
923
config Commands
Usage Guidelines
The accounting port is derived from the authentication port. All the DNS servers should use the same secret.
Examples
The following example shows how to enable the RADIUS DNS feature on the Cisco WLC:
(Cisco Controller) > config radius dns enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
mode
off
passive
active
username
username
interval
interval
Release
Modification
7.6
The following example shows how to disable the RADIUS accounting server fallback behavior:
(Cisco Controller) > config radius fallback-test mode off
925
config Commands
The following example shows how to configure the controller to revert to a preferable server from the available
backup servers without using the extraneous probe messages:
(Cisco Controller) > config radius fallback-test mode passive
The following example shows how to configure the controller to revert to a preferable server from the available
backup servers by using RADIUS probe messages:
(Cisco Controller) > config radius fallback-test mode active
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
external
rogue_MAC
alert
all
auto-contain
monitor_ap
contain
1234_aps
delete
all
mac-address
927
config Commands
Command Default
Command History
Usage Guidelines
Note
mac-address
classify
friendly state
internal
malicious state
alert
contain
unclassified state
The default for this command is enabled and is set to alert. The default for auto-containment is disabled.
Release
Modification
7.6
The controller continuously monitors all nearby access points and automatically discovers and collects
information on rogue access points and clients. When the controller discovers a rogue access point, it uses
RLDP to determine if the rogue is attached to your wired network.
RLDP is not supported for use with Cisco autonomous rogue access points. These access points drop the
DHCP Discover request sent by the RLDP client. Also, RLDP is not supported if the rogue access point
channel requires dynamic frequency selection (DFS).
When you enter any of the containment commands, the following warning appears:
Using this feature may have legal consequences. Do you want to continue? (y/n) :
OL-31334-01
config Commands
The 2.4- and 5-GHz frequencies in the Industrial, Scientific, and Medical (ISM) band are open to the public
and can be used without a license. As such, containing devices on another partys network could have legal
consequences.
Enter the auto-contain command with the monitor_ap argument to monitor the rogue access point without
containing it. Enter the auto-contain command without the optional monitor_ap to automatically contain all
wired ad-hoc rogues detected by the controller.
Examples
The following example shows how to enable the detection and reporting of ad-hoc rogues:
(Cisco Controller) > config rogue adhoc enable
The following example shows how to enable alerts for all ad-hoc rogue access points:
(Cisco Controller) > config rogue adhoc alert all
The following example shows how to classify an ad-hoc rogue access point as friendly and configure external
state on it:
(Cisco Controller) > config rogue adhoc classify friendly state internal 11:11:11:11:11:11
Related Commands
929
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
friendly
state
internal
external
ap_mac
malicious
unclassified
alert
contain
These commands are disabled by default. Therefore, all unknown access points are categorized as unclassified
by default.
Release
Modification
7.6
A rogue access point cannot be moved to the unclassified class if its current state is contain.
When you enter any of the containment commands, the following warning appears: Using this feature may
have legal consequences. Do you want to continue? The 2.4- and 5-GHz frequencies in the Industrial,
OL-31334-01
config Commands
Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing
devices on another partys network could have legal consequences.
Examples
The following example shows how to classify a rogue access point as friendly and can be trusted:
(Cisco Controller) > config rogue ap classify friendly state internal 11:11:11:11:11:11
The following example shows how to classify a rogue access point as malicious and to send an alert:
(Cisco Controller) > config rogue ap classify malicious state alert 11:11:11:11:11:11
The following example shows how to classify a rogue access point as unclassified and to contain it:
(Cisco Controller) > config rogue ap classify unclassified state contain 11:11:11:11:11:11
Related Commands
931
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
ap_mac
None
Release
Modification
7.6
The following example shows how to add a new friendly access point with MAC address 11:11:11:11:11:11
to the friendly MAC address list.
(Cisco Controller) > config rogue ap friendly add 11:11:11:11:11:11
Related Commands
OL-31334-01
config Commands
933
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
alarm-only
auto-contain
monitor_ap_only
initiate
rogue_mac_address
disable
None
Release
Modification
7.6
When you enter any of the containment commands, the following warning appears: Using this feature may
have legal consequences. Do you want to continue? The 2.4- and 5-GHz frequencies in the Industrial,
Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing
devices on another partys network could have legal consequences.
OL-31334-01
config Commands
Examples
The following example shows how to enable RLDP on all access points:
(Cisco Controller) > config rogue ap rldp enable alarm-only
The following example shows how to enable RLDP on monitor-mode access point ap_1:
(Cisco Controller) > config rogue ap rldp enable alarm-only ap_1
The following example shows how to start RLDP on the rogue access point with MAC address 123.456.789.000:
(Cisco Controller) > config rogue ap rldp initiate 123.456.789.000
The following example shows how to disable RLDP on all access points:
(Cisco Controller) > config rogue ap rldp disable
Related Commands
935
config Commands
Syntax Description
Command Default
Command History
alarm
auto-contain
None
Release
Modification
7.6
Usage Guidelines
When you enter any of the containment commands, the following warning appears: Using this feature may
have legal consequences. Do you want to continue? The 2.4- and 5-GHz frequencies in the Industrial,
Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing
devices on another partys network could have legal consequences.
Examples
The following example shows how to automatically contain a rogue access point that is advertising your
networks SSID:
(Cisco Controller) > config rogue ap ssid auto-contain
Related Commands
OL-31334-01
config Commands
937
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
The default number of seconds after which the rogue access point and client entries expire is 1200 seconds.
Release
Modification
7.6
The following example shows how to set an expiration time for entries in the rogue access point and client
list to 2400 seconds:
(Cisco Controller) > config rogue ap timeout 2400
Related Commands
OL-31334-01
config Commands
939
config Commands
Syntax Description
level
monitor_ap_only
Command Default
Command History
Usage Guidelines
Release
Modification
7.6
The controller continuously monitors all nearby access points and automatically discovers and collects
information on rogue access points and clients. When the controller discovers a rogue access point, it uses
any of the configured auto-containment policies to start autocontainment. The policies for initiating
autocontainment are rogue on wire (detected through RLDP or rogue detector AP), rogue using managed
SSID, Valid client on Rogue AP, and AdHoc Rogue.
This table lists the RSSI value associated with each containment level.
Table 9: RSSI Associated with Each Containment Level
Auto-containment
Level
RSSI
0 to 55 dBm
75 to 55 dBm
85 to 75 dBm
OL-31334-01
config Commands
Note
Auto-containment
Level
RSSI
RLDP is not supported for use with Cisco autonomous rogue access points. These access points drop the
DHCP Discover request sent by the RLDP client. Also, RLDP is not supported if the rogue access point
channel requires dynamic frequency selection (DFS).
When you enter any of the containment commands, the following warning appears:
Using this feature may have legal consequences. Do you want to continue? (y/n) :
The 2.4-GHz and 5-GHz frequencies in the Industrial, Scientific, and Medical (ISM) band are open to the
public and can be used without a license. As such, containing devices on another partys network could have
legal consequences.
Examples
Related Commands
941
config Commands
Syntax Description
Command Default
Command History
alarm
auto-contain
None
Release
Modification
7.6
Usage Guidelines
When you enter any of the containment commands, the following warning appears: Using this feature may
have legal consequences. Do you want to continue? The 2.4- and 5-GHz frequencies in the Industrial,
Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing
devices on another partys network could have legal consequences.
Examples
The following example shows how to automatically contain a rogue access point that is associated with a
valid client:
(Cisco Controller) > config rogue ap valid-client auto-contain
Related Commands
OL-31334-01
config Commands
943
config Commands
Syntax Description
aaa
enable
disable
alert
ap_mac
contain
client_mac
delete
state
alert
any
contained
contained-pending
all
mac-address
mse
OL-31334-01
config Commands
Command Default
Command History
None
Release
Modification
7.6
Usage Guidelines
You cannot validate rogue clients against MSE and AAA at the same time.
Examples
The following example shows how to enable the AAA server or local database to check MAC addresses:
(Cisco Controller) > config rogue client aaa enable
The following example shows how to disable the AAA server or local database from checking MAC addresses:
(Cisco Controller) > config rogue client aaa disable
Related Commands
945
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
flexconnect
auto-rate
enable
disable
None
Release
Modification
7.5
The following table lists the rogue containment automatic rate selection details.
Table 10: Rogue Containment Automatic Rate Selection
Examples
RSSI (dBm)
74
70
12
55
5.5
12
< 40
5.5
18
The following example shows how to enable automatic rate selection for rogue containment:
(Cisco Controller) > config rogue containment auto-rate enable
OL-31334-01
config Commands
Note
If an AP itself is configured with the keyword all, the all access points case takes precedence over the
AP that is with the keyword all.
Syntax Description
Command Default
Command History
enable
disable
cisco_ap
all
Release
Modification
7.6
Usage Guidelines
Rogue detection is enabled by default for all access points joined to the controller except for OfficeExtend
access points. OfficeExtend access points are deployed in a home environment and are likely to detect a large
number of rogue devices.
Examples
The following example shows how to enable rogue detection on the access point Cisco_AP:
(Cisco Controller) > config rogue detection enable Cisco_AP
Related Commands
947
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
value
Threshold rogue client count on an access point after which a trap is sent from the Cisco
Wireless LAN Controller (WLC). The range is from 1 to 256. Enter 0 to disable the
feature.
Release
Modification
7.5
The following example shows how to configure the rogue client threshold:
(Cisco Controller) >config rogue detection client-threshold 200
949
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
rssi-in-dBm
Release
Modification
7.6
Examples
The following example shows how to configure the minimum RSSI value:
(Cisco Controller) > config rogue detection min-rssi 80
Related Commands
OL-31334-01
config Commands
Syntax Description
report-interval
transient-rogue-interval
time-in-seconds
Command History
Usage Guidelines
Release
Modification
7.6
Examples
The following example shows how to configure the rogue report interval to 60 seconds:
(Cisco Controller) > config rogue detection monitor-ap report-interval 60
The following example shows how to configure the transient rogue interval to 300 seconds:
(Cisco Controller) > config rogue detection monitor-ap transient-rogue-interval 300
951
config Commands
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
time
Time interval, in seconds, at which the access points send the rogue detection report to
the controller. The range is from 10 to 300.
Release
Modification
7.5
Usage Guidelines
This feature is applicable only to the access points that are in the monitor mode.
Examples
The following example shows how to configure the rogue detection report interval:
(Cisco Controller) >config rogue detection report-interval 60
953
config Commands
Syntax Description
Command Default
Command History
Examples
critical
custom
Configures the rogue detection security level to custom, and allows you to configure
the rogue policy parameters.
high
Configures the rogue detection security level to high. This security level configures
basic rogue detection and auto containment for medium-scale or less critical deployments.
The Rogue Location Discovery Protocol (RLDP) is disabled for this security level.
low
Configures the rogue detection security level to low. This security level configures basic
rogue detection for small-scale deployments. Auto containment is not supported for this
security level.
Release
Modification
7.5
The following example shows how to configure the rogue detection security level to high:
(Cisco Controller) > config rogue detection security-level high
OL-31334-01
config Commands
Syntax Description
Command Default
time
Time interval, in seconds, at which a rogue should be consistently scanned by the access
point after the rogue is scanned for the first time. The range is from 120 to 1800.
The default rogue-detection transient interval for each security level is as follows:
Low120 seconds
High300 seconds
Critical600 seconds
Command History
Usage Guidelines
Release
Modification
7.5
This feature applies only to the access points that are in the monitor mode.
After the rogue is scanned consistently, updates are sent periodically to the Cisco Wireless LAN Controller
(WLC). The access points filter the active transient rogues for a very short period and are then silent.
Examples
The following example shows how to configure the rogue detection transient interval:
(Cisco Controller) > config rogue detection transient-rogue-interval 200
955
config Commands
Syntax Description
add ap priority
priority
classify
custom
severity-score
classification-name
friendly
malicious
notify
all
global
local
none
state
OL-31334-01
config Commands
alert
contain
delete
external
internal
rule_name
condition ap
set
delete
957
config Commands
condition_type
condition_value
enable
delete
disable
match
all
any
priority
OL-31334-01
config Commands
Command Default
Command History
Usage Guidelines
Release
Modification
7.6
For your changes to be effective, you must enable the rule. You can configure up to 64 rules.
Reclassification of rogue APs according to the RSSI condition of the rogue rule occurs only when the RSSI
changes more than +/- 2 dBm of the configured RSSI value. Manual and automatic classification override
custom rogue rules. Rules are applied to manually changed rogues if their class type changes to unclassified
and state changes to alert. Adhoc rogues are classified and do not go to the pending state. You can have up
to 50 classification types.
Examples
The following example shows how to create a rule called rule_1 with a priority of 1 and a classification as
friendly.
(Cisco Controller) > config rogue rule add ap priority 1 classify friendly rule_1
The following example shows how to change the priority of the last command.
(Cisco Controller) > config rogue rule priority 2 rule_1
The following example shows how to change the classification of the last command.
(Cisco Controller) > config rogue rule classify malicious rule_1
The following example shows how to delete SSID_2 from the user-configured SSID list in rule-5.
(Cisco Controller) > config rogue rule condition ap delete ssid ssid_2 rule-5
959
config Commands
Syntax Description
set
Configures conditions to a rule that the rogue access point must meet.
client-count
count
Minimum number of clients to be associated to the rogue access point. The range
is from 1 to 10 (inclusive). For example, if the number of clients associated to a
rogue access point is greater than or equal to the configured value, the access point
is classified as malicious.
duration
time
Minimum time period, in seconds, to detect the rogue access point. The range is
from 0 to 3600.
managed-ssid
no-encryption
Enables a rogue access points advertised WLAN to not have encryption enabled.
If a rogue access point has encryption disabled, it is likely that more clients will
try to associate to it.
rssi
Enables a rogue access point to have a minimum Received Signal Strength Indicator
(RSSI) value.
rssi
Minimum RSSI value, in dBm, required for the access point. The range is from
95 to 50 (inclusive). For example, if the rogue access point has an RSSI that is
greater than the configured value, the access point is classified as malicious.
ssid
ssid
substring-ssid
substring-ssid
delete
Removes the conditions to a rule that a rogue access point must comply with.
all
OL-31334-01
config Commands
rule_name
Command Default
Command History
Release
Modification
7.6
Usage Guidelines
You can configure up to 25 SSIDs per rogue rule. You can configure up to 25 SSID substrings per rogue rule.
Examples
The following example shows how to configure the RSSI rogue rule condition:
(Cisco Controller) > config rogue rule condition ap set rssi 50
961
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
8.0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
8.0
963
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
8.0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
add
1-3
IP addr
port
ascii/hex
secret
delete
disable
enable
server-timeout
seconds
None
Release
Modification
7.6
8.0
965
config Commands
Examples
The following example shows how to add a new TACACS+ accounting server index 1 with the IPv4 address
10.0.0.0, port number 49, and secret key 12345678 in ASCII:
(Cisco Controller) > config tacacs acct add 1 10.0.0.0 10 ascii 12345678
The following example shows how to add a new TACACS+ accounting server index 1 with the IPv6 address
2001:9:6:40::623, port number 49, and secret key 12345678 in ASCII:
(Cisco Controller) > config tacacs acct add 1
The following example shows how to configure the server timeout of 5 seconds for the TACACS+ accounting
server:
(Cisco Controller) > config tacacs acct server-timeout 1 5
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
add
1-3
IP addr
port
ascii/hex
secret
delete
disable
enable
mgmt-server-timeout 1-3seconds
None
Release
Modification
7.6
8.0
967
config Commands
Examples
The following example shows how to add a new TACACS+ authorization server index 1 with the IPv4 address
10.0.0.0, port number 49, and secret key 12345678 in ASCII:
(Cisco Controller) > config tacacs athr add 1 10.0.0.0 49 ascii 12345678
The following example shows how to add a new TACACS+ authorization server index 1 with the IPv6 address
2001:9:6:40::623, port number 49, and secret key 12345678 in ASCII:
(Cisco Controller) > config tacacs athr add 1 2001:9:6:40::623 49 ascii 12345678
The following example shows how to configure the retransmit timeout of 5 seconds for the TACACS+
authorization server:
(Cisco Controller) > config tacacs athr server-timeout 1 5
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure a default TACACS+ authorization server timeout for
management users:
(Cisco Controller) > config tacacs athr mgmt-server-timeout 1 10
Related Commands
969
config Commands
Syntax Description
Command Default
Command History
add
1-3
IP addr
port
ascii/hex
secret
delete
disable
enable
None
Release
Modification
7.6
8.0
OL-31334-01
config Commands
Examples
The following example shows how to add a new TACACS+ authentication server index 1 with the IPv4
address 10.0.0.3, port number 49, and secret key 12345678 in ASCII:
(Cisco Controller) > config tacacs auth add 1 10.0.0.3 49 ascii 12345678
The following example shows how to add a new TACACS+ authentication server index 1 with the IPv6
address 2001:9:6:40::623, port number 49, and secret key 12345678 in ASCII:
(Cisco Controller) > config tacacs auth add 1 2001:9:6:40::623 49 ascii 12345678
The following example shows how to configure the server timeout for TACACS+ authentication server:
(Cisco Controller) > config tacacs auth server-timeout 1 5
971
config Commands
Syntax Description
Command Default
Command History
Examples
index
timeout
None
Release
Modification
7.6
The following example shows how to configure a default TACACS+ authentication server timeout for
management users:
(Cisco Controller) > config tacacs auth mgmt-server-timeout 1 10
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
global
Configures the global port and secret to retrieve the TACACS IP information
from a DNS server.
port
Port number for authentication. The range is from 1 to 65535. All the DNS servers
should use the same authentication port.
ascii
hex
secret
query
Configures the fully qualified domain name (FQDN) of the TACACS server and
DNS timeout.
url
timeout
Maximum time that the Cisco Wireless LAN Controller (WLC) waits for, in
days, before timing out a request and resending it. The range is from 1 to 180.
serverip
ip_address
disable
enable
Enables the Cisco WLC to retrieve the TACACS IP information from a DNS
server.
Release
Modification
7.6
973
config Commands
Usage Guidelines
The accounting port is derived from the authentication port. All the DNS servers should use the same secret.
When you enable a DNS query, the static configurations will be overridden. The DNS list overrides the static
AAA list.
Examples
The following example shows how to enable the TACACS DNS feature on the Cisco WLC:
(Cisco Controller) > config tacacs dns enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
radius_server
enable
disable
wlan-id
None
Release
Modification
8.0
975
config Commands
Syntax Description
{enable |disable }
eapol-key-timeout timeout
eapol-key-retries retries
identity-request-retries retries
request-timeout
request-retriesretries
OL-31334-01
config Commands
wlan-id
Command Default
Command History
Examples
Release
Modification
7.6
The following example shows how to enable SSID specific EAP parameters on a WLAN:
(Cisco Controller) > config wlan security eap-params enable 4
The following example shows how to set EAPOL key timeout parameter on a WLAN:
(Cisco Controller) > config wlan security eap-params eapol-key-retries 4
The following example shows how to set EAPOL key retries on a WLAN:
(Cisco Controller) > config wlan security eap-params eapol-key-retries 4
977
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
threshold
threshold_value
None
Release
Modification
7.6
The following example shows how to configure the access point neighbor authentication:
(Cisco Controller) > config wps ap-authentication threshold 25
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
stop
Command Default
Disabled
Command History
Release
Modification
7.6
Usage Guidelines
A potential attacker can use specially crafted packets to mislead the Intrusion Detection System (IDS) into
treating a legitimate client as an attacker. It causes the controller to disconnect this legitimate client and launch
a DoS attack. The auto-immune feature, when enabled, is designed to protect against such attacks. However,
conversations using Cisco 792x phones might be interrupted intermittently when the auto-immune feature is
enabled. If you experience frequent disruptions when using 792x phones, you might want to disable this
feature.
Examples
Related Commands
979
config Commands
Syntax Description
Command Default
add
index
ip_address
username
password
delete
enable
disable
port
port
Port number.
interval
query_interval
fingerprint
sha1
fingerprint
TLS fingerprint.
443
Query interval
60
Certification fingerprint
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
Query state
Disabled
OL-31334-01
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the intrusion detection system with the IDS index 1, IDS
sensor IP address 10.0.0.51, IDS username Sensor_user0doc1, and IDS password passowrd01:
(Cisco Controller) > config wps cids-sensor add 1 10.0.0.51 Sensor_user0doc1 password01
Related Commands
981
config Commands
Syntax Description
Command Default
Command History
Examples
802.11-assoc
802.11-auth
802.1x-auth
ip-theft
web-auth
all
enable
disable
Release
Modification
7.6
The following example shows how to disable clients on the 802.11 association attempt after five consecutive
failures:
(Cisco Controller) > config wps client-exclusion 802.11-assoc disable
OL-31334-01
config Commands
Related Commands
983
config Commands
Syntax Description
Command Default
Command History
Examples
infrastructure
ap-impersonation
enable
disable
None
Release
Modification
7.6
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the controller to synchronize with other controllers for the
shun list:
(Cisco Controller) > config wps shun-list re-sync
Related Commands
985
config Commands
Syntax Description
Command Default
Command History
standard
custom
state
signature_id
enable
disable
Release
Modification
7.6
Usage Guidelines
If IDS signature processing is disabled, all signatures are disabled, regardless of the state configured for
individual signatures.
Examples
The following example shows how to enable IDS signature processing, which enables the processing of all
IDS signatures:
(Cisco Controller) >config wps signature enable
The following example shows how to disable a standard individual IDS signature:
(Cisco Controller) > config wps signature standard state 15 disable
Related Commands
OL-31334-01
config Commands
987
config Commands
Syntax Description
Command Default
Command History
signature_id
frequency
Release
Modification
7.6
Usage Guidelines
If IDS signature processing is disabled, all signatures are disabled, regardless of the state configured for
individual signatures.
Examples
The following example shows how to set the number of matching packets per interval per access point before
an attack is detected to 1800 for signature ID 4:
(Cisco Controller) > config wps signature frequency 4 1800
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
signature_id
interval
Release
Modification
7.6
Usage Guidelines
If IDS signature processing is disabled, all signatures are disabled, regardless of the state configured for
individual signatures.
Examples
The following example shows how to set the number of seconds to elapse before reaching the signature
frequency threshold to 200 for signature ID 1:
(Cisco Controller) > config wps signature interval 1 200
Related Commands
989
config Commands
Syntax Description
Command Default
Command History
signature_id
mac_frequency
Release
Modification
7.6
Usage Guidelines
If IDS signature processing is disabled, all signatures are disabled, regardless of the state configured for
individual signatures.
Examples
The following example shows how to set the number of matching packets per interval per client before an
attack is detected to 50 for signature ID 3:
(Cisco Controller) > config wps signature mac-frequency 3 50
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
signature_id
quiet_time
Release
Modification
7.6
Usage Guidelines
If IDS signature processing is disabled, all signatures are disabled, regardless of the state configured for
individual signatures.
Examples
The following example shows how to set the number of seconds after which no attacks have been detected
per access point to 60 for signature ID 1:
(Cisco Controller) > config wps signature quiet-time 1 60
Related Commands
991
config Commands
Syntax Description
Command Default
Command History
signature_id
all
None
Release
Modification
7.6
Usage Guidelines
If IDS signature processing is disabled, all signatures are disabled, regardless of the state configured for
individual signatures.
Examples
The following example shows how to reset the IDS signature 1 to default values:
(Cisco Controller) > config wps signature reset 1
Related Commands
OL-31334-01
clear Commands
clear Commands
This section lists the clear commands to clear existing security configurations of the controller.
993
clear Commands
Syntax Description
Command Default
Command History
acl_name
ACL name.
None
Release
Modification
7.6
Usage Guidelines
Note
Examples
ACL counters are available only on the following controllers: Cisco 4400 Series Controller, Cisco WiSM,
and Catalyst 3750G Integrated Wireless LAN Controller Switch.
The following example shows how to clear the current counters for acl1:
(Cisco Controller) > clear acl counters acl1
Related Commands
OL-31334-01
clear Commands
Syntax Description
Command Default
Command History
Examples
index
all
None
Release
Modification
7.6
The following example shows how to clear the RADIUS accounting statistics:
(Cisco Controller) > clear radius acc statistics
Related Commands
995
clear Commands
Syntax Description
Command Default
Command History
Examples
index
all
None
Release
Modification
7.6
The following example shows how to clear the RADIUS authentication server statistics:
(Cisco Controller) > clear tacacs auth statistics
Related Commands
OL-31334-01
clear Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to clear the local EAP statistics:
(Cisco Controller) > clear stats local-auth
Local EAP Authentication Stats Cleared.
Related Commands
997
clear Commands
Syntax Description
Command Default
Command History
Examples
auth
acct
index
all
None
Release
Modification
7.6
The following example shows how to clear the statistics for all RADIUS authentication servers:
(Cisco Controller) > clear stats radius auth all
Related Commands
clear transfer
clear download datatype
clear download filename
clear download mode
clear download serverip
clear download start
clear upload datatype
clear upload filename
clear upload mode
clear upload path
clear upload serverip
clear upload start
OL-31334-01
clear Commands
999
clear Commands
Syntax Description
Command Default
Command History
Examples
auth
athr
acct
index
all
None
Release
Modification
7.6
The following example shows how to clear the TACACS+ accounting server statistics for index 1:
(Cisco Controller) > clear stats tacacs acct 1
Related Commands
OL-31334-01
debug Commands
debug Commands
This section lists the debug commands to manage debugging of security settings of the controller.
Caution
Debug commands are reserved for use only under the direction of Cisco personnel. Do not use these
commands without direction from Cisco-certified staff.
1001
debug Commands
debug 11w-pmf
To configure the debugging of 802.11w, use the debug 11w-pmf command.
debug 11w-pmf {all | events| keys} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
keys
events
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of 802.11w keys:
(Cisco Controller) >debug 11w-pmf keys enable
OL-31334-01
debug Commands
debug aaa
To configure the debugging of AAA settings, use the debug aaa command.
debug aaa {[all | detail | events | packet | ldap | local-auth | tacacs] [enable | disable]}
Syntax Description
Command Default
Command History
Examples
all
detail
events
packet
ldap
local-auth
tacacs
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of AAA LDAP events:
(Cisco Controller) > debug aaa ldap enable
Related Commands
1003
debug Commands
Syntax Description
events
Command History
Release
Modification
7.6
Examples
The following example shows how to enable the debugging for DNS-based ACLs:
(Cisco Controller) > debug aaa events enble
OL-31334-01
debug Commands
Syntax Description
Command Default
Command History
db
shim
eap
framework
method
all
errors
events
packets
sm
enable
disable
None
Release
Modification
7.6
1005
debug Commands
Examples
The following example shows how to enable the debugging of the AAA local EAP authentication:
(Cisco Controller) > debug aaa local-auth eap method all enable
Related Commands
OL-31334-01
debug Commands
debug bcast
To configure the debugging of broadcast options, use the debug bcast command.
debug bcast {all | error | message | igmp | detail} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
error
message
igmp
detail
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of broadcast messages:
(Cisco Controller) > debug bcast message enable
The following example shows how to disable the debugging of broadcast mesages:
(Cisco Controller) > debug bcast message disable
Related Commands
debug disable-all
show sysinfo
1007
debug Commands
debug cckm
To configure the debugging of the Cisco Centralized Key Management options, use the debug cckm
debug cckm {client | detailed} {enable| disable}
Syntax Description
Command Default
Command History
Examples
client
detailed
enable
disable
None
Release
Modification
7.6
The following example shows how to enable detailed debugging of Cisco Centralized Key Management:
(Cisco Controller) > debug cckm detailed enable
OL-31334-01
debug Commands
debug client
To configure the debugging for a specific client, use the debug client command.
debug client mac_address
Syntax Description
mac_address
Command Default
None
Usage Guidelines
After entering the debug client mac_address command, if you enter the debug aaa events enable command,
then the AAA events logs are displayed for that particular client MAC address.
Command History
Examples
Release
Modification
7.6
1009
debug Commands
Syntax Description
Command Default
Command History
Examples
all
errors
events
framework
message
enable
disable
None
Release
Modification
7.6
The following example shows how to enable CTS SXP event debugging:
(Cisco Controller) > debug cts sxp
OL-31334-01
debug Commands
debug dns
To configure debugging of Domain Name System (DNS) options, use the debug dns command.
debug dns {all | detail | error | message} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
detail
error
message
enable
disable
None
Release
Modification
7.6
1011
debug Commands
debug dot1x
To configure debugging of the 802.1X options, use the debug dot1x command.
debug dot1x {aaa | all | events | packets | states} {enable | disable}
Syntax Description
Command Default
Command History
Examples
aaa
all
events
packets
states
enable
disable
None
Release
Modification
7.6
The following example shows how to enable 802.1X state transitions debugging:
(Cisco Controller) > debug dot1x states enable
OL-31334-01
debug Commands
debug dtls
To configure debugging of the Datagram Transport Layer Security (DTLS) options, use the debug dtls
command.
debug dtls {all | event | packet | trace} {enable | disable}
Syntax Description
Command Default
Command History
all
event
packet
trace
enable
disable
None
Release
Modification
7.6
Usage Guidelines
The debug actions described here are used in conjunction with CAPWAP troubleshooting.
Examples
1013
debug Commands
debug nac
To configure the debugging of Network Access Control (NAC), use the debug nac command.
debug nac {events | packet} {enable | disable}
Syntax Description
Command Default
Command History
Examples
events
packet
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of NAC settings:
(Cisco Controller) > debug nac events enable
Related Commands
OL-31334-01
debug Commands
debug policy
To configure debugging of policy settings, use the debug policy command.
debug policy {errors | events} {enable | disable}
Syntax Description
Command Default
Command History
Examples
errors
events
enable
disable
None
Release
Modification
7.6
1015
debug Commands
debug pm
To configure the debugging of the security policy manager module, use the debug pm command.
debug pm {all disable | {config | hwcrypto | ikemsg | init | list | message | pki | rng | rules | sa-export |
sa-import | ssh-l2tp | ssh-appgw | ssh-engine | ssh-int | ssh-pmgr | ssh-ppp | ssh-tcp} {enable | disable}}
Syntax Description
all disable
config
hwcrypto
ikemsg
init
list
message
pki
rng
rules
sa-export
sa-import
ssh-l2tp
ssh-appgw
ssh-engine
ssh-int
ssh-pmgr
OL-31334-01
debug Commands
Command Default
Command History
Examples
ssh-ppp
ssh-tcp
enable
disable
None
Release
Modification
7.6
The following example shows how to configure the debugging of PKI-related events:
(Cisco Controller) > debug pm pki enable
Related Commands
debug disable-all
1017
debug Commands
debug web-auth
To configure debugging of web-authenticated clients, use the debug web-auth command.
debug web-auth {redirect{ enable mac mac_address | disable} | webportal-server {enable | disable}}
Syntax Description
Command Default
Command History
Examples
redirect
enable
mac
mac_address
disable
webportal-server
None
Release
Modification
7.6
The following example shows how to enable the debugging of a web authenticated and redirected client:
(Cisco Controller) > debug web-auth redirect enable mac xx:xx:xx:xx:xx:xx
OL-31334-01
debug Commands
debug wips
To configure debugging of wireless intrusion prevention system (WIPS), use the debug wips command.
debug wips {all | error | event | nmsp | packet} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
error
event
nmsp
packet
enable
disable
None
Release
Modification
7.6
The following example shows how to enable debugging of all WIPS messages:
(Cisco Controller) > debug wips all enable
Related Commands
debug client
debug dot11 rogue
show wps summary
show wps wips
1019
debug Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of WPS signature settings:
(Cisco Controller) > debug wps sig enable
Related Commands
OL-31334-01
debug Commands
Syntax Description
Command Default
Command History
Examples
client
capwap
detail
report
mm
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of WPS MFP settings:
(Cisco Controller) > debug wps mfp detail enable
Related Commands
debug disable-all
debug wps sig
1021
debug Commands
OL-31334-01
PART
WLAN Commands
CLI Commands, page 1025
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands, page 1025
config Commands, page 1082
clear Commands, page 1319
debug Commands, page 1320
test Commands, page 1335
show Commands
This section lists the show commands to display information about your WLAN configuration settings.
1025
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the advanced HotSpot parameters:
(Cisco Controller) >show advanced hotspot
ANQP 4-way state.................................
GARP Broadcast state: ...........................
GAS request rate limit ..........................
ANQP comeback delay in TUs(TU=1024usec)..........
Disabled
Enabled
Disabled
50
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
application
application_name
top-app-groups
upstream
downstream
top-apps
None
Release
Modification
7.4
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
(D)
(U)
Packets
Bytes
Avg Pkt Packets
Bytes
(n secs) (n secs) Size
(Total)
(Total)
======= ======
======
======
=======
191464
208627
1
92208613 11138796586
63427 53440610
842
16295621
9657054635
805
72880
90
172939
11206202
911
58143
63
190900
17418653
264904 12508288
47
27493945
2837672192
319894 436915253 1365
29850934 36817587924
0
0
0
10158872 10402684928
0
0
0
0
0
1
40
40
323
98476
7262
4034576
555
2888266
1605133372
62565 64066560 1024
11992305 12280120320
0
0
0
0
0
1430
16798
11
305161
3795766
1027
show Commands
irc
nntp
(D)
(U)
(D)
(U)
(D)
1555
9
11
22
22
576371
74
371
158
372
370
8
33
7
16
332290
1736
1972
1705
2047
125799465
9133
173381
9612
214391
The following is a sample output of the show avc statistics wlan command.
(Cisco Controller) >show avc statistics wlan 1 application ftp
Description
===========
Number of Packtes(n secs)
Number of Bytes(n secs)
Average Packet size(n secs)
Total Number of Packtes
Total Number of Bytes
Upstream
========
0
0
0
32459
274
Downstream
==========
0
0
0
64888
94673983
OL-31334-01
show Commands
show call-control ap
Note
The show call-control ap command is applicable only for SIP based calls.
To see the metrics for successful calls or the traps generated for failed calls, use the show call-control ap
command.
show call-control ap {802.11a | 802.11b} cisco_ap {metrics | traps}
Syntax Description
Command Default
Command History
Usage Guidelines
802.11a
802.11b
cisco_ap
metrics
traps
None
Release
Modification
7.6
To aid in troubleshooting, the output of this command shows an error code for any failed calls. This table
explains the possible error codes for failed calls.
Table 11: Error Codes for Failed VoIP Calls
Description
unknown
Unknown error.
400
badRequest
401
unauthorized
402
paymentRequired
403
forbidden
1029
show Commands
Description
404
notFound
The server has information that the user does not exist at the
domain specified in the Request-URI.
405
methodNotallowed
406
notAcceptable
407
proxyAuthenticationRequired
408
requestTimeout
409
conflict
410
gone
411
lengthRequired
413
requestEntityTooLarge
414
requestURITooLarge
415
unsupportedMediaType
420
badExtension
480
temporarilyNotAvailable
481
callLegDoesNotExist
The UAS received a request that does not match any existing
dialog or transaction.
482
loopDetected
OL-31334-01
show Commands
Description
483
tooManyHops
484
addressIncomplete
485
ambiguous
486
busy
500
internalServerError
501
notImplemented
502
badGateway
503
serviceUnavailable
504
serverTimeout
505
versionNotSupported
600
busyEverywhere
603
decline
604
doesNotExistAnywhere
606
notAcceptable
1031
show Commands
Examples
The following is a sample output of the show call-controller ap command that displays successful calls
generated for an access point:
(Cisco Controller) >show call-control ap 802.11a Cisco_AP metrics
Total Call Duration in Seconds................... 120
Number of Calls.................................. 10
Number of calls for given client is................. 1
The following is a sample output of the show call-control ap command that displays metrics of traps generated
for an AP.
(Cisco Controller) >show call-control ap 802.11a Cisco_AP traps
Number of traps sent in one min.................. 2
Last SIP error code.............................. 404
Last sent trap timestamp...................... Jun 20 10:05:06
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
callInfo
client_MAC_address
None
Release
Modification
7.6
The following example is a sample output of the show call-controller client command:
> show call-control client callInfo 10.10.10.10.10.10
Uplink IP/port................................... 0.0.0.0 /
0
Downlink IP/port................................ 9.47.96.107 / 5006
UP...............................................
6
Calling Party.................................... sip:1021
Called Party..................................... sip:1000
Call ID.......................................... 38423970c3fca477
Call on hold: ................................... FALSE
Number of calls for given client is.............. 1
1033
show Commands
Syntax Description
Command Default
Command History
client_mac_address
None
Release
Modification
7.6
Usage Guidelines
This command displays the clients available capabilities, not the current settings for the capabilities.
Examples
The following is a sample output of the show client ccx client-capability command:
(Cisco Controller) >show client ccx client-capability 00:40:96:a8:f7:98
Service Capability.................................. Voice, Streaming(uni-directional)
Video, Interactive(bi-directional) Video
Radio Type.......................................... DSSS OFDM(802.11a) HRDSSS(802.11b)
ERP(802.11g)
Radio Type.......................................... DSSS
Radio Channels.................................. 1 2 3 4 5 6 7 8 9 10 11
Tx Power Mode................................... Automatic
Rate List(MB)................................... 1.0 2.0
Radio Type.......................................... HRDSSS(802.11b)
Radio Channels.................................. 1 2 3 4 5 6 7 8 9 10 11
Tx Power Mode................................... Automatic
Rate List(MB)................................... 5.5 11.0
Radio Type.......................................... ERP(802.11g)
Radio Channels.................................. 1 2 3 4 5 6 7 8 9 10 11
Tx Power Mode................................... Automatic
Rate List(MB)................................... 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
Are you sure you want to start? (y/N)y Are you sure you want to start? (y/N)
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx frame-data command:
(Cisco Controller) >show client ccx frame-data
xx:xx:xx:xx:xx:xx
1035
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx last-response-status command:
(Cisco Controller) >show client ccx last-response-status
Test Status ........................ Success
Response Dialog Token.............. 87
Response Status.................... Successful
Response Test Type................. 802.1x Authentication Test
Response Time...................... 3476 seconds since system boot
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx last-test-status command:
(Cisco Controller) >show client ccx last-test-status
Test Type ........................
Test Status ......................
Dialog Token .....................
Timeout ..........................
Request Time .....................
1037
show Commands
Syntax Description
Command Default
Command History
Examples
roam
rsna
syslog
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx log-response syslog command:
(Cisco Controller) >show client ccx log-response syslog 00:40:96:a8:f7:98
Tue Jun 26 18:07:48 2007
Syslog Response LogID=131: Status=Successful
Event Timestamp=0d 00h 19m 42s 278987us
Client SysLog = <11> Jun 19 11:49:47 unraval13777 Mandatory elements
OID response
Event Timestamp=0d 00h 19m 42s 278990us
Client SysLog = <11> Jun 19 11:49:47 unraval13777 Mandatory elements
OID response
Tue Jun 26 18:07:48 2007
Syslog Response LogID=131: Status=Successful
Event Timestamp=0d 00h 19m 42s 278987us
Client SysLog = <11> Jun 19 11:49:47 unraval13777 Mandatory elements
OID response
Event Timestamp=0d 00h 19m 42s 278990us
Client SysLog = <11> Jun 19 11:49:47 unraval13777 Mandatory elements
OID response
missing in the
missing in the
missing in the
missing in the
The following example shows how to display the client roaming log response:
(Cisco Controller) >show client ccx log-response roam 00:40:96:a8:f7:98
Thu Jun 22 11:55:14 2007
Roaming Response LogID=20: Status=Successful
Event Timestamp=0d 00h 00m 13s 322396us
Source BSSID=00:40:96:a8:f7:98
Target BSSID=00:0b:85:23:26:70,
Transition Time=100(ms)
Transition Reason: Normal roam, poor link
Transition Result: Success
Thu Jun 22 11:55:14 2007
Roaming Response LogID=133: Status=Successful
Event Timestamp=0d 00h 00m 16s 599006us
Source BSSID=00:0b:85:81:06:c2
Target BSSID=00:0b:85:81:06:c2,
Transition Time=3235(ms)
Transition Reason: Normal roam, poor link
Transition Result: Success
Thu Jun 22 18:28:48 2007
Roaming Response LogID=133: Status=Successful
Event Timestamp=0d 00h 00m 08s 815477us
Source BSSID=00:0b:85:81:06:c2
OL-31334-01
show Commands
Target BSSID=00:0b:85:81:06:d2,
Transition Time=3281(ms)
Transition Reason: First association to WLAN
Transition Result: Success
1039
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx manufacturer-info command:
(Cisco Controller) >show client ccx manufacturer-info 00:40:96:a8:f7:98
Manufacturer OUI .............................. 00:40:96
Manufacturer ID ............................... Cisco
Manufacturer Model ............................ Cisco Aironet 802.11a/b/g Wireless Adapter
Manufacturer Serial ........................... FOC1046N3SX
Mac Address ................................... 00:40:96:b2:8d:5e
Radio Type .................................... DSSS OFDM(802.11a) HRDSSS(802.11b)
ERP(802.11g)
Antenna Type .................................. Omni-directional diversity
Antenna Gain .................................. 2 dBi
Rx Sensitivity:
Radio Type ...................................... DSSS
Rx Sensitivity .................................. Rate:1.0 Mbps, MinRssi:-95, MaxRss1:-30
Rx Sensitivity .................................. Rate:2.0 Mbps, MinRssi:-95, MaxRss1:-30
Radio Type ...................................... HRDSSS(802.11b)
Rx Sensitivity .................................. Rate:5.5 Mbps, MinRssi:-95, MaxRss1:-30
Rx Sensitivity .................................. Rate:11.0 Mbps, MinRssi:-95, MaxRss1:-30
Radio Type ...................................... ERP(802.11g)
Rx Sensitivity .................................. Rate:6.0 Mbps, MinRssi:-95, MaxRss1:-30
Rx Sensitivity .................................. Rate:9.0 Mbps, MinRssi:-95, MaxRss1:-30
Rx Sensitivity .................................. Rate:12.0 Mbps, MinRssi:-95, MaxRss1:-30
Rx Sensitivity .................................. Rate:18.0 Mbps, MinRss1:-95, MaxRss1:-30
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx operating-parameters command:
(Cisco Controller) >show client ccx operating-parameters 00:40:96:b2:8d:5e
Client Mac ......................................... 00:40:96:b2:8d:5e
Radio Type ......................................... OFDM(802.11a)
Radio Type ......................................... OFDM(802.11a)
Radio Channels ................................. 36 40 44 48 52 56 60 64 100 104 108 112
116 120 124 128 132 136 140 149 153 157 161 165
Tx Power Mode .................................. Automatic
Rate List(MB)................................... 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
Power Save Mode .................................... Normal Power Save
SSID ............................................... wifi
Security Parameters[EAP Method, Credential]......... None
Auth Method ........................................ None
Key Management...................................... None
Encryption ......................................... None
Device Name ........................................ Wireless Network Connection 15
Device Type ........................................ 0
OS Id .............................................. Windows XP
OS Version ......................................... 5.1.6.2600 Service Pack 2
IP Type ............................................ DHCP address
IPv4 Address ....................................... Available
IP Address ......................................... 70.0.4.66
Subnet Mask ........................................ 255.0.0.0
Default Gateway .................................... 70.1.0.1
IPv6 Address ....................................... Not Available
IPv6 Address ....................................... 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:
IPv6 Subnet Mask ................................... 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:
DNS Servers ........................................ 103.0.48.0
WINS Servers .......................................
System Name ........................................ URAVAL3777
Firmware Version ................................... 4.0.0.187
Driver Version ..................................... 4.0.0.187
1041
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx profiles command:
(Cisco Controller) >show client ccx profiles 00:40:96:15:21:ac
Number of Profiles .................................. 1
Current Profile ..................................... 1
Profile ID .......................................... 1
Profile Name ........................................ wifiEAP
SSID ................................................ wifiEAP
Security Parameters [EAP Method, Credential]......... EAP-TLS, Host OS Login Credentials
Auth Method ......................................... EAP
Key Management ...................................... WPA2+CCKM
Encryption .......................................... AES-CCMP
Power Save Mode ..................................... Constantly Awake
Radio Configuration:
Radio Type........................................... DSSS
Preamble Type.................................... Long preamble
CCA Method....................................... Energy Detect + Carrier
Detect/Correlation
Data Retries..................................... 6
Fragment Threshold............................... 2342
Radio Channels................................... 1 2 3 4 5 6 7 8 9 10 11
Tx Power Mode.................................... Automatic
Rate List (MB)................................... 1.0 2.0
Radio Type........................................... HRDSSS(802.11b)
Preamble Type.................................... Long preamble
CCA Method....................................... Energy Detect + Carrier
Detect/Correlation
Data Retries..................................... 6
Fragment Threshold............................... 2342
Radio Channels................................... 1 2 3 4 5 6 7 8 9 10 11
Tx Power Mode.................................... Automatic
Rate List(MB).................................... 5.5 11.0
Radio Type........................................... ERP(802.11g)
Preamble Type.................................... Long preamble
CCA Method....................................... Energy Detect + Carrier
Detect/Correlation
Data Retries..................................... 6
Fragment Threshold............................... 2342
Radio Channels................................... 1 2 3 4 5 6 7 8 9 10 11
Tx Power Mode.................................... Automatic
Rate List (MB)................................... 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
Radio Type........................................... OFDM(802.11a)
OL-31334-01
show Commands
Preamble Type....................................
CCA Method.......................................
Detect/Correlation
Data Retries.....................................
Fragment Threshold...............................
Radio Channels...................................
165
Tx Power Mode....................................
Rate List (MB)...................................
Long preamble
Energy Detect + Carrier
6
2342
36 40 44 48 52 56 60 64 149 153 157 161
Automatic
6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
1043
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx results command:
(Cisco Controller) >show client ccx results xx.xx.xx.xx
dot1x Complete....................................... Success
EAP Method........................................... *1,Host OS Login Credentials
dot1x Status......................................... 255
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
client_MAC
status
report
chan-load
noise-hist
beacon
frame
pathloss
None
Release
Modification
7.6
The following example shows how to display the client radio management status information:
(Cisco Controller) >show client ccx rm 00:40:96:15:21:ac status
Client Mac Address............................... 00:40:96:15:21:ac
Channel Load Request............................. Enabled
Noise Histogram Request.......................... Enabled
Beacon Request................................... Enabled
Frame Request.................................... Enabled
Interval......................................... 30
Iteration........................................... 10
The following example shows how to display the client radio management load reports:
(Cisco Controller) >show client ccx rm 00:40:96:15:21:ac report chan-load
Channel Load Report
Client Mac Address............................... 00:40:96:ae:53:bc
Timestamp........................................ 788751121
Incapable Flag................................... On
1045
show Commands
Refused Flag........................................ On
Chan CCA Busy Fraction
----------------------1 194
2 86
3 103
4 0
5 178
6 82
7 103
8 95
9 13
10 222
11 75
The following example shows how to display the client radio management noise histogram reports:
(Cisco Controller) >show client ccx rm 00:40:96:15:21:ac report noise-hist
Noise Histogram Report
Client Mac Address............................... 00:40:96:15:21:ac
Timestamp........................................ 4294967295
Incapable Flag................................... Off
Refused Flag........................................ Off
Chan RPI0 RPI1 RPI2 RPI3 RPI4 RPI5 RPI6 RPI7
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following is a sample output of the show client ccx stats-report command:
(Cisco Controller) > show client ccx stats-report 00:0c:41:07:33:a6
Measurement duration = 1
dot11TransmittedFragmentCount
= 1
dot11MulticastTransmittedFrameCount = 2
dot11FailedCount
= 3
dot11RetryCount
= 4
dot11MultipleRetryCount
= 5
dot11FrameDuplicateCount
= 6
dot11RTSSuccessCount
= 7
dot11RTSFailureCount
= 8
dot11ACKFailureCount
= 9
dot11ReceivedFragmentCount
= 10
dot11MulticastReceivedFrameCount
= 11
dot11FCSErrorCount
= 12
dot11TransmittedFrameCount
= 13
1047
show Commands
Syntax Description
Command Default
Command History
mac_address
None
Release
Modification
7.6
Usage Guidelines
The show client ap command may list the status of automatically disabled clients. Use the show exclusionlist
command to display clients on the exclusion list (blacklisted).
Examples
The following example shows how to display the client detailed information:
(Cisco Controller) >show client detail 00:0c:41:07:33:a6
Policy Manager State..............................POSTURE_REQD
Policy Manager Rule Created.......................Yes
Client MAC Address............................... 00:16:36:40:ac:58
Client Username.................................. N/A
Client State..................................... Associated
Client NAC OOB State............................. QUARANTINE
Guest LAN Id..................................... 1
IP Address....................................... Unknown
Session Timeout.................................. 0
QoS Level........................................ Platinum
802.1P Priority Tag.............................. disabled
KTS CAC Capability............................... Yes
WMM Support...................................... Enabled
Power Save....................................... ON
Diff Serv Code Point (DSPC)...................... disabled
Mobility State................................... Local
Internal Mobility State.......................... apfMsMmInitial
Security Policy Completed........................ No
Policy Manager State............................. WEBAUTH_REQD
Policy Manager Rule Created...................... Yes
NPU Fast Fast Notified........................... Yes
Last Policy Manager State........................ WEBAUTH_REQD
Client Entry Create Time......................... 460 seconds
Interface........................................ wired-guest
FlexConnect Authentication....................... Local
FlexConnect Data Switching....................... Local
VLAN............................................. 236
Quarantine VLAN.................................. 0
Client Statistics:
Number of Bytes Received................... 66806
Number of Data Bytes Received................... 160783
Number of Realtime Bytes Received............... 160783
OL-31334-01
show Commands
1049
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the location calibration summary information:
(Cisco Controller) >show client location-calibration summary
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the number of probing clients:
(Cisco Controller) >show client probing
Number of Probing Clients........................ 0
1051
show Commands
Syntax Description
Command Default
Command History
Examples
mac_address
None
Release
Modification
7.6
OL-31334-01
show Commands
Syntax Description
Syntax Description
Command Default
Command History
None
Release
Modification
7.6
Usage Guidelines
Use show client ap command to list the status of automatically disabled clients. Use the show exclusionlist
command to display clients on the exclusion list (blacklisted).
Examples
The following example shows how to display a summary of the active clients:
(Cisco Controller) > show client summary
Number of Clients................................ 24
Number of PMIPV6 Clients......................... 200
MAC Address
AP Name
Status
WLAN/GLAN/RLAN Auth Protocol
Port
Wired PMIPV6
----------------- ----------------- ------------- -------------- ---- ---------------- -------- -----00:00:15:01:00:01
No
Yes
00:00:15:01:00:02
No
No
00:00:15:01:00:03
No
Yes
00:00:15:01:00:04
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
NMSP-TalwarSIM1-2 Associated
Yes
802.11a
13
1053
show Commands
No
Examples
No
The following example shows how to display all clients that are WindowsXP-Workstation device type:
(Cisco Controller) >show client summary WindowsXP-Workstation
Number of Clients in WLAN........................ 0
MAC Address
AP Name
Status
Auth Protocol
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
devicetype
device
None
Release
Modification
7.6
The following are sample outputs of the show client wlan command:
(Cisco Controller) > show client wlan 1
Number of Clients in WLAN........................ 0
(Cisco Controller) > show client devicetype WindowsXP-Workstation
Number of Clients in WLAN........................ 0
MAC Address
AP Name
Status
Auth Protocol
1055
show Commands
show dhcp
To display the internal Dynamic Host Configuration Protocol (DHCP) server configuration, use the show
dhcp command.
show dhcp {leases | summary | scope}
Syntax Description
Command Default
Command History
Examples
leases
summary
scope
None
Release
Modification
7.6
The following example shows how to display the allocated DHCP leases:
(Cisco Controller) >show dhcp leases
No leases allocated.
The following example shows how to display the DHCP summary information:
(Cisco Controller) >show dhcp summary
Scope Name
Enabled
Address Range
003
No
0.0.0.0 -> 0.0.0.0
The following example shows how to display the DHCP information for the scope 003:
(Cisco Controller) >show dhcp 003
Enabled.......................................
Lease Time....................................
Pool Start....................................
Pool End......................................
Network.......................................
Netmask.......................................
Default Routers...............................
DNS Domain....................................
DNS...........................................
Netbios Name Servers..........................
No
0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0 0.0.0.0 0.0.0.0
0.0.0.0 0.0.0.0 0.0.0.0
0.0.0.0 0.0.0.0 0.0.0.0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the status of DHCP proxy information:
(Cisco Controller) >show dhcp proxy
DHCP Proxy Behavior: enabled
1057
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the DHCP timeout value:
(Cisco Controller) >show dhcp timeout
DHCP Timeout (seconds)................. 10
OL-31334-01
show Commands
show guest-lan
To display the configuration of a specific wired guest LAN, use the show guest-lan command.
show guest-lan guest_lan_id
Syntax Description
Command Default
Command History
guest_lan_id
None
Release
Modification
7.6
Usage Guidelines
To display all wired guest LANs configured on the controller, use the show guest-lan summary command.
Examples
1059
show Commands
Syntax Description
Command Default
Command History
Examples
acl_name
detailed
None
Release
Modification
7.6
The following example shows how to display the detailed information of the access control lists:
(Cisco Controller) >show ipv6 acl detailed acl6
Rule Index.......................................
Direction........................................
IPv6 source prefix...............................
IPv6 destination prefix..........................
Protocol.........................................
Source Port Range................................
Destination Port Range...........................
DSCP.............................................
Flow label.......................................
Action...........................................
Counter..........................................
Deny Counter................................... 0
1
Any
::/0
::/0
Any
0-65535
0-65535
Any
0
Permit
0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
8.0
The following is a sample output of the show ipv6 acl detailed TestACL command:
(Cisco Controller) > show ipv6 acl detailed ddd
Rule Index.......................................
Direction........................................
IPv6 source prefix...............................
IPv6 destination prefix..........................
Protocol.........................................
Source Port Range................................
Destination Port Range...........................
DSCP.............................................
Action...........................................
Counter..........................................
1
Any
2001:9:5:90::115/128
::/0
6
0-65535
0-65535
Any
Permit
0
Rule Index.......................................
Direction........................................
IPv6 source prefix...............................
IPv6 destination prefix..........................
Protocol.........................................
Source Port Range................................
Destination Port Range...........................
DSCP.............................................
Action...........................................
Counter..........................................
2
Any
::/0
2001:9:5:90::115/128
6
0-65535
0-65535
Any
Permit
0
1061
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
8.0
The following is a sample output of the show ipv6 acl cpu command:
(Cisco Controller) > show ipv6 acl cpu
CPU Acl Name................................ NOT CONFIGURED
Wireless Traffic............................ Disabled
Wired Traffic............................... Disabled
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
capture-policy
counters
detailed
mac
Displays the IPv6 binding table entries for a specific MAC address.
mac_address
Displays the IPv6 binding table entries for a specific MAC address.
port
port_number
Port Number. You can enter ap for an access point or LAG for a LAG port.
vlan
Displays the IPv6 neighbor binding table entries for a specific VLAN.
vlan_id
VLAN identifier.
features
policies
ra-throttle
statistics
routers
summary
None
Release
Modification
7.6
1063
show Commands
Usage Guidelines
Examples
The following is the output of the show ipv6 neighbor-binding summary command:
(Cisco Controller) >show ipv6 neighbor-binding summary
Binding Table has 6 entries, 5 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, DH - DDCP
Preflevel flags (prlvl):
0001:MAC and LLA match
0002:Orig trunk
0004:Orig access
0008:Orig trusted access
0010:Orig trusted trunk
0020:DHCP assigned
0040:Cga authenticated
0080:Cert authenticated
0100:Statically assigned
IPv6 address
MAC Address
Port VLAN Type
prlvl age
state
Time left
-- ---------------------------------------- ----------------- ---- ---- -------- -------- --------- ---------ND fe80::216:46ff:fe43:eb01
00:16:46:43:eb:01
1 980 wired
0005
2 REACHABLE 157
ND fe80::9cf9:b009:b1b4:1ed9
70:f1:a1:dd:cb:d4
AP 980 wireless 0005
2 REACHABLE 157
ND fe80::6233:4bff:fe05:25ef
60:33:4b:05:25:ef
AP 980 wireless 0005
2 REACHABLE 203
ND fe80::250:56ff:fe8b:4a8f
00:50:56:8b:4a:8f
AP 980 wireless 0005
2 REACHABLE 157
ND 2001:410:0:1:51be:2219:56c6:a8ad
70:f1:a1:dd:cb:d4
AP 980 wireless 0005
5 REACHABLE 157
S
2001:410:0:1::9
00:00:00:00:00:08
AP 980 wireless 0100
1 REACHABLE 205
The following is the output of the show ipv6 neighbor-binding detailed command:
(Cisco Controller) >show ipv6 neighbor-binding detailed mac 60:33:4b:05:25:ef
macDB has 3 entries for mac 60:33:4b:05:25:ef, 3 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, DH - DDCP
Preflevel flags (prlvl):
0001:MAC and LLA match
0002:Orig trunk
0004:Orig access
0008:Orig trusted access
0010:Orig trusted trunk
0020:DHCP assigned
0040:Cga authenticated
0080:Cert authenticated
0100:Statically assigned
IPv6 address
MAC Address
Port VLAN Type
prlvl age
state
Time left
-- ---------------------------------------- ----------------- ---- ---- -------- -------- --------- ---------ND fe80::6233:4bff:fe05:25ef
60:33:4b:05:25:ef
AP 980 wireless 0009
0 REACHABLE 303
ND 2001:420:0:1:6233:4bff:fe05:25ef
60:33:4b:05:25:ef
AP 980 wireless 0009
0 REACHABLE 300
ND 2001:410:0:1:6233:4bff:fe05:25ef
60:33:4b:05:25:ef
AP 980 wireless 0009
0 REACHABLE 301
The following is the output of the show ipv6 neighbor-binding counters command:
(Cisco Controller) >show ipv6 neighbor-binding counters
Received Messages
NDP Router Solicitation
NDP Router Advertisement
NDP Neighbor Solicitation
NDP Neighbor Advertisement
NDP Redirect
NDP Certificate Solicit
NDP Certificate Advert
DHCPv6 Solicitation
DHCPv6 Advertisement
DHCPv6 Request
DHCPv6 Reply
DHCPv6 Inform
DHCPv6 Confirm
6
19
557
48
0
0
0
0
0
0
0
0
0
OL-31334-01
show Commands
DHCPv6
DHCPv6
DHCPv6
DHCPv6
DHCPv6
DHCPv6
DHCPv6
Renew
Rebind
Release
Decline
Reconfigure
Relay Forward
Relay Rep
0
0
0
0
0
0
0
Bridged Messages
NDP Router Solicitation
NDP Router Advertisement
NDP Neighbor Solicitation
NDP Neighbor Advertisement
NDP Redirect
NDP Certificate Solicit
NDP Certificate Advert
DHCPv6 Solicitation
DHCPv6 Advertisement
DHCPv6 Request
DHCPv6 Reply
DHCPv6 Inform
DHCPv6 Confirm
DHCPv6 Renew
DHCPv6 Rebind
DHCPv6 Release
DHCPv6 Decline
DHCPv6 Reconfigure
DHCPv6 Relay Forward
DHCPv6 Relay Rep
6
19
471
16
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1065
show Commands
0
0
DHCPv6 Recfg
0
0
DHCPv6 Infreq
0
0
DHCPv6 Relayfwd
0
0
DHCPv6 Relayreply
0
0
0
0
0
0
0
0
CacheMiss Statistics
Multicast NS Forwarded
To STA 0
To DS
0
Multicast NS Dropped
To STA 467
To DS
467
Multicast NA Statistics
Multicast NA Forwarded
To STA 0
To DS
0
Multicast NA Dropped
To STA 0
To DS
0
(Cisco Controller) > >
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
ap
wlc
summary
None
Release
Modification
7.6
The following example show the output of the show ipv6 ra-guard ap summary command:
(Cisco Controller) >show ipv6 ra-guard ap summary
IPv6 RA Guard on AP..................... Enabled
RA Dropped per client:
MAC Address
AP Name
WLAN/GLAN
Number of RA Dropped
----------------- ----------------- -------------- --------------------00:40:96:b9:4b:89 Bhavik_1130_1_p13 2
19
----------------- ----------------- -------------- --------------------Total RA Dropped on AP......................
19
The following example shows how to display the RA guard statistics for a controller:
(Cisco Controller) >show ipv6 ra-guard wlc summary
IPv6 RA Guard on WLC.................... Enabled
1067
show Commands
Command Default
Command History
Examples
None
Release
Modification
8.0
The following is a sample output of the show ipv6 route summary command:
(Cisco Controller) > show ipv6 route summary
Number of Routes................................. 1
Destination Network PrefixLength Gateway
------------------- ------------- ------------------2001:9:5:90::115 /128 2001:9:5:91::1
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example displays the output of the show ipv6 summary command:
(Cisco Controller) >show ipv6 summary
Global Config...............................
Reachable-lifetime value....................
Stale-lifetime value........................
Down-lifetime value.........................
RA Throttling...............................
RA Throttling allow at-least................
RA Throttling allow at-most.................
RA Throttling max-through...................
RA Throttling throttle-period...............
RA Throttling interval-option...............
NS Mulitcast CacheMiss Forwarding...........
NA Mulitcast Forwarding.....................
IPv6 Capwap UDP Lite........................
Operating System IPv6 state ................
Enabled
30
300
300
Disabled
1
no-limit
5
600
ignore
Enabled
Enabled
Enabled
Enabled
1069
show Commands
show macfilter
To display the MAC filter parameters, use the show macfilter command.
show macfilter {summary | detail MAC}
Syntax Description
Command Default
Command History
summary
detail MAC
None
Release
Modification
7.6
Usage Guidelines
The MAC delimiter (none, colon, or hyphen) for MAC addresses sent to RADIUS servers is displayed. The
MAC filter table lists the clients that are always allowed to associate with a wireless LAN.
Examples
The following example shows how to display the detailed display of a MAC filter entry:
(Cisco Controller) >show macfilter detail xx:xx:xx:xx:xx:xx
MAC Address...................................... xx:xx:xx:xx:xx:xx
WLAN Identifier.................................. Any
Interface Name................................... management
Description...................................... RAP
The following example shows how to display a summary of the MAC filter parameters:
(Cisco Controller) > show macfilter summary
MAC Filter RADIUS Compatibility mode............. Cisco ACS
MAC Filter Delimiter............................. None
Local Mac Filter Table
MAC Address
WLAN Id
Description
------------------------------------------------------------------xx:xx:xx:xx:xx:xx
Any
RAP
xx:xx:xx:xx:xx:xx
Any
PAP2 (2nd hop)
xx:xx:xx:xx:xx:xx
Any
PAP1 (1st hop)
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
8.0
This command updated to display the IPv6 multicast details in the network summary.
The following example displays the output of the show ipv6 summary command:
(Cisco Controller) >show network summary
RF-Network Name.............................
Web Mode....................................
Secure Web Mode.............................
Secure Web Mode Cipher-Option High..........
Secure Web Mode Cipher-Option SSLv2.........
Secure Web Mode RC4 Cipher Preference.......
OCSP........................................
OCSP responder URL..........................
Secure Shell (ssh)..........................
Telnet......................................
Ethernet Multicast Forwarding...............
Ethernet Broadcast Forwarding...............
IPv4 AP Multicast/Broadcast Mode............
IPv6 AP Multicast/Broadcast Mode............
IGMP snooping...............................
IGMP timeout................................
IGMP Query Interval.........................
MLD snooping................................
MLD timeout.................................
MLD query interval..........................
User Idle Timeout...........................
ARP Idle Timeout............................
Cisco AP Default Master.....................
AP Join Priority............................
Mgmt Via Wireless Interface.................
Mgmt Via Dynamic Interface..................
Bridge MAC filter Config....................
Bridge Security Mode........................
Mesh Full Sector DFS........................
AP Fallback ................................
Web Auth CMCC Support ......................
Web Auth Redirect Ports ....................
Web Auth Proxy Redirect ...................
Web Auth Captive-Bypass
..................
Web Auth Secure Web .......................
Fast SSID Change ...........................
AP Discovery - NAT IP Only .................
IP/MAC Addr Binding Check ..................
johnny
Enable
Enable
Disable
Disable
Disable
Disabled
Enable
Enable
Enable
Enable
Multicast
Address : 239.9.9.9
Multicast
Address : ff1e::6:9
Enabled
60 seconds
20 seconds
Enabled
60 seconds
20 seconds
300 seconds
300 seconds
Disable
Disable
Enable
Enable
Enable
EAP
Enable
Enable
Disabled
80
Disable
Disable
Enable
Disabled
Enabled
Enabled
1071
show Commands
Disabled
Disable
Disable
Enable
Disable
0
0
Disabled
15 minutes
Default
IPv4
OL-31334-01
show Commands
show pmk-cache
To display information about the pairwise master key (PMK) cache, use the show pmk-cache command.
show pmk-cache {all | MAC}
Syntax Description
Command Default
Command History
Examples
all
MAC
None
Release
Modification
7.6
The following example shows how to display information about a single entry in the PMK cache:
(Cisco Controller) >show pmk-cache xx:xx:xx:xx:xx:xx
The following example shows how to display information about all entries in the PMK cache:
(Cisco Controller) >show pmk-cache all
PMK Cache
Entry
Station
Lifetime
VLAN Override
-------------------------------------------
IP Override
---------------
1073
show Commands
show remote-lan
To display information about remote LAN configuration, use the show remote-lan command.
show remote-lan { summary | remote-lan-id }
Syntax Description
Command Default
Command History
Examples
summary
remote-lan-id
None
Release
Modification
7.6
The following example shows how to display a summary of all remote LANs:
(Cisco Controller) >show remote-lan summary
Number of Remote LANS............................ 2
RLAN ID RLAN Profile Name
Status
------- ------------------------------------- -------2
remote
Disabled
8
test
Disabled
Interface Name
-------------------management
management
The following example shows configuration information about the remote LAN with the remote-lan-id 2:
(Cisco Controller) >show remote-lan 2
Remote LAN Identifier............................
Profile Name.....................................
Status...........................................
MAC Filtering....................................
AAA Policy Override..............................
Network Admission Control
Radius-NAC State...............................
SNMP-NAC State.................................
Quarantine VLAN................................
Maximum number of Associated Clients.............
Number of Active Clients.........................
Exclusionlist....................................
Session Timeout..................................
CHD per Remote LAN...............................
Webauth DHCP exclusion...........................
Interface........................................
Remote LAN ACL...................................
DHCP Server......................................
DHCP Address Assignment Required.................
Static IP client tunneling.......................
Radius Servers
Authentication................................
Accounting....................................
Dynamic Interface.............................
Security
2
remote
Disabled
Disabled
Disabled
Disabled
Disabled
0
0
0
Disabled
Infinity
Enabled
Disabled
management
unconfigured
Default
Disabled
Disabled
Global Servers
Global Servers
Disabled
OL-31334-01
show Commands
1075
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Applied
------No
No
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
rf-profile-name
None
Release
Modification
7.6
8.0
<none>
5 GHz
-70 dBm
-67 dBm
-10 dBm
30 dBm
Medium
Mandatory
Supported
Mandatory
Supported
Mandatory
Supported
Supported
Supported
200
50
0
0 dBm
0 dBm
Enabled
Disabled
2 cycles
200 milliseconds
20 seconds
60 seconds
-80 dBm
3 count
5 clients
-80 dBm
-80 dBm
3 clients
25 %
1077
show Commands
show wlan
To display configuration information for a specified wireless LAN or a foreign access point, or to display
wireless LAN summary information, use the show wlan command.
show wlan { apgroups | summary | wlan_id | foreignAp }
Syntax Description
Command Default
Command History
Examples
apgroups
summary
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to display a summary of wireless LANs for wlan_id 1:
(Cisco Controller) >show wlan 1
WLAN Identifier.................................. 1
Profile Name..................................... aicha
Network Name (SSID).............................. aicha
Status........................................... Enabled
MAC Filtering.................................... Disabled
Broadcast SSID................................... Enabled
AAA Policy Override.............................. Disabled
Network Admission Control
RADIUS Profiling Status ...................... Disabled
DHCP ......................................... Disabled
HTTP ......................................... Disabled
Client Profiling Status ...................... Disabled
DHCP ......................................... Disabled
HTTP ......................................... Disabled
Radius-NAC State.............................. Enabled
SNMP-NAC State................................ Enabled
Quarantine VLAN................................ 0
Maximum number of Associated Clients............. 0
Maximum number of Clients per AP Radio........... 200
Number of Active Clients......................... 0
Exclusionlist Timeout............................ 60 seconds
Session Timeout.................................. 1800 seconds
User Idle Timeout................................ 300 seconds
User Idle Threshold.............................. 0 Bytes
NAS-identifier................................... Talwar1
CHD per WLAN..................................... Enabled
Webauth DHCP exclusion........................... Disabled
Interface........................................ management
OL-31334-01
show Commands
1079
show Commands
OL-31334-01
show Commands
1
1
0
Closed
2
1
0
Closed
3
1
0
Closed
4
1
0
Closed
5
1
0
Closed
6
1
0
Closed
7
1
0
Closed
WAN Metrics Info
Link status..................................
Symmetric Link...............................
Downlink speed...............................
Uplink speed.................................
Up
No
4 kbps
4 kbps
Status
Interface Name
--------
--------------------
Disabled
management
PMIPv6
none
The following example shows how to display the configuration for support of foreign access points:
(Cisco Controller) >show wlan foreignap
Foreign AP support is not enabled.
AIR-CAP3502I-A-K9
00:22:90:91:6d:b6
ren
Port
---1
1
1
Number of Clients................................ 1
MAC Address
AP Name
Status
Device Type
----------------- ------------- ------------- -----------------
1081
config Commands
24:77:03:89:9b:f8
ap2
Associated
Android
config Commands
This section lists the config commands to configure WLANs.
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to disable DTPC for an 802.11a network:
(Cisco Controller) > config 802.11a dtpc disable
1083
config Commands
Syntax Description
Command Default
Command History
anqp-4way
Enables, disables, or, configures the Access Network Query Protocol (ANQP)
four way fragment threshold.
disable
enable
threshold
value
ANQP four way fragment threshold value in bytes. The range is from 10 to
1500. The default value is 1500.
cmbk-delay
value
garp
disable
enable
gas-limit
disable
enable
None
Release
Modification
7.6
OL-31334-01
config Commands
Examples
The following example shows how to configure the ANQP four way fragment threshold value:
(Cisco Controller) >config advanced hotspot anqp-4way threshold 200
1085
config Commands
Syntax Description
Command Default
Command History
cisco
wlan_id
radio
802.11a
802.11b
all
None
Release
Modification
7.6
Usage Guidelines
When you configure this command, all WLANs and radios are automatically disabled. After the completion
of the configuration, the previous state of the WLANs and radios is restored.
Examples
The following example shows how to auto-configure voice deployment for all radios in a WLAN:
(Cisco Controller) >config auto-configure voice cisco 2 radio all
Warning! This command will automatically disable all WLAN's and Radio's.
It will be reverted to the previous state once configuration is complete.
Are you sure you want to continue? (y/N)y
Auto-Configuring these commands in WLAN for Voice..
wlan qos 2 platinum
- Success
wlan call-snoop enable 2
- Success
wlan wmm allow 2
- Success
wlan session-timeout 2 86400
- Success
wlan peer-blocking disable 2
- Success
wlan security tkip hold-down 0 2
- Success
wlan exclusionlist 2 disable
OL-31334-01
config Commands
- Success
wlan mac-filtering disable 2
- Success
wlan dtim 802.11a 2 2
- Success
wlan dtim 802.11b 2 2
- Success
wlan ccx aironetIeSupport enabled 2
- Success
wlan channel-scan defer-priority 4 enable 2
- Success
wlan channel-scan defer-priority 5 enable 2
- Success
wlan channel-scan defer-priority 6 enable 2
- Success
wlan channel-scan defer-time 100 2
- Success
wlan load-balance allow disable 2
- Success
wlan mfp client enable 2
- Success
wlan security wpa akm cckm enable 2
- Success
wlan security wpa akm cckm timestamp-tolerance
- Success
wlan band-select allow disable 2
- Success
***********************************************
5000 2
1087
config Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following example shows how to clear the reporting information of the client MAC address
00:1f:ca:cf:b6:60:
(Cisco Controller) >config client ccx clear-reports 00:1f:ca:cf:b6:60
1089
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following example shows how to clear the test results of the client MAC address 00:1f:ca:cf:b6:60:
(Cisco Controller) >config client ccx clear-results 00:1f:ca:cf:b6:60
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
client_mac_address
None
Release
Modification
7.6
Usage Guidelines
This test does not require the client to use the diagnostic channel.
Examples
The following example shows how to send a request to the client00:0b:85:02:0d:20 to perform the default
gateway ping test:
(Cisco Controller) >config client ccx default-gw-ping 00:0b:85:02:0d:20
1091
config Commands
Syntax Description
Command Default
Command History
client_mac_address
None
Release
Modification
7.6
Usage Guidelines
This test does not require the client to use the diagnostic channel.
Examples
The following example shows how to send a request to the client 00:E0:77:31:A3:55 to perform the DHCP
test:
(Cisco Controller) >config client ccx dhcp-test 00:E0:77:31:A3:55
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
client_mac_address
None
Release
Modification
7.6
Usage Guidelines
This test does not require the client to use the diagnostic channel.
Examples
The following example shows how to send a request to the client 00:E0:77:31:A3:55 to perform the DNS
server IP address ping test:
(Cisco Controller) >config client ccx dns-ping 00:E0:77:31:A3:55
1093
config Commands
Syntax Description
Command Default
Command History
client_mac_address
host_name
None
Release
Modification
7.6
Usage Guidelines
This test does not require the client to use the diagnostic channel.
Examples
The following example shows how to send a request to the client 00:E0:77:31:A3:55 to perform the DNS
name resolution test to the specified hostname:
(Cisco Controller) >config client ccx dns-resolve 00:E0:77:31:A3:55 host_name
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following example shows how to send a request to the client 172.19.28.40 to send its capability information:
(Cisco Controller) >config client ccx get-client-capability 172.19.28.40
1095
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following example shows how to send a request to the client 172.19.28.40 to send the manufacturers
information:
(Cisco Controller) >config client ccx get-manufacturer-info 172.19.28.40
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following example shows how to send a request to the client 172.19.28.40 to send its current operating
parameters:
(Cisco Controller) >config client ccx get-operating-parameters 172.19.28.40
1097
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
None
Release
Modification
7.6
The following example shows how to send a request to the client 172.19.28.40 to send its profile details:
(Cisco Controller) >config client ccx get-profiles 172.19.28.40
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
roam
rsna
syslog
client_mac_address
None
Release
Modification
7.6
The following example shows how to specify the request to specify the client CCS system log:
(Cisco Controller) >config client ccx log-request syslog 00:40:96:a8:f7:98
Tue Oct 05 13:05:21 2006
SysLog Response LogID=1: Status=Successful
Event Timestamp=121212121212
Client SysLog = 'This is a test syslog 2'
Event Timestamp=121212121212
Client SysLog = 'This is a test syslog 1'
Tue Oct 05 13:04:04 2006
SysLog Request LogID=1
The following example shows how to specify the client CCX roaming log:
(Cisco Controller) >config client ccx log-request roam 00:40:96:a8:f7:98
Thu Jun 22 11:55:14 2006
Roaming Response LogID=20: Status=Successful
Event Timestamp=121212121212
Source BSSID=00:40:96:a8:f7:98, Target BSSID=00:0b:85:23:26:70,
Transition Time=100(ms)
Transition Reason: Unspecified Transition Result: Success
Thu Jun 22 11:55:04 2006
Roaming Request LogID=20
Thu Jun 22 11:54:54 2006
Roaming Response LogID=19: Status=Successful
Event Timestamp=121212121212
Source BSSID=00:40:96:a8:f7:98, Target BSSID=00:0b:85:23:26:70,
Transition Time=100(ms)
1099
config Commands
The following example shows how to specify the client CCX RSNA log:
(Cisco Controller) >config client ccx log-request rsna 00:40:96:a8:f7:98
Tue Oct 05 11:06:48 2006
RSNA Response LogID=2: Status=Successful
Event Timestamp=242424242424
Target BSSID=00:0b:85:23:26:70
RSNA Version=1
Group Cipher Suite=00-x0f-ac-01
Pairwise Cipher Suite Count = 2
Pairwise Cipher Suite 0 = 00-0f-ac-02
Pairwise Cipher Suite 1 = 00-0f-ac-04
AKM Suite Count = 2
KM Suite 0 = 00-0f-ac-01
KM Suite 1 = 00-0f-ac-02
SN Capability = 0x1
PMKID Count = 2
PMKID 0 = 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16
PMKID 1 = 0a 0b 0c 0d 0e 0f 17 18 19 20 1a 1b 1c 1d 1e 1f
802.11i Auth Type: EAP_FAST
RSNA Result: Success
OL-31334-01
config Commands
Syntax Description
client_mac_address
1101
config Commands
message_id
OL-31334-01
config Commands
message_type (cont.)
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to send a message to the client MAC address 172.19.28.40 with the message
user-action-required:
(Cisco Controller) >config client ccx send-message 172.19.28.40 user-action-required
1103
config Commands
Syntax Description
Command Default
Command History
Examples
measurement_duration
dot11
security
client_mac_address
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
client_mac_address
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to send a request to the client 11:11:11:11:11:11 to abort the correct test
settings:
(Cisco Controller) >config client ccx test-abort 11:11:11:11:11:11
1105
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
ssid
Network name.
bssid
Basic SSID.
802.11a
802.11b
802.11g
channel
Channel number.
None
Release
Modification
7.6
The following example shows how to send a request to the client MAC address 00:0E:77:31:A3:55 to perform
the basic SSID association test:
(Cisco Controller) >config client ccx test-association 00:E0:77:31:A3:55 ssid bssid 802.11a
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
client_mac_address
profile_id
bssid
Basic SSID.
802.11a
802.11b
802.11g
channel
Channel number.
None
Release
Modification
7.6
The following example shows how to send a request to the client to perform the 802.11b test with the profile
name profile_01:
(Cisco Controller) >config client ccx test-dot1x 172.19.28.40 profile_01 bssid 802.11b
1107
config Commands
Syntax Description
client_mac_address
profile_id
Command Default
Command History
Examples
The profile_id should be from one of the client profiles for which client
reporting is enabled.
None
Release
Modification
7.6
The following example shows how to send a request to the client to perform the profile redirect test with the
profile name profile_01:
(Cisco Controller) >config client ccx test-profile 11:11:11:11:11:11 profile_01
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
MAC
IPv4/v6_address
user_name
None
Release
Modification
7.6
The following example shows how to deauthenticate a client using its MAC address:
(Cisco Controller) >config client deauthenticate 11:11:11:11:11
1109
config Commands
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
When you use this command, the controller drops all IPv6 packets and the clients will not receive any IPv6
address.
Examples
OL-31334-01
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to enable IPv6 on the Cisco WLC:
(Cisco Controller) >config ipv6 enable
1111
config Commands
Syntax Description
apply name
cpu name
cpu none
create
delete
Configures rules in the IPv6 ACL to either permit or deny access. IPv6
ACL name can contains up to 32 alphanumeric characters and IPv6 ACL
rule index can be between 1 and 32.
{permit|deny}
OL-31334-01
config Commands
Configure a rule's destination port range. Enter IPv6 ACL name and set an
rule index for it.
Configures a rules DSCP. For rule index of DSCP, select a number between
0 and 63, or any.
protocol name index protocol Configures a rules protocol. Enter a name and set an index between 0 and
255 or any
source address name index
ip_address prefix-len
source port range name index Configures a rules source port range.
start_port end_port
swap index name index_1
index_2
Command Default
Command History
After adding an ACL, the config ipv6 acl cpu is by default configured as enabled.
Release
Modification
7.6
8.0
Usage Guidelines
For a Cisco 2100 Series Wireless LAN Controller, you must configure a preauthentication ACL on the wireless
LAN for the external web server. This ACL should then be set as a wireless LAN preauthentication ACL
under Web Policy. However, you do not need to configure any preauthentication ACL for Cisco 4400 Series
Wireless LAN Controllers.
Examples
The following example shows how to configure an IPv6 ACL to permit access:
(Cisco Controller) >config ipv6 acl rule action lab1 4 permit
1113
config Commands
Examples
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
updlite
enable
disable
all
<Cisco AP>
Release
Modification
8.0
IPv6 CAPWAP UDP Lite configuration applies only to APs that are connected to controller using IPv6
tunnel.
For APs connected to WLC using IPv4 Tunnel, IPv6 CAPWAP UDPLite command will not apply on
either global configuration or on Per AP.
IPv6 mandates complete payload checksum for UDP and this will have performance implications. To
minimize the impact, UDPLite (mandates only header checksum) will be used for data traffic and UDP
for control traffic.
Usage UDP Lite will have an impact on the firewall. Intermediate firewall must be configured to allow
UDP Lite protocol (protocol ID of 136) packets.
Turning off UDP Lite will cause performance issues on packet handling.
Changing from UDP to UDPLite or vice-versa will enforce the AP to dis-join and re-join.
1115
config Commands
Examples
The following example shows how to configure an IPv6 CAPWAP UDP Lite on All Cisco APs or on a
particular Cisco AP:
(Cisco Controller) >config ipv6 capwap udplite enable all
Changing AP's IPv6 Capwap UDP Lite mode will cause the AP to rejoin.
Are you sure you want to continue? (y/n)
Related Commands
OL-31334-01
config Commands
Syntax Description
acl
management
acl_name
address
management
primary
ipv6_address
prefix_length
ipv6_gateway_address
service-port
ipv6_address
prefix_length
slacc
service-port
enable
disable
1117
config Commands
Command Default
Command History
Examples
None.
Release
Modification
8.0
The following example shows how to configure an IPv6 ACL management interface:
(Cisco Controller) >config ipv6 interface acl management Test_ACL
Examples
The following example shows how to configure an IPv6 address and primary interface:
(Cisco Controller) > config ipv6 interface address management primary 2001:9:10:56::44 64
fe80::aea0:16ff:fe4f:2244
Related Commands
OL-31334-01
config Commands
Syntax Description
mode
unicast
multicast
ipv6_address
Command Default
By default, multicast is enabled on Cisco WLC 8500 and Cisco WLC 2500.
By default, unicast is enabled on Cisco WLC 5500.
Command History
Release
Modification
8.0
Usage Guidelines
none...
Examples
The following example shows how to configure an IPv6 multicast on Cisco WLC, to permit access:
(Cisco Controller) >config ipv6 multicast 2001:DB8:0000:0000:0000:0000:0000:0001
Examples
The following example shows how to configure an IPv6 unicast on Cisco WLC, to permit access:
(Cisco Controller) > config ipv6 multicast mode unicast
Related Commands
1119
config Commands
Syntax Description
timers
down-lifetime
down_time
reachable-lifetime
reachable_time
stale-lifetime
stale_time
ra-throttle
allow
at_least_value
enable
disable
interval-option
ignore
passthrough
OL-31334-01
config Commands
Command Default
Command History
Examples
throttle
max-through
no_mcast_RA
no-limit
throttle-period
throttle_period
Release
Modification
7.6
The following example shows how to configure the Neighbor Binding table:
(Cisco Controller) >config ipv6 neighbor-binding ra-throttle enable
Related Commands
1121
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
None
Release
Modification
7.5
If you enable Neighbor Advertisement multicast forwarding, all the unsolicited multicast Neighbor
Advertisement from wired or wireless is not forwarded to wireless.
If you disable Neighbor Advertisement multicast forwarding, IPv6 Duplicate Address Detection (DAD) of
the controller is affected.
Examples
The following example shows how to configure an Neighbor Advertisement multicast forwarding:
(Cisco Controller) >config ipv6 na-mcast-fwd enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
1123
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
add
network_ipv6_addr
prefix-len
ipv6_gw_addr
delete
network_ipv6_addr
None
Release
Modification
8.0
This command is used to add and delete an IPv6 network route to access service interface over IPv6
from different network.
While adding IPv6 route, IPv6 Gateway Address must be a link local scope (FE80::/64).
Examples
Examples
Related Commands
1125
config Commands
config remote-lan
To configure a remote LAN, use the config remote-lan command.
config remote-lan {enable | disable} {remote-lan-id | all}
Syntax Description
Command Default
Command History
Examples
enable
disable
remote-lan-id
all
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
remote-lan-id
None
Release
Modification
7.6
The following example shows how to enable user policy override through AAA on a remote LAN where the
remote LAN ID is 2:
(Cisco Controller) >config remote-lan aaa-override enable 2
1127
config Commands
Syntax Description
remote-lan-id
acl_name
ACL name.
Note
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to specify ACL1 for a remote LAN whose ID is 2:
(Cisco Controller) >config remote-lan acl 2 ACL1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
name
None
Release
Modification
7.6
The following example shows how to configure a new remote LAN, MyRemoteLAN, with the LAN ID as
3:
(Cisco Controller) >config remote-lan create 3 MyRemoteLAN
1129
config Commands
Syntax Description
Command Default
Command History
ext-webauth-url
URL
global
enable
disable
login-page
page-name
none
logout-page
none
webauth-type
internal
customized
external
name
remote-lan-id
None
Release
Modification
7.6
OL-31334-01
config Commands
Usage Guidelines
Follow these guidelines when you use the config remote-lan custom-web command:
When you configure the external Web-Auth URL, do the following:
Ensure that Web-Auth or Web-Passthrough Security is in enabled state. To enable Web-Auth, use
the config remote-lan security web-auth enable command. To enable Web-Passthrough, use the
config remote-lan security web-passthrough enable command.
Ensure that the global status of the remote LAN is in disabled state. To enable the global status of
the remote LAN, use the config remote-lan custom-web global disable command.
Ensure that the remote LAN is in disabled state. To disable a remote LAN, use the config remote-lan
disable command.
When you configure the Web-Auth type for the remote LAN, do the following:
When you configure a customized login page, ensure that you have a login page configured. To
configure a login page, use the config remote-lan custom-web login-page command.
When you configure an external login page, ensure that you have configured preauthentication
ACL for external web authentication to function.
Examples
The following example shows how to configure an external web authentication URL for a remote LAN with
ID 3:
(Cisco Controller) >config remote-lan custom-web ext-webauth-url
http://www.AuthorizationURL.com/ 3
The following example shows how to enable the global status of a remote LAN with ID 3:
(Cisco Controller) >config remote-lan custom-web global enable 3
The following example shows how to configure the login page for a remote LAN with ID 3:
(Cisco Controller) >config remote-lan custom-web login-page custompage1 3
The following example shows how to configure a web authentication type with the default login page for a
remote LAN with ID 3:
(Cisco Controller) >config remote-lan custom-web webauth-type internal 3
1131
config Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
ip_addr
Release
Modification
7.6
8.0
The following example shows how to configure a DHCP server for a remote LAN with ID 3:
(Cisco Controller) >config remote-lan dhcp_server 3 209.165.200.225
Related Commands
show remote-lan
1133
config Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
seconds
disabled
enabled
None
Release
Modification
7.6
The following example shows how to configure the exclusion list timeout to 20 seconds on a remote LAN
with ID 3:
(Cisco Controller) >config remote-lan exclusionlist 3 20
OL-31334-01
config Commands
Syntax Description
remote-lan-id
interface_name
Interface name.
Note
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure an interface myinterface for a remote LAN with ID 3:
(Cisco Controller) >config remote-lan interface 3 myinterface
1135
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
remote-lan-id
index
None
Release
Modification
7.6
The following example shows how to add an LDAP server with the index number 10 for a remote LAN with
ID 3:
(Cisco Controller) >config remote-lan ldap add 3 10
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
remote-lan-id
Release
Modification
7.6
The following example shows how to disable MAC filtering on a remote LAN with ID 3:
(Cisco Controller) >config remote-lan mac-filtering disable 3
1137
config Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
max-clients
None
Release
Modification
7.6
The following example shows how to configure 10 client connections on a remote LAN with ID 3:
(Cisco Controller) >config remote-lan max-associated-clients 3 10
OL-31334-01
config Commands
Syntax Description
Command Default
acct
add
delete
remote-lan-id
server-index
enable
disable
interim-update
interval
enable
disable
auth
enable
disable
overwrite-interface
enable
disable
1139
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to enable RADIUS accounting for a remote LAN with ID 3:
(Cisco Controller) >config remote-lan radius_server acct enable 3
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
web-auth
enable
disable
acl
server-precedence
remote-lan-id
email-input
web-passthrough
None
Release
Modification
7.6
The following example shows how to configure the security web authentication policy for remote LAN ID
1:
(Cisco Controller) >config remote-lan security web-auth enable 1
1141
config Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
seconds
None
Release
Modification
7.6
The following example shows how to configure the client session timeout to 6000 seconds for a remote LAN
with ID 1:
(Cisco Controller) >config remote-lan session-timeout 1 6000
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
remote-lan-id
enable
disable
None
Release
Modification
7.6
The following example shows how to enable web authentication exclusion on a remote LAN with ID 1:
(Cisco Controller) >config remote-lan webauth-exclude 1 enable
1143
config Commands
Syntax Description
client-rssi
Configures the client Received Signal Strength Indicator (RSSI) threshold for
the RF profile.
rssi
Minimum RSSI for a client to respond to a probe. The range is from -20 to -90
dBm.
cycle-count
Configures the probe cycle count for the RF profile. The cycle count sets the
number of suppression cycles for a new client.
cycles
cycle-threshold
Configures the time threshold for a new scanning RF Profile band select cycle
period. This setting determines the time threshold during which new probe
requests from a client come in a new scanning cycle.
value
Value of the cycle threshold for the RF profile. The range is from 1 to 1000
milliseconds.
expire
dual-band
Configures the expiration time for pruning previously known dual-band clients.
After this time elapses, clients become new and are subject to probe response
suppression.
value
suppression
Configures the expiration time for pruning previously known 802.11b/g clients.
After this time elapses, clients become new and are subject to probe response
suppression.
value
probe-response
enable
disable
profile name
OL-31334-01
config Commands
Command Default
Command History
Release
Modification
7.6
Usage Guidelines
When you enable band select on a WLAN, the access point suppresses client probes on 2.4-GHz and moves
the dual band clients to the 5-Ghz spectrum. The band-selection algorithm directs dual-band clients only from
the 2.4-GHz radio to the 5-GHz radio of the same access point, and it only runs on an access point when both
the 2.4-GHz and 5-GHz radios are up and running. Band selection can be used only with Cisco Aironet 1040,
1140, and 1250 Series and the 3500 series access points.
Examples
1145
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
foreign
chan-width
chan
profile name
enable
disable
{20 | 40 | 80}
None
Release
Modification
8.0
The following example shows how to add a channel to the RF profile DCA channel list:
(Cisco Controller) >config rf-profile channel add 40 admin1
The following example shows how to configure the RF profile DCA channel width:
(Cisco Controller) >config rf-profile channel chan-width 40 admin1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
threshold
Threshold value of the number of clients that associate with an access point, after
which an SNMP trap is sent to the controller. The range is from 0 to 200. Traps are
disabled if the threshold value is configured as zero.
profile_name
None
Release
Modification
7.6
The following example shows how to configure the threshold value of the number of clients that associate
with an access point:
(Cisco Controller) >config rf-profile client-trap-threshold 150
1147
config Commands
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b/g
profile-name
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
data
coverage_level
Minimum receive signal strength indication (RSSI) value of data packets received by
the access point. The value that you configure is used to identify coverage holes within
the network. If the access point receives a packet in the data queue with an RSSI value
below the value that you enter here, a potential coverage hole is detected. The range is
from 90 to 60 dBm. The access point takes voice RSSI measurements every 5 seconds
and reports them to the controller in 90-second intervals.
exception
clients
Minimum number of clients on an access point with an RSSI value at or below the data
or voice RSSI threshold. The range is from 1 to 75. The default value is 3.
voice
coverage_level
Minimum receive signal strength indication (RSSI) value of voice packets received by
the access point. The value that you configure is used to identify coverage holes within
the network. If the access point receives a packet in the data queue with an RSSI value
below the value that you enter here, a potential coverage hole is detected. The range is
from 90 to 60 dBm. The access point takes voice RSSI measurements every 5 seconds
and reports them to the controller in 90-second intervals.
level
value
Coverage exception level per AP. Percentage of clients on an access point that are
experiencing a low signal level but cannot roam to another access point.
The controller determines if the coverage hole can be corrected and, if appropriate,
mitigates the coverage hole by increasing the transmit power level for that specific
access point.
profile_name
Command Default
1149
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the threshold value of the data RSSI:
(Cisco Controller) >config rf-profile coverage data -80
The following example shows how to configure the minimum client coverage exception level:
(Cisco Controller) >config rf-profile coverage exception 10
The following example shows how to configure the coverage exception level per AP:
(Cisco Controller) >config rf-profile coverage level 30
OL-31334-01
config Commands
Syntax Description
Command Default
802.11a
802.11b
disabled
Disables a rate.
mandatory
supported
data-rate
profile-name
Default data rates for RF profiles are derived from the controller system defaults, the global data rate
configurations. For example, if the RF profile's radio policy is mapped to 802.11a then the global 802.11a
data rates are copied into the RF profiles at the time of creation.
The data rates set with this command are negotiated between the client and the Cisco wireless LAN controller.
If the data rate is set to mandatory, the client must support it in order to use the network. If a data rate is set
as supported by the Cisco wireless LAN controller, any associated client that also supports that rate may
communicate with the Cisco lightweight access point using that rate. It is not required that a client is able to
use all the rates marked supported in order to associate.
Command History
Examples
Release
Modification
7.6
The following example shows how to set the 802.11b transmission of an RF profile at a mandatory rate at 12
Mbps:
(Cisco Controller) >config rf-profile 802.11b data-rates mandatory 12 RFGroup1
1151
config Commands
Syntax Description
Command Default
Command History
Examples
profile-name
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
description
profile-name
None
Release
Modification
7.6
1153
config Commands
Syntax Description
window
clients
Client window size that limits the number of client associations with an access point. The
range is from 0 to 20. The default value is 5.
The window size is part of the algorithm that determines whether an access point is too
heavily loaded to accept more client associations:
load-balancing window + client associations on AP with lightest load = load-balancing
threshold
Access points with more client associations than this threshold are considered busy, and
clients can associate only to access points with client counts lower than the threshold. This
window also helps to disassociate sticky clients.
denial
value
Maximum number of association denials during load balancing. The range is from 1 to 10.
The default value is 3.
When a client tries to associate on a wireless network, it sends an association request to
the access point. If the access point is overloaded and load balancing is enabled on the
controller, the access point sends a denial to the association request. If there are no other
access points in the range of the client, the client tries to associate the same access point
again. After the maximum denial count is reached, the client is able to associate. Association
attempts on an access point from any client before associating any AP is called a sequence
of association. The default is 3.
profile_name
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure the client window size for an RF profile:
(Cisco Controller) >config rf-profile load-balancing window 15
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
clients
None
Release
Modification
7.6
Usage Guidelines
You can use this command to configure the maximum number of clients on access points that are in client
dense areas, or serving high bandwidth video or mission critical voice applications.
Examples
The following example shows how to set the maximum number of clients at 50:
(Cisco Controller) >config rf-profile max-clients 50
1155
config Commands
Syntax Description
Command Default
Command History
Examples
value
Minimum RF profile multicast data rate. The options are 6, 9, 12, 18, 24, 36, 48,
54. Enter 0 to specify that access points will dynamically adjust the data rate.
profile_name
Release
Modification
7.6
The following example shows how to set the multicast data rate for an RF profile:
(Cisco Controller) >config rf-profile multicast data-rate 24
OL-31334-01
config Commands
Syntax Description
enable
Enables the creation of an out-of-box AP group. When you enable this command, the following
occurs:
Newly installed access points that are part of the default AP group will be part of the
out-of-box AP group and their radios will be switched off, which eliminates any RF
instability caused by the new access points.
All access points that do not have a group name become part of the out-of-box AP group.
Special RF profiles are created per 802.11 band. These RF profiles have default-settings
for all the existing RF parameters and additional new configurations.
disable
Command Default
Command History
Disables the out-of-box AP group. When you disable this feature, only the subscription of
new APs to the out-of-box AP group stops. All APs that are subscribed to the out-of-box AP
group remain in this AP group. You can move APs to the default group or a custom AP group
upon network convergence.
None
Release
Modification
7.6
Usage Guidelines
When an out-of-box AP associates with the controller for the first time, it will be redirected to a special AP
group and the RF profiles applicable to this AP Group will control the radio admin state configuration of the
AP. You can move APs to the default group or a custom group upon network convergence.
Examples
The following example shows how to enable the creation of an out-of-box AP group:
(Cisco Controller) >config rf-profile out-of-box enable
1157
config Commands
Syntax Description
Command Default
Command History
Examples
high
medium
low
auto
Configures an auto Rx SOP threshold value for an RF profile. When you choose
auto, the access point determines the best Rx SOP threshold value.
profile_name
Release
Modification
8.0
The following example shows how to configure the high Rx SOP threshold value on an RF profile:
(Cisco Controller) > config 802.11 rx-sop threshold high T1a
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
clients
clients
The number of clients on an access point's radio for the trap is between 1 and
200. The default is 12 clients.
profile name
interference
percent
The percentage of interference threshold for the trap is from 0 to 100 %. The
default is 10 %.
noise
dBM
The level of noise threshold for the trap is from -127 to 0 dBm. The default is
-17 dBm.
utilization
percent
The percentage of bandwidth being used by an access point threshold for the
trap is from 0 to 100 %. The default is 80 %.
None
Release
Modification
8.0
The following example shows how to configure the RF profile trap threshold for clients:
(Cisco Controller) >config rf-profile trap-threshold clients 50 admin1
1159
config Commands
Syntax Description
Command Default
Command History
Examples
tpc-threshold
TPC threshold.
profile-name
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
tpc-threshold
TPC threshold.
profile-name
None
Release
Modification
7.6
1161
config Commands
Syntax Description
Command Default
Command History
Examples
tx-power-max
profile-name
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
tx-power-min
profile-name
None
Release
Modification
7.6
1163
config Commands
Syntax Description
Command Default
Command History
Examples
mac MAC
username username
None
Release
Modification
7.6
The following example shows how to add a watchlist entry for the MAC address a5:6b:ac:10:01:6b:
(Cisco Controller) >config watchlist add mac a5:6b:ac:10:01:6b
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
mac MAC
Specifies the MAC address of the wireless LAN to delete from the list.
username username
None
Release
Modification
7.6
The following example shows how to delete a watchlist entry for the MAC address a5:6b:ac:10:01:6b:
(Cisco Controller) >config watchlist delete mac a5:6b:ac:10:01:6b
1165
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
1167
config Commands
config wlan
To create, delete, enable, or disable a wireless LAN, use the config wlan command.
config wlan {enable | disable | create | delete} wlan_id [name | foreignAp name ssid | all]
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
create
delete
wlan_id
name
foreignAp
ssid
all
None
Release
Modification
7.6
When you create a new WLAN using the config wlan create command, it is created in disabled mode. Leave
it disabled until you have finished configuring it.
If you do not specify an SSID, the profile name parameter is used for both the profile name and the SSID.
If the management and AP-manager interfaces are mapped to the same port and are members of the same
VLAN, you must disable the WLAN before making a port-mapping change to either interface. If the
management and AP-manager interfaces are assigned to different VLANs, you do not need to disable the
WLAN.
An error message appears if you try to delete a WLAN that is assigned to an access point group. If you proceed,
the WLAN is removed from the access point group and from the access points radio.
OL-31334-01
config Commands
Examples
The following example shows how to enable wireless LAN identifier 16:
(Cisco Controller) >config wlan enable 16
1169
config Commands
Syntax Description
Command Default
Command History
ap-cac-limit
client-cac-limit
Supports phones that require access point-controlled CAC that expect the IEEE
802.11e Draft 6 QBSS-load.
enable
disable
wlan_id
None
Release
Modification
7.6
Usage Guidelines
You cannot enable both WMM mode and client-controlled CAC mode on the same WLAN.
Examples
The following example shows how to enable the phone support that requires client-controlled CAC with
wireless LAN ID 8:
(Cisco Controller) >config wlan 7920-support ap-cac-limit enable 8
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
allow
disable
require
wlan_id
None
Release
Modification
7.6
802.11e provides quality of service (QoS) support for LAN applications, which are critical for delay sensitive
applications such as Voice over Wireless IP (VoWIP).
802.11e enhances the 802.11 Media Access Control layer (MAC layer) with a coordinated time division
multiple access (TDMA) construct, and adds error-correcting mechanisms for delay sensitive applications
such as voice and video. The 802.11e specification provides seamless interoperability and is especially well
suited for use in networks that include a multimedia capability.
Examples
The following example shows how to allow 802.11e on the wireless LAN with LAN ID 1:
(Cisco Controller) >config wlan 802.11e allow 1
1171
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
wlan_id
foreignAp
AAA is disabled.
Release
Modification
7.6
When AAA override is enabled and a client has conflicting AAA and Cisco wireless LAN controller wireless
LAN authentication parameters, client authentication is performed by the AAA server. As part of this
authentication, the operating system will move clients from the default Cisco wireless LAN VLAN to a VLAN
returned by the AAA server and predefined in the controller interface configuration (only when configured
for MAC filtering, 802.1X, and/or WPA operation). In all cases, the operating system will also use QoS,
DSCP, 802.1p priority tag values, and ACLs provided by the AAA server, as long as they are predefined in
the controller interface configuration. (This VLAN switching by AAA override is also referred to as Identity
Networking.)
If the corporate wireless LAN uses a management interface assigned to VLAN 2, and if AAA override returns
a redirect to VLAN 100, the operating system redirects all client transmissions to VLAN 100, regardless of
the physical port to which VLAN 100 is assigned.
When AAA override is disabled, all client authentication defaults to the controller authentication parameter
settings, and authentication is performed by the AAA server if the controller wireless LAN does not contain
any client-specific authentication parameters.
The AAA override values might come from a RADIUS server.
Examples
The following example shows how to configure user policy override via AAA on WLAN ID 1:
(Cisco Controller) >config wlan aaa-override enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
acl_name
none
(Optional) Clears the ACL settings for the specified wireless LAN.
None
Release
Modification
7.6
The following example shows how to configure a WLAN access control list with WLAN ID 1 and ACL
named office_1:
(Cisco Controller) >config wlan acl 1 office_1
1173
config Commands
Syntax Description
Command Default
neighbor-list
dual-list
Configures a dual band 802.11k neighbor list for a WLAN. The default is
the band that the client is currently associated with.
prediction
enable
disable
wlan_id
Command History
Release
Modification
7.6
Usage Guidelines
When you enable the assisted roaming prediction list, a warning appears and load balancing is disabled for
the WLAN, if load balancing is already enabled on the WLAN.
Examples
The following example shows how to enable an 802.11k neighbor list for a WLAN:
(Cisco Controller) >config wlan assisted-roaming neighbor-list enable 1
OL-31334-01
config Commands
Syntax Description
wlan_id
profile
profile_name
visibility
enable
disable
Command Default
Command History
None
Release
Modification
7.6
Usage Guidelines
You can configure only one AVC profile per WLAN and each AVC profile can have up to 32 rules. Each
rule states a Mark or Drop action for an application, which allows you to configure up to 32 application actions
per WLAN. You can configure up to 16 AVC profiles on a controller and associate an AVC profile with
multiple WLANs.
Examples
The following example shows how to associate an AVC profile with a WLAN:
(Cisco Controller) >config wlan avc 5 profile profile1 enable
1175
config Commands
Syntax Description
add
apgroup_name
wlan_id
delete
description
Describes an AP group.
description
interface-mapping
interface_name
nac-snmp
enable
disable
NAS-ID
none
OL-31334-01
config Commands
profile-mapping
profile_name
wlan-radio-policy
802.11a-only
802.11bg
802.11g-only
all
hotspot
venue
type
group_code
1177
config Commands
type_code
OL-31334-01
config Commands
1179
config Commands
1 : PRIMARY SCHOOL
2 : SECONDARY SCHOOL
3 : UNIVERSITY OR COLLEGE
For venue group 4 (FACTORY-INDUSTRIAL), the
following options are available:
0 : UNSPECIFIED FACTORY AND
INDUSTRIAL
1 : FACTORY
For venue group 5 (INSTITUTIONAL), the following
options are available:
0 : UNSPECIFIED INSTITUTIONAL
1 : HOSPITAL
2 : LONG-TERM CARE FACILITY
3 : ALCOHOL AND DRUG RE-HABILITATION
CENTER
4 :GROUP HOME
5 :PRISON OR JAIL
For venue group 6 (MERCANTILE), the following
options are available:
0 : UNSPECIFIED MERCANTILE
1 : RETAIL STORE
2 : GROCERY MARKET
3 : AUTOMOTIVE SERVICE STATION
4 : SHOPPING MALL
5 : GAS STATION
For venue group 7 (RESIDENTIAL), the following
options are available:
0 : UNSPECIFIED RESIDENTIAL
1 : PRIVATE RESIDENCE
2 : HOTEL OR MOTEL
3 : DORMITORY
4 : BOARDING HOUSE
OL-31334-01
config Commands
language_code
venue_name
1181
config Commands
Command Default
Command History
Usage Guidelines
add
delete
operating_class_value
Release
Modification
7.6
An error message appears if you try to delete an access point group that is used by at least one access point.
Before you can delete an AP group in controller software release 6.0, move all APs in this group to another
group. The access points are not moved to the default-group access point group as in previous releases. To
see the APs, enter the show wlan apgroups command. To move APs, enter the config ap group-name
groupname cisco_ap command.
The NAS-ID configured on the controller for AP group or WLAN or interface is used for authentication. The
NAS-ID is not propagated across controllers.
Examples
The following example shows how to enable the NAC out-of band support on access point group 4:
(Cisco Controller) >config wlan apgroup nac enable apgroup 4
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
tagging
client-traffic
dhcp-v4
eap-sim-aka
enable
disable
service-vlan
apgroup_name
vlan_id
VLAN identifier.
By default, 802.1Q-in-Q tagging of client and DHCPv4 traffic for an AP group is disabled.
Release
Modification
8.0
Usage Guidelines
Note
You must enable 802.1Q-in-Q tagging of client traffic before you enable 802.1Q-in-Q tagging of DHCPv4
traffic.
When you enable 802.1Q-in-Q tagging of client traffic, the 802.1Q-in-Q tagging of EAP-AKA and EAP-SIM
traffic is also enabled.
1183
config Commands
Examples
The following example shows how to enable 802.1Q-in-Q tagging of client traffic for an AP group:
(Cisco Controller) >config wlan apgroup qinq tagging client-traffic APg1 enable
The following example shows how to configure the service VLAN for an AP group:
(Cisco Controller) >config wlan apgroup qinq service-vlan APg1 10
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
wlan_id
None
Release
Modification
7.6
Usage Guidelines
When you enable band select on a WLAN, the access point suppresses client probes on 2.4-GHz and moves
the dual band clients to the 5-Ghz spectrum. The band-selection algorithm directs dual-band clients only from
the 2.4-GHz radio to the 5-GHz radio of the same access point, and it only runs on an access point when both
the 2.4-GHz and 5-GHz radios are up and running. Band selection can be used only with Cisco Aironet 1040,
1140, and 1250 Series and the 3500 series access points.
Examples
1185
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
Release
Modification
7.6
The following example shows how to configure an SSID broadcast on wireless LAN ID 1:
(Cisco Controller) >config wlan broadcast-ssid enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
wlan_id
None
Release
Modification
7.6
Usage Guidelines
WLAN should be with Platinum QoS and it needs to be disabled while invoking this CLI
Examples
The following example shows how to enable VoIP snooping for WLAN 3:
(Cisco Controller) >config wlan call-snoop 3 enable
1187
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
enable
disable
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable Aironet information elements for a WLAN:
(Cisco Controller) >config wlan ccx aironet-ie enable
1189
config Commands
Syntax Description
Command Default
Command History
priority
enable
disable
wlan_id
None
Release
Modification
7.6
Usage Guidelines
The priority value should be set to 6 on the client and on the WLAN.
Examples
The following example shows how to enable the controller to defer priority markings that can defer off channel
scanning with user priority value 6 and WLAN id 30:
(Cisco Controller) >config wlan channel-scan defer-priority 6 enable 30
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
msecs
wlan_id
None
Release
Modification
7.6
Usage Guidelines
The time value in milliseconds should match the requirements of the equipment on your WLAN.
Examples
The following example shows how to assign the scan defer time to 40 milliseconds for WLAN with ID 50:
(Cisco Controller) >config wlan channel-scan defer-time 40 50
1191
config Commands
Syntax Description
ext-webauth-url
ext-webauth-url
wlan_id
global
enable
disable
login-page
Configures the name of the login page for an external web authentication
URL.
page-name
loginfailure-page
Configures the name of the login failure page for an external web
authentication URL.
none
Does not configure a login failure page for an external web authentication
URL.
logout-page
Configures the name of the logout page for an external web authentication
URL.
sleep-client
timeout
duration
Maximum amount of time after the idle timeout, in hours, before a sleeping
client is forced to reauthenticate. The range is from 1 to 720. The default
value is 12. When the sleep client feature is enabled, the clients need not
provide the login credentials when they move from one Cisco WLC to
another (if Cisco WLCs are in the same mobility group) between the sleep
and wake up times.
webauth-type
internal
customized
OL-31334-01
config Commands
external
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure the web authentication type as an external.
(Cisco Controller) >config wlan custom-web webauth-type external
1193
config Commands
Syntax Description
Command Default
Command History
wlan_id
foreignAp
ip_address
required
None
Release
Modification
7.6
Usage Guidelines
The preferred method for configuring DHCP is to use the primary DHCP address assigned to a particular
interface instead of the DHCP server override. If you enable the override, you can use the show wlan command
to verify that the DHCP server has been assigned to the WLAN.
Examples
The following example shows how to configure an IP address 10.10.2.1 of the internal DHCP server for
wireless LAN ID 16:
(Cisco Controller) >config wlan dhcp_server 16 10.10.2.1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
None
Release
Modification
7.6
The following example shows how to enable the wireless LAN diagnostic channel for WLAN ID 1:
(Cisco Controller) >config wlan diag-channel enable 1
1195
config Commands
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b
dtim
wlan_id
Release
Modification
7.6
The following example shows how to configure DTIM for 802.11a radio network with DTIM value 128 and
WLAN ID 1:
(Cisco Controller) >config wlan dtim 802.11a 128 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
wlan_id
enabled
(Optional) Enables the exclusion list for the specified wireless LAN or foreign
access point.
disabled
(Optional) Disables the exclusion list for the specified wireless LAN or a foreign
access point.
time
(Optional) Exclusion list timeout in seconds. A value of zero (0) specifies infinite
time.
foreignAp
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to enable the exclusion list for WLAN ID 1:
(Cisco Controller) >config wlan exclusionlist 1 enabled
1197
config Commands
Syntax Description
Command Default
Command History
wlan_id
monitor
monitor_name
enable
disable
None
Release
Modification
7.6
Usage Guidelines
You can use the config flow command to create a new NetFlow monitor.
Examples
The following example shows how to associate a NetFlow monitor with a WLAN:
(Cisco Controller) >config wlan flow 5 monitor monitor1 enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
ap-auth
wlan_id
enable
disable
None
Release
Modification
7.6
Usage Guidelines
Local switching must be enabled on the WLAN where you want to configure local authentication of clients
associated with FlexConnect.
Examples
The following example shows how to enable authentication of clients associated with FlexConnect on a
specified WLAN:
(Cisco Controller) >config wlan flexconnect ap-auth 6 enable
1199
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan-id
ID of the WLAN
enable
disable
Client reassociation and security key caching on the Cisco WLC is in disabled state.
Release
Modification
8.0
A use case for this configuration is a large-scale deployment with fast roaming.
Configuration of central association with local authentication is not supported for the WLAN. After the
PMIPv6 tunnel is set up, all data traffic from the PMIPv6 clients are forwarded from the Cisco AP to the local
mobility anchor (LMA) in the Generic Routing Encapsulation (GRE) tunnel. If the connectivity between the
Cisco AP and the Cisco WLC is lost, the data traffic for the existing PMIPv6 clients continue to flow until
the connectivity between the Cisco AP and the client is lost. When the AP is in stand-alone mode, no new
client associations are accepted on the PMIPv6 enabled WLAN.
Examples
The following example shows how to enable client reassociation and security key caching on the Cisco WLC
for a WLAN whose ID is 2:
(Cisco Controller) >config wlan flexconnect central-assoc 2 enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan_id
enable
disable
Disabled when the config wlan flexconnect local-switching command is disabled. Enabled when the config
wlan flexconnect local-switching command is enabled.
Release
Modification
7.6
8.0
If the client is configured with Layer 2 encryption, the controller cannot learn the client IP address, and the
controller will periodically drop the client. Disable this option to keep the client connection without waiting
to learn the client IP address.
Note
Note
The ability to disable IP address learning is not supported with FlexConnect central switching.
Examples
The following example shows how to disable client IP address learning for WLAN 6:
(Cisco Controller) >config wlan flexconnect learn-ipaddr disable 6
Related Commands
show wlan
1201
config Commands
Syntax Description
Command Default
Command History
wlan_id
enable
disable
central-dhcp
enable
disable
nat-pat
enable
disable
override
option dns
enable
disable
Release
Modification
7.6
OL-31334-01
config Commands
Usage Guidelines
Examples
Release
Modification
8.0
When you enable the config wlan flexconnect local-switching command, the config wlan flexconnect
learn-ipaddr command is enabled by default.
Note
Note
The ability to disable IP address learning is not supported with FlexConnect central switching.
The following example shows how to enable WLAN 6 for local switching and enable central DHCP and
NAT-PAT:
(Cisco Controller) >config wlan flexconnect local-switching 6 enable central-dhcp enable
nat-pat enable
The following example shows how to enable the override DNS option on WLAN 6:
(Cisco Controller) >config wlan flexconnect local-switching 6 override option dns enable
1203
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan_id
enable
disable
Release
Modification
7.6
You must enable Flexconnect local switching to enable VLAN central switching. When you enable WLAN
central switching, the access point bridges the traffic locally if the WLAN is configured on the local IEEE
802.1Q link. If the VLAN is not configured on the access point, the AP tunnels the traffic back to the controller
and the controller bridges the traffic to the corresponding VLAN.
WLAN central switching does not support:
FlexConnect local authentication.
Layer 3 roaming of local switching client.
Examples
The following example shows how to enable WLAN 6 for central switching:
(Cisco Controller) >config wlan flexconnect vlan-central-switching 6 enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
clear-all
wlan_id
dot11u
hs2
msap
None
Release
Modification
7.6
Usage Guidelines
Examples
1205
config Commands
Syntax Description
Command Default
Command History
Examples
3gpp-info
auth-type
disable
domain
Configures a domain.
enable
hessid
ipaddr-type
nai-realm
network-type
roam-oi
None.
Release
Modification
7.6
8.0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
add
delete
index
country_code
Mobile Country Code (MCC) in Binary Coded Decimal (BCD) format. The
country code can be up to 3 characters. For example, the MCC for USA is 310.
network_code
wlan_id
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to configure 3GPP cellular network information on a WLAN:
(Cisco Controller) >config wlan hotspot dot11u 3gpp-info add
1207
config Commands
Syntax Description
network-auth
Network authentication that you would like to configure on the WLAN. The
available values are as follows:
0Acceptance of terms and conditions
1On-line enrollment
2HTTP/HTTPS redirection
3DNS Redirection
4Not Applicable
wlan_id
Command Default
Command History
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to configure HTTP/HTTPS redirection as the network authentication type
on an 802.11u HotSpot WLAN:
(Cisco Controller) >config wlan hotspot dot11u auth-type 2 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
1209
config Commands
Syntax Description
Command Default
Command History
Examples
add
Adds a domain.
wlan_id
domain-index
domain_name
delete
Deletes a domain.
modify
Modifies a domain.
None
Release
Modification
7.6
The following example shows how to add a domain in the 802.11 access network:
(Cisco Controller) >config wlan hotspot dot11u domain add 6 30 domain1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
1211
config Commands
Syntax Description
Command Default
Command History
Examples
hessid
MAC address that can be configured as an HESSID. The HESSID is a 6-octet MAC
address that uniquely identifies the network. For example, Basic Service Set
Identification (BSSID) of the WLAN can be used as the HESSID.
wlan_id
None
Release
Modification
7.6
The following example shows how to configure an HESSID on an 802.11u HotSpot WLAN:
(Cisco Controller) >config wlan hotspot dot11u hessid 00:21:1b:ea:36:60 6
OL-31334-01
config Commands
Syntax Description
IPv4Type
IPv6Type
wlan_id
Command Default
Command History
Examples
Release
Modification
7.6
8.0
The following example shows how to configure the IP address availability type on an 802.11u HotSpot WLAN:
(Cisco Controller) >config wlan hotspot dot11u ipaddr-type 6 2 6
Related Commands
show wlan
1213
config Commands
Syntax Description
add
Adds a realm.
delete
Deletes a realm.
modify
Modifies a realm.
auth-method
wlan_id
realm-index
eap-index
auth-index
auth-method
auth-parameter
eap-method
OL-31334-01
config Commands
eap-method
EAP Method. The range is from 0 to 7. The following options are available:
0Not Applicable
1Lightweight Extensible Authentication Protocol (LEAP)
2Protected EAP (PEAP)
3EAP-Transport Layer Security (EAP-TLS)
4EAP-FAST (Flexible Authentication via Secure Tunneling)
5EAP for GSM Subscriber Identity Module (EAP-SIM)
6EAP-Tunneled Transport Layer Security (EAP-TTLS)
7EAP for UMTS Authentication and Key Agreement (EAP-AKA)
Command Default
Command History
Usage Guidelines
realm-name
realm
Name of the realm. The realm name should be RFC 4282 compliant. For example,
Cisco. The realm name is case-sensitive and can be up to 255 alphanumeric
characters.
None
Release
Modification
7.6
1215
config Commands
0Reserved
1LEAP
1SIM
1Password authentication
protocol (PAP)
2PEAP
2USIM
3EAP-TLS
4EAP-FAST
4Hardware Token
2Challenge-Handshake
Authentication Protocol (CHAP)
5EAP-SIM
3Microsoft Challenge
Handshake Authentication Protocol 6EAP-TTLS
(MS-CHAP)
7EAP-AKA
4MSCHAPV2
5Soft Token
6Certificate
7Username/Password
8Reserver
9Anonymous
10Vendor Specific
Examples
The following example shows how to add the Tunneled EAP Method Credential authentication method on
WLAN 4:
(Cisco Controller) >config wlan hotspot dot11u nai-realm add auth-method 4 10 3 5 4 6
OL-31334-01
config Commands
Syntax Description
wlan_id
network-type
internet-access
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure the network type and Internet availability on an 802.11u
HotSpot WLAN:
(Cisco Controller) >config wlan hotspot dot11u network-type 2 1
1217
config Commands
Syntax Description
Command Default
Command History
Examples
add
Adds an OI.
wlan-id
oi-index
oi
is-beacon
modify
Modifies an OI.
delete
Deletes an OI.
None.
Release
Modification
7.6
The following example shows how to configure the roaming consortium OI list:
(Cisco Controller) >config wlan hotspot dot11u roam-oi add 4 10 004096 1
OL-31334-01
config Commands
Syntax Description
disable
Disables HotSpot2.
wlan-id
enable
Enables HotSpot2.
operator-name
add
index
operator-name
language-code
delete
modify
port-config
port_config_index
1219
config Commands
ip-protocol
port-number
status
wan-metrics
link-status
symet-link
downlink-speed
OL-31334-01
config Commands
uplink-speed
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure the WAN metrics parameters:
(Cisco Controller) >config wlan hotspot hs2 wan-metrics add 345 1 0 3333
1221
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
server-id
server_id
wlan_id
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
interface-name
Interface name.
interface-group-name
None
Release
Modification
7.6
1223
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
acl_name
None
Release
Modification
7.6
The following example shows how to configure an IPv6 ACL for local switching:
(Cisco Controller) >config wlan ipv6 acl 22 acl_sample
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
wlan_id
None
Release
Modification
7.6
To enable the KTS-based CAC policy for a WLAN, ensure that you do the following:
Configure the QoS profile for the WLAN to Platinum by entering the following command:
config wlan qos wlan-id platinum
Disable the WLAN by entering the following command:
config wlan disable wlan-id
Disable FlexConnect local switching for the WLAN by entering the following command:
config wlan flexconnect local-switching wlan-id disable
Examples
The following example shows how to enable the KTS-based CAC policy for a WLAN with the ID 4:
(Cisco Controller) >config wlan kts-cac enable 4
1225
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan_id
acl_name
none
None
Release
Modification
7.5
Examples
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
wlan_id
enable
disable
None
Release
Modification
7.6
8.0
Usage Guidelines
If the client is configured with Layer 2 encryption, the Cisco WLC cannot learn the client IP address and will
periodically drop the client. Disable this option so that the Cisco WLC maintains the client connection without
waiting to learn the client IP address.
Examples
The following example shows how to enable client IP address learning on a centrally switched WLAN:
(Cisco Controller) >config wlan learn-ipaddr-cswlan 2 enable
Related Commands
show wlan
1227
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
add
wlan_id
server_id
delete
all
None
Release
Modification
7.6
Use this command to specify the LDAP server priority for the WLAN.
To specify the LDAP server priority, one of the following must be configured and enabled:
802.1X authentication and Local EAP
Web authentication and LDAP
Note
Examples
Local EAP was introduced in controller software release 4.1; LDAP support on Web
authentication was introduced in controller software release 4.2.
The following example shows how to add a link to a configured LDAP server with the WLAN ID 100 and
server ID 4:
(Cisco Controller) >config wlan ldap add 100 4
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
Release
Modification
7.6
The following example shows how to enable band selection on a wireless LAN with WLAN ID 3:
(Cisco Controller) >config wlan load-balance allow enable 3
1229
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to enable the MAC filtering on WLAN ID 1:
(Cisco Controller) >config wlan mac-filtering enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
max_clients
wlan_id
None
Release
Modification
7.6
The following example shows how to specify the maximum number of client connections on WLAN ID 2:
(Cisco Controller) >config wlan max-associated-clients 25 2
1231
config Commands
Syntax Description
Command Default
Command History
Examples
max_radio_clients
wlan_id
None
Release
Modification
7.6
The following example shows how to specify the maximum number of client connections per access point
radio on WLAN ID 2:
(Cisco Controller) >config wlan max-radio-clients 25 2
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
profile
profile-name
none
Removes all existing mDNS profiles from the WLAN. You cannot configure
mDNS profiles on the WLAN.
wlan_id
all
Release
Modification
7.4
Usage Guidelines
You must disable the WLAN before you use this command. Clients receive service advertisements only for
the services associated with the profile. The controller gives the highest priority to the profiles associated to
interface groups, followed by the interface profiles, and then the WLAN profiles. Each client is mapped to a
profile based on the order of priority.
Examples
The following example shows how to configure an mDNS profile for a WLAN.
(Cisco Controller) >config wlan mdns profile profile1 1
1233
config Commands
Syntax Description
Command Default
Command History
multicast-direct
wlan_id
all
enable
disable
None
Release
Modification
7.6
Usage Guidelines
Media stream multicast-direct requires load based Call Admission Control (CAC) to run. WLAN quality of
service (QoS) needs to be set to either gold or platinum.
Examples
The following example shows how to enable the global multicast-direct media stream with WLAN ID 2:
(Cisco Controller) >config wlan media-stream multicast-direct 2 enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
client
enable
disable
wlan_id
infrastructure protection
None
Release
Modification
7.6
The following example shows how to configure client management frame protection for WLAN ID 1:
(Cisco Controller) >config wlan mfp client enable 1
1235
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
wlan_id
ip_addr
None
Release
Modification
7.6
8.0
The following example shows how to configure the mobility wireless LAN anchor list with WLAN ID 4 and
IPv4 address 192.168.0.14
(Cisco Controller) >config wlan mobility anchor add 4 192.168.0.14
Related Commands
show wlan
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
wlan_id
foreign_mac_address
interface_name
interface_group_name
None
Release
Modification
7.6
The following example shows how to add an interface group for foreign Cisco WLCs with WLAN ID 4 and
a foreign switch MAC address on WLAN 00:21:1b:ea:36:60:
(Cisco Controller) >config wlan mobility foreign-map add 4 00:21:1b:ea:36:60 mygroup1
1237
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
buffer-size
Radio multicast packet buffer size. The range is from 30 to 60. Enter 0 to indicate
APs will dynamically adjust the number of buffers allocated for multicast.
wlan_id
Release
Modification
7.6
The following example shows how to configure radio multicast buffer settings:
(Cisco Controller) >config wlan multicast buffer enable 45 222
OL-31334-01
config Commands
Syntax Description
wlan_id
enable
delete
interface_name
Interface name.
Note
Command Default
Command History
Examples
Multicast is disabled.
Release
Modification
7.6
The following example shows how to enable the multicast interface feature for a wireless LAN with WLAN
ID 4 and interface name myinterface1:
(Cisco Controller) >config wlan multicast interface 4 enable myinterface1
1239
config Commands
Syntax Description
Command Default
Command History
snmp
radius
enable
disable
wlan_id
None
Release
Modification
7.6
Usage Guidelines
You should enable AAA override before you enable the RADIUS NAC state. You also should disable
FlexConnect local switching before you enable the RADIUS NAC state.
Examples
The following example shows how to configure SNMP NAC support for WLAN 13:
(Cisco Controller) >config wlan nac snmp enable 13
The following example shows how to configure RADIUS NAC support for WLAN 34:
(Cisco Controller) >config wlan nac radius enable 20
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan_id
average-data-rate
Specifies the average data rate for TCP traffic per user or
per SSID. The range is from 0 to 51,2000 Kbps.
average-realtime-rate
burst-data-rate
Specifies the peak data rate for TCP traffic per user or per
SSID. The range is from 0 to 51,2000 Kbps.
burst-realtime-rate
Specifies the peak real-time data rate for UDP traffic per
user or per SSID. The range is from 0 to 51,2000 Kbps.
per-ssid
per-client
Configures the rate limit for each client associated with the
SSID.
downstream
upstream
rate
Data rate for TCP or UDP traffic per user or per SSID. The
range is form 0 to 51,2000 Kbps. A value of 0 imposes no
bandwidth restriction on the QoS profile.
None
Release
Modification
7.6
The rate limits are enforced by the controller and the AP. For central switching, the controller handles the
downstream enforcement of per-client rate limit and the AP handles the enforcement of the upstream traffic
1241
config Commands
and per-SSID rate limit for downstream traffic. When the AP enters standalone mode it handles the downstream
enforcement of per-client rate limits too.
In FlexConnect local switching and standalone modes, per-client and per-SSID rate limiting is done by the
AP for downstream and upstream traffic. However, in FlexConnect standalone mode, the configuration is not
saved on the AP, so when the AP reloads, the configuration is lost and rate limiting does not happen after
reboot.
For roaming clients, if the client roams between the APs on the same controller, same rate limit parameters
are applied on the client. However, if the client roams from an anchor to a foreign controller, the per-client
downstream rate limiting uses the parameters configured on the anchor controller while upstream rate limiting
uses the parameters of the foreign controller.
Examples
The following example shows how to configure the burst real-time actual rate 2000 Kbps for the upstream
traffic per SSID:
(Cisco Controller) >config wlan override-rate-limit 2 burst-realtime-rate per-ssid upstream
2000
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
enable
disable
wlan_id
None
Release
Modification
7.6
You need to enable the global multicast mode and multicast-multicast mode by using the config network
multicast global and config network multicast mode commands before entering this command.
You should configure the multicast in multicast-multicast mode only not in unicast mode. The passive
client feature does not work with multicast-unicast mode in this release.
The following example shows how to configure the passive client on wireless LAN ID 2:
(Cisco Controller) >config wlan passive-client enable 2
1243
config Commands
Syntax Description
Command Default
Command History
Examples
disable
Disables peer-to-peer blocking and bridge traffic locally within the controller
whenever possible.
drop
forward-upstream
Causes the packets to be forwarded on the upstream VLAN. The device above
the controller decides what action to take regarding the packets.
wlan_id
None
Release
Modification
7.6
The following example shows how to disable the peer-to-peer blocking for WLAN ID 1:
(Cisco Controller) >config wlan peer-blocking disable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None.
Release
Modification
7.6
The following example shows how to configure a default realm name on a PMIPv6 WLAN:
(Cisco Controller) >config wlan pmipv6 default-realm XYZ 6
1245
config Commands
Syntax Description
Command Default
Command History
none
pmipv6
all
wlan_id
None
Release
Modification
7.6
Usage Guidelines
You must disable the WLAN when you configure the mobility type.
Examples
The following example shows how to configure the mobility type as PMIPv6 on a WLAN:
(Cisco Controller) >config wlan pmipv6 mobility-type pmipv6 16
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
profile_name
wlan_id
None
Release
Modification
7.6
Usage Guidelines
This command binds a profile name to the PMIPv6 WLAN or SSID. Each time that a mobile node associates
with the controller, it uses the profile name and NAI in the trigger to the PMIPV6 module. The PMIPV6
module extracts all the profile specific parameters such as LMA IP, APN, and NAI and sends the PBU to the
ASR5K.
Examples
The following example shows how to create a profile named ABC01 on a PMIPv6 WLAN:
(Cisco Controller) >config wlan pmipv6 profile_name ABC01 16
1247
config Commands
Syntax Description
Command Default
Command History
add
delete
priority-index
policy_name
wlan-id
Release
Modification
7.5
Usage Guidelines
Examples
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
profile-name
None
Release
Modification
8.0
Status
-------Disabled
Interface Name
--------------management
PMIPv6 Mobility
--------------none
1249
config Commands
Syntax Description
local
radius
all
dhcp
http
enable
disable
wlan_id
Usage Guidelines
Ensure that you have disabled the WLAN before configuring client profiling on the WLAN.
Command Default
Command History
Usage Guidelines
Release
Modification
7.6
Only clients connected to port 80 for HTTP can be profiled. IPv6 only clients are not profiled.
If a session timeout is configured for a WLAN, clients must send the HTTP traffic before the configured
timeout to get profiled.
This feature is not supported on the following:
FlexConnect Standalone mode
FlexConnect Local Authentication
OL-31334-01
config Commands
Examples
The following example shows how to enable both DHCP and HTTP profiling on a WLAN:
(Cisco Controller) >config wlan profiling radius all enable 6
HTTP Profiling successfully enabled.
DHCP Profiling successfully enabled.
1251
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
bronze
silver
gold
platinum
foreignAp
Release
Modification
7.6
The following example shows how to set the highest level of service on wireless LAN 1:
(Cisco Controller) >config wlan qos 1 gold
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
all
802.11a
802.11bg
802.11g
None
Release
Modification
7.6
The following example shows how to configure the wireless LAN on all radio bands:
(Cisco Controller) >config wlan radio 1 all
1253
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
add
server_id
delete
address
both
Configures the accounting framed IPv6 attribute to an IPv6 address and prefix.
prefix
None
Release
Modification
7.6
The following example shows how to enable RADIUS accounting for the WLAN 2:
(Cisco Controller) >config wlan radius_server acct enable 2
The following example shows how to add a link to a configured RADIUS accounting server:
(Cisco Controller) > config wlan radius_server acct add 2 5
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
interim-update
interval
Interim update interval that you specify. The valid range is 180 seconds to 3600
seconds.
enable
Enables interim update of the RADIUS accounting server for the WLAN.
disable
Disables interim update of the RADIUS accounting server for the WLAN.
wlan_id
Release
Modification
7.6
The following example shows how to specify an interim update of 200 seconds to a RADIUS accounting
server of WLAN 2:
(Cisco Controller) >config wlan radius_server acct interim-update 200 2
1255
config Commands
Syntax Description
Command Default
Command History
Examples
auth
enable
wlan_id
disable
add
server_id
delete
all
None
Release
Modification
7.6
The following example shows how to add a link to a configured RADIUS authentication server with WLAN
ID 1 and Server ID 1:
(Cisco Controller) >config wlan radius_server auth add 1 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
wlan_id
disable
interval
None
Release
Modification
7.6
Usage Guidelines
This command helps to set some time as a default if the timeout interval is not specified.
Examples
The following example shows how to force the 10 minutes as the default, if timeout interval is not specified:
(Cisco Controller) >config wlan radius_server acct interim-update 600 1
1257
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
apgroup
enable
disable
wlan
wlan_id
None
Release
Modification
7.6
The controller uses the management interface as identity. If the RADIUS server is on a directly connected
dynamic interface, the traffic is sourced from the dynamic interface. Otherwise, the management IP address
is used.
If the feature is enabled, controller uses the interface specified on the WLAN configuration as identity and
source for all RADIUS related traffic on the WLAN.
Examples
The following example shows how to enable RADIUS dynamic interface for a WLAN with an ID 1:
(Cisco Controller) >config wlan radius_server overwrite-interface enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
Release
Modification
7.6
The following example shows how to enable a roamed voice clients reanchor policy where WLAN ID is 1:
(Cisco Controller) >config wlan roamed-voice-client re-anchor enable 1
1259
config Commands
Syntax Description
enable
wlan_id
foreignAp
disable
encryption
40
Note
Note
Command History
Specifies a WEP key size of 104 bits. The default value is 104.
104
Command Default
on-macfilter-failure
enable
disable
None
Release
Modification
7.6
OL-31334-01
config Commands
Usage Guidelines
To change the encryption level of 802.1X security on the wireless LAN Cisco radios, use the following key
sizes:
0no 802.1X encryption.
4040/64-bit encryption.
104104/128-bit encryption. (This is the default encryption setting.)
Examples
The following example shows how to configure 802.1X security on WLAN ID 16.
(Cisco Controller) >config wlan security 802.1X enable 16
1261
config Commands
Syntax Description
Command Default
Command History
enable
disable
wlan_id
(Optional) Configures encryption key management for the CKIP wireless LAN.
hex
ascii
40
Sets the static encryption key length to 40 bits for the CKIP WLAN. 40-bit keys must
contain 5 ASCII text characters or 10 hexadecimal characters.
104
Sets the static encryption key length to 104 bits for the CKIP WLAN. 104-bit keys must
contain 13 ASCII text characters or 26 hexadecimal characters.
key
key_index
mmh-mic
kp
None
Release
Modification
7.6
OL-31334-01
config Commands
Examples
The following example shows how to configure a CKIP WLAN encryption key of 104 bits (26 hexadecimal
characters) for PSK key index 2 on WLAN 03:
(Cisco Controller) >config wlan security ckip akm psk set-key hex 104 key 2 03
1263
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
None
Release
Modification
7.6
The following example shows how to enable the conditional web direct on WLAN ID 2:
(Cisco Controller) >config wlan security cond-web-redir enable 2
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
None
Release
Modification
7.6
The following example shows how to enable the 802.1X frames pass through to external authenticator on
WLAN ID 2:
(Cisco Controller) >config wlan security eap-passthru enable 2
1265
config Commands
Syntax Description
Command Default
Command History
enable
disable
reassociation-timeout
timeout-in-seconds
wlan_id
None
Release
Modification
7.6
Usage Guidelines
Ensure that you have disabled the WLAN before you proceed.
Examples
The following example shows how to enable 802.11r fast transition roaming support on WLAN 2:
(Cisco Controller) >config wlan security ft enable 2
The following example shows how to set the reassociation timeout value of 20 seconds for 802.11r fast
transition roaming support on WLAN 2:
(Cisco Controller) >config wlan security ft reassociation-timeout 20 2
OL-31334-01
config Commands
Syntax Description
enable
disable
wlan_id
Command Default
Enabled.
Command History
Release
Modification
7.6
Usage Guidelines
Ensure that you have disabled the WLAN before you proceed.
Ensure that 802.11r fast transition is enabled on the WLAN.
Examples
The following example shows how to enable 802.11r fast transition roaming support over a distributed system
on WLAN ID 2:
(Cisco Controller) >config wlan security ft over-the-ds enable 2
1267
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to disable the IPsec for WLAN ID 16:
(Cisco Controller) >config wlan security IPsec disable 16
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to enable the IPsec for WLAN ID 16:
(Cisco Controller) >config wlan security IPsec enable 16
1269
config Commands
Syntax Description
Command Default
Command History
Examples
hmac-md5
hmac-sha-1
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to configure the IPsec HMAC-SHA-1 security authentication parameter
for WLAN ID 1:
(Cisco Controller) >config wlan security IPsec authentication hmac-sha-1 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
3des
aes
des
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to configure the IPsec AES encryption:
(Cisco Controller) >config wlan security IPsec encryption aes 1
1271
config Commands
Syntax Description
Command Default
Command History
qotd
ip_address
wlan_id
foreignAp
None
Release
Modification
7.6
Usage Guidelines
IKE is used as a method of distributing the session keys (encryption and authentication), as well as providing
a way for the VPN endpoints to agree on how the data should be protected. IKE keeps track of connections
by assigning a bundle of Security Associations (SAs), to each connection.
Examples
The following example shows how to configure the quote-of-the-day server IP 44.55.66.77 for cfg-mode for
WLAN 1:
(Cisco Controller) >config wlan security IPsec config qotd 44.55.66.77 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
certificates
wlan_id
foreignAp
pre-share-key
xauth-psk
key
None
Release
Modification
7.6
The following example shows how to configure the IKE certification mode:
(Cisco Controller) >config wlan security IPsec ike authentication certificates 16
1273
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
group-1
group-2
group-5
None
Release
Modification
7.6
The following example shows how to configure the Diffe Hellman group parameter for group-1:
(Cisco Controller) >config wlan security IPsec ike dh-group 1 group-1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
seconds
None
Release
Modification
7.6
The following example shows how to configure the IPsec IKE lifetime use on the wireless LAN:
(Cisco Controller) >config wlan security IPsec ike lifetime 1 1900
1275
config Commands
Syntax Description
Command Default
Command History
Examples
aggressive
main
wlan_id
foreignAp
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to modify Contivity VPN client support:
(Cisco Controller) >config wlan security IPsec ike contivity enable 14
1277
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
foreignAp
ip_address
(Optional) IP address of the IPsec gateway (router) that is terminating the VPN
tunnel.
None
Release
Modification
7.6
The following example shows how to modify IPsec pass-through used on the wireless LAN:
(Cisco Controller) >config wlan security passthru enable 3 192.12.1.1
OL-31334-01
config Commands
Syntax Description
disable
optional
required
association-comeback
Command Default
saquery-retrytimeout
saquery-retry_timeout
wlan_id
Command History
Usage Guidelines
Release
Modification
7.6
802.11w introduces an Integrity Group Temporal Key (IGTK) that is used to protect broadcast or multicast
robust management frames. IGTK is a random value, assigned by the authenticator station (controller) used
to protect MAC management protocol data units (MMPDUs) from the source STA. The 802.11w IGTK key
1279
config Commands
is derived using the four way handshake and is used only on WLANs that are configured with WPA or WPA2
security at Layer 2.
Examples
The following example shows how to enable 802.11w MFP protection on a WLAN:
(Cisco Controller) > config wlan security pmf optional 1
Examples
The following example shows how to configure the SA query retry timeout on a WLAN:
(Cisco Controller) > config wlan security pmf saquery-retrytimeout 300 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
Release
Modification
7.6
The following example shows how to enable spash page web redirect:
(Cisco Controller) >config wlan security splash-page-web-redir enable 2
1281
config Commands
Syntax Description
Command Default
Command History
Examples
shared-key
open
wlan_id
None
Release
Modification
7.6
The following example shows how to enable the static WEP shared key authentication for WLAN ID 1:
(Cisco Controller) >config wlan security static-wep-key authentication shared-key 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
The following example shows how to disable the static WEP keys for WLAN ID 1:
(Cisco Controller) >config wlan security static-wep-key disable 1
1283
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
The following example shows how to enable the use of static WEK keys for WLAN ID 1:
(Cisco Controller) >config wlan security static-wep-key enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan_id
40
104
hex
ascii
key
key-index
None
Release
Modification
7.6
One unique WEP key index can be applied to each wireless LAN. Because there are only four WEP key
indexes, only four wireless LANs can be configured for static WEP Layer 2 encryption.
Make sure to disable 802.1X before using this command.
Examples
The following example shows how to configure the static WEP keys for WLAN ID 1 that uses hexadecimal
character 0201702001 and key index 2:
(Cisco Controller) >config wlan security static-wep-key encryption 1 40 hex 0201702001 2
1285
config Commands
Syntax Description
Command Default
Command History
hold-down
time
wlan_id
Release
Modification
7.6
Usage Guidelines
TKIP countermeasure mode can occur if the access point receives 2 MIC errors within a 60 second period.
When this situation occurs, the access point deauthenticates all TKIP clients that are associated to that 802.11
radio and holds off any clients for the countermeasure holdoff time.
Examples
The following example shows how to configure the TKIP MIC countermeasure hold-down timer:
(Cisco Controller) >config wlan security tkip
OL-31334-01
config Commands
Syntax Description
Command Default
acl
enable
disable
wlan_id
foreignAp
acl_name
none
on-macfilter-failure
server-precendence
local
ldap
radius
flexacl
ipv4_acl_name
ipv6_acl_name
None
1287
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the security policy for WLAN ID 1 and an ACL named
ACL03:
(Cisco Controller) >config wlan security web-auth acl 1 ACL03
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
acl_name
none
None
Release
Modification
7.6
The following example shows how to add an ACL to the wireless LAN definition:
(Cisco Controller) >config wlan security web-passthrough acl 1 ACL03
1289
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to disable a web captive portal with no authentication required on wireless
LAN ID 1:
(Cisco Controller) >config wlan security web-passthrough disable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
email-input
enable
disable
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to configure a web captive portal using an e-mail address:
(Cisco Controller) >config wlan security web-passthrough email-input enable 1
1291
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
foreignAp
None
Release
Modification
7.6
The following example shows how to enable a web captive portal with no authentication required on wireless
LAN ID 1:
Controllerconfig wlan security web-passthrough enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
None
Release
Modification
7.6
1293
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
timestamp-tolerance
None
Release
Modification
7.6
The following example shows how to configure authentication key-management using CCKM.
(Cisco Controller) >config wlan security wpa akm cckm 1500
OL-31334-01
config Commands
Syntax Description
over-the-air
over-the-ds
psk
reassociation-timeout
Command Default
Command History
Examples
seconds
enable
disable
wlan_id
None
Release
Modification
7.6
The following example shows how to configure authentication key-management using 802.11r fast transition:
(Cisco Controller) >config wlan security wpa akm ft reassociation-timeout 25 1
1295
config Commands
Syntax Description
802.1x
psk
enable
disable
wlan_id
Command Default
Disabled.
Command History
Release
Modification
7.6
Usage Guidelines
802.11w has two new AKM suites: 00-0F-AC:5 or 00-0F-AC:6. You must enable WPA and then disable the
WLAN to configure PMF on the WLAN.
Examples
The following example shows how to enable 802.1X authentication for PMF in a WLAN:
(Cisco Controller) >config wlan security wpa akm pmf 802.1x enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables WPA-PSK.
disable
Disables WPA-PSK.
set-key
key-format
key
wlan_id
None
Release
Modification
7.6
The following example shows how to configure the WPA preshared key mode:
(Cisco Controller) >config wlan security wpa akm psk disable 1
1297
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
1299
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wpa1
wpa2
ciphers
aes
tkip
enable
disable
wlan_id
None
Release
Modification
7.6
If you are not specifying the WPA versions, it implies the following:
If the cipher enabled is AES, you are configuring WPA2/AES.
If the ciphers enabled is AES+TKIP, you are configuring WPA/TKIP, WPA2/AES,or WPA/TKIP.
If the cipher enabled is TKIP, you are configuring WPA/TKIP or WPA2/TKIP.
From Release 8.0, you cannot configure TKIP as a standalone encryption method. TKIP can be used only
with the AES encryption method.
Examples
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
Enables the randomization of GTK keys between the access point and clients.
disable
Disables the randomization of GTK keys between the access point and clients.
wlan_id
None
Release
Modification
7.6
Usage Guidelines
When you enable this command, the clients in the Basic Service Set (BSS) get a unique GTK key. The clients
do not receive multicast or broadcast traffic.
Examples
The following example shows how to enable the GTK randomization for each client associated on a WLAN:
(Cisco Controller) >config wlan security wpa gtk-random enable 3
1301
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
1303
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None
Release
Modification
7.6
1305
config Commands
Syntax Description
Command Default
Command History
sticky
enable
disable
wlan_id
None
Release
Modification
7.6
Usage Guidelines
In SKC (Sticky Key caching) also known as PKC (Pro Active Key caching), the client stores each Pairwise
Master Key (PMK) ID (PMKID) against a Pairwise Master Key Security Association (PMKSA). When a
client finds an AP for which it has a PMKSA, it sends the PMKID in the association request to the AP. If the
PMKSA is alive in the AP, the AP provides support for fast roaming. In SKC, full authentication is done on
each new AP to which the client associates and the client must keep the PMKSA associated with all APs.
Examples
The following example shows how to enable SKC roaming support on a WLAN:
(Cisco Controller) >config wlan security wpa wpa2 cache sticky enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
wlan_id
Release
Modification
7.6
Beginning in Release 7.2 and later releases, the controller supports Sticky PMKID Caching (SKC). With
sticky PMKID caching, the client receives and stores a different PMKID for every AP it associates with. The
APs also maintain a database of the PMKID issued to the client. In SKC also known as PKC (Pro Active Key
caching), the client stores each Pairwise Master Key (PMK) ID (PMKID) against a Pairwise Master Key
Security Association (PMKSA). When a client finds an AP for which it has the PMKSA, it sends the PMKID
in the association request to the AP. If the PMKSA is alive in the AP, the AP provides support for fast roaming.
In SKC, full authentication is done on each new AP to which the client associates and the client must keep
the PMKSA associated with all APs. For SKC, PMKSA is a per AP cache that the client stores and PMKSA
is precalculated based on the BSSID of the new AP.
You cannot use SKC for large scale deployments as the controller supports SKC only up to eight APs.
SKC does not work across controllers in a mobility group.
SKC works only on WPA2-enabled WLANs.
SKC works only on local mode APs.
Examples
The following example shows how to enable Sticky PMKID Caching on WLAN 5:
(Cisco Controller) >config wlan security wpa wpa2 cache sticky enable 5
1307
config Commands
Syntax Description
Command Default
Command History
Examples
tkip
enable
disable
wlan_id
Release
Modification
7.6
The following example shows how to enable AES data encryption for WPA2:
(Cisco Controller) >config wlan security wpa wpa2 ciphers aes enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
wlan_id
Release
Modification
7.6
The following example shows how to enable a client disassociation on a SIP CAC failure where the WLAN
ID is 1:
(Cisco Controller) >config wlan sip-cac disassoc-client enable 1
1309
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables sending a SIP 486 busy message upon a SIP CAC failure.
disable
Disables sending a SIP 486 busy message upon a SIP CAC failure.
wlan_id
Release
Modification
7.6
The following example shows how to enable sending a SIP 486 busy message upon a SIP CAC failure where
the WLAN ID is 1:
(Cisco Controller) >config wlan sip-cac send-busy486 enable 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
ssid
None
Release
Modification
8.0
WLAN ID
------1
Status
Interface Name
------- ---------------Disabled
management
PMIPv6 Mobility
--------------none
1311
config Commands
Syntax Description
Command Default
Command History
Examples
tunneling
enable
disable
wlan_id
None
Release
Modification
7.6
The following example shows how to enable static IP client tunneling support for WLAN ID 3:
(Cisco Controller) >config wlan static-ip tunneling enable 34
OL-31334-01
config Commands
Syntax Description
wlan_id
foreignAp
seconds
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to configure the client timeout to 6000 seconds for WLAN ID 1:
(Cisco Controller) >config wlan session-timeout 1 6000
1313
config Commands
Note
This was introduced for Ascom non-wmm capable phones and is not applicable for Cisco 792x/9971 IP
phones.
Syntax Description
Command Default
Examples
wlan_id
None
Release
Modification
7.6
Property Type
Property Value
Property Description
OL-31334-01
config Commands
Note
This was introduced for Ascom non-wmm capable phones and is not applicable for Cisco 792x/9971 IP
phones.
Syntax Description
Command Default
Examples
wlan_id
None
Release
Modification
7.6
1315
config Commands
Syntax Description
Command Default
Command History
Examples
bytes
Threshold data sent by the client during the idle timeout for the client session for a
WLAN. If the client send traffic less than the defined threshold, the client is removed
on timeout. The range is from 0 to 10000000 bytes.
wlan_id
The default timeout for threshold data sent by client during the idle timeout is 0 bytes.
Release
Modification
7.6
The following example shows how to configure the threshold data sent by the client during the idle timeout
for client sessions for a WLAN:
(Cisco Controller) >config wlan user-idle-threshold 100 1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
timeout
Timeout for idle client sessions for a WLAN. If the client sends traffic less than
the threshold, the client is removed on timeout. The range is from 15 to 100000
seconds.
wlan_id
Release
Modification
7.6
Usage Guidelines
The timeout value that you configure here overrides the global timeout that you define using the command
config network usertimeout.
Examples
The following example shows how to configure the idle client sessions for a WLAN:
(Cisco Controller) >config wlan usertimeout 100 1
1317
config Commands
Syntax Description
wlan_id
enable
disable
Command Default
Disabled.
Command History
Release
Modification
7.6
Usage Guidelines
You can use this command for guest WLANs that are configured with web authentication.
This command is applicable when you configure the internal DHCP scope on the controller.
By default, when the web authentication timer expires for a guest user, the guest user can immediately
reassociate with the same IP address before another guest user can acquire the IP address. If there are many
guest users or limited IP address in the DHCP pool, some guest users might not be able to acquire an IP
address.
When you enable this feature on the guest WLAN, the guest users IP address is released when the web
authentication policy time expires and the guest user is excluded from acquiring an IP address for three minutes.
The IP address is available for another guest user to use. After three minutes, the excluded guest user can
reassociate and acquire an IP address, if available.
Examples
The following example shows how to enable the web authentication exclusion for WLAN ID 5:
(Cisco Controller) >config wlan webauth-exclude 5 enable
OL-31334-01
clear Commands
Syntax Description
Command Default
Command History
allow
disable
require
wlan_id
None
Release
Modification
7.6
Usage Guidelines
When the controller is in Layer 2 mode and WMM is enabled, you must put the access points on a trunk port
in order to allow them to join the controller.
Examples
The following example shows how to configure wireless LAN ID 1 to allow WMM:
(Cisco Controller) >config wlan wmm allow 1
The following example shows how to configure wireless LAN ID 1 to specify that clients use WMM:
(Cisco Controller) >config wlan wmm require 1
clear Commands
This section lists the clear commands to clear existing configurations, log files, and other functions for WLANs
.
1319
debug Commands
Syntax Description
Command Default
Command History
Examples
table
mac
mac_address
vlan
vlan_id
VLAN identifier.
port
port
Port number.
ipv6
ipv6_address
all
counters
None
Release
Modification
7.6
The following example shows how to clear the IPv6 neighbor binding table entries for a VLAN:
(Cisco Controller) >clear ipv6 neighbor-binding table vlan 1
debug Commands
This section lists the debug commands to manage debugging of WLANs managed by the controller.
OL-31334-01
debug Commands
Caution
Debug commands are reserved for use only under the direction of Cisco personnel. Do not use these
commands without direction from Cisco-certified staff.
1321
debug Commands
debug 11w-pmf
To configure the debugging of 802.11w, use the debug 11w-pmf command.
debug 11w-pmf {all | events| keys} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
keys
events
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of 802.11w keys:
(Cisco Controller) >debug 11w-pmf keys enable
OL-31334-01
debug Commands
debug call-control
To configure the debugging of the SIP call control settings, use the debug call-control command.
debug call-control {all | event} {enable | disable}
Syntax Description
all
Configures the debugging options for all SIP call control messages.
event
enable
disable
Command Default
Disabled.
Command History
Release
Modification
7.6
Examples
The following example shows how to enable the debugging of all SIP call control messages:
(Cisco Controller) >debug call-control all enable
1323
debug Commands
debug ccxdiag
To configure debugging of Cisco Compatible Extensions (CCX) diagnostic options, use the debug ccxdiag
command.
debug ccxdiag {all | error | event | packet} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
error
event
packet
enable
disable
None
Release
Modification
7.6
The following example shows how to enable CCX S69 packets debugging:
(Cisco Controller) >debug ccxdiag packets enable
OL-31334-01
debug Commands
debug ccxrm
To configure debugging of the CCX Cisco Client eXtension (CCX) Radio Management (RM), use the debug
ccxrm command.
debug ccxrm {all | detail | error | location-calibration | message | packet | warning} {enable| disable}
Syntax Description
Command Default
Command History
Examples
all
detail
error
location-calibration
message
packet
warning
enable
disable
None
Release
Modification
7.6
1325
debug Commands
debug ccxs69
To configure debugging of CCX S69 tasks, use the debug ccxs69 command.
debug ccxs69 {all | error | event} {enable| disable}
Syntax Description
Command Default
Command History
Examples
all
error
event
enable
disable
None
Release
Modification
7.6
OL-31334-01
debug Commands
debug client
To configure the debugging of a passive client that is associated correctly with the access point, use the debug
client command.
debug client mac_address
Syntax Description
mac_address
Command Default
None
Examples
The following example shows how to debug a passive client with MAC address 00:0d:28:f4:c0:45:
(Cisco Controller) >debug client 00:0d:28:f4:c0:45
1327
debug Commands
debug dhcp
To configure the debugging of DHCP, use the debug dhcp command.
debug dhcp {message | packet} {enable | disable}
Syntax Description
message
packet
enable
disable
Command Default
None
Examples
The following example shows how to enable the debugging of DHCP messages:
(Cisco Controller) >debug dhcp message enable
OL-31334-01
debug Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of DHCP packets on a service port:
(Cisco Controller) >debug dhcp service-port enable
1329
debug Commands
debug ft
To configure debugging of 802.11r, use the debug ft command.
debug ft {events | keys} {enable | disable}
Syntax Description
Command Default
Command History
Examples
events
keys
enable
disable
None
Release
Modification
7.6
OL-31334-01
debug Commands
debug hotspot
To configure debugging of HotSpot events or packets, use the debug hotspot command.
debug hotspot {events | packets} {enable | disable} {enable | disable}
Syntax Description
Command Default
Command History
Examples
events
packets
enable
disable
None
Release
Modification
7.6
1331
debug Commands
debug ipv6
To configure debugging of IPv6 options, use the debug ipv6 command.
debug ipv6 {all | bt | classifier | errors | events | filter | fsm | gleaner | hwapi | memory | ndsuppress |
parser | policy | ra_throttler | switcher} {enable | disable}
Syntax Description
Command Default
all
bt
classifier
errors
events
filter
fsm
gleaner
hwapi
memory
ndsuppress
parser
policy
ra_throttler
switcher
enable
disable
None
OL-31334-01
debug Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the debugging of IPv6 policies:
(Cisco Controller) >debug ipv6 policy enable
1333
debug Commands
debug profiling
To configure the debugging of client profiling, use the debug profiling command.
debug profiling {enable | disable}
Syntax Description
enable
disable
Command Default
Disabled.
Command History
Release
Modification
7.6
Examples
The following example shows how to enable the debugging of client profiling:
(Cisco Controller) >debug profiling enable
OL-31334-01
test Commands
debug wcp
To configure the debugging of WLAN Control Protocol (WCP), use the debug wcp command.
debug wcp {events | packet} {enable | disable}
Syntax Description
Command Default
Command History
Examples
events
packet
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of WCP settings:
(Cisco Controller) >debug wcp packet enable
test Commands
This section lists the test commands for WLANs.
1335
test Commands
Syntax Description
Command Default
Command History
Examples
all
Deletes PMK cache entries from all Cisco wireless LAN controllers.
mac_address
MAC address of the Cisco wireless LAN controller from which PMK cache
entries have to be deleted.
local
global
Deletes PMK cache entries, for clients currently connected to this WLC, across
the mobility group
None
Release
Modification
7.6
The following example shows how to delete all entries in the PMK cache:
(Cisco Controller) >test pmk-cache delete all
OL-31334-01
PART
VI
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands, page 1339
capwap ap Commands, page 1410
config Commands, page 1422
clear Commands, page 1556
debug Commands, page 1561
transfer upload peer-start, page 1575
Resetting the System Reboot Time, page 1575
test Commands, page 1580
show Commands
This section lists the show commands to display information about your configuration settings for access
points.
1339
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the backup controller information:
> show advanced backup-controller
AP primary Backup Controller ....................
AP secondary Backup Controller ..................
controller 10.10.10.10
0.0.0.0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the maximum 802.1X sessions per access point:
> show advanced max-1x-sessions
Max 802.1x session per AP at a given time........ 0
1341
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the probe settings for the WLAN controller:
> show advanced probe
Probe request filtering.......................... Enabled
Probes fwd to controller per client per radio.... 12
Probe request rate-limiting interval............. 100 msec
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the switch control path rate limiting mode:
> show advanced rate
Control Path Rate Limiting.......................
Disabled
1343
show Commands
Syntax Description
Command Default
Command History
Examples
Release
Modification
7.6
The following example shows how to display the system timers setting:
> show advanced timers
Authentication Response Timeout (seconds)........ 10
Rogue Entry Timeout (seconds).................... 1200
AP Heart Beat Timeout (seconds).................. 30
AP Discovery Timeout (seconds)................... 10
AP Local mode Fast Heartbeat (seconds)........... disable
AP flexconnect mode Fast Heartbeat (seconds)........... disable
AP Primary Discovery Timeout (seconds)........... 120
OL-31334-01
show Commands
show ap auto-rf
To display the auto-RF settings for a Cisco lightweight access point, use the show ap auto-rf command.
show ap auto-rf 802.11{a | b} cisco_ap
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to display auto-RF information for an access point:
(Cisco Controller) > show ap auto-rf 802.11a AP1
Number Of Slots..................................
AP Name..........................................
MAC Address......................................
Radio Type.....................................
Noise Information
Noise Profile................................
Channel 36...................................
Channel 40...................................
Channel 44...................................
Channel 48...................................
Channel 52...................................
Channel 56...................................
Channel 60...................................
Channel 64...................................
Interference Information
Interference Profile.........................
Channel 36...................................
Channel 40...................................
Channel 44...................................
Channel 48...................................
Channel 52...................................
Channel 56...................................
Channel 60...................................
Channel 64...................................
Rogue Histogram (20/40_ABOVE/40_BELOW)
Channel 36...................................
Channel 40...................................
2
AP03
00:0b:85:01:18:b7
RADIO_TYPE_80211a
PASSED
-88 dBm
-86 dBm
-87 dBm
-85 dBm
-84 dBm
-83 dBm
-84 dBm
-85 dBm
PASSED
-66 dBm
-128 dBm
-128 dBm
-128 dBm
-128 dBm
-73 dBm
-55 dBm
-69 dBm
@
@
@
@
@
@
@
@
1%
0%
0%
0%
0%
1%
1%
1%
busy
busy
busy
busy
busy
busy
busy
busy
16/ 0/ 0
28/ 0/ 0
1345
show Commands
Channel 44...................................
Channel 48...................................
Channel 52...................................
Channel 56...................................
Channel 60...................................
Channel 64...................................
Load Information
Load Profile.................................
Receive Utilization..........................
Transmit Utilization.........................
Channel Utilization..........................
Attached Clients.............................
Coverage Information
Coverage Profile.............................
Failed Clients...............................
Client Signal Strengths
RSSI -100 dBm................................
RSSI -92 dBm................................
RSSI -84 dBm................................
RSSI -76 dBm................................
RSSI -68 dBm................................
RSSI -60 dBm................................
RSSI -52 dBm................................
Client Signal To Noise Ratios
SNR
0 dBm.................................
SNR
5 dBm.................................
SNR
10 dBm.................................
SNR
15 dBm.................................
SNR
20 dBm.................................
SNR
25 dBm.................................
SNR
30 dBm.................................
SNR
35 dBm.................................
SNR
40 dBm.................................
SNR
45 dBm.................................
Nearby RADs
RAD 00:0b:85:01:05:08 slot 0.................
RAD 00:0b:85:01:12:65 slot 0.................
Channel Assignment Information
Current Channel Average Energy...............
Previous Channel Average Energy..............
Channel Change Count.........................
Last Channel Change Time.....................
2004
Recommended Best Channel.....................
RF Parameter Recommendations
Power Level..................................
RTS/CTS Threshold............................
Fragmentation Threshold......................
Antenna Pattern..............................
9/
9/
3/
4/
7/
2/
0/
0/
0/
0/
1/
0/
0
0
0
0
0
0
PASSED
0%
0%
1%
1 clients
PASSED
0 clients
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
0
0
0
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
clients
clients
clients
OL-31334-01
show Commands
show ap ccx rm
To display an access points Cisco Client eXtensions (CCX) radio management status information, use the
show ap ccx rm command.
show ap ccx rm ap_name status
Syntax Description
Command Default
Command History
Examples
ap_name
status
Displays the CCX radio management status information for an access point.
None
Release
Modification
7.6
The following example shows how to display the status of the CCX radio management:
> show ap ccx rm AP1240-21ac status
A Radio
Channel Load Request .....................
Noise Histogram Request ..................
Beacon Request ...........................
Frame Request ............................
Interval .................................
Iteration ................................
G Radio
Channel Load Request .....................
Noise Histogram Request ..................
Beacon Request ...........................
Frame Request ............................
Interval .................................
Iteration ................................
Disabled
Disabled
Disabled
Disabled
60
10
Disabled
Disabled
Disabled
Disabled
60
10
1347
show Commands
show ap cdp
To display the Cisco Discovery Protocol (CDP) information for an access point, use the show ap cdp command.
show ap cdp {all | ap-name cisco_ap | neighbors {all | ap-name cisco_ap | detail cisco_ap}}
Syntax Description
Command Default
Command History
Examples
all
ap-name
cisco_ap
neighbors
detail
None
Release
Modification
7.6
The following example shows how to display the CDP status of all access points:
> show ap cdp all
AP CDP State
AP Name
-----------------SB_RAP1
SB_MAP1
SB_MAP2
SB_MAP3
AP CDP State
---------enable
enable
enable
enable
The following example shows how to display the CDP status of a specified access point:
> show ap cdp ap-name SB_RAP1
AP CDP State
AP Name
AP CDP State
------------------ ---------AP CDP State.......................Enabled
AP Interface-Based CDP state
Ethernet 0.....................Enabled
Slot 0.........................Enabled
Slot 1.........................Enabled
OL-31334-01
show Commands
The following example shows how to display details about all neighbors using CDP:
> show ap cdp neighbor all
AP Name
AP IP
----------------------SB_RAP1
192.168.102.154
SB_RAP1
192.168.102.154
SB_MAP1
192.168.102.137
SB_MAP1
192.168.102.137
SB_MAP2
192.168.102.138
SB_MAP2
192.168.102.138
SB_MAP3
192.168.102.139
Neighbor Name
-----------------sjc14-41a-sw1
SB_MAP1
SB_RAP1
SB_MAP2
SB_MAP1
SB_MAP3
SB_MAP2
Neighbor IP
Neighbor Port
-------------- ------------192.168.102.2
GigabitEthernet1/0/13
192.168.102.137 Virtual-Dot11Radio0
192.168.102.154 Virtual-Dot11Radio0
192.168.102.138 Virtual-Dot11Radio0
192.168.102.137 Virtual-Dot11Radio1
192.168.102.139 Virtual-Dot11Radio0
192.168.102.138 Virtual-Dot11Radio1
The following example shows how to display details about a specific neighbor with a specified access point
using CDP:
> show ap cdp neighbors ap-name SB_MAP2
AP Name
AP IP
Neighbor Name
----------- --------------- --------------SB_MAP2
192.168.102.138 SB_MAP1
SB_MAP2
192.168.102.138 SB_MAP3
Neighbor IP
Neighbor Port
-------------- ------------192.168.102.137 Virtual-Dot11Radio1
192.168.102.139 Virtual-Dot11Radio0
The following example shows how to display details about neighbors using CDP:
> show ap cdp neighbors detail SB_MAP2
AP Name:SB_MAP2
AP IP address:192.168.102.138
------------------------Device ID: SB_MAP1
Entry address(es): 192.168.102.137
Platform: cisco AIR-LAP1522AG-A-K9 , Cap
Interface: Virtual-Dot11Radio0, Port ID (outgoing port): Virtual-Dot11Radio1
Holdtime : 180 sec
Version :
Cisco IOS Software, C1520 Software (C1520-K9W8-M), Experimental Version 12.4(200
81114:084420) [BLD-v124_18a_ja_throttle.20081114 208] Copyright (c) 1986-2008 by
Cisco Systems, Inc. Compiled Fri 14-Nov-08 23:08 by
advertisement version: 2
------------------------Device ID: SB_MAP3
Entry address(es): 192.168.102.139
Platform: cisco AIR-LAP1522AG-A-K9 , Capabilities: Trans-Bridge
Interface: Virtual-Dot11Radio1, Port ID (outgoing port): Virtual-Dot11Radio0
Holdtime : 180 sec
Version :
Cisco IOS Software, C1520 Software (C1520-K9W8-M), Experimental Version 12.4(200
81114:084420) [BLD-v124_18a_ja_throttle.20081114 208] Copyright (c) 1986-2008 by
Cisco Systems, Inc. Compiled Fri 14-Nov-08 23:08 by
advertisement version: 2
1349
show Commands
show ap channel
To display the available channels for a specific mesh access point, use the show ap channel command.
show ap channel ap_name
Syntax Description
Command Default
Command History
Examples
ap_name
None
Release
Modification
7.6
The following example shows how to display the available channels for a particular access point:
> show ap channel AP47
802.11b/g Current Channel ...........1
Allowed Channel List.....................1,2,3,4,5,6,7,8,9,10,11
802.11a Current Channel .................161
Allowed Channel List.....................36,40,44,48,52,56,60,64,100,
.........................................104,108,112,116,132,136,140,
.........................................149,153,157,161
OL-31334-01
show Commands
show ap config
To display the detailed configuration for a lightweight access point, use the show ap config command.
show ap config 802.11{a | b} [summary] cisco_ap
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b
summary
cisco_ap
None
Release
Modification
7.6
The following example shows how to display the detailed configuration for an access point:
> show ap config 802.11a AP02
Cisco AP Identifier.............................. 0
Cisco AP Name.................................... AP02
Country code..................................... US - United States
Regulatory Domain allowed by Country............. 802.11bg:-A
802.11a:-A
AP Regulatory Domain............................. Unconfigured
Switch Port Number .............................. 1
MAC Address...................................... 00:0b:85:18:b6:50
IP Address Configuration......................... DHCP
IP Address....................................... 1.100.49.240
IP NetMask....................................... 255.255.255.0
Gateway IP Addr.................................. 1.100.49.1
CAPWAP Path MTU.................................. 1485
Telnet State..................................... Disabled
Ssh State........................................ Disabled
Cisco AP Location................................ default-location
Cisco AP Group Name.............................. default-group
Primary Cisco Switch............................. Cisco_32:ab:63
Primary Cisco Switch IP Address.................. Not Configured
Secondary Cisco Switch...........................
Secondary Cisco Switch IP Address................ Not Configured
Tertiary Cisco Switch............................
Tertiary Cisco Switch IP Address................. Not Configured
Administrative State ............................ ADMIN_ENABLED
Operation State ................................. REGISTERED
Mirroring Mode .................................. Disabled
AP Mode ........................................... Sniffer
Public Safety ..................................... Global: Disabled, Local: Disabled
AP SubMode ...................................... Not Configured
1351
show Commands
Disabled
informational
kern
7.0.110.6
12.4.18.0
3.0.51.0
180
Enabled
Enabled
Disabled
Power injector / Normal mode
2
AIR-LAP1142N-A-K9
C1140-K9W8-M
12.4(20100502:031212)
Enabled
FTX1305S180
Manufacture Installed
AUTOMATIC
Not Configured
Not Configured
Not Configured
255.255.255.255
47 days, 23 h 47 m 47 s
47 days, 23 h 10 m 37 s
Tue May 4 16:05:00 2010
0 days, 00 h 01 m 37 s
RADIO_TYPE_80211n-5
RADIO_SUBBAND_ALL
ADMIN_ENABLED
UP
ACCESS
0
AUTOMATIC
2
100
4
60
00:24:97:88:99:60
MANDATORY
SUPPORTED
MANDATORY
SUPPORTED
MANDATORY
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
100
2346
TRUE
TRUE
US
OL-31334-01
show Commands
AUTOMATIC
36
21
AUTOMATIC
2346
64
6
14 dBm
11 dBm
8 dBm
5 dBm
2 dBm
-1 dBm
AUTOMATIC
0
AUTOMATIC
36
NONE
20 Mhz
36,40,44,48,52,56,60,64,100,
104,108,112,116,132,136,140,
149,153,157,161,165
-50
AUTOMATIC
DISABLED
INTERNAL_ANTENNA
6
DIVERSITY_ENABLED
ENABLED
ENABLED
ENABLED
ENABLED
ENABLED
AUTOMATIC
10 %
-70 dBm
80 %
1000000 bps
12 clients
16 dB
25 %
3 clients
0
No
dB
The following example shows how to display the detailed configuration for another access point:
> show ap config 802.11b AP02
Cisco AP Identifier..............................
Cisco AP Name....................................
AP Regulatory Domain.............................
Switch Port Number ..............................
MAC Address......................................
IP Address Configuration.........................
IP Address.......................................
0
AP02
Unconfigured
1
00:0b:85:18:b6:50
DHCP
1.100.49.240
1353
show Commands
IP NetMask.......................................
Gateway IP Addr..................................
Cisco AP Location................................
Cisco AP Group Name..............................
Primary Cisco Switch.............................
Secondary Cisco Switch...........................
Tertiary Cisco Switch............................
Administrative State ............................
Operation State .................................
Mirroring Mode ..................................
AP Mode .........................................
Remote AP Debug .................................
S/W Version ....................................
Boot Version ...................................
Stats Reporting Period ..........................
LED State........................................
ILP Pre Standard Switch..........................
ILP Power Injector...............................
Number Of Slots..................................
AP Model.........................................
AP Serial Number.................................
AP Certificate Type..............................
Attributes for Slot 1
Radio Type...................................
Administrative State ........................
Operation State .............................
CellId ......................................
Station Configuration
Configuration .............................
Number Of WLANs ...........................
Medium Occupancy Limit ....................
CFP Period ................................
CFP MaxDuration ...........................
BSSID .....................................
Operation Rate Set
1000 Kilo Bits...........................
2000 Kilo Bits...........................
5500 Kilo Bits...........................
11000 Kilo Bits..........................
6000 Kilo Bits...........................
9000 Kilo Bits...........................
12000 Kilo Bits..........................
18000 Kilo Bits..........................
24000 Kilo Bits..........................
36000 Kilo Bits..........................
48000 Kilo Bits..........................
54000 Kilo Bits..........................
Beacon Period .............................
DTIM Period ...............................
Fragmentation Threshold ...................
Multi Domain Capability Implemented .......
Multi Domain Capability Enabled ...........
Country String ............................
Multi Domain Capability
Configuration .............................
First Chan Num ............................
Number Of Channels ........................
MAC Operation Parameters
Configuration .............................
RTS Threshold .............................
Short Retry Limit .........................
Long Retry Limit ..........................
Fragmentation Threshold ...................
Maximum Tx MSDU Life Time .................
Maximum Rx Life Time.......................
Tx Power
Num Of Supported Power Levels..............
Tx Power Level 1 ..........................
Tx Power Level 2...........................
Tx Power Level 3...........................
Tx Power Level 4...........................
Tx Power Level 5...........................
Tx Power Configuration.....................
255.255.255.0
1.100.49.1
default-location
default-group
Cisco_32:ab:63
ADMIN_ENABLED
REGISTERED
Disabled
Local
Disabled
3.1.61.0
1.2.59.6
180
Enabled
Disabled
Disabled
2
AS-1200
044110223A
Manufacture Installed
RADIO_TYPE_80211g
ADMIN_ENABLED
UP
0
AUTOMATIC
1
100
4
60
00:0b:85:18:b6:50
MANDATORY
MANDATORY
MANDATORY
MANDATORY
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
100
1
2346
TRUE
TRUE
US
AUTOMATIC
1
11
AUTOMATIC
2347
7
4
2346
512
512
5
17 dBm
14 dBm
11 dBm
8 dBm
5 dBm
CUSTOMIZED
OL-31334-01
show Commands
5
CUSTOMIZED
1
-50
CUSTOMIZED
ENABLED
INTERNAL_ANTENNA
11
DIVERSITY_ENABLED
AUTOMATIC
10%
-70 dBm
80%
1000000 bps
12 clients
12 dB
25%
3 clients
0
The following example shows how to display the general configuration of a Cisco access point:
> show ap config general cisco-ap
Cisco AP Identifier..............................
Cisco AP Name....................................
Country code.....................................
Regulatory Domain allowed by Country.............
AP Country code..................................
AP Regulatory Domain.............................
Switch Port Number ..............................
MAC Address......................................
IP Address Configuration.........................
IP Address.......................................
IP NetMask.......................................
CAPWAP Path MTU..................................
Domain...........................................
Name Server......................................
Telnet State.....................................
Ssh State........................................
Cisco AP Location................................
Cisco AP Group Name..............................
Primary Cisco Switch Name........................
Primary Cisco Switch IP Address..................
Secondary Cisco Switch Name......................
Secondary Cisco Switch IP Address................
Tertiary Cisco Switch Name.......................
Tertiary Cisco Switch IP Address.................
Administrative State ............................
Operation State .................................
Mirroring Mode ..................................
AP Mode .........................................
Public Safety ...................................
AP subMode ......................................
Remote AP Debug .................................
S/W Version ....................................
Boot Version ...................................
Mini IOS Version ................................
Stats Reporting Period ..........................
LED State........................................
PoE Pre-Standard Switch..........................
PoE Power Injector MAC Addr......................
Power Type/Mode..................................
Number Of Slots..................................
AP Model.........................................
IOS Version......................................
Reset Button.....................................
AP Serial Number.................................
AP Certificate Type..............................
Management Frame Protection Validation...........
9
cisco-ap
US - United States
802.11bg:-A 802.11a:-A
US - United States
802.11bg:-A 802.11a:-A
1
12:12:12:12:12:12
DHCP
10.10.10.21
255.255.255.0
1485
Disabled
Disabled
default location
default-group
4404
10.10.10.32
Not Configured
4404
3.3.3.3
ADMIN_ENABLED
REGISTERED
Disabled
Local
Global: Disabled, Local: Disabled
WIPS
Disabled
5.1.0.0
12.4.10.0
0.0.0.0
180
Enabled
Enabled
Disabled
PoE/Low Power (degraded mode)
2
AIR-LAP1252AG-A-K9
12.4(10:0)
Enabled
serial_number
Manufacture Installed
Enabled (Global MFP Disabled)
1355
show Commands
OL-31334-01
show Commands
Syntax Description
Command History
Examples
Release
Modification
8.0
1357
show Commands
AP Model......................................... AIR-LAP1142N-A-K9
AP Image......................................... C1140-K9W8-M
IOS Version...................................... 15.3(20140302:180954)$
Reset Button..................................... Enabled
AP Serial Number................................. FGL1510S3VZ
AP Certificate Type.............................. Manufacture Installed
AP User Mode..................................... AUTOMATIC
AP User Name..................................... cisco
AP Dot1x User Mode............................... Not Configured
AP Dot1x User Name............................... Not Configured
Cisco AP system logging host..................... 255.255.255.255
AP Up Time....................................... 0 days, 18 h 43 m 35 s
AP LWAPP Up Time................................. 0 days, 18 h 42 m 23 s
Join Date and Time............................... Wed Mar 5 07:26:07 2014
Join Taken Time.................................. 0 days, 00 h 01 m 11 s
Memory Type...................................... DDR3
Memory Size...................................... 98294 KBytes
CPU Type......................................... PowerPC405ex CPU at 586Mhz, revision
number 0x147E
Flash Type....................................... Onboard Flash
Flash Size....................................... 31374 KBytes
GPS Present...................................... NO
Ethernet Vlan Tag................................ Disabled
Ethernet Port Duplex............................. Auto
Ethernet Port Speed.............................. Auto
AP Link Latency.................................. Disabled
Rogue Detection.................................. Enabled
AP TCP MSS Adjust................................ Disabled
Hotspot Venue Group.............................. Unspecified
Hotspot Venue Type............................... Unspecified
DNS server IP ............................. Not Available
OL-31334-01
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
The following example shows how to display global syslog server settings:
> show ap config global
AP global system logging host.............................. 255.255.255.255
1359
show Commands
show ap core-dump
To display the memory core dump information for a lightweight access point, use the show ap core-dump
command.
show ap core-dump cisco_ap
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to display memory core dump information:
> show ap core-dump AP02
Memory core dump is disabled.
OL-31334-01
show Commands
show ap crash-file
To display the list of both crash and radio core dump files generated by lightweight access points, use the
show ap crash-file command.
show ap crash-file
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the crash file generated by the access point:
> show ap crash-file
1361
show Commands
show ap data-plane
To display the data plane status for all access points or a specific access point, use the show ap data-plane
command.
show ap data-plane {all | cisco_ap}
Syntax Description
Command Default
Command History
Examples
all
cisco_ap
None
Release
Modification
7.6
The following example shows how to display the data plane status of all access points:
> show ap data-plane all
Min Data
Data
Max Data
Last
AP Name
Round Trip
Round Trip
------------------ -------------- -------------1130
0.000s
0.000s
1240
0.000s
0.000s
Round Trip
Update
-------------- -----0.002s
18:51:23
0.000s
18:50:45
OL-31334-01
show Commands
show ap dtls-cipher-suite
To display the DTLS show cipher suite information, use the show ap dtls-cipher-suite command.
show ap dtls-cipher-suite
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
8.0
The following example shows how to display DTLS cipher suite information:
(Cisco Controller) > show ap dtls-cipher-suite
DTLS Cipher Suite................................ RSA-AES256-SHA
1363
show Commands
Syntax Description
Command Default
Command History
summary
Displays the VLAN tagging information for all access points associated to the
controller.
cisco_ap
Name of the Cisco lightweight access point. Displays the VLAN tagging
information for a specific access point associated to the controller.
None
Release
Modification
7.6
Usage Guidelines
If the access point is unable to route traffic or reach the controller using the specified trunk VLAN, it falls
back to the untagged configuration. If the access point joins the controller using this fallback configuration,
the controller sends a trap to a trap server such as the WCS, which indicates the failure of the trunk VLAN.
In this scenario, the "Failover to untagged" message appears in show command output.
Examples
The following example shows how to display the VLAN tagging information for all access points associated
to the controller:
> show ap ethernet tag summary
AP Name
-----------------AP2
charan.AP1140.II
OL-31334-01
show Commands
show ap eventlog
To display the contents of the event log file for an access point that is joined to the controller, use the show ap
eventlog command.
show ap eventlog ap_name
Syntax Description
Command Default
Command History
Examples
ap_name
None
Release
Modification
7.6
The following example shows how to display the event log of an access point:
> show ap eventlog ciscoAP
AP event log download has been initiated
Waiting for download to complete
AP event log download completed.
======================= AP Event log Contents =====================
*Feb 13 11:54:17.146: %CAPWAP-3-CLIENTEVENTLOG: AP event log has been cleared from the
contoller 'admin'
*Feb 13 11:54:32.874: *** Access point reloading. Reason: Reload Command ***
*Mar 1 00:00:39.134: %CDP_PD-4-POWER_OK: Full power - NEGOTIATED inline power source
*Mar 1 00:00:39.174: %LINK-3-UPDOWN: Interface Dot11Radio1, changed state to up
*Mar 1 00:00:39.211: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
*Mar 1 00:00:49.947: %CAPWAP-3-CLIENTEVENTLOG: Did not get vendor specific options from
DHCP.
...
1365
show Commands
show ap image
To display the detailed information about the predownloaded image for specified access points, use the show
ap image command.
show ap image {cisco_ap | all}
Syntax Description
Note
Command History
cisco_ap
all
If you have an AP that has the name all, it conflicts with the keyword all that specifies all access points.
In this scenario, the keyword all takes precedence over the AP that is named all.
Release
Modification
7.6
OL-31334-01
show Commands
show ap inventory
To display inventory information for an access point, use the show ap inventory command.
show ap inventory ap_name
Syntax Description
Command Default
Command History
Examples
ap_name
None
Release
Modification
7.6
The following example shows how to display the inventory of an access point:
> show ap inventory test101
NAME: "test101"
, DESCR: "Cisco Wireless Access Point"
PID: AIR-LAP1131AG-A-K9 , VID: V01, SN: FTX1123T2XX
1367
show Commands
Syntax Description
Command Default
Command History
Examples
ap_mac
Access point Ethernet MAC address or the MAC address of the 802.11 radio
interface.
None
Release
Modification
7.6
The following example shows how to display join information for a specific access point trying to join the
controller:
> show ap join stats detailed 00:0b:85:02:0d:20
Discovery phase statistics
- Discovery requests received.......................... 2
- Successful discovery responses sent.................. 2
- Unsuccessful discovery request processing............ 0
- Reason for last unsuccessful discovery attempt....... Not applicable
- Time at last successful discovery attempt............ Aug 21 12:50:23:335
- Time at last unsuccessful discovery attempt.......... Not applicable
Join phase statistics
- Join requests received............................... 1
- Successful join responses sent....................... 1
- Unsuccessful join request processing................. 1
- Reason for last unsuccessful join attempt.............RADIUS authorization is pending for
the AP
- Time at last successful join attempt................. Aug 21 12:50:34:481
- Time at last unsuccessful join attempt............... Aug 21 12:50:34:374
Configuration phase statistics
- Configuration requests received...................... 1
- Successful configuration responses sent.............. 1
- Unsuccessful configuration request processing........ 0
- Reason for last unsuccessful configuration attempt... Not applicable
- Time at last successful configuration attempt........ Aug 21 12:50:34:374
- Time at last unsuccessful configuration attempt...... Not applicable
Last AP message decryption failure details
- Reason for last message decryption failure........... Not applicable
Last AP disconnect details
- Reason for last AP connection failure................ Not applicable
Last join error summary
- Type of error that occurred last..................... Lwapp join request rejected
- Reason for error that occurred last.................. RADIUS authorization is pending for
the AP
- Time at which the last join error occurred........... Aug 21 12:50:34:374
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
ap_mac
Access point Ethernet MAC address or the MAC address of the 802.11 radio
interface.
None
Release
Modification
7.6
Usage Guidelines
To obtain the MAC address of the 802.11 radio interface, enter the show interface command on the access
point.
Examples
The following example shows how to display specific join information for an access point:
> show ap join stats summary 00:0b:85:02:0d:20
Is the AP currently connected to controller..........................
Time at which the AP joined this controller last time................
Type of error that occurred last.....................................
rejected
Reason for error that occurred last..................................
is pending for the AP
Time at which the last join error occurred...........................
No
Aug 21 12:50:36:061
Lwapp join request
RADIUS authorization
Aug 21 12:50:34:374
1369
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of join information for all access points:
> show ap join stats summary all
Number of APs.............................................. 4
Base Mac
AP EthernetMac
AP Name
IP Address
00:0b:85:57:bc:c0
00:0b:85:57:bc:c0
AP1130
10.10.163.217
00:1c:0f:81:db:80
00:1c:63:23:ac:a0
AP1140
10.10.163.216
00:1c:0f:81:fc:20
00:1b:d5:9f:7d:b2
AP1
10.10.163.215
00:21:1b:ea:36:60
00:0c:d4:8a:6b:c1
AP2
10.10.163.214
Status
Joined
Not joined
Joined
Not joined
OL-31334-01
show Commands
show ap led-state
To view the LED state of all access points or a specific access point, use the show ap led-state command.
show ap led-state {all | cisco_ap}
Syntax Description
Command Default
Command History
Examples
all
cisco_ap
Release
Modification
7.6
The following example shows how to get the LED state of all access points:
> show ap led-state all
Global LED State: Enabled (default)
1371
show Commands
show ap led-flash
To display the LED flash status of an access point, use the show ap led-flash command.
show ap led-flash cisco_ap
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to display the LED flash status of an access point:
> show ap led-flash
OL-31334-01
show Commands
show ap link-encryption
To display the MAC addresses of all the access points that are joined to the controller or that have tried to
join, use the show ap link-encryption command.
show ap link-encryption {all | cisco_ap}
Syntax Description
Command Default
Command History
Examples
all
cisco_ap
None
Release
Modification
7.6
The following example shows how to display the link encryption status of all access points:
> show ap link-encryption all
Encryption Dnstream
AP Name
State
Count
------------------ --- -------1240
Dis
4406
1130
En
2484
Upstream
Count
-------237553
276308
Last
Update
-----Never
19:31
1373
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.5
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display current channel-optimized monitor mode settings:
> show ap monitor-mode summary
AP Name
Ethernet MAC
Status
Scanning Channel List
--- ----------------- ---------- ---------------------AP_004
xx:xx:xx:xx:xx:xx Tracking
1, 6, 11, 4
1375
show Commands
Syntax Description
Command History
Usage Guidelines
Release
Modification
7.6
Examples
The following example shows how to display the access point Packet Capture configurations:
> show ap packet-dump status
Packet Capture Status............................
FTP Server IP Address............................
FTP Server Path..................................
FTP Server Username..............................
FTP Server Password..............................
Buffer Size for Capture..........................
Packet Capture Time..............................
Packet Truncate Length...........................
Packet Capture Classifier........................
Stopped
0.0.0.0
********
2048 KB
45 Minutes
Unspecified
None
OL-31334-01
show Commands
Command Default
Command Modes
Command History
Release
Modification
Task ID
Operation
Usage Guidelines
Task ID
Examples
1377
show Commands
show ap retransmit
To display access point control packet retransmission parameters, use theshow ap retransmit command.
show ap retransmit {all | cisco_ap}
Syntax Description
Command Default
Command History
Examples
all
cisco_ap
None
Release
Modification
7.6
The following example shows how to display the control packet retransmission parameters of all access points
on a network:
> show ap retransmit all
Global control packet retransmit interval: 3 (default)
Global control packet retransmit count: 5 (default)
AP Name
Retransmit Interval Retransmit count
------------------ ------------------- ------------------AP_004
3 (default)
5 (WLC default),5 (AP default)
OL-31334-01
show Commands
show ap stats
To display the statistics for a Cisco lightweight access point, use the show ap stats command.
show ap stats {802.11{a | b} | wlan | ethernet summary} cisco_ap [tsm {client_mac | all}]
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b
wlan
ethernet
summary
cisco_ap
tsm
client_mac
all
None
Release
Modification
7.6
8.0
The following example shows how to display statistics of an access point for the 802.11b network:
> show ap stats 802.11a Ibiza
Number Of Slots..................................
AP Name..........................................
MAC Address......................................
Radio Type.......................................
Stats Information
Number of Users................................
TxFragmentCount................................
MulticastTxFrameCnt............................
2
Ibiza
44:2b:03:9a:8a:73
RADIO_TYPE_80211a
0
84628
84628
1379
show Commands
FailedCount....................................
RetryCount.....................................
MultipleRetryCount.............................
FrameDuplicateCount............................
RtsSuccessCount................................
RtsFailureCount................................
AckFailureCount................................
RxIncompleteFragment...........................
MulticastRxFrameCnt............................
FcsErrorCount..................................
TxFrameCount...................................
WepUndecryptableCount..........................
TxFramesDropped................................
OEAP WMM Stats :
Best Effort:
Tx Frame Count...............................
Tx Failed Frame Count........................
Tx Expired Count.............................
Tx Overflow Count............................
Tx Queue Count...............................
Tx Queue Max Count...........................
Rx Frame Count...............................
Rx Failed Frame Count........................
Background:
Tx Frame Count...............................
Tx Failed Frame Count........................
Tx Expired Count.............................
Tx Overflow Count............................
Tx Queue Count...............................
Tx Queue Max Count...........................
Rx Frame Count...............................
Rx Failed Frame Count........................
Video:
Tx Frame Count...............................
Tx Failed Frame Count........................
Tx Expired Count.............................
Tx Overflow Count............................
Tx Queue Count...............................
Tx Queue Max Count...........................
Rx Frame Count...............................
Rx Failed Frame Count........................
Voice:
Tx Frame Count...............................
Tx Failed Frame Count........................
Tx Expired Count.............................
Tx Overflow Count............................
Tx Queue Count...............................
Tx Queue Max Count...........................
Rx Frame Count...............................
Rx Failed Frame Count........................
Rate Limiting Stats:
Wlan 1:
Number of Data Packets Received..............
Number of Data Rx Packets Dropped............
Number of Data Bytes Received................
Number of Data Rx Bytes Dropped..............
Number of Realtime Packets Received..........
Number of Realtime Rx Packets Dropped........
Number of Realtime Bytes Received............
Number of Realtime Rx Bytes Dropped..........
Number of Data Packets Sent..................
Number of Data Tx Packets Dropped............
Number of Data Bytes Sent....................
Number of Data Tx Bytes Dropped..............
Number of Realtime Packets Sent..............
Number of Realtime Tx Packets Dropped........
Number of Realtime Bytes Sent................
Number of Realtime Tx Bytes Dropped..........
Call Admission Control (CAC) Stats
Voice Bandwidth in use(% of config bw).........
Voice Roam Bandwidth in use(% of config bw)....
Total channel MT free........................
0
0
0
0
1
0
0
0
0
20348857
84628
19907
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
592
160
160783
0
592
0
160783
0
131
0
23436
0
131
0
23436
0
0
0
0
OL-31334-01
show Commands
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1381
show Commands
show ap summary
To display a summary of all lightweight access points attached to the controller, use the show ap summary
command.
show ap summary [cisco_ap]
Syntax Description
Command Default
Command History
cisco_ap
None
Release
Modification
7.6
Usage Guidelines
A list that contains each lightweight access point name, number of slots, manufacturer, MAC address, location,
and the controller port number appears. When you specify
Examples
The following example shows how to display a summary of all connected access points:
> show
Number
Global
Global
Number
Global
Global
ap
of
AP
AP
of
AP
AP
summary
APs.................................... 2
username.............................. user
Dot1x username........................ Not Configured
APs.................................... 2
username.............................. user
Dot1x username........................ Not Configured
AP Name
Slots AP Model
Ethernet MAC
Location
Country IP Address
Clients
------------------ ----- -------------------- ----------------- ---------------- --------------------- ------AP1140
2
AIR-LAP1142N-A-K9
f0:f7:55:75:f3:29
default
location
US
192.168.0.0
0
Access Points using IPv6 transport:
AP Name
Slots
AP Model
Ethernet MAC
Location
Country
IPv6
Address
Clients
------------------ ----- ------------------------------------- ----------------------------- ----- ---------------------------- -----AP1040
2
AIR-LAP1042N-A-K9
00:40:96:b9:4b:89
default location US
2001:DB8:0:1::1
0
OL-31334-01
show Commands
show ap tcp-mss-adjust
To display the Basic Service Set Identifier (BSSID) value for each WLAN defined on an access point, use
the show ap tcp-mss-adjust command.
show ap tcp-mss-adjust {cisco_ap | all}
Syntax Description
Note
Command History
Examples
cisco_ap
all
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
Release
Modification
7.6
The following example shows how to display Transmission Control Protocol (TCP) maximum segment size
(MSS) information of all access points:
> show ap tcp-mss-adjust all
AP Name
TCP State
------------------ --------AP-1140
enabled
AP-1240
disabled
AP-1130
disabled
MSS Size
------536
-
1383
show Commands
show ap wlan
To display the Basic Service Set Identifier (BSSID) value for each WLAN defined on an access point, use
the show ap wlan command.
show ap wlan 802.11{a | b} cisco_ap
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b
ap_name
None
Release
Modification
7.6
The following example shows how to display BSSIDs of an access point for the 802.11b network:
> show ap wlan 802.11b AP01
Site Name........................................ MY_AP_GROUP1
Site Description................................. MY_AP_GROUP1
WLAN ID
Interface
BSSID
-----------------------------------------1
management
00:1c:0f:81:fc:20
2
dynamic
00:1c:0f:81:fc:21
OL-31334-01
show Commands
show auth-list
To display the access point authorization list, use the show auth-list command.
show auth-list
Syntax Description
Command History
Examples
Release
Modification
7.6
The following example shows how to display the access point authorization list:
> show auth-list
Authorize APs against AAA...................... disabled
Allow APs with Self-signed Certificate (SSC)... disabled
Mac Addr
Cert Type
Key Hash
------------------------------------------------------------------------xx:xx:xx:xx:xx:xx
MIC
1385
show Commands
show client ap
To display the clients on a Cisco lightweight access point, use the show client ap command.
show client ap 802.11{a | b} cisco_ap
Syntax Description
802.11a
802.11b
cisco_ap
Command Default
None.
Usage Guidelines
The show client ap command may list the status of automatically disabled clients. Use the show exclusionlist
command to view clients on the exclusion list (blacklisted).
Examples
Related Commands
WLAN Id
--------1
Authenticated
------------No
OL-31334-01
show Commands
show boot
To display the primary and backup software build numbers with an indication of which is active, use the show
boot command.
show boot
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
Each Cisco wireless LAN controller retains one primary and one backup operating system software load in
nonvolatile RAM to allow controllers to boot off the primary load (default) or revert to the backup load when
desired.
Examples
Related Commands
config boot
1387
show Commands
show call-control ap
Note
The show call-control ap command is applicable only for SIP based calls.
To see the metrics for successful calls or the traps generated for failed calls, use the show call-control ap
command.
show call-control ap {802.11a | 802.11b} cisco_ap {metrics | traps}
Syntax Description
Command Default
Command History
Usage Guidelines
802.11a
802.11b
cisco_ap
metrics
traps
None
Release
Modification
7.6
To aid in troubleshooting, the output of this command shows an error code for any failed calls. This table
explains the possible error codes for failed calls.
Table 13: Error Codes for Failed VoIP Calls
Description
unknown
Unknown error.
400
badRequest
401
unauthorized
402
paymentRequired
403
forbidden
OL-31334-01
show Commands
Description
404
notFound
The server has information that the user does not exist at the
domain specified in the Request-URI.
405
methodNotallowed
406
notAcceptable
407
proxyAuthenticationRequired
408
requestTimeout
409
conflict
410
gone
411
lengthRequired
413
requestEntityTooLarge
414
requestURITooLarge
415
unsupportedMediaType
420
badExtension
480
temporarilyNotAvailable
481
callLegDoesNotExist
The UAS received a request that does not match any existing
dialog or transaction.
482
loopDetected
1389
show Commands
Description
483
tooManyHops
484
addressIncomplete
485
ambiguous
486
busy
500
internalServerError
501
notImplemented
502
badGateway
503
serviceUnavailable
504
serverTimeout
505
versionNotSupported
600
busyEverywhere
603
decline
604
doesNotExistAnywhere
606
notAcceptable
OL-31334-01
show Commands
Examples
The following is a sample output of the show call-controller ap command that displays successful calls
generated for an access point:
(Cisco Controller) >show call-control ap 802.11a Cisco_AP metrics
Total Call Duration in Seconds................... 120
Number of Calls.................................. 10
Number of calls for given client is................. 1
The following is a sample output of the show call-control ap command that displays metrics of traps generated
for an AP.
(Cisco Controller) >show call-control ap 802.11a Cisco_AP traps
Number of traps sent in one min.................. 2
Last SIP error code.............................. 404
Last sent trap timestamp...................... Jun 20 10:05:06
1391
show Commands
show country
To display the configured country and the radio types that are supported, use the show country command.
show country
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the configured countries and supported radio types:
> show country
Configured Country............................. United States
Configured Country Codes
US - United States............................. 802.11a / 802.11b / 802.11g
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the auto-RF channels for the configured countries:
> show country channels
Configured Country............................. United States
KEY: * = Channel is legal in this country and may be configured manually.
Configured Country............................. United States
KEY: * = Channel is legal in this country and may be configured manually.
A = Channel is the Auto-RF default in this country.
. = Channel is not legal in this country.
C = Channel has been configured for use by Auto-RF.
x = Channel is available to be configured for use by Auto-RF.
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+802.11BG :
Channels :
1 1 1 1 1
: 1 2 3 4 5 6 7 8 9 0 1 2 3 4
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+US : A * * * * A * * * * A . . .
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+802.11A : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Channels : 3 3 3 4 4 4 4 4 5 5 6 6 0 0 0 1 1 2 2 2 3 3 4 4 5 5 6 6
: 4 6 8 0 2 4 6 8 2 6 0 4 0 4 8 2 6 0 4 8 2 6 0 9 3 7 1 5
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+US : . A . A . A . A A A A A * * * * * . . . * * * A A A A *
---------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
1393
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a list of all the supported countries:
> show country supported
Configured Country............................. United States
Supported Country Codes
AR - Argentina................................. 802.11a / 802.11b
AT - Austria................................... 802.11a / 802.11b
AU - Australia................................. 802.11a / 802.11b
BR - Brazil.................................... 802.11a / 802.11b
BE - Belgium................................... 802.11a / 802.11b
BG - Bulgaria.................................. 802.11a / 802.11b
CA - Canada.................................... 802.11a / 802.11b
CH - Switzerland............................... 802.11a / 802.11b
CL - Chile.....................................
802.11b
CN - China..................................... 802.11a / 802.11b
CO - Colombia..................................
802.11b
CY - Cyprus.................................... 802.11a / 802.11b
CZ - Czech Republic............................ 802.11a / 802.11b
DE - Germany................................... 802.11a / 802.11b
DK - Denmark................................... 802.11a / 802.11b
EE - Estonia................................... 802.11a / 802.11b
ES - Spain..................................... 802.11a / 802.11b
FI - Finland................................... 802.11a / 802.11b
FR - France.................................... 802.11a / 802.11b
GB - United Kingdom............................ 802.11a / 802.11b
GI - Gibraltar................................. 802.11a / 802.11b
GR - Greece.................................... 802.11a / 802.11b
HK - Hong Kong................................. 802.11a / 802.11b
HU - Hungary................................... 802.11a / 802.11b
ID - Indonesia.................................
802.11b
IE - Ireland................................... 802.11a / 802.11b
IN - India..................................... 802.11a / 802.11b
IL - Israel.................................... 802.11a / 802.11b
ILO - Israel (outdoor)..........................
802.11b
IS - Iceland................................... 802.11a / 802.11b
IT - Italy..................................... 802.11a / 802.11b
JP - Japan (J)................................. 802.11a / 802.11b
J2 - Japan 2(P)................................ 802.11a / 802.11b
J3 - Japan 3(U)................................ 802.11a / 802.11b
KR - Korea Republic (C)........................ 802.11a / 802.11b
KE - Korea Extended (K)........................ 802.11a / 802.11b
LI - Liechtenstein............................. 802.11a / 802.11b
/
/
/
/
/
/
/
/
/
/
/
/
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
OL-31334-01
show Commands
LT
LU
LV
MC
MT
MX
MY
NL
NZ
NO
PA
PE
PH
PL
PT
RU
RO
SA
SE
SG
SI
SK
TH
TR
TW
UA
US
USL
USX
VE
ZA
Lithuania.................................
Luxembourg................................
Latvia....................................
Monaco....................................
Malta.....................................
Mexico....................................
Malaysia..................................
Netherlands...............................
New Zealand...............................
Norway....................................
Panama....................................
Peru......................................
Philippines...............................
Poland....................................
Portugal..................................
Russian Federation........................
Romania...................................
Saudi Arabia..............................
Sweden....................................
Singapore.................................
Slovenia..................................
Slovak Republic...........................
Thailand..................................
Turkey....................................
Taiwan....................................
Ukraine...................................
United States.............................
United States (Legacy)....................
United States (US + chan165)..............
Venezuela.................................
South Africa..............................
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
/
/
/
/
/
/
/
/
/
/
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
/
/
/
/
/
/
/
/
/
/
802.11a
802.11a
802.11a
802.11a
802.11a
/
/
/
/
/
802.11a /
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
802.11g
1395
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Local Port
------------Capwap_Ctrl
Capwap_Data
Capwap_Ctrl
Peer IP
--------------1.100.163.210
1.100.163.210
1.100.163.209
Peer Port
------------23678
23678
59674
Ciphersuite
----------------------TLS_RSA _WITH_AES_128_CBC_SHA
TLS_RSA _WITH_AES_128_CBC_SHA
TLS_RSA _WITH_AES_128_CBC_SHA
OL-31334-01
show Commands
show known ap
To display known Cisco lightweight access point information, use the show known ap command.
show known ap {summary | detailed MAC}
Syntax Description
Command Default
Command History
Examples
summary
detailed
MAC
None
Release
Modification
7.6
The following example shows how to display a summary of all known access points:
> show known ap summary
MAC Address
State
---------------------
# APs
-----
# Clients
--------
Last Heard
-----------------
1397
show Commands
Syntax Description
Command Default
Command History
Examples
ap
wlc
summary
None
Release
Modification
7.6
The following example show the output of the show ipv6 ra-guard ap summary command:
(Cisco Controller) >show ipv6 ra-guard ap summary
IPv6 RA Guard on AP..................... Enabled
RA Dropped per client:
MAC Address
AP Name
WLAN/GLAN
Number of RA Dropped
----------------- ----------------- -------------- --------------------00:40:96:b9:4b:89 Bhavik_1130_1_p13 2
19
----------------- ----------------- -------------- --------------------Total RA Dropped on AP......................
19
The following example shows how to display the RA guard statistics for a controller:
(Cisco Controller) >show ipv6 ra-guard wlc summary
IPv6 RA Guard on WLC.................... Enabled
OL-31334-01
show Commands
show msglog
To display the message logs written to the Cisco WLC database, use the show msglog command.
show msglog
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
If there are more that 15 entries, you are prompted to display the messages shown in the example.
Examples
1399
show Commands
Syntax Description
Command Default
None.
Examples
RF
Disable
Enable
Disable
Disable
Disable
Disabled
Enable
Enable
Disable
Mode: Ucast
Disable
Disable
Disable
Unicast
Disabled
60 seconds
20 seconds
Disabled
60 seconds
20 seconds
300 seconds
Disable
300 seconds
Disabled
Disable
Disable
Disable
Enable
EAP
Enable
Disable
Enable
Disable
Disabled
80
Disable
Disable
Enable
Disabled
Enabled
Enabled
Disable
Disable
Enable
Disabled
15 minutes
Red
OL-31334-01
show Commands
Related Commands
config network
show network multicast mgid summary
show network multicast mgid detail
show network
1401
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the redundancy summary information of the controller:
> show redundancy summary
Redundancy Mode = SSO DISABLED
Local State = ACTIVE
Peer State = N/A
Unit = Primary
Unit ID = 88:43:E1:7E:03:80
Redundancy State = N/A
Mobility MAC = 88:43:E1:7E:03:80
Network Monitor = ENABLED
Link Encryption = DISABLED
BulkSync Status = <Status>
Average Redundancy Peer Reachability Latency = 1390 usecs
Average Management Gateway Reachability Latency = 1165 usecs
Redundancy Management IP Address.................
Peer Redundancy Management IP Address............
Redundancy Port IP Address.......................
Peer Redundancy Port IP Address..................
9.4.92.12
9.4.92.14
169.254.92.12
169.254.92.14
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the average latency to reach the management gateway and the
peer redundancy management IP address:
> show redundancy latency
Network Latencies (RTT) for the Peer Reachability on the Redundancy Port in micro seconds
for the past 10 intervals
Peer Reachability Latency[ 1 ]
: 524 usecs
Peer Reachability Latency[ 2 ]
: 524 usecs
Peer Reachability Latency[ 3 ]
: 522 usecs
Peer Reachability Latency[ 4 ]
: 526 usecs
Peer Reachability Latency[ 5 ]
: 524 usecs
Peer Reachability Latency[ 6 ]
: 524 usecs
Peer Reachability Latency[ 7 ]
: 522 usecs
Peer Reachability Latency[ 8 ]
: 522 usecs
Peer Reachability Latency[ 9 ]
: 526 usecs
Peer Reachability Latency[ 10 ]
: 523 usecs
Network
past 10
Gateway
Gateway
Gateway
Gateway
Gateway
Gateway
Gateway
Gateway
Gateway
Gateway
Latencies (RTT) for the Management Gateway Reachability in micro seconds for the
intervals
Reachability Latency[ 1 ]
: 1347 usecs
Reachability Latency[ 2 ]
: 2427 usecs
Reachability Latency[ 3 ]
: 1329 usecs
Reachability Latency[ 4 ]
: 2014 usecs
Reachability Latency[ 5 ]
: 2675 usecs
Reachability Latency[ 6 ]
: 731 usecs
Reachability Latency[ 7 ]
: 1882 usecs
Reachability Latency[ 8 ]
: 2853 usecs
Reachability Latency[ 9 ]
: 832 usecs
Reachability Latency[ 10 ]
: 3708 usecs
1403
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the redundancy and service port IP addresses information:
> show redundancy interfaces
Redundancy Management IP Address.................
Peer Redundancy Management IP Address............
Redundancy Port IP Address.......................
Peer Redundancy Port IP Address..................
Peer Service Port IP Address.....................
9.4.120.5
9.4.120.3
169.254.120.5
169.254.120.3
10.104.175.189
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the HA mobility MAC address used to communicate with the
peer:
> show redundancy mobilitymac
ff:ff:ff:ff:ff:ff
1405
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display all the configured routes of the standby WLC:
> show redundancy peer-route summary
Number of Routes................................. 1
Destination Network
------------------xxx.xxx.xxx.xxx
Netmask
------------------255.255.255.0
Gateway
------------------xxx.xxx.xxx.xxx
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Usage Guidelines
Release
Modification
7.6
Examples
The following example shows how to display the statistics information of the Redundancy Manager:
> show redundancy statistics
Redundancy Manager Statistics
Keep Alive Request Send Counter
Keep Alive Response Receive Counter
: 16
: 16
: 500322
: 500322
: 63360
: 63360
: 12
: 3
: 0
: 0
: 10000000
: 10000000
1407
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the details of the Redundancy Manager timers:
> show redundancy timers
Keep Alive Timer
: 100 msecs
: 120 secs
OL-31334-01
show Commands
show watchlist
To display the client watchlist, use the show watchlist command.
show watchlist
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the client watchlist information:
> show watchlist
client watchlist state is disabled
1409
capwap ap Commands
capwap ap Commands
Use the capwap ap commands to configure CAPWAP access point settings.
OL-31334-01
capwap ap Commands
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
A.B.C.D
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command is applicable for IPv4
addresses only.
The access point must be running Cisco IOS Release 12.3(11)JX1 or later releases.
The following example shows how to configure the controller IP address 10.23.90.81 into the CAPWAP
access point:
ap_console >capwap ap controller ip address 10.23.90.81
1411
capwap ap Commands
capwap ap dot1x
To configure the dot1x username and password into the CAPWAP access point from the access points console
port, use the capwap ap dot1x command.
capwap ap dot1x username user_name password password
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
user_name
Dot1x username.
password
Dot1x password.
None
Release
Modification
7.6
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
This example shows how to configure the dot1x username ABC and password pass01:
ap_console >capwap ap dot1x username ABC password pass01
OL-31334-01
capwap ap Commands
capwap ap hostname
To configure the access point host name from the access points console port, use the capwap ap hostname
command.
capwap ap hostname host_name
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
host_name
None
Release
Modification
7.6
The access point must be running Cisco IOS Release 12.3(11)JX1 or later releases. This command is
available only for the Cisco Lightweight AP IOS Software recovery image (rcvk9w8) without any
private-config. You can remove the private-config by using the clear capwap private-config command.
This example shows how to configure the hostname WLC into the capwap access point:
ap_console >capwap ap hostname WLC
1413
capwap ap Commands
capwap ap ip address
To configure the IP address into the CAPWAP access point from the access points console port, use the
capwap ap ip address command.
capwap ap ip address A.B.C.D
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
A.B.C.D
IP address.
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command supports only IPv4 address
format.
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
This example shows how to configure the IP address 10.0.0.1 into CAPWAP access point:
ap_console >capwap ap ip address 10.0.0.1
OL-31334-01
capwap ap Commands
capwap ap ip default-gateway
To configure the default gateway from the access points console port, use the capwap ap ip default-gateway
command.
capwap ap ip default-gateway A.B.C.D
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
A.B.C.D
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command supports only IPv4 address
format.
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
This example shows how to configure the CAPWAP access point with the default gateway address 10.0.0.1:
ap_console >capwap ap ip default-gateway 10.0.0.1
1415
capwap ap Commands
capwap ap log-server
To configure the system log server to log all the CAPWAP errors, use the capwap ap log-server command.
capwap ap log-server A.B.C.D
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
A.B.C.D
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command supports only IPv4 address
format.
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
This example shows how to configure the syslog server with the IP address 10.0.0.1:
ap_console >capwap ap log-server 10.0.0.1
OL-31334-01
capwap ap Commands
capwap ap mode
To configure the local or bridge mode on the access point, use the capwap ap mode command.
capwap ap mode local | bridge
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
local
bridge
None
Release
Modification
8.0
The following example shows how to configure an access point in bridge mode:
ap_console #capwap ap mode bridge
1417
capwap ap Commands
capwap ap primary-base
To configure the primary controller name and IP address into the CAPWAP access point from the access
points console port, use the capwap ap primary-base command.
capwap ap primary-base WORD A.B.C.D
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
WORD
A.B.C.D
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command supports only IPv4 address
format.
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
This example shows how to configure the primary controller name WLC1 and primary controller IP address
209.165.200.225 into the CAPWAP access point:
ap_console >capwap ap primary-base WLC1 209.165.200.225
OL-31334-01
capwap ap Commands
capwap ap primed-timer
To configure the primed timer into the CAPWAP access point, use the capwap ap primed-timer command.
capwap ap primed-timer {enable | disable}
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
enable
disable
None
Release
Modification
7.6
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
1419
capwap ap Commands
capwap ap secondary-base
To configure the name and IP address of the secondary Cisco WLC into the CAPWAP access point from the
access points console port, use the capwap ap secondary-base command.
capwap ap secondary-base controller_name controller_ip_address
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
controller_name
controller_ip_address
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command supports only IPv4 address
format.
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
This example shows how to configure the secondary Cisco WLC name as WLC2 and secondary Cisco WLC
IP address 209.165.200.226 into the CAPWAP access point:
ap_console >capwap ap secondary-base WLC2 209.165.200.226
OL-31334-01
capwap ap Commands
capwap ap tertiary-base
To configure the name and IP address of the tertiary Cisco WLC into the CAPWAP access point from the
access points console port, use the capwap ap tertiary-base command.
capwap ap tertiary-base WORDA.B.C.D
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
WORD
A.B.C.D
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command supports only IPv4 address
format.
The access point must be running Cisco IOS Release 12.3(11)JX1 or later releases.
This example shows how to configure the tertiary Cisco WLC with the name WLC3 and secondary Cisco
WLC IP address 209.165.200.227 into the CAPWAP access point:
ap_console >capwap ap tertiary-base WLC3 209.165.200.227
1421
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
A.B.C.D
None
Release
Modification
7.6
8.0
This command must be entered from an access points console port. This command is applicable for IPv4
addresses only.
Prior to changing the FlexConnect configuration on an access point using the access points console port, the
access point must be in standalone mode (not connected to a controller) and you must remove the current
LWAPP private configuration by using the clear lwapp private-config command.
Note
Examples
The access point must be running Cisco IOS Release 12.3(11)JX1 or higher releases.
The following example shows how to configure the controller IP address 10.92.109.1 into the FlexConnect
access point:
(Cisco Controller) > lwapp ap controller ip address 10.92.109.1
config Commands
This section lists the config commands to configure access points.
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
802.11-a49
802.11-a58
ant_gain
cisco_ap
global
channel_no
Release
Modification
7.6
Before you enter the config 802.11-a antenna extAntGain command, disable the 802.11 Cisco radio with
the config 802.11-a disable command.
After you configure the external antenna gain, use the config 802.11-a enable command to reenable the 802.11
Cisco radio.
Examples
The following example shows how to configure an 802.11-a49 external antenna gain of 10 dBi for AP1:
(Cisco Controller) >config 802.11-a antenna extAntGain 10 AP1
1423
config Commands
Syntax Description
Command Default
Command History
Examples
802.11-a49
802.11-a58
cisco_ap
global
channel_no
Custom channel for a specific mesh access point. The range is 1 through
26, inclusive, for a 4.9-GHz band and 149 through 165, inclusive, for a
5.8-GHz band.
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
802.11-a49
802.11-a58
txpower
ap
cisco_ap
global
power_level
The default transmission power properties for the 4.9-GHz and 5.8-GHz public safety channels on an access
point is disabled.
Release
Modification
7.6
The following example shows how to configure an 802.11-a49 transmission power level of 4 for AP1:
(Cisco Controller) > config 802.11-a txpower ap 4 AP1
1425
config Commands
Syntax Description
Command Default
Command History
Examples
enable
sideA
Specifies the diversity between the internal antennas and an external antenna
connected to the Cisco lightweight access point left port.
sideB
Specifies the diversity between the internal antennas and an external antenna
connected to the Cisco lightweight access point right port.
cisco_ap
None
Release
Modification
7.6
The following example shows how to enable antenna diversity for AP01 on an 802.11b network:
(Cisco Controller) >config 802.11a antenna diversity enable AP01
The following example shows how to enable diversity for AP01 on an 802.11a network, using an external
antenna connected to the Cisco lightweight access point left port (sideA):
(Cisco Controller) >config 802.11a antenna diversity sideA AP01
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
antenna_gain
Antenna gain in 0.5 dBm units (for example, 2.5 dBm = 5).
cisco_ap
None
Release
Modification
7.6
Before you enter the config 802.11 antenna extAntGain command, disable the 802.11 Cisco radio with the
config 802.11 disable command.
After you configure the external antenna gain, use the config 802.11 enable command to enable the 802.11
Cisco radio.
Examples
The following example shows how to configure an 802.11a external antenna gain of 0.5 dBm for AP1:
(Cisco Controller) >config 802.11 antenna extAntGain 1 AP1
1427
config Commands
Syntax Description
Command Default
Command History
Examples
omni
sectorA
sectorB
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure access point AP01 antennas for a 360-degree omnidirectional
pattern on an 802.11b network:
(Cisco Controller) >config 802.11 antenna mode omni AP01
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
internal
external
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure access point AP02 on an 802.11b network to use the internal
antenna:
(Cisco Controller) >config 802.11a antenna selection internal AP02
1429
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
global
ap ap_name
enable
Enables beamforming.
disable
Disables beamforming.
None
Release
Modification
7.6
When you enable Beamforming on the network, it is automatically enabled for all the radios applicable to
that network type.
Follow these guidelines for using Beamforming:
Beamforming is supported only for legacy orthogonal frequency-division multiplexing (OFDM) data
rates (6, 9, 12, 18, 24, 36, 48, and 54 mbps).
Note
Beamforming is not supported for complementary-code keying (CCK) data rates (1, 2,
5.5, and 11 Mbps).
Beamforming is supported only on access points that support 802.11n (AP1250 and AP1140).
Two or more antennas must be enabled for transmission.
All three antennas must be enabled for reception.
OFDM rates must be enabled.
OL-31334-01
config Commands
If the antenna configuration restricts operation to a single transmit antenna, or if OFDM rates are disabled,
Beamforming is not used.
Examples
The following example shows how to enable Beamforming on the 802.11a network:
(Cisco Controller) >config 802.11 beamforming global enable
1431
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
network
cisco_ap
Release
Modification
7.6
You must use this command to disable the network before using many config 802.11 commands.
This command can be used any time that the CLI interface is active.
Examples
The following example shows how to disable the entire 802.11a network:
(Cisco Controller) >config 802.11a disable network
The following example shows how to disable access point AP01 802.11b transmissions:
(Cisco Controller) >config 802.11b disable AP01
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
clients
802.11a Cisco lightweight access point client threshold between 1 and 75 clients.
Release
Modification
7.6
The following example shows how to set all Cisco lightweight access point clients thresholds to 25 clients:
(Cisco Controller) >config advanced 802.11 profile clients global 25
Global client count profile set.
The following example shows how to set the AP1 clients threshold to 75 clients:
(Cisco Controller) >config advanced 802.11 profile clients AP1 75
Global client count profile set.
1433
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
on
off
Uses global default performance profiles for this Cisco lightweight access point.
Release
Modification
7.6
The following example shows how to turn performance profile customization on for 802.11a Cisco lightweight
access point AP1:
(Cisco Controller) >config advanced 802.11 profile customize AP1 on
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
percent
Release
Modification
7.6
The following example shows how to set the foreign 802.11a transmitter interference threshold for all Cisco
lightweight access points to 50 percent:
(Cisco Controller) >config advanced 802.11a profile foreign global 50
The following example shows how to set the foreign 802.11a transmitter interference threshold for AP1 to 0
percent:
(Cisco Controller) >config advanced 802.11 profile foreign AP1 0
1435
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
dBm
Release
Modification
7.6
The following example shows how to set the 802.11a foreign noise threshold for all Cisco lightweight access
points to 127 dBm:
(Cisco Controller) >config advanced 802.11a profile noise global -127
The following example shows how to set the 802.11a foreign noise threshold for AP1 to 0 dBm:
(Cisco Controller) >config advanced 802.11a profile noise AP1 0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
value
802.11a Cisco lightweight access point throughput threshold between 1000 and
10000000 bytes per second.
The default Cisco lightweight access point data-rate throughput threshold value is 1,000,000 bytes per second.
Release
Modification
7.6
The following example shows how to set all Cisco lightweight access point data-rate thresholds to 1000 bytes
per second:
(Cisco Controller) >config advanced 802.11 profile throughput global 1000
The following example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:
(Cisco Controller) >config advanced 802.11 profile throughput AP1 10000000
1437
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
percent
Release
Modification
7.6
The following example shows how to set the RF utilization threshold for all Cisco lightweight access points
to 0 percent:
(Cisco Controller) >config advanced 802.11 profile utilization global 0
The following example shows how to set the RF utilization threshold for AP1 to 100 percent:
(Cisco Controller) >config advanced 802.11 profile utilization AP1 100
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
system name
IP addr
None
Release
Modification
7.6
8.0
Usage Guidelines
To delete a primary backup controller entry (IPv6 or IPv4), enter 0.0.0.0 for the controller IP address.
Examples
The following example shows how to configure the IPv4 primary backup controller:
(Cisco Controller) >config advanced backup-controller primary Controller_1 10.10.10.10
The following example shows how to configure the IPv6 primary backup controller:
(Cisco Controller) >config advanced backup-controller primary systemname 2001:9:6:40::623
The following example shows how to remove the IPv4 primary backup controller:
(Cisco Controller) >config advanced backup-controller primary Controller_1 10.10.10.10
The following example shows how to remove the IPv6 primary backup controller:
(Cisco Controller) >config advanced backup-controller primary Controller_1 0.0.0.0
Related Commands
1439
config Commands
Syntax Description
Command Default
Command History
system name
IP addr
None
Release
Modification
7.6
8.0
Usage Guidelines
To delete a secondary backup controller entry (IPv4 or IPv6), enter 0.0.0.0 for the controller IP address.
Examples
The following example shows how to configure an IPv4 secondary backup controller:
(Cisco Controller) >config advanced backup-controller secondary Controller_2 10.10.10.10
The following example shows how to configure an IPv6 secondary backup controller:
(Cisco Controller) >config advanced backup-controller secondary Controller_2 2001:9:6:40::623
The following example shows how to remove an IPv4 secondary backup controller:
(Cisco Controller) >config advanced backup-controller secondary Controller_2 0.0.0.0
The following example shows how to remove an IPv6 secondary backup controller:
(Cisco Controller) >config advanced backup-controller secondary Controller_2 0.0.0.0
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
num_of_retries
The default value for the number of 802.11 data packet excessive retries is 0.
Release
Modification
7.6
Usage Guidelines
This command is supported only for the 1000/1510 series access points.
Examples
This example shows how to set the client handoff to 100 excessive retries:
(Cisco Controller) >config advanced client-handoff 100
1441
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
Related Commands
debug dot11
debug dot11 mgmt interface
debug dot11 mgmt msg
debug dot11 mgmt ssid
debug dot11 mgmt state-machine
debug dot11 mgmt station
show advanced dot11-padding
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
number of associations
per interval
(Optional) Number of association request per access point slot in a given interval.
The range is from 1 to 100.
interval
(Optional) Association request limit interval. The range is from 100 to 10000
milliseconds.
Release
Modification
7.6
Usage Guidelines
When 200 or more wireless clients try to associate to a controller at the same time, the clients no longer become
stuck in the DHCP_REQD state when you use the config advanced assoc-limit command to limit association
requests from access points.
Examples
The following example shows how to configure the number of association requests per access point slot in a
given interval of 20 with the association request limit interval of 250:
(Cisco Controller) >config advanced assoc-limit enable 20 250
1443
config Commands
Syntax Description
Command Default
Command History
Examples
no_of_sessions
None
Release
Modification
7.6
The following example shows how to configure the maximum number of simultaneous 802.1X sessions:
(Cisco Controller) >config advanced max-1x-sessions 200
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable switch control path rate limiting:
(Cisco Controller) >config advanced rate enable
1445
config Commands
Syntax Description
enable
disable
Command Default
Disabled
Command History
Release
Modification
7.5
Examples
The following example shows how to use increased backoff parameters for probe response:
(Cisco Controller) >config advanced probe backoff enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the filtering of probe requests forwarded from an access point
to the controller:
(Cisco Controller) >config advanced probe filter enable
1447
config Commands
Syntax Description
Command Default
Command History
Examples
num_probes
Number of probe requests (from 1 to 100) forwarded to the controller per client
per access point radio in a given interval.
interval
The default number of probe requests is 2. The default interval is 500 milliseconds.
Release
Modification
7.6
This example shows how to set the number of probes per access point per client to 5 and the probe interval
to 800 milliseconds:
(Cisco Controller) >config advanced probe limit 5 800
OL-31334-01
config Commands
Syntax Description
ap-discovery-timeout
discovery-timeout
ap-fast-heartbeat
Configures the fast heartbeat timer, which reduces the amount of time it
takes to detect a controller failure in access points.
local
Configures the fast heartbeat interval for access points in local mode.
flexconnect
all
Configures the fast heartbeat interval for all the access points.
enable
disable
fast_heartbeat_seconds
ap-heartbeat-timeout
heartbeat_seconds
ap-primed-join-timeout
primed_join_timeout
auth-timeout
1449
config Commands
auth_timeout
pkt-fwd-watchdog
watchdog_timer
default
eap-identity-request-delay
eap_identity_request_delay
eap-timeout
eap_timeout
Command Default
Command History
Usage Guidelines
Release
Modification
7.6
The Cisco lightweight access point discovery timeout indicates how often a Cisco WLC attempts to discover
unconnected Cisco lightweight access points.
The Cisco lightweight access point heartbeat timeout controls how often the Cisco lightweight access point
sends a heartbeat keepalive signal to the Cisco Wireless LAN Controller.
Examples
The following example shows how to configure an access point discovery timeout with a timeout value of
20:
(Cisco Controller) >config advanced timers ap-discovery-timeout 20
OL-31334-01
config Commands
The following example shows how to enable the fast heartbeat interval for an access point in FlexConnect
mode:
(Cisco Controller) >config advanced timers ap-fast-heartbeat flexconnect enable 8
The following example shows how to configure the authentication timeout to 20 seconds:
(Cisco Controller) >config advanced timers auth-timeout 20
1451
config Commands
config ap
To configure a Cisco lightweight access point or to add or delete a third-party (foreign) access point, use the
config ap command.
config ap {{enable | disable} cisco_ap | {add | delete} MAC port {enable | disable} IP_address}
Syntax Description
Command Default
Command History
Examples
enable
disable
cisco_ap
add
delete
MAC
port
Port number through which the foreign access point can be reached.
IP_address
None
Release
Modification
7.6
8.0
The following example shows how to disable lightweight access point AP1:
(Cisco Controller) >config ap disable AP1
The following example shows how to add a foreign access point with MAC address 12:12:12:12:12:12 and
IP address 192.12.12.1 from port 2033:
(Cisco Controller) >config ap add 12:12:12:12:12:12 2033 enable 192.12.12.1
OL-31334-01
config Commands
config ap autoconvert
To automatically convert all access points to FlexConnect mode or Monitor mode upon associating with the
Cisco WLC, use the config ap autoconvert command.
config ap autoconvert {flexconnect | monitor | disable}
Syntax Description
Command Default
Command History
flexconnect
monitor
disable
None
Release
Modification
7.6
Usage Guidelines
When access points in local mode connect to a Cisco 7500 Series Wireless Controller, they do not serve
clients. The access point details are available in the controller. To enable access points to serve clients or
perform monitoring related tasks when connected to the Cisco 7500 Series Wireless Controller, the access
points must be in FlexConnect mode or Monitor mode.
Examples
The following example shows how to automatically convert all access points to the FlexConnect mode:
(Cisco Controller) >config ap autoconvert flexconnect
The following example shows how to disable the autoconvert option on the APs:
(Cisco Controller) >config ap autoconvert disable
1453
config Commands
config ap bhrate
To configure the Cisco bridge backhaul Tx rate, use the config ap bhrate command.
config ap bhrate {rate | auto} cisco_ap
Syntax Description
Command Default
Command History
Usage Guidelines
rate
Cisco bridge backhaul Tx rate in kbps. The valid values are 6000, 12000, 18000, 24000,
36000, 48000, and 54000.
auto
cisco_ap
Release
Modification
7.6
In previous software releases, the default value for the bridge data rate was 24000 (24 Mbps). In controller
software release 6.0, the default value for the bridge data rate is auto. If you configured the default bridge
data rate value (24000) in a previous controller software release, the bridge data rate is configured with the
new default value (auto) when you upgrade to controller software release 6.0. However, if you configured a
non default value (for example, 18000) in a previous controller software release, that configuration setting is
preserved when you upgrade to Cisco WLC Release 6.0.
When the bridge data rate is set to auto, the mesh backhaul chooses the highest rate where the next higher
rate cannot be used due to unsuitable conditions for that specific rate (and not because of conditions that affect
all rates).
Examples
The following example shows how to configure the Cisco bridge backhaul Tx rate to 54000 kbps:
(Cisco Controller) >config ap bhrate 54000 AP01
OL-31334-01
config Commands
config ap bridgegroupname
To set or delete a bridge group name on a Cisco lightweight access point, use the config ap bridgegroupname
command.
config ap bridgegroupname {set groupname | delete} cisco_ap
Syntax Description
Command Default
Command History
set
groupname
delete
cisco_ap
None
Release
Modification
7.6
Usage Guidelines
Only access points with the same bridge group name can connect to each other. Changing the AP
bridgegroupname may strand the bridge AP.
Examples
The following example shows how to delete a bridge group name on Cisco access points bridge group name
AP02:
(Cisco Controller) >config ap bridgegroupname delete AP02
Changing the AP's bridgegroupname may strand the bridge AP. Please continue with caution.
Changing the AP's bridgegroupname will also cause the AP to reboot.
Are you sure you want to continue? (y/n)
1455
config Commands
config ap bridging
To configure Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the config ap bridging
command.
config ap bridging {enable | disable} cisco_ap
Syntax Description
Command Default
Command History
Examples
enable
disable
cisco_ap
None
Release
Modification
7.6
OL-31334-01
config Commands
config ap cdp
To configure the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the config ap cdp
command.
config ap cdp {enable | disable | interface {ethernet interface_number | slot slot_id}} {cisco_ap | all}
Syntax Description
Note
Command Default
Command History
Usage Guidelines
enable
disable
interface
ethernet
interface_number
slot
slot_id
cisco_ap
all
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
Enabled on radio interfaces of mesh APs and disabled on radio interfaces of non-mesh APs. Enabled on
Ethernet interfaces of all APs.
Release
Modification
7.6
The config ap cdp disable all command disables CDP on all access points that are joined to the controller
and all access points that join in the future. CDP remains disabled on both current and future access points
even after the controller or access point reboots. To enable CDP, enter the config ap cdp enable all command.
1457
config Commands
Note
Examples
CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all
access points joined to the controller, you may disable and then reenable CDP on individual access points
using the config ap cdp {enable | disable} cisco_ap command. After you disable CDP on all access points
joined to the controller, you may not enable and then disable CDP on individual access points.
The following example shows how to enable CDP on all access points:
(Cisco Controller) >config ap cdp enable all
The following example shows how to disable CDP on ap02 access point:
(Cisco Controller) >config ap cdp disable ap02
The following example shows how to enable CDP for Ethernet interface number 2 on all access points:
(Cisco Controller) >config ap cdp ethernet 2 enable all
OL-31334-01
config Commands
config ap core-dump
To configure a Cisco lightweight access points memory core dump, use the config ap core-dump command.
config ap core-dump {disable | enable tftp_server_ipaddress filename {compress | uncompress} {cisco_ap
| all}
Syntax Description
Note
Command Default
Command History
enable
Enables the Cisco lightweight access points memory core dump setting.
disable
Disables the Cisco lightweight access points memory core dump setting.
tftp_server_ipaddress
IP address of the TFTP server to which the access point sends core dump files.
filename
Name that the access point uses to label the core file.
compress
uncompress
cisco_ap
all
If an AP itself is configured with the name all, then the all access points case takes precedence over the
AP that is named all.
None
Release
Modification
7.6
8.0
Usage Guidelines
The access point must be able to reach the TFTP server. This command is applicable for both IPv4 and IPv6
addresses.
Examples
The following example shows how to configure and compress the core dump file:
(Cisco Controller) >config ap core-dump enable 209.165.200.225 log compress AP02
1459
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
filename
None
Release
Modification
7.6
1461
config Commands
Syntax Description
Command Default
Command History
cisco_ap
None
Release
Modification
7.6
Usage Guidelines
Use the transfer upload datatype command to transfer the collected data to the Cisco wireless LAN controller.
Examples
The following example shows how to collect the latest crash data for access point AP3:
(Cisco Controller) >config ap crash-file get-crash-file AP3
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
slot_id
cisco_ap
None
Release
Modification
7.6
The following example shows how to collect the radio core dump for access point AP02 and slot 0:
(Cisco Controller) >config ap crash-file get-radio-core-dump 0 AP02
1463
config Commands
config ap 802.1Xuser
To configure the global authentication username and password for all access points currently associated with
the controller as well as any access points that associate with the controller in the future, use the config ap
802.1Xuser command.
config ap 802.1Xuser add username ap-username password ap-password {all | cisco_ap}
Syntax Description
Command Default
Command History
Usage Guidelines
add username
ap-username
password
ap-password
Password.
cisco_ap
all
None
Release
Modification
7.6
You must enter a strong password. Strong passwords have the following characteristics:
They are at least eight characters long.
They contain a combination of uppercase and lowercase letters, numbers, and symbols.
They are not a word in any language.
You can set the values for a specific access point.
Examples
This example shows how to configure the global authentication username and password for all access points:
(Cisco Controller) >config ap 802.1Xuser add username cisco123 password cisco2020 all
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
Access point.
None
Release
Modification
7.6
The following example shows how to delete access point AP01 to use the controllers global authentication
settings:
(Cisco Controller) >config ap 802.1Xuser delete AP01
1465
config Commands
Syntax Description
Command Default
Command History
disable
Disables authentication.
all
cisco_ap
Access point.
None
Release
Modification
7.6
Usage Guidelines
You can disable 802.1X authentication for a specific access point only if global 802.1X authentication is not
enabled. If global 802.1X authentication is enabled, you can disable 802.1X for all access points only.
Examples
The following example shows how to disable the authentication for access point cisco_ap1:
(Cisco Controller) >config ap 802.1Xuser disable
OL-31334-01
config Commands
config ap dtls-cipher-suite
To enable new cipher suites for DTLS connection between AP and controller, use the config ap
dtls-cipher-suite command.
config ap dtls-cipher-suite{RSA-AES256-SHA256 | RSA-AES256-SHA | RSA-AES128-SHA}
Syntax Description
Command Default
Command History
Examples
RSA-AES256-SHA256
RSA-AES256-SHA
RSA-AES128-SHA
None
Release
Modification
8.0
The following example shows how to enable RSA cipher suites using 256 bit AES and SHA 256 for DTLS
connection between AP and controller:
(Cisco Controller) > config ap dtls-cipher-suite RSA-AES256-SHA256
1467
config Commands
Syntax Description
Command Default
Command History
Examples
auto
half
full
speed
auto
10
100
1000
all
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure the Ethernet port duplex half settings as 10 Mbps for all
access points:
(Cisco Controller) >config ap ethernet duplex half speed 10 all
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
id
vlan_id
disable
Disables the VLAN tag feature. When you disable VLAN tagging, the access
point untags the CAPWAP packets.
cisco_ap
all
None
Release
Modification
7.6
After you configure VLAN tagging, the configuration comes into effect only after the access point reboots.
You cannot configure VLAN tagging on mesh access points.
If the access point is unable to route traffic or reach the controller using the specified trunk VLAN, it falls
back to the untagged configuration. If the access point joins the controller using this fallback configuration,
the controller sends a trap to a trap server such as the Cisco Prime Infrastructure, which indicates the failure
of the trunk VLAN. In this scenario, the "Failover to untagged" message appears in show command output.
Examples
The following example shows how to configure VLAN tagging on a trunk VLAN:
(Cisco Controller) >config ap ethernet tag 6 AP1
1469
config Commands
config ap group-name
To specify a descriptive group name for a Cisco lightweight access point, use the config ap group-name
command.
config ap group-name groupname cisco_ap
Syntax Description
Command Default
Command History
groupname
cisco_ap
None
Release
Modification
7.6
Usage Guidelines
The Cisco lightweight access point must be disabled before changing this parameter.
Examples
The following example shows how to configure a descriptive name for access point AP01:
(Cisco Controller) >config ap group-name superusers AP01
OL-31334-01
config Commands
config ap hotspot
To configure HotSpot parameters on an access point, use the config ap hotspot command.
config ap hotspot venue {type group_code type_code | name {add language_code venue_name | delete}}
cisco_ap
Syntax Description
venue
type
group_code
1471
config Commands
type_code
OL-31334-01
config Commands
1473
config Commands
3UNIVERSITY OR COLLEGE
For venue group 4 (FACTORY-INDUSTRIAL), the following options are available:
0UNSPECIFIED FACTORY AND INDUSTRIAL
1FACTORY
For venue group 5 (INSTITUTIONAL), the following options are available:
0UNSPECIFIED INSTITUTIONAL
1HOSPITAL
2LONG-TERM CARE FACILITY
3ALCOHOL AND DRUG RE-HABILITATION CENTER
4GROUP HOME
5 :PRISON OR JAIL
OL-31334-01
config Commands
type_code
1475
config Commands
OL-31334-01
config Commands
4TRAFFIC CONTROL
5BUS STOP
6KIOSK
name
language_code ISO-639 encoded string defining the language used at the venue. This string is a
three-character language code. For example, you can enter ENG for English.
Command Default
Command History
Examples
venue_name
Venue name for this access point. This name is associated with the basic service set (BSS)
and is used in cases where the SSID does not provide enough information about the venue.
The venue name is case sensitive and can be up to 252 alphanumeric characters.
add
delete
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure the venue group as educational and venue type as university:
(Cisco Controller) >config ap hotspot venue type 3 3
1477
config Commands
Syntax Description
abort
primary
cisco_ap
all
Note
Command Default
Command History
Examples
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
None
Release
Modification
7.6
The following example shows how to predownload an image to an access point from the primary image:
(Cisco Controller) >config ap image predownload primary all
OL-31334-01
config Commands
Syntax Description
Note
Command Default
Command History
Examples
cisco_ap
all
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
None
Release
Modification
7.6
The following example shows how to swap an access points primary and secondary images:
(Cisco Controller) >config ap image swap all
1479
config Commands
config ap led-state
To configure the LED state of an access point or to configure the flashing of LEDs, use the config ap led-state
command.
config ap led-state {enable | disable} {cisco_ap | all}
config ap led-state flash {seconds | indefinite | disable} {cisco_ap | dual-band}
Syntax Description
enable
disable
cisco_ap
flash
seconds
Duration that the LEDs have to flash. The range is from 1 to 3600
seconds.
indefinite
dual-band
Usage Guidelines
Note
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
LEDs on access points with dual-band radio module will flash green and blue when you execute the led state
flash command.
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to enable the LED state for an access point:
(Cisco Controller) >config ap led-state enable AP02
OL-31334-01
config Commands
The following example shows how to enable the flashing of LEDs for dual-band access points:
(Cisco Controller) >config ap led-state flash 20 dual-band
1481
config Commands
config ap link-encryption
To configure the Datagram Transport Layer Security (DTLS) data encryption for access points on the
5500 series controller, use the config ap link-encryption command.
Note
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
cisco_ap
all
DTLS data encryption is enabled automatically for OfficeExtend access points but disabled by default for all
other access points.
Release
Modification
7.6
Only Cisco 5500 Series Controllers support DTLS data encryption. This feature is not available on other
controller platforms. If an access point with data encryption enabled tries to join any other controller, the
access point joins the controller, but data packets are sent unencrypted.
Only Cisco 1130, 1140, 1240, and 1250 series access points support DTLS data encryption, and data-encrypted
access points can join a Cisco 5500 Series Controller only if the wplus license is installed on the controller.
If the wplus license is not installed, the access points cannot join the controller.
Examples
The following example shows how to enable the data encryption for an access point:
(Cisco Controller) >config ap link-encryption enable AP02
OL-31334-01
config Commands
config ap link-latency
To configure link latency for a specific access point or for all access points currently associated to the controller,
use the config ap link-latency command:
Note
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
Syntax Description
Command Default
Command History
enable
disable
reset
cisco_ap
all
Release
Modification
7.6
Usage Guidelines
This command enables or disables link latency only for access points that are currently joined to the controller.
It does not apply to access points that join in the future.
Examples
The following example shows how to enable the link latency for all access points:
(Cisco Controller) >config ap link-latency enable all
1483
config Commands
config ap location
To modify the descriptive location of a Cisco lightweight access point, use the config ap location command.
config ap location location cisco_ap
Syntax Description
Command Default
Command History
location
cisco_ap
None
Release
Modification
7.6
Usage Guidelines
The Cisco lightweight access point must be disabled before changing this parameter.
Examples
The following example shows how to configure the descriptive location for access point AP1:
(Cisco Controller) >config ap location Building 1 AP1
OL-31334-01
config Commands
Syntax Description
severity_level
Note
Command Default
Command History
Usage Guidelines
cisco_ap
all
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
None
Release
Modification
7.6
If you set a syslog level, only those messages whose severity is equal to or less than that level are sent to the
access point. For example, if you set the syslog level to Warnings (severity level 4), only those messages
whose severity is between 0 and 4 are sent to the access point.
1485
config Commands
Examples
This example shows how to set the severity for filtering syslog messages to 3:
(Cisco Controller) >config ap logging syslog level 3
OL-31334-01
config Commands
config ap max-count
To configure the maximum number of access points supported by the Cisco Wireless LAN Controller (WLC),
use the config ap max-count command.
config ap max-count number
Syntax Description
Command Default
Command History
number
None
Release
Modification
7.6
Usage Guidelines
The access point count of the Cisco WLC license overrides this count if the configured value is greater than
the access point count of the license. A value of 0 indicates that there is no restriction on the maximum number
of access points. If high availability is configured, you must reboot both the active and the standby Cisco
WLCs after you configure the maximum number of access points supported by the Cisco WLC.
Examples
The following example shows how to configure the number of access points supported by the Cisco WLC:
(Cisco Controller) >config ap max-count 100
1487
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
username
AP_username
Management username.
password
AP_password
AP management password.
secret
secret
all
cisco_ap
None
Release
Modification
7.6
OL-31334-01
config Commands
Examples
The following example shows how to add a username, password, and secret password for AP management:
> config ap mgmtuser add username acd password Arc_1234 secret Mid_45 all
1489
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
Access point.
None
Release
Modification
7.6
The following example shows how to delete the credentials of an access point:
> config ap mgmtuser delete cisco_ap1
OL-31334-01
config Commands
config ap mode
To change a Cisco WLC communication option for an individual Cisco lightweight access point, use the
config ap mode command.
config ap mode {bridge | flexconnect submode {none | wips | pppoe-only | pppoe-wips} | local submode
{none | wips} | reap | rogue | sniffer | se-connect | monitor submode {none | wips} | flex+bridge
submode{none | wips | pppoe-only | pppoe-wips} } cisco_ap
Syntax Description
Command Default
Command History
bridge
flexconnect
local
reap
rogue
sniffer
se-connect
flex+bridge
submode
none
wips
pppoe-only
pppoe-wips
cisco_ap
Local
Release
Modification
7.6
8.0
1491
config Commands
Usage Guidelines
The sniffer mode captures and forwards all the packets from the clients on that channel to a remote machine
that runs AiroPeek or other supported packet analyzer software. It includes information on the timestamp,
signal strength, packet size and so on.
Examples
The following example shows how to set the controller to communicate with access point AP91 in bridge
mode:
> config ap mode bridge AP91
The following example shows how to set the controller to communicate with access point AP01 in local mode:
> config ap mode local AP01
The following example shows how to set the controller to communicate with access point AP91 in remote
office (REAP) mode:
> config ap mode flexconnect AP91
The following example shows how to set the controller to communicate with access point AP91 in a wired
rogue access point detector mode:
> config ap mode rogue AP91
The following example shows how to set the controller to communicate with access point AP02 in wireless
sniffer mode:
> config ap mode sniffer AP02
OL-31334-01
config Commands
config ap monitor-mode
To configure Cisco lightweight access point channel optimization, use the config ap monitor-mode command.
config ap monitor-mode {802.11b fast-channel | no-optimization | tracking-opt | wips-optimized} cisco_ap
Syntax Description
Command Default
Command History
Examples
802.11b fast-channel
no-optimization
tracking-opt
wips-optimized
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure a Cisco wireless intrusion prevention system (wIPS) monitor
mode on access point AP01:
> config ap monitor-mode wips-optimized AP01
1493
config Commands
config ap name
To modify the name of a Cisco lightweight access point, use the config ap name command.
config ap name new_name old_name
Syntax Description
Command Default
Command History
Examples
new_name
old_name
None
Release
Modification
7.6
The following example shows how to modify the name of access point AP1 to AP2:
> config ap name AP1 AP2
OL-31334-01
config Commands
config ap packet-dump
To configure the Packet Capture parameters on access points, use the config ap packet-dump command.
config ap packet-dump {buffer-size Size _in_KB| capture-time Time_in_Min| ftp serverip IP_addr path
path username usernamepassword password | start MAC_address Cisco_AP | stop | truncate
Length_in_Bytes}
config ap packet-dump classifier {{arp | broadcast | control | data | dot1x | iapp | ip | management |
multicast } {enable | disable} | tcp {enable | disable | port TCP_Port {enable | disable}} | udp {enable |
disable | port UDP_Port {enable | disable}}}
Syntax Description
buffer-size
Size _in_KB
capture-time
Time_in_Min
ftp
serverip
IP_addr
path path
username user_ID
password password
start
MAC_address
Cisco_AP
stop
1495
config Commands
truncate
Length_in_Bytes
classifier
arp
enable
disable
broadcast
control
data
dot1x
iapp
ip
Captures IP packets.
management
multicast
tcp
TCP_Port
udp
OL-31334-01
config Commands
Command Default
Command History
Usage Guidelines
UDP_Port
ftp
server_ip
The default buffer size is 2 MB. The default capture time is 10 minutes.
Release
Modification
7.6
8.0
Examples
The following example shows how to start Packet Capture from an access point:
(Cisco Controller) >config ap packet-dump start 00:0d:28:f4:c0:45 AP1
The following example shows how to capture 802.11 control packets from an access point:
(Cisco Controller) >config ap packet-dump classifier control enable
1497
config Commands
config ap port
To configure the port for a foreign access point, use the config ap port command.
config ap port MAC port
Syntax Description
Command Default
Command History
Examples
MAC
port
None
Release
Modification
7.6
The following example shows how to configure the port for a foreign access point MAC address:
> config ap port 12:12:12:12:12:12 20
OL-31334-01
config Commands
Syntax Description
Note
Command Default
Command History
Examples
enable
disable
cisco_ap
all
installed
Detects the MAC address of the current switch port that has a power injector.
override
Overrides the safety checks and assumes a power injector is always installed.
switch_MAC
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
None
Release
Modification
7.6
The following example shows how to enable the power injector state for all access points:
> config ap power injector enable all 12:12:12:12:12:12
1499
config Commands
Syntax Description
enable
Enables the inline power Cisco pre-standard switch state for an access point.
disable
Disables the inline power Cisco pre-standard switch state for an access point.
cisco_ap
Command Default
Disabled.
Command History
Release
Modification
7.6
Examples
The following example shows how to enable the inline power Cisco pre-standard switch state for access point
AP02:
> config ap power pre-standard enable AP02
OL-31334-01
config Commands
config ap preferred-mode
To configure the preferred mode, use the config ap preferred-mode command.
config appreferred-mode{ipv4 | ipv6|any}{AP_name | Ap-group_name | all }
Syntax Description
Command Default
Command History
Examples
ipv4
ipv6
any
AP_name
Ap-group_name
all
None
Release
Modification
8.0
The following example shows how to configure IPv6 as the preferred mode to lightweight access point AP1
(Cisco Controller) >config ap preferred-mode ipv6 AP1
1501
config Commands
config ap primary-base
To set the Cisco lightweight access point primary Cisco WLC, use the config ap primary-base command.
config ap primary-base controller_name Cisco_AP[controller_ip_address]
Syntax Description
controller_name
Cisco_AP
controller_ip_address
(Optional) If the backup controller is outside the mobility group to which the
access point is connected, then you need to provide the IP address of the primary,
secondary, or tertiary controller.
Note
Command Default
Command History
Usage Guidelines
For OfficeExtend access points, you must enter both the name and IP
address of the controller. Otherwise, the access point cannot join this
controller.
None
Release
Modification
7.6
8.0
The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event
of a hardware reset.
OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find
a controller. You must configure one or more controllers because OfficeExtend access points try to connect
only to their configured controllers.
This command supports both IPv4 and IPv6 address formats.
Examples
The following example shows how to set an access point primary Cisco WLC IPv4 address for an Cisco AP:
(Cisco Controller) > config ap primary-base SW_1 AP2 10.0.0.0
The following example shows how to set an access point primary Cisco WLC IPv6 address for an Cisco AP:
(Cisco Controller) > config ap primary-base SW_1 AP2 2001:DB8:0:1::1
OL-31334-01
config Commands
Related Commands
1503
config Commands
config ap priority
To assign a priority designation to an access point that allows it to reauthenticate after a controller failure by
priority rather than on a first-come-until-full basis, use the config ap priority command.
config ap priority {1 | 2 | 3 | 4} cisco_ap
Syntax Description
Command Default
Command History
cisco_ap
1 - Low priority.
Release
Modification
7.6
Usage Guidelines
In a failover situation, if the backup controller does not have enough ports to allow all the access points in
the affected area to reauthenticate, it gives priority to higher-priority access points over lower-priority ones,
even if it means replacing lower-priority access points.
Examples
The following example shows how to assign a priority designation to access point AP02 that allows it to
reauthenticate after a controller failure by assigning a reauthentication priority 3:
> config ap priority 3 AP02
OL-31334-01
config Commands
config ap reporting-period
To reset a Cisco lightweight access point, use the config ap reporting-period command.
config ap reporting-period period
Syntax Description
Command Default
Command History
Examples
period
None
Release
Modification
7.6
The following example shows how to reset an access point reporting period to 120 seconds:
> config ap reporting-period 120
1505
config Commands
config ap reset
To reset a Cisco lightweight access point, use the config ap reset command.
config ap reset cisco_ap
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
all
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure the retransmission interval for all access points globally:
> config ap retransmit interval 4 all
1507
config Commands
Syntax Description
Command Default
Command History
Examples
count
all
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure the retransmission retry count for a specific access point:
> config ap retransmit count 6 cisco_ap
OL-31334-01
config Commands
config ap role
To specify the role of an access point in a mesh network, use the config ap role command.
config ap role {rootAP | meshAP} cisco_ap
Syntax Description
rootAP
meshAP
cisco_ap
Command Default
meshAP.
Command History
Release
Modification
7.6
Usage Guidelines
Use the meshAP keyword if the access point has a wireless connection to the controller, or use the rootAP
keyword if the access point has a wired connection to the controller. If you change the role of the AP, the AP
will be rebooted.
Examples
The following example shows how to designate mesh access point AP02 as a root access point:
> config ap role rootAP AP02
Changing the AP's role will cause the AP to reboot.
Are you sure you want to continue? (y/n)
1509
config Commands
config ap rst-button
To configure the Reset button for an access point, use the config ap rst-button command.
config ap rst-button {enable | disable} cisco_ap
Syntax Description
Command Default
Command History
Examples
enable
disable
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure the Reset button for access point AP03:
> config ap rst-button enable AP03
OL-31334-01
config Commands
config ap secondary-base
To set the Cisco lightweight access point secondary Cisco WLC, use the config ap secondary-base command.
config ap secondary-base Controller_name Cisco_AP [Controller_IP_address]
Syntax Description
controller_name
Cisco_AP
Controller_IP_address
(Optional). If the backup Cisco WLC is outside the mobility group to which the
access point is connected, then you need to provide the IP address of the primary,
secondary, or tertiary Cisco WLC.
Note
Command Default
Command History
Usage Guidelines
For OfficeExtend access points, you must enter both the name and IP
address of the Cisco WLC. Otherwise, the access point cannot join this
Cisco WLC.
None
Release
Modification
7.6
8.0
The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event
of a hardware reset.
OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find
a Cisco WLC. You must configure one or more Cisco WLCs because OfficeExtend access points try to connect
only to their configured Cisco WLCs.
This command supports both IPv4 and IPv6 address formats.
Examples
The following example shows how to set an access point secondary Cisco WLC:
> config ap secondary-base SW_1 AP2 10.0.0.0
The following example shows how to set an access point primary Cisco WLC IPv6 address for an Cisco AP:
(Cisco Controller) > config ap secondary-base SW_1 AP2 2001:DB8:0:1::1
1511
config Commands
Related Commands
OL-31334-01
config Commands
config ap sniff
To enable or disable sniffing on an access point, use the config ap sniff command.
config ap sniff {802.11a | 802.11b} {enable channel server_ip | disable} cisco_ap
Syntax Description
Command Default
Command History
Usage Guidelines
802.11a
802.11b
enable
channel
Channel to be sniffed.
server_ip
disable
cisco_ap
Channel 36.
Release
Modification
7.6
When the sniffer feature is enabled on an access point, it starts sniffing the signal on the given channel. It
captures and forwards all the packets to the remote computer that runs Omnipeek, Airopeek, AirMagnet, or
Wireshark software. It includes information on the timestamp, signal strength, packet size and so on.
Before an access point can act as a sniffer, a remote computer that runs one of the listed packet analyzers must
be set up so that it can receive packets sent by the access point. After the Airopeek installation, copy the
following .dll files to the location where airopeek is installed:
socket.dll file to the Plug-ins folder (for example, C:\Program Files\WildPackets\AiroPeek\Plugins)
socketres.dll file to the PluginRes folder (for example, C:\Program Files\WildPackets\AiroPeek\
1033\PluginRes)
1513
config Commands
Examples
The following example shows how to enable the sniffing on the 802.11a an access point from the primary
Cisco WLC:
> config ap sniff 80211a enable 23 11.22.44.55 AP01
OL-31334-01
config Commands
config ap ssh
To enable Secure Shell (SSH) connectivity on an access point, use the config ap ssh command.
config ap ssh {enable | disable | default} cisco_ap | all
Syntax Description
Command Default
Command History
enable
disable
default
cisco_ap
all
None
Release
Modification
7.6
Usage Guidelines
The Cisco lightweight access point associates with this Cisco wireless LAN controller for all network operation
and in the event of a hardware reset.
Examples
The following example shows how to enable SSH connectivity on access point Cisco_ap2:
> config ap ssh enable cisco_ap2
1515
config Commands
config ap static-ip
To configure Static IP address settings on Cisco lightweight access point , use the config ap static-ip command.
config ap static-ip {enable Cisco_AP AP_IP_addr IP_netmask /prefix_length gateway | disable Cisco_AP|
add {domain {Cisco_AP | all} domain_name | nameserver {Cisco_AP | all} nameserver-ip} | delete {domain
| nameserver} {Cisco_AP | all}}
Syntax Description
Note
enable
disable
Cisco_AP
AP_IP_addr
IP_netmask/prefix_length
gateway
add
domain
all
domain_name
nameserver
nameserver-ip
delete
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
OL-31334-01
config Commands
Command Default
Command History
Usage Guidelines
None
Release
Modification
7.6
8.0
An access point cannot discover the controller using Domain Name System (DNS) resolution if a static IP
address is configured for the access point, unless you specify a DNS server and the domain to which the access
point belongs.
After you enter the IPv6 address, Prefix-length and IPv6 gateway address, the CAPWAP tunnel will restart
for access point. Changing the AP's IP address will cause the AP to disjoin. After the access point rejoins the
controller, you can enter the domain and IPv6 DNS server information.
This command supports both IPv4 and IPv6 address formats.
Examples
The following example shows how to configure static IP address on an access point:
(Cisco Controller) >config ap static-ip enable AP2 1.1.1.1 255.255.255.0 209.165.200.254
The following example shows how to configure static IPv6 address on an access point:
(Cisco Controller) > config ap static-ip enable AP2 2001:DB8:0:1::1
Related Commands
1517
config Commands
config ap stats-timer
To set the time in seconds that the Cisco lightweight access point sends its DOT11 statistics to the Cisco
wireless LAN controller, use the config ap stats-timer command.
config ap stats-timer period cisco_ap
Syntax Description
Command Default
Command History
period
cisco_ap
Release
Modification
7.6
Usage Guidelines
A value of 0 (zero) means that the Cisco lightweight access point does not send any DOT11 statistics. The
acceptable range for the timer is from 0 to 65535 seconds, and the Cisco lightweight access point must be
disabled to set this value.
Examples
The following example shows how to set the stats timer to 600 seconds for access point AP2:
> config ap stats-timer 600 AP2
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
ip_address
The default value of the IPv4 address of the syslog server is 255.255.255.255.
Release
Modification
7.6
8.0
By default, the global syslog server IP address for all access points is 255.255.255.255. Make sure that the
access points can reach the subnet on which the syslog server resides before configuring the syslog server on
the controller. If the access points cannot reach this subnet, the access points are unable to send out syslog
messages.
This command supports both IPv4 and IPv6 address formats.
Examples
The following example shows how to configure a global syslog server, using IPv4 address, for all access
points:
(Cisco Controller) > config ap syslog host global 255.255.255.255
Examples
The following example shows how to configure a global syslog server, using IPv6 address, for all access
points:
(Cisco Controller) > config ap syslog host global
2001:9:10:56::100
1519
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
ap_name
ip_address
Release
Modification
7.6
8.0
By default, the syslog server IP address for each access point is 0.0.0.0, indicating that it is not yet set. When
the default value is used, the global access point syslog server IP address is pushed to the access point.
This command supports both IPv4 and IPv6 address formats.
Examples
Examples
The following example shows how to configure a syslog server for a specific AP, using IPv6 address:
(Cisco Controller) > config ap syslog host specific AP3600 2001:9:10:56::100
OL-31334-01
config Commands
config ap tcp-mss-adjust
To enable or disable the TCP maximum segment size (MSS) on a particular access point or on all access
points, use the config ap tcp-mss-adjust command.
config ap tcp-mss-adjust {enable | disable} {cisco_ap | all} size
Syntax Description
enable
disable
cisco_ap
all
size
Note
Command Default
Command History
Usage Guidelines
If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP
that is with the keyword all.
None
Release
Modification
7.6
8.0
When you enable this feature, the access point checks for TCP packets to and from wireless clients in its data
path. If the MSS of these packets is greater than the value that you configured or greater than the default value
for the CAPWAP tunnel, the access point changes the MSS to the new configured value.
1521
config Commands
Examples
This example shows how to enable the TCP MSS on access point cisco_ap1 with a segment size of 1200
bytes:
> config ap tcp-mss-adjust enable cisco_ap1 1200
OL-31334-01
config Commands
config ap telnet
To enable Telnet connectivity on an access point, use the config ap telnet command.
config ap telnet {enable | disable | default} cisco_ap | all
Syntax Description
Command Default
Command History
enable
disable
default
Replaces the specific Telnet configuration of an access point with the global
Telnet configuration.
cisco_ap
all
None
Release
Modification
7.6
Usage Guidelines
The Cisco lightweight access point associates with this Cisco wireless LAN controller for all network operation
and in the event of a hardware reset.
Examples
The following example shows how to enable Telnet connectivity on access point cisco_ap1:
> config ap telnet enable cisco_ap1
The following example shows how to disable Telnet connectivity on access point cisco_ap1:
> config ap telnet disable cisco_ap1
1523
config Commands
config ap tertiary-base
To set the Cisco lightweight access point tertiary Cisco WLC, use the config ap tertiary-base command.
config ap tertiary-base controller_name Cisco_AP [controller_ip_address]
Syntax Description
controller_name
Cisco_AP
controller_ip_address
(Optional) If the backup controller is outside the mobility group to which the
access point is connected, then you need to provide the IP address of the primary,
secondary, or tertiary Cisco WLC.
Note
Command Default
Command History
Usage Guidelines
For OfficeExtend access points, you must enter both the name and IP
address of the Cisco WLC. Otherwise, the access point cannot join this
Cisco WLC.
None
Release
Modification
7.6
8.0
OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find
a Cisco WLC. You must configure one or more controllers because OfficeExtend access points try to connect
only to their configured Cisco WLCs.
The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event
of a hardware reset.
This command supports both IPv4 and IPv6 address formats.
Examples
This example shows how to set the access point tertiary Cisco WLC:
(Cisco Controller) > config ap tertiary-base SW_1 AP02 10.0.0.0
The following example shows how to set an access point tertiary Cisco WLC IPv6 address for an Cisco AP:
(Cisco Controller) > config ap tertiary-base SW_1 AP2 2001:DB8:0:1::1
OL-31334-01
config Commands
Related Commands
1525
config Commands
config ap tftp-downgrade
To configure the settings used for downgrading a lightweight access point to an autonomous access point,
use the config ap ftp-downgrade command.
config ap tftp-downgrade tftp_ip_addressfilename Cisco_AP
Syntax Description
Command Default
Command History
Examples
tftp_ip_address
filename
Cisco_AP
None
Release
Modification
7.6
8.0
The following example shows how to configure the settings for downgrading access point ap1240_102301:
(Cisco Controller) >config ap ftp-downgrade 209.165.200.224 1238.tar ap1240_102301
OL-31334-01
config Commands
config ap username
To assign a username and password to access either a specific access point or all access points, use the config
ap username command.
config ap username user_id password passwd [all | ap_name]
Syntax Description
Command Default
Command History
Examples
user_id
Administrator username.
passwd
Administrator password.
all
ap_name
None
Release
Modification
7.6
The following example shows how to assign a username and password to a specific access point:
> config ap username jack password blue la204
The following example shows how to assign the same username and password to a all access points:
> config ap username jack password blue all
1527
config Commands
config ap venue
To configure the venue information for 802.11u network on an access point, use the config ap venue command.
config ap venue {addvenue_name venue-group venue-type lang-code cisco-ap | delete}
Syntax Description
Command Default
Command History
Examples
add
venue_name
Venue name.
venue_group
Venue group category. See the table below for details on venue group
mappings.
venue_type
Venue type. This value depends on the venue-group specified. See the
table below for venue group mappings.
lang_code
cisco_ap
deletes
None
Release
Modification
7.6
The following example shows how to set the venue details for an access point named cisco-ap1:
> config ap venue add test 11 34 eng cisco-ap1
This table lists the different venue types for each venue group.
Table 14: Venue Group Mapping
Value
UNSPECIFIED
OL-31334-01
config Commands
Value
ASSEMBLY
BUSINESS
0UNSPECIFIED BUSINESS
1DOCTOR OR DENTIST OFFICE
2BANK
3FIRE STATION
4POLICE STATION
6POST OFFICE
7PROFESSIONAL OFFICE
8RESEARCH AND
DEVELOPMENT FACILITY
9ATTORNEY OFFICE
1529
config Commands
Value
EDUCATIONAL
FACTORY-INDUSTRIAL
INSTITUTIONAL
0UNSPECIFIED
INSTITUTIONAL
1HOSPITAL
2LONG-TERM CARE FACILITY
(E.G., NURSING HOME, HOSPICE,
ETC.)
3ALCOHOL AND DRUG
RE-HABILITATION CENTER
4GROUP HOME
5PRISON OR JAIL
MERCANTILE
0UNSPECIFIED MERCANTILE
1RETAIL STORE
2GROCERY MARKET
3AUTOMOTIVE SERVICE
STATION
4SHOPPING MALL
5GAS STATION
RESIDENTIAL
0UNSPECIFIED RESIDENTIAL
1PRIVATE RESIDENCE
2HOTEL OR MOTEL
3DORMITORY
4BOARDING HOUSE
OL-31334-01
config Commands
Value
STORAGE
UNSPECIFIED STORAGE
UTILITY-MISC
VEHICULAR
10
0UNSPECIFIED VEHICULAR
1AUTOMOBILE OR TRUCK
2AIRPLANE
3BUS
4FERRY
5SHIP OR BOAT
6TRAIN
7MOTOR BIKE
OUTDOOR
11
0UNSPECIFIED OUTDOOR
1MUNI-MESH NETWORK
2CITY PARK
3REST AREA
4TRAFFIC CONTROL
5BUS STOP
6KIOSK
1531
config Commands
config ap wlan
To enable or disable wireless LAN override for a Cisco lightweight access point radio, use the config ap wlan
command.
config ap wlan {enable | disable} {802.11a | 802.11b} wlan_id cisco_ap
Syntax Description
Command Default
Command History
Examples
enable
disable
802.11a
802.11b
wlan_id
cisco_ap
None
Release
Modification
7.6
The following example shows how to enable wireless LAN override on the AP03 802.11a radio:
> config ap wlan 802.11a AP03
OL-31334-01
config Commands
config country
To configure the controllers country code, use the config country command.
config country country_code
Syntax Description
Command Default
Command History
Usage Guidelines
country_code
Release
Modification
7.6
Cisco WLCs must be installed by a network administrator or qualified IT professional and the installer must
select the proper country code. Following installation, access to the unit should be password protected by the
installer to maintain compliance with regulatory requirements and to ensure proper unit functionality. See the
related product guide for the most recent country codes and regulatory domains.
You can use the show country command to display a list of supported countries.
Examples
The following example shows how to configure the controllers country code to DE:
(Cisco Controller) >config country DE
1533
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
Related Commands
OL-31334-01
config Commands
config known ap
To configure a known Cisco lightweight access point, use the config known ap command.
config known ap {add | alert | delete} MAC
Syntax Description
Command Default
Command History
Examples
add
alert
delete
MAC
None
Release
Modification
7.6
The following example shows how to add a new access point entry ac:10:02:72:2f:bf on a known access point:
(Cisco Controller) >config known ap add ac:10:02:72:2f:bf 12
1535
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to configure an old bridge access point to associate with the switch:
> config network allow-old-bridge-aps enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
Release
Modification
7.6
If the config interface nat-address management command is set, this command controls which address(es)
are sent in the CAPWAP discovery responses.
If all APs are on the outside of the NAT gateway of the controller, enter the config network ap-discovery
nat-ip-only enable command, and only the management NAT address is sent.
If the controller has both APs on the outside and the inside of its NAT gateway, enter the config network
ap-discovery nat-ip-only disable command, and both the management NAT address and the management
inside address are sent. Ensure that you have entered the config ap link-latency disable all command to avoid
stranding APs.
Examples
1537
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the Cisco lightweight access point fallback:
> config network ap-fallback enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the lightweight access point priority reauthorization:
> config network ap-priority enable
1539
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
shared_secret
Release
Modification
7.6
This command creates a secret that encrypts backhaul user data for the mesh access points that connect to the
switch.
The zero-touch configuration must be enabled for this command to work.
Examples
The following example shows how to configure the bridging shared secret string shhh1:
(Cisco Controller) > config network bridging-shared-secret shhh1
Related Commands
1541
config Commands
Syntax Description
Command Default
Command History
enable
Enables the Cisco wireless LAN controller acting as a Cisco lightweight access
point default master.
disable
Disables the Cisco wireless LAN controller acting as a Cisco lightweight access
point default master.
None
Release
Modification
7.6
Usage Guidelines
This setting is only used upon network installation and should be disabled after the initial network configuration.
Because the Master Cisco wireless LAN controller is normally not used in a deployed network, the Master
Cisco wireless LAN controller setting can be saved from 6.0.199.0 or later releases.
Examples
The following example shows how to enable the Cisco wireless LAN controller as a default master:
(Cisco Controller) > config network master-base enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables Ethernet port 3 of Cisco OfficeExtend 600 Series access points to operate
as a remote LAN port in addition to port 4.
disable
Resets the Ethernet port 3 Cisco OfficeExtend 600 Series access points to function
as a local LAN port.
Release
Modification
7.6
The following example shows how to enable the Ethernet port 3 of Cisco OfficeExtend 600 Series access
points to operate as a remote LAN port:
> config network oeap-600 dual-rlan-ports enable
1543
config Commands
Syntax Description
Command Default
Command History
Examples
enable
Enables access to the local network for the Cisco 600 Series OfficeExtend access
points.
disable
Disables access to the local network for the Cisco 600 Series OfficeExtend access
points.
Access to the local network for the Cisco 600 Series OEAPs is disabled.
Release
Modification
7.6
The following example shows how to enable access to the local network for the Cisco 600 Series OfficeExtend
access points:
> config network oeap-600 local-network enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
1545
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the bridge access point ZeroConfig support:
> config network zero-config enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
ip_address
netmask
None
Release
Modification
7.6
Usage Guidelines
You can configure this command only from the Active controller. For the HA feature, the service port
configurations are made per controller. You will loose these configurations if you change the mode from HA
to non-HA and vice-versa.
Examples
The following example shows how to configure the service port IP and netmask of the peer or standby
controller:
(Cisco Controller) >config redundancy interface address peer-service-port 11.22.44.55
1547
config Commands
Syntax Description
Command Default
Command History
Examples
mac_address
MAC address that is an identifier for the active and standby controller
pair.
None
Release
Modification
7.6
The following example shows how to configure the HA mobility MAC address:
(Cisco Controller) >config redundancy mobilitymac ff:ff:ff:ff:ff:ff
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
sso
none
None
Release
Modification
7.6
Usage Guidelines
You must configure local and peer redundancy management IP addresses before you configure redundancy.
Examples
1549
config Commands
Syntax Description
Command Default
Command History
add
delete
network_ip_address
Network IP address.
netmask
gateway
None
Release
Modification
7.6
Usage Guidelines
You can configure this command only from the Active controller. For the HA feature, the service port
configurations are made per controller. You will lose these configurations if you change the mode from HA
to non-HA and vice-versa.
Examples
The following example shows how to configure route configurations of a peer or standby controller.
(Cisco Controller) >config redundancy peer-route add 10.1.1.0 255.255.255.0 10.1.1.1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
milliseconds
Release
Modification
7.6
The following example shows how to configure the keep-alive timeout value:
(Cisco Controller) >config redundancy timer keep-alive-timer 200
1551
config Commands
Syntax Description
Command Default
Command History
seconds
Value of the peer search timer in seconds. The range is from 60 to 180 secs.
Release
Modification
7.6
Usage Guidelines
You can use this command to configure the boot up role negotiation timeout value in seconds.
Examples
The following example shows how to configure the redundancy peer search timer:
(Cisco Controller) >config redundancy timer peer-search-timer 100
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
primary
secondary
Release
Modification
7.6
Usage Guidelines
When you configure a Cisco WLC as the secondary WLC, it becomes the HA Stakable Unit (SKU) without
any valid AP licenses.
Examples
The following example shows how to configure a Cisco WLC as the primary WLC:
(Cisco Controller) >config redundancy unit primary
1553
config Commands
redundancy force-switchover
To trigger a manual switch over on the active Cisco WLC, use the redundancy force-switchover command.
redundancy force-switchover
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
When a manual switchover occurs, the active Cisco WLC reboots and the standby Cisco WLC takes over the
network. A stateful switchover of access points (AP SSO) is supported. AP SSO ensures that the AP sessions
are maintained after the standby Cisco WLC takes over and the APs switch over to the standby Cisco WLC.
The clients on the active Cisco WLC deauthenticate and join the new active Cisco WLC.
Examples
The following example shows how to trigger a forceful switchover on the Cisco WLC:
(Cisco Controller) >redundancy force-switchover
OL-31334-01
config Commands
config slot
To configure various slot parameters, use the config slot command.
config slot slot_id {enable | disable | channel ap | chan_width | txpower ap | antenna extAntGain
antenna_gain | rts} cisco_ap
Syntax Description
Command Default
Command History
Examples
slot_id
Slot downlink radio to which the channel is assigned. Beginning in Release 7.5
and later releases, you can configure 802.11a on slot 1 and 802.11ac on slot 2.
enable
disable
channel
ap
chan_width
txpower
antenna
extAntGain
antenna_gain
External antenna gain value in .5 dBi units (such as 2.5 dBi = 5).
rts
cisco_ap
None
Release
Modification
7.6
The following example shows how to enable slot 3 for the access point abc:
(Cisco Controller) >config slot 3 enable abc
The following example shows how to configure RTS for the access point abc:
(Cisco Controller) >config slot 2 rts abc
1555
clear Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable WGB VLAN client support:
(Cisco Controller) >config wgb vlan enable
clear Commands
This section lists the clear commands to clear existing configurations, log files, and other functions for access
points .
OL-31334-01
clear Commands
clear ap config
To clear (reset to the default values) a lightweight access points configuration settings, use the clear ap config
command.
clear ap config ap_name
Syntax Description
Command Default
Command History
ap_name
None
Release
Modification
7.6
Usage Guidelines
Entering this command does not clear the static IP address of the access point.
Examples
The following example shows how to clear the access points configuration settings for the access point named
ap1240_322115:
(Cisco Controller) >clear ap config ap1240_322115
Clear ap-config will clear ap config and reboot the AP. Are you sure you want continue?
(y/n)
1557
clear Commands
clear ap eventlog
To delete the existing event log and create an empty event log file for a specific access point or for all access
points joined to the controller, use the clear ap eventlog command.
clear ap eventlog {specific ap_name | all}
Syntax Description
Command Default
Command History
Examples
specific
ap_name
Name of the access point for which the event log file will be emptied.
all
Deletes the event log for all access points joined to the controller.
None
Release
Modification
7.6
The following example shows how to delete the event log for all access points:
(Cisco Controller) >clear ap eventlog all
This will clear event log contents for all APs. Do you want continue? (y/n) :y
Any AP event log contents have been successfully cleared.
OL-31334-01
clear Commands
Syntax Description
Command Default
Command History
Examples
all
ap_mac
None
Release
Modification
7.6
The following example shows how to clear the join statistics of all the access points:
(Cisco Controller) >clear ap join stats all
1559
clear Commands
clear ap tsm
To clear the Traffic Stream Metrics (TSM) statistics of clients associated to an access point, use the clear ap
tsm command.
clear ap tsm {802.11a | 802.11b} cisco_ap all
Syntax Description
Command Default
Command History
Examples
802.11a
802.11b
cisco_ap
all
None
Release
Modification
7.6
The following example shows how to clear 802.11a TSM statistics for all clients of an access point:
(Cisco Controller) >clear ap tsm 802.11a AP3600_1 all
OL-31334-01
debug Commands
Syntax Description
Command Default
None
Command History
Usage Guidelines
Release
Modification
7.6
Note
Examples
The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.
The following example shows how to clear an access points current LWAPP private configuration:
ap_console >clear lwapp private-config
removing the reap config file flash:/lwapp_reap.cfg
debug Commands
This section lists the debug commands to manage debugging of access points managed by the controller.
Caution
Debug commands are reserved for use only under the direction of Cisco personnel. Do not use these
commands without direction from Cisco-certified staff.
1561
debug Commands
debug ap
To configure the remote debugging of Cisco lightweight access points or to remotely execute a command on
a lightweight access point, use the debug ap command.
debug ap {enable | disable | command cmd} cisco_ap
Syntax Description
enable
disable
command
cmd
Command to be executed.
Note
cisco_ap
Command Default
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the remote debugging on access point AP01:
> debug ap enable AP01
The following example shows how to execute the config ap location command on access point AP02:
> debug ap command config ap location "Building 1" AP02
The following example shows how to execute the flash LED command on access point AP03:
> debug ap command led flash 30 AP03
OL-31334-01
debug Commands
debug ap enable
To configure the remote debugging of Cisco lightweight access points or to remotely execute a command on
a lightweight access point, use the debug ap enable command.
debug ap {enable | disable | command cmd} cisco_ap
Syntax Description
enable
disable
command
cmd
Command to be executed.
Note
cisco_ap
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to enable the remote debugging on access point AP01:
> debug ap enable AP01
The following example shows how to disable the remote debugging on access point AP02:
> debug ap disable AP02
The following example shows how to execute the flash LED command on access point AP03:
> debug ap command led flash 30 AP03
1563
debug Commands
debug ap packet-dump
To configure the debugging of Packet Capture, use the debug ap packet-dump command.
debug ap packet-dump {enable | disable}
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
Release
Modification
7.6
Examples
The following example shows how to enable the debugging of Packet Capture from an access point:
> debug ap packet-dump enable
OL-31334-01
debug Commands
Syntax Description
Command Default
802.11a
802.11b
cisco_ap
tx-queue
packet
load
Displays the QoS Basic Service Set (QBSS) and other statistics of the AP.
multicast
client
client_MAC
video
all
video metrics
mgid
mgid_database_number
admission
bandwidth
None
1565
debug Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to troubleshoot the access point AP01s transmit queue traffic on an 802.11a
network:
> debug ap show stats 802.11a AP01 tx-queue
The following example shows how to troubleshoot the access point AP02s multicast supported rates on an
802.11b/g network:
> debug ap show stats 802.11b AP02 multicast
The following example shows how to troubleshoot the metrics of a client identified by its MAC address,
associated with the access point AP01 on an 802.11a network:
> debug ap show stats 802.11a AP01 client 00:40:96:a8:f7:98
The following example shows how to troubleshoot the metrics of all clients associated with the access point
AP01 on an 802.11a network:
> debug ap show stats 802.11a AP01 client all
OL-31334-01
debug Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
multicast mgid
mgid_value
admission
bandwidth
None
Release
Modification
7.6
The following example shows how to configure the debugging of an access point AP01s multicast group that
is identified by the groups Layer 2 MGID database number:
> debug ap show stats video AP01 multicast mgid 50
This example shows how to configure the debugging of an access point AP01s video bandwidth:
> debug ap show stats video AP01 bandwidth
1567
debug Commands
debug capwap
To configure the debugging of Control and Provisioning of Wireless Access Points (CAPWAP) settings, use
the debug capwap command.
debug capwap {detail | dtls-keepalive | errors | events | hexdump | info | packet | payload | mfp} {enable
| disable}
Syntax Description
Command Default
Command History
Examples
detail
dtls-keepalive
Configures the debugging for CAPWAP DTLS data keepalive packets settings.
errors
events
hexdump
info
packet
payload
mfp
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of CAPWAP details:
> debug capwap detail enable
OL-31334-01
debug Commands
debug group
To configure the debugging of access point groups, use the debug group command.
debug group {enable | disable}
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of access point groups:
> debug group enable
1569
debug Commands
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
This access point CLI command must be entered from the access point console port.
Examples
The following example shows how to configure the debugging of the access point console:
AP# debug lwapp console cli
LWAPP console CLI allow/disallow debugging is on
OL-31334-01
debug Commands
debug rfac
To configure the debugging of the Redundancy Framework (RFAC), use the debug rfac command.
debug rfac {[packet | events | errors | detail] [enable | disable]}
Syntax Description
Command Default
Command History
Examples
packet
events
errors
detail
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of Redundancy Framework packets:
> debug rfac packet enable
1571
debug Commands
debug rmgr
To configure the debugging of Redundancy Manager (RMGR), use the debug rmgr command.
debug rmgr {packet | events | errors | detail} {enable | disable}
Syntax Description
Command Default
Command History
packet
events
errors
detail
enable
disable
None
Release
Modification
7.6
Usage Guidelines
Redundancy Manager determines the role of the Cisco WLCs, maintains the keepalive messages between the
peers, and initiates the switchover.
Examples
The following example shows how to enable the debugging of Redundancy Manager packets:
> debug rmgr packet enable
OL-31334-01
debug Commands
debug rsyncmgr
To configure the debugging of the Redundancy Sync Manager (RSYNCMGR), use the debug rsyncmgr
command.
debug rsyncmgr {packet | events | errors | detail} {enable | disable}}
Syntax Description
Command Default
Command History
packet
events
errors
detail
enable
disable
None
Release
Modification
7.6
Usage Guidelines
Redundancy Synchronization Manager synchronizes the configurations of the active and standby Cisco WLCs.
Examples
The following example shows how to enable the debugging of Redundancy Sync Manager packets:
> debug rsyncmgr packet enable
1573
debug Commands
Syntax Description
Command Default
Command History
Examples
all
error
event
nmsp
packet
enable
disable
None
Release
Modification
7.6
The following example shows how to configure the debugging of access point monitor NMSP events:
> debug service ap-monitor events
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to start uploading a file to the peer controller:
> transfer upload peer-start
Mode.............................................
FTP Server IP....................................
FTP Server Port..................................
FTP Path.........................................
FTP Filename.....................................
FTP Username.....................................
FTP Password.....................................
Data Type........................................
FTP
209.165.201.1
21
/builds/nimm/
AS_5500_7_4_1_20.aes
wnbu
*********
Error Log
Are you sure you want to start upload from standby? (y/N) n
Transfer Canceled
1575
reset system at
To reset the system at a specified time, use the reset system at command.
reset system at YYYY-MM-DD HH:MM:SS image {no-swap|swap} reset-aps [save-config]
Syntax Description
Command Default
Command History
Examples
YYYY-MM-DD
HH: MM: SS
image
swap
no-swap
reset-aps
save-config
None
Release
Modification
7.6
The following example shows how to reset the system at 2010-03-29 and 12:01:01 time:
(Cisco Controller) > reset system at 2010-03-29 12:01:01 image swap reset-aps save-config
OL-31334-01
reset system in
To specify the amount of time delay before the devices reboot, use the reset system in command.
reset system in HH:MM:SS image {swap | no-swap} reset-aps save-config
Syntax Description
Command Default
Command History
Examples
HH :MM :SS
image
swap
no-swap
reset-aps
save-config
None
Release
Modification
7.6
The following example shows how to reset the system after a delay of 00:01:01:
(Cisco Controller) > reset system in 00:01:01 image swap reset-aps save-config
1577
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
Syntax Description
Command Default
Command History
Examples
minutes
The default time period to configure the trap generation prior to scheduled resets is 10 minutes.
Release
Modification
7.6
The following example shows how to configure the trap generation to 10 minutes before the scheduled resets:
(Cisco Controller) > reset system notify-time 55
1579
test Commands
reset peer-system
To reset the peer controller, use the reset peer-system command.
reset peer-system
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
test Commands
This section lists the test commands for access points.
OL-31334-01
test Commands
test ap
To enable or disable the Path Maximum Transmission Unit (PMTU) on the CAPWAP tunnel of a Cisco access
point, use the test ap command.
test ap {pmtu {enable | disable} cisco_ap | group-name-reset {enable | disable}}
Syntax Description
enable
disable
cisco_ap
group-name-reset
Command Default
None.
Examples
This example shows how to enable PMTU on the CAPWAP tunnel of a Cisco access point:
> test ap pmtu enable AP1600_1
Related Commands
test ap
test capwap
test ccx
test cleanair
test ftpstatus
test lic-agent
test license
test log
test make-space
test media
test reader
test redundancy
test rrm
test sip-cac-fail
test token-bucket
test wlan
1581
test Commands
test capwap
To configure an access point to send broadcast radio measurement requests to clients, or to enable the encryption
of control packets that are sent between the access point and the controller, use the test capwap command.
test capwap {message token cisco_ap | encr cisco_ap {enable | disable}}
Syntax Description
message
token
Time interval for the access point to send a broadcast radio measurement requests
to clients.
cisco_ap
encr
Encrypts or decrypts the control packets that are sent between the access point and
the controller.
enable
Enables the encryption or decryption of control packets that are sent between the
access point and the controller.
disable
Disables the encryption or decryption of control packets that are sent between the
access point and the controller.
Command Default
None.
Examples
Related Commands
test ap
test capwap
test ccx
test cleanair
test ftpstatus
test lic-agent
test license
test log
test make-space
test media
test reader
OL-31334-01
test Commands
test redundancy
test rrm
test sip-cac-fail
test token-bucket
test wlan
1583
test Commands
OL-31334-01
PART
VII
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
This chapter describes the how to control and configure Mesh access points using the controller commands
and contains the following sections:
show mesh Commands, page 1588
config mesh Commands, page 1608
debug Commands, page 1636
1587
OL-31334-01
show mesh ap
To display settings for mesh access points, use the show mesh ap command.
show mesh ap {summary | tree}
Syntax Description
Command Default
Command History
Examples
summary
Displays a summary of mesh access point information including the name, model,
bridge virtual interface (BVI) MAC address, United States Computer Emergency
Response Team (US-CERT) MAC address, hop, and bridge group name.
tree
None
Release
Modification
7.6
The following example shows how to display settings in a hierarchical (tree) format:
(Cisco Controller) >show mesh ap tree
=======================================================
|| AP Name [Hop Counter, Link SNR, Bridge Group Name] ||
=======================================================
[Sector 1]
---------SB_RAP1[0,0,sbox]
|-SB_MAP1[1,32,sbox]
|-SB_MAP2[2,27,sbox]
|-SB_MAP3[3,30,sbox]
---------------------------------------------------Number of Mesh APs............................... 4
Number of RAPs................................... 1
Number of MAPs................................... 3
----------------------------------------------------
1589
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to display anti-stranding statistics on all outdoor mesh access points:
(Cisco Controller) >show mesh astools stats
Total No of Aps stranded : 0
The following example shows how to display anti-stranding statistics for access point sb_map1:
(Cisco Controller) >show mesh astools stats sb_map1
Total No of Aps stranded : 0
OL-31334-01
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
1591
Syntax Description
Command Default
Command History
Examples
summary
Displays the total number of voice calls and voice bandwidth used for each mesh access
point.
bwused
voice
Displays the mesh topology and the voice bandwidth used or available.
video
Displays the mesh topology and the video bandwidth used or available.
access
callpath
rejected
cisco_ap
None
Release
Modification
7.6
The following example shows how to display a summary of the call admission control settings:
(Cisco Controller) >show mesh cac summary
AP Name
Slot#
Radio BW Used/Max Calls
----------------- ------- ----- ----------- ----SB_RAP1
0
11b/g
0/23437
0
1
11a
0/23437
0
SB_MAP1
0
11b/g
0/23437
0
1
11a
0/23437
0
SB_MAP2
0
11b/g
0/23437
0
1
11a
0/23437
0
SB_MAP3
0
11b/g
0/23437
0
1
11a
0/23437
0
The following example shows how to display the mesh topology and the voice bandwidth used or available:
(Cisco Controller) >show mesh cac bwused voice SB_MAP1
AP Name
Slot#
Radio
BW Used/Max
------------------- --------------SB_RAP1
0
11b/g
0/23437
1
11a
0/23437
OL-31334-01
SB_MAP1
||
SB_MAP2
||| SB_MAP3
0
1
0
1
0
1
11b/g
11a
11b/g
11a
11b/g
11a
0/23437
0/23437
0/23437
0/23437
0/23437
0/23437
The following example shows how to display the access voice calls in progress in a tree topology:
(Cisco Controller) >show mesh cac access 1524_Map1
AP Name
Slot#
Radio
Calls
------------------- --------1524_Rap
0
11b/g
0
1
11a
0
2
11a
0
|
1524_Map1
0
11b/g
0
1
11a
0
2
11a
0
|| 1524_Map2
0
11b/g
0
1
11a
0
2
11a
0
1593
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display backhaul client access configuration settings for a mesh access
point:
(Cisco Controller) >show mesh client-access
Backhaul with client access status: enabled
Backhaul with client access extended status(3 radio AP): disabled
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
8.0
The following example shows how to display global mesh configuration settings:
(Cisco Controller) >show mesh config
Mesh Range.......................................
Mesh Statistics update period....................
Backhaul with client access status...............
Backhaul with extended client access status......
Background Scanning State........................
Backhaul Amsdu State.............................
Mesh Security
Security Mode.................................
External-Auth.................................
Use MAC Filter in External AAA server.........
Force External Authentication.................
Mesh Alarm Criteria
Max Hop Count.................................
Recommended Max Children for MAP..............
Recommended Max Children for RAP..............
Low Link SNR..................................
High Link SNR.................................
Max Association Number........................
Association Interval..........................
Parent Change Numbers.........................
Parent Change Interval........................ 60
Mesh Multicast Mode..............................
Mesh Full Sector DFS.............................
Mesh Ethernet Bridging VLAN Transparent Mode.....
Mesh DCA channels for serial backhaul APs........
Mesh Slot Bias...................................
Mesh Convergence Method..........................
12000
3 minutes
disabled
disabled
enabled
disabled
EAP
disabled
disabled
disabled
4
10
20
12
60
10
60 minutes
3
minutes
In-Out
enabled
disabled
enabled
enabled
standard
1595
Syntax Description
Command Default
None
Command History
Release
Modification
8.0
Usage Guidelines
Examples
OL-31334-01
Syntax Description
Command Default
Command History
Examples
summary
cisco_ap
None
Release
Modification
7.6
The following example shows how to display global environment summary information:
(Cisco Controller) >show mesh env summary
AP Name
Temperature(C) Heater
------------------ -------------- -----ap1130:5f:be:90
N/A
N/A
AP1242:b2.31.ea
N/A
N/A
AP1131:f2.8d.92
N/A
N/A
AP1131:46f2.98ac
N/A
N/A
ap1500:62:39:70
-36
OFF
Ethernet
-------DOWN
DOWN
DOWN
DOWN
UP
Battery
------N/A
N/A
N/A
N/A
N/A
The following example shows how to display an environment summary for an access point:
(Cisco Controller) >show mesh env SB_RAP1
AP Name..........................................
AP Model.........................................
AP Role..........................................
Temperature......................................
Heater...........................................
Backhaul.........................................
GigabitEthernet0 Status..........................
Duplex.......................................
Speed........................................
Rx Unicast Packets...........................
Rx Non-Unicast Packets.......................
Tx Unicast Packets...........................
Tx Non-Unicast Packets.......................
GigabitEthernet1 Status..........................
POE Out........................................
Battery..........................................
SB_RAP1
AIR-LAP1522AG-A-K9
RootAP
21 C, 69 F
OFF
GigabitEthernet0
UP
FULL
100
114754
1464
9630
3331
DOWN
OFF
N/A
1597
Syntax Description
Note
Command History
Examples
detail
Displays the channel and signal-to-noise ratio (SNR) details between the
designated mesh access point and its neighbor.
summary
cisco_ap
all
If an AP itself is configured with the allkeyword, the allkeyword access points take precedence over the
AP that is named all.
Release
Modification
7.6
The following example shows how to display a neighbor summary of an access point:
(Cisco Controller) >show mesh neigh summary RAP1
AP Name/Radio Mac Channel Rate Link-Snr Flags
----------------- ------- ----- -------- -------00:1D:71:0F:CA:00 157
54
6
0x0
00:1E:14:48:25:00 157
24
1
0x0
MAP1-BB00
157
54
41
0x11
State
-------BEACON
BEACON
CHILD BEACON
The following example shows how to display the detailed neighbor statistics of an access point:
(Cisco Controller) >show mesh neigh detail RAP1
AP MAC : 00:1E:BD:1A:1A:00 AP Name: HOR1522_MINE06_MAP_S_Dyke
backhaul rate 54
FLAGS : 860 BEACON
worstDv 255, Ant 0, channel 153, biters 0, ppiters 0
Numroutes 0, snr 0, snrUp 8, snrDown 8, linkSnr 8
adjustedEase 0, unadjustedEase 0
txParent 0, rxParent 0
poorSnr 0
lastUpdate 2483353214 (Sun Aug 4 23:51:58 1912)
parentChange 0
Per antenna smoothed snr values: 0 0 0 0
Vector through 00:1E:BD:1A:1A:00
The following table lists the output flags displayed for the show mesh neigh detail command.
OL-31334-01
Table 15: Output Flags for the show mesh neigh detail command
Output Flag
Description
AP MAC
AP Name
FLAGS
worstDv
Ant
channel
biters
ppiters
Numroutes
snr
snrUp
snrDown
linkSnr
adjustedEase
Ease to the root AP through this AP. It is based on the current SNR and threshold
SNR values.
unadjustedEase
Ease to the root AP through this AP after applying correct for number of hops.
1599
Output Flag
Description
txParent
rxparent
poorSnr
lastUpdate
parentChange
OL-31334-01
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to display channel and SNR details for a designated link path:
(Cisco Controller) >show mesh path mesh-45-rap1
AP Name/Radio Mac Channel Rate Link-Snr Flags
----------------- ------- ----- -------- -------MAP1-BB00
157
54
32
0x0
RAP1
157
54
37
0x0
State
-------UPDATED NEIGH PARENT BEACON
BEACON
1601
Syntax Description
Note
Command History
summary
cisco_ap
all
If an AP itself is configured with the allkeyword, the allkeyword access points take precedence over the
AP that is named all.
Release
Modification
7.6
Usage Guidelines
The packet error rate percentage equals 1, which is the number of successfully transmitted packets divided
by the number of total packets transmitted.
Examples
The following example shows how to display the percentage of packet errors for packets transmitted by the
neighbors to a mesh access point:
(Cisco Controller) >show mesh per-stats
Neighbor MAC Address 00:0B:85:5F:FA:F0
Total Packets transmitted:
Total Packets transmitted successfully:
Total Packets retried for transmission:
RTS Attempts:
RTS Success:
Neighbor MAC Address:
Total Packets transmitted:
Total Packets transmitted successfully:
Total Packets retried for transmission:
Neighbor MAC Address:
Total Packets transmitted:
Total Packets transmitted successfully:
Total Packets retried for transmission:
RTS Attempts:
RTS Success:
summary ap_12
104833
104833
33028
0
0
00:0B:85:80:ED:D0
0
0
0
00:17:94:FE:C3:5F
0
0
0
0
0
OL-31334-01
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to view 4.8-GHz public safety settings:
(Cisco Controller) >(Cisco Controller) >show mesh public-safety
Global Public Safety status: disabled
1603
Note
Syntax Description
Command Default
Command History
Examples
If an AP itself is configured with the allkeyword, the allkeyword access points take precedence over the
AP that is named all.
cisco_ap
Name of access point for which you want packet queue statistics.
all
None
Release
Modification
7.6
The following example shows how to display packet queue statistics for access point ap417:
(Cisco Controller) >show mesh queue-stats ap417
Queue Type Overflows Peak length Average length
---------- --------- ----------- -------------Silver
0
1
0.000
Gold
0
4
0.004
Platinum
0
4
0.001
Bronze
0
0
0.000
Management 0
0
0.000
OL-31334-01
Syntax Description
Note
Command Default
Command History
cisco_ap
Name of access point for which you want packet error statistics.
all
If an AP itself is configured with the allkeyword, the allkeyword access points take precedence over the
AP that is named all.
None
Release
Modification
7.6
Usage Guidelines
This command shows packet error statistics and a count of failures, timeouts, and successes with respect to
associations and authentications as well as reassociations and reauthentications for the specified access point
and its child.
Examples
The following example shows how to display packet error statistics for access point ap417:
(Cisco Controller) >show mesh security-stats ap417
AP MAC : 00:0B:85:5F:FA:F0
Packet/Error Statistics:
----------------------------x Packets 14, Rx Packets 19, Rx Error Packets 0
Parent-Side Statistics:
-------------------------Unknown Association Requests 0
Invalid Association Requests 0
Unknown Re-Authentication Requests 0
Invalid Re-Authentication Requests 0
Unknown Re-Association Requests 0
Invalid Re-Association Requests 0
Child-Side Statistics:
-------------------------Association Failures 0
Association Timeouts 0
Association Successes 0
Authentication Failures 0
Authentication Timeouts 0
Authentication Successes 0
Re-Association Failures 0
1605
Re-Association Timeouts 0
Re-Association Successes 0
Re-Authentication Failures 0
Re-Authentication Timeouts 0
Re-Authentication Successes 0
OL-31334-01
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
1607
OL-31334-01
Syntax Description
enable
disable
Command Default
None.
Examples
This example shows how to enable anti-stranding on all outdoor mesh access points:
> config mesh astools enable
Related Commands
1609
Syntax Description
all
bronze
silver
gold
platinum
enable
disable
Command Default
Disabled.
Usage Guidelines
To use this command, mesh backhaul with client access must be enabled by using the config mesh client-access
command.
Note
Examples
This example shows how to set the backhaul client access to the best-effort level:
> config mesh backhaul rate-adapt silver
Related Commands
OL-31334-01
Syntax Description
slot_id
enable
disable
cisco_ap
Name of the Root AP of the sector on which the backhaul needs to be enabled
or disabled.
Command Default
Disabled.
Usage Guidelines
For 2.4-GHz, only slot 0 and 1 are valid. If slot 0 is enabled, then slot 1 is automatically be disabled. If slot
0 is disabled, then slot 1 is automatically enabled. The config mesh backhaul slot command is applicable
only to AP1522.
Examples
This example shows how to enable slot 1 as the preferred backhaul for the root AP myrootap1:
> config mesh backhaul slot 1 enable myrootap1
Related Commands
1611
Syntax Description
enable
disable
all
cisco_ap
Command Default
Disabled.
Examples
This example shows how to set the backhaul client access to the best-effort level:
> config mesh battery-state enable all
OL-31334-01
Syntax Description
max-hop
Sets the maximum number of hops before triggering an alarm for traffic
over the mesh network. The range is from 1 to 16.
max-children
Sets the maximum number of mesh access points (MAPs) that can be
assigned to a mesh router access point (RAP) before triggering an alarm.
The range is from 1 to 16.
low-snr
high-snr
Sets the high-end SNR value before triggering an alarm. The range is from
1 to 30 (inclusive).
association
Sets the mesh alarm association count value before triggering an alarm.
The range is from 1 to 30 (inclusive).
parent-change count
Sets the number of times a MAP can change its RAP association before
triggering an alarm. The range is from 1 to 30 (inclusive).
value
Value above or below which an alarm is generated. The valid values vary
for each command.
Command Default
See the Syntax Description section for command and argument value ranges.
Examples
This example shows how to set the upper SNR threshold to 25:
>
Related Commands
1613
OL-31334-01
Syntax Description
enable
extended
(Optional) Enables client access over both the backhaul radios for
1524 serial backhaul access points.
disable
Command Default
Disabled.
Usage Guidelines
Backhaul interfaces (802.11a radios) act as primary Ethernet interfaces. Backhauls function as trunks in the
network and carry all VLAN traffic between the wireless and wired network. No configuration of primary
Ethernet interfaces is required.
When this feature is enabled, Cisco Aironet 1520 series (152x) mesh access points allow wireless client
association over the 802.11a radio, which implies that a 152x mesh access point can carry both backhaul
traffic and 802.11a client traffic over the same 802.11a radio.
When this feature is disabled, the 152x carries backhaul traffic over the 802.11a radio and allows client
association only over the 802.11b/g radio.
Examples
This example shows how to enable client access extended to allow a wireless client association over the
802.11a radio:
> config mesh client-access enable extended
Enabling client access on both backhaul slots
Same BSSIDs will be used on both slots
All Mesh AP will be rebooted
Are you sure you want to start? (y/N)Y
This example shows how to restrict a wireless client association to the 802.11b/g radio:
> config mesh client-access disable
All Mesh AP will be rebooted
Are you sure you want to start? (Y/N) Y
Backhaul with client access is cancelled.
Related Commands
1615
OL-31334-01
Syntax Description
Command Default
Command History
Usage Guidelines
fast
standard
very-fast
all
Sets the selected mesh convergence method on all the mesh access
points.
Release
Modification
8.0
The standard convergence method is available on Release 7.6 onwards. The fast and very fast convergence
methods are available from Release 8.0.
This table lists the different convergence methods.
Examples
Convergence method
Parent loss
Timer (seconds)
Standard
21
Fast
Very Fast
1.5
1617
Syntax Description
enable
disable
Command Default
Enabled.
Usage Guidelines
VLAN transparent is enabled as a default to ensure a smooth software upgrade from 4.1.192.xxM releases to
release 5.2. Release 4.1.192.xxM does not support VLAN tagging.
Examples
Related Commands
OL-31334-01
Syntax Description
enable
disable
Command Default
None.
Usage Guidelines
This command instructs the mesh sector to make a coordinated channel change on the detection of a radar
signal. For example, if a mesh access point (MAP) detects a radar signal, the MAP will notify the root access
point (RAP), and the RAP will initiate a sector change.
All MAPs and the RAP that belong to that sector go to a new channel, which lowers the probability of MAPs
stranding when radar is detected on the current backhaul channel, and no other valid parent is available as
backup.
Each sector change causes the network to be silent for 60 seconds (as dictated by the DFS standard).
It is expected that after a half hour, the RAP will go back to the previously configured channel, which means
that if radar is frequently observed on a RAP's channel, it is important that you configure a different channel
for that RAP to exclude the radar affected channel at the controller.
Examples
Related Commands
1619
Syntax Description
Command Default
destination_ap_name
Disabled.
Usage Guidelines
Note
The config mesh linktest and config mesh linkdata commands are designed to be used together to verify
information between a source and a destination access point. To get this information, first execute the
config mesh linktest command with the access point that you want link data from in the dest_ap argument.
When the command completes, enter the config mesh linkdata command and list the same destination
access point, to display the link data will display (see example).
MAC filtering uses the local MAC filter on the controller by default.
When external MAC filter authorization is enabled, if the MAC address is not found in the local MAC filter,
then the MAC address in the external RADIUS server is used.
MAC filtering protects your network against rogue mesh access points by preventing access points that are
not defined on the external server from joining.
Before employing external authentication within the mesh network, the following configuration is required:
The RADUIS server to be used as an AAA server must be configured on the controller.
The controller must also be configured on the RADIUS server.
The mesh access point configured for external authorization and authentication must be added to the
user list of the RADIUS server.
Examples
This example shows how to enable external MAC address filtering on access point AP001d.710d.e300:
> config mesh linkdata MAP2-1-1522.7400 AP001d.710d.e300 18 100 1000 30
LinkTest started on source AP, test ID: 0
[00:1D:71:0E:74:00]->[00:1D:71:0D:E3:0F]
Test config: 1000 byte packets at 100 pps for 30 seconds, a-link rate 18 Mb/s
In progress: | || || || || || || || || || || || || |
LinkTest complete
Results
=======
txPkts:
2977
txBuffAllocErr:
0
txQFullErrs:
0
Total rx pkts heard at destination:
2977
rx pkts decoded correctly:
2977
err pkts: Total
0 (PHY 0 + CRC 0 + Unknown 0), TooBig 0, TooSmall 0
rx lost packets:
0 (incr for each pkt seq missed or out of order)
OL-31334-01
rx dup pkts:
0
rx out of order:
0
avgSNR:
30, high:
33, low:
3
SNR profile
[0dB...60dB]
0
6
0
0
0
0
0
1
2
77
2888
3
0
0
0
0
0
0
0
0
(>60dB)
0
avgNf:
-95, high: -67, low: -97
Noise Floor profile [-100dB...-40dB]
0
2948
19
3
1
0
0
0
0
0
3
3
0
0
0
0
0
0
0
0
(>-40dB)
0
avgRssi:
64, high:
68, low:
63
RSSI profile
[-100dB...-40dB]
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
(>-40dB)
2977
Summary PktFailedRate (Total pkts sent/recvd):
0.000%
Physical layer Error rate (Total pkts with errors/Total pkts heard): 0.000%
This example shows how to enable external MAC filtering on access point AP001d.71d.e300:
> config mesh linkdata AP001d.710d.e300
[SD:0,0,0(0,0,0), 0,0, 0,0]
[SD:1,105,0(0,0,0),30,704,95,707]
[SD:2,103,0(0,0,0),30,46,95,25]
[SD:3,105,0(0,0,0),30,73,95,29]
[SD:4,82,0(0,0,0),30,39,95,24]
[SD:5,82,0(0,0,0),30,60,95,26]
[SD:6,105,0(0,0,0),30,47,95,23]
[SD:7,103,0(0,0,0),30,51,95,24]
[SD:8,105,0(0,0,0),30,55,95,24]
[SD:9,103,0(0,0,0),30,740,95,749]
[SD:10,105,0(0,0,0),30,39,95,20]
[SD:11,104,0(0,0,0),30,58,95,23]
[SD:12,105,0(0,0,0),30,53,95,24]
[SD:13,103,0(0,0,0),30,64,95,43]
[SD:14,105,0(0,0,0),30,54,95,27]
[SD:15,103,0(0,0,0),31,51,95,24]
[SD:16,105,0(0,0,0),30,59,95,23]
[SD:17,104,0(0,0,0),30,53,95,25]
[SD:18,105,0(0,0,0),30,773,95,777]
[SD:19,103,0(0,0,0),30,745,95,736]
[SD:20,105,0(0,0,0),30,64,95,54]
[SD:21,103,0(0,0,0),30,747,95,751]
[SD:22,105,0(0,0,0),30,55,95,25]
[SD:23,104,0(0,0,0),30,52,95,35]
[SD:24,105,0(0,0,0),30,134,95,23]
[SD:25,103,0(0,0,0),30,110,95,76]
[SD:26,105,0(0,0,0),30,791,95,788]
[SD:27,103,0(0,0,0),30,53,95,23]
[SD:28,105,0(0,0,0),30,128,95,25]
[SD:29,104,0(0,0,0),30,49,95,24]
[SD:30,0,0(0,0,0), 0,0, 0,0]
Related Commands
1621
OL-31334-01
Syntax Description
source_ap
dest_ap
dest_MAC
datarate
Data rate for 802.11a radios. Valid values are 6, 9, 11, 12, 18, 24, 36, 48
and 54 Mbps.
Data rate for 802.11b radios. Valid values are 6, 12, 18, 24, 36, 54, or 100
Mbps.
Data rate for 802.11n radios. Valid values are MCS rates between m0 to
m15.
Command Default
packet_rate
Number of packets per second. Valid range is 1 through 3000, but the
recommended default is 100.
packet_size
(Optional) Packet size in bytes. If not specified, packet size defaults to 1500
bytes.
duration
(Optional) Duration of the test in seconds. Valid values are 10-300 seconds,
inclusive. If not specified, duration defaults to 30 seconds.
Usage Guidelines
Note
The config mesh linktest and config mesh linkdata commands are designed to be used together to verify
information between a source and a destination access point. To get this information, first enter the config
mesh linktest command with the access point that you want link data from in the dest_ap argument. When
the command completes, enter the config mesh linkdata command and list the same destination access
point, to display the link data.
The following warning message appears when you run a linktest that might oversubscribe the link:
Warning! Data Rate (100 Mbps) is not enough to perform this link test on packet size (2000bytes) and (1000)
packets per second. This may cause AP to disconnect or reboot. Are you sure you want to continue?
1623
Examples
This example shows how to verify client access between mesh access points SB_MAP1 and SB_RAP2 at 36
Mbps, 20 fps, 100 frame size, and 15 second duration:
> config mesh linktest SB_MAP1 SB_RAP1 36 20 100 15
LinkTest started on source AP, test ID: 0
[00:1D:71:0E:85:00]->[00:1D:71:0E:D0:0F]
Test config: 100 byte packets at 20 pps for 15 seconds, a-link rate 36 Mb/s
In progress: | || || || || || |
LinkTest complete
Results
=======
txPkts:
290
txBuffAllocErr:
0
txQFullErrs:
0
Total rx pkts heard at destination:
290
rx pkts decoded correctly:
err pkts: Total
0 (PHY 0 + CRC 0 + Unknown 0), TooBig 0, TooSmall 0
rx lost packets:
0 (incr for each pkt seq missed or out of order)
rx dup pkts:
0
rx out of order:
0
avgSNR:
37, high:
40, low:
5
SNR profile
[0dB...60dB]
0
1
0
0
1
3
0
1
0
2
8
27
243
4
0
0
0
0
0
0
(>60dB)
0
avgNf:
-89, high: -58, low: -90
Noise Floor profile [-100dB...-40dB]
0
0
0
145
126
11
2
0
1
0
3
0
1
0
1
0
0
0
0
0
(>-40dB)
0
avgRssi:
51, high:
53, low:
50
RSSI profile
[-100dB...-40dB]
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
7
283
0
0
(>-40dB)
0
Summary PktFailedRate (Total pkts sent/recvd):
0.000%
Physical layer Error rate (Total pkts with errors/Total pkts heard): 0.000%
The following table lists the output flags displayed for the config mesh linktest command.
Table 16: Output Flags for the Config Mesh Linktest Command
Output Flag
Description
txPkts
txBuffAllocErr
txQFullErrs
Total rx pkts heard at Number of linktest packets received at the destination (expected to be same as or
destination
close to the txPkts).
rx pkts decoded
correctly
Number of linktest packets received and decoded correctly at the destination (expected
to be same as close to txPkts).
OL-31334-01
Related Commands
Output Flag
Description
rx lost packets
rx dup pkts
rx out of order
avgNF
avgSNR
SNR profile
[odb...60dB]
Histogram samples received between 0 to 60 dB. The different colums in the SNR
profile is the number of packets falling under the bucket 0-3, 3-6, 6-9, up to 57-60.
avgRSSI
Average RSSI values. The average high and low RSSI values are positive numbers.
RSSI profile
[-100dB...-40dB]
1625
Syntax Description
enable
disable
Command Default
None.
Examples
Related Commands
OL-31334-01
Syntax Description
regular
Multicasts the video across the entire mesh network and all its segments by
bridging-enabled root access points (RAPs) and mesh access points (MAPs).
in
Forwards the multicast video received from the Ethernet by a MAP to the RAPs
Ethernet network. No additional forwarding occurs, which ensures that
non-LWAPP multicasts received by the RAP are not sent back to the MAP
Ethernet networks within the mesh network (their point of origin), and
MAP-to-MAP multicasts do not occur because they are filtered out
in-out
Configures the RAP and MAP to multicast, but each in a different manner:
If multicast packets are received at a MAP over Ethernet, they are sent to the
RAP; however, they are not sent to other MAP Ethernets, and the MAP-to-MAP
packets are filtered out of the multicast.
If multicast packets are received at a RAP over Ethernet, they are sent to all the
MAPs and their respective Ethernet networks. See the Usage Guidelines section
for more information.
Command Default
In-out mode.
Usage Guidelines
Multicast for mesh networks cannot be enabled using the controller GUI.
Mesh multicast modes determine how bridging-enabled access points mesh access points (MAPs) and root
access points (RAPs) send multicasts among Ethernet LANs within a mesh network. Mesh multicast modes
manage non-LWAPP multicast traffic only. LWAPP multicast traffic is governed by a different mechanism.
You can use the controller CLI to configure three mesh multicast modes to manage video camera broadcasts
on all mesh access points. When enabled, these modes reduce unnecessary multicast transmissions within the
mesh network and conserve backhaul bandwidth.
When using in-out mode, it is important to properly partition your network to ensure that a multicast sent by
one RAP is not received by another RAP on the same Ethernet segment and then sent back into the network.
Note
If 802.11b clients need to receive CAPWAP multicasts, then multicast must be enabled globally on the
controller as well as on the mesh network (by using the config network multicast global command). If
multicast does not need to extend to 802.11b clients beyond the mesh network, you should disable the
global multicast parameter.
1627
Examples
This example shows how to multicast video across the entire mesh network and all its segments by
bridging-enabled RAPs and MAPs:
> config mesh multicast regular
Related Commands
OL-31334-01
Syntax Description
Command Default
Command History
Usage Guidelines
cisco_ap
mac_address
none
None
Release
Modification
7.6
Examples
The following example shows how to configure a preferred parent with the MAC address 00:21:1b:ea:36:60
for a mesh access point myap1:
(Cisco Controller) >config mesh parent preferred myap1 00:21:1b:ea:36:60
The following example shows how to clear a preferred parent for a mesh access point myap1 by using the
keyword none:
(Cisco Controller) >config mesh parent preferred myap1 none
1629
Syntax Description
enable
disable
all
cisco_ap
Command Default
Disabled.
Usage Guidelines
Examples
This example shows how to enable the 4.9-GHz public safety band for all mesh access points:
> config mesh public-safety enable all
4.9GHz is a licensed frequency band in -A domain for public-safety usage
Are you sure you want to continue? (y/N) y
Related Commands
OL-31334-01
Syntax Description
index
enable
disable
Command Default
Examples
This example shows how to enable external authentication for mesh access points:
> config mesh radius-server eap enable
Related Commands
1631
Syntax Description
distance
(Optional) Maximum operating range (150 to 132000 ft) of the mesh access
point.
Command Default
12,000 feet.
Usage Guidelines
After this command is enabled, all outdoor mesh access points reboot. This command does not affect indoor
access points.
Examples
This example shows how to set the range between an outdoor mesh RAP and a MAP:
> config mesh range 300
Command not applicable for indoor mesh. All outdoor Mesh APs will be rebooted
Are you sure you want to start? (y/N) y
Related Commands
OL-31334-01
Syntax Description
Command Default
enable
force-same-secondarychannel
disable
rll-transmit
(Optional) Uses reliable link layer (RLL) at the second hop and beyond.
rll-retransmit
None.
Usage Guidelines
Note
The secondary backhaul access feature is not supported by Cisco 1520 and 1524 indoor mesh access points
in the 5.2 release.
This command uses a secondary backhaul radio as a temporary path for traffic that cannot be sent on the
primary backhaul due to intermittent interference.
Examples
This example shows ho to enable a secondary backhaul radio and force all access points rooted at the first
hop node to have the same secondary channel:
> config mesh secondary-backhaul enable force-same-secondary-channel
Related Commands
1633
Syntax Description
rad-mac-filter
Enables a RADIUS MAC address filter for the mesh security setting.
force-ext-auth
enable
disable
eap
Designates the Extensible Authentication Protocol (EAP) for the mesh security
setting.
psk
Command Default
EAP.
Examples
This example shows how to configure EAP as the security option for all mesh access points:
> config mesh security eap
This example shows how to configure PSK as the security option for all mesh access points:
> config mesh security psk
Related Commands
OL-31334-01
Syntax Description
enable
disable
Command Default
Usage Guidelines
Examples
This example shows how to disable slot bias for serial backhaul mesh APs:
> config mesh slot-bias disable
Related Commands
1635
debug Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable LSC on mesh access point:
(Cisco Controller) >config lsc mesh enable
debug Commands
This section describes the controller debug commands to troubleshoot Mesh access points.
Caution
Debug commands are reserved for use only under the direction of Cisco personnel. Do not use these
commands without direction from Cisco-certified staff.
OL-31334-01
debug Commands
Syntax Description
Command Default
Command History
Examples
all
events
errors
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of mesh security error messages:
(Cisco Controller) >debug mesh security errors enable
1637
debug Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
8.0
The following example shows how to enable the debugging of mesh covergence error messages:
(Cisco Controller) >debug mesh convergence
mesh convergence debugging is on
OL-31334-01
PART
VIII
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands, page 1641
config Commands, page 1658
Configuring 802.11k and Assisted Roaming, page 1754
debug Commands, page 1758
show Commands
This section lists the show commands to display information about your Radio Resource Management (RRM)
configuration settings.
1641
show Commands
Syntax Description
Command Default
Command History
Examples
extended
None
Release
Modification
7.6
8.0
The following example shows how to display radio extended configurations and the Rx SOP threshold:
(Cisco Controller) > show 802.11a extended
Default 802.11a band Radio Extended Configurations:
Beacon period: 100, range: 0 (AUTO);
Multicast buffer: 0 (AUTO), rate: 0 (AUTO);
RX SOP threshold: -76; CCA threshold: 0 (AUTO);
AP3600-XALE3 34:a8:4e:6a:7b:00
Beacon period: 100, range: 0 (AUTO);
Multicast buffer: 0 (AUTO), rate: 0 (AUTO);
RX SOP threshold: -76; CCA threshold: 0 (AUTO);
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display the automatic channel assignment configuration and statistics:
(Cisco Controller) > show advanced 802.11a channel
1643
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display the statistics for coverage hole detection:
(Cisco Controller) > show advanced 802.11a coverage
Enabled
100 packets
50%
-80 dBm
50 packets
50%
-80 dBm
25 %
3 clients
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display Cisco radio RF group settings:
(Cisco Controller) > show advanced 802.11a group
Radio RF Grouping
802.11a Group Mode................................... AUTO
802.11a Group Update Interval........................ 600 seconds
802.11a Group Leader................................. xx:xx:xx:xx:xx:xx
802.11a Group Member............................... xx:xx:xx:xx:xx:xx
802.11a Last Run..................................... 133 seconds ago
1645
show Commands
Syntax Description
Command Default
Command History
Examples
rf-param
statistics
mac_address
None
Release
Modification
7.6
The following is a sample output of the show advanced 802.11b l2roam rf-param command:
(Cisco Controller) > show advanced 802.11b l2roam rf-param
L2Roam 802.11bg RF Parameters.....................
Config Mode.................................. Default
Minimum RSSI................................. -85
Roam Hysteresis.............................. 2
Scan Threshold............................... -72
Transition time.............................. 5
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display 802.11b RF event and performance logging:
(Cisco Controller) > show advanced 802.11b logging
Off
Off
Off
Off
Off
Off
Off
1647
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display the radio monitoring for the 802.11b network:
(Cisco Controller) > show advanced 802.11b monitor
enable
Country channels
Transparent
180 seconds
60 seconds
180 seconds
60 seconds
OL-31334-01
show Commands
Syntax Description
stats
Command Default
None
Command History
Examples
Release
Modification
8.0
The following example shows how to display the optimized roaming configurations for an 802.11a network:
(Cisco Controller) > show advanced 802.11a optimized roaming
OptimizedRoaming
802.11a OptimizedRoaming Mode.................. Enabled
802.11a OptimizedRoaming Reporting Interval.... 20 seconds
802.11a OptimizedRoaming Rate Threshold........ disabled
The following example shows how to display the optimized roaming statistics for an 802.11a network:
(Cisco Controller) > show advanced 802.11a optimized roaming stats
OptimizedRoaming Stats
802.11a OptimizedRoaming Disassociations....... 2
802.11a OptimizedRoaming Rejections............ 1
1649
show Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
None
Release
Modification
7.6
The following example shows how to display the global configuration and statistics of an 802.11a profile:
(Cisco Controller) > show advanced 802.11 profile global
10%
-70 dBm
80%
1000000 bps
12 clients
12 dB
80%
3 clients
The following example shows how to display the configuration and statistics of a specific access point profile:
(Cisco Controller) >
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display the configuration and statistics of the 802.11a network settings:
(Cisco Controller) > show advanced 802.11 receiver
15
5
2
Enabled
10
Enabled
30
Enabled
Enabled
Disabled
10
Disabled
0
Disabled
Disabled
1651
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display a summary of the 802.11b access point settings:
(Cisco Controller) > show advanced 802.11b summary
AP Name
TxPower
------------------CJ-1240
1( )
CJ-1130
1(*)
Note
MAC Address
Admin State
Operation State
Channel
ENABLED
UP
161
00:1f:ca:cf:b6:60
ENABLED
UP
56*
An asterisk (*) next to a channel number or power level indicates that it is being controlled by the global
algorithm settings.
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display the configuration and statistics of the 802.11b transmit power
cost:
(Cisco Controller) > show advanced 802.11b txpower
AUTO
600 seconds
-65 dBm
3 APs
SN.
xx:xx:xx:xx:xx:xx
384 seconds ago
1653
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to view the state of over-the-air frame padding:
(Cisco Controller) > show advanced dot11-padding
dot11-padding.................................... Disabled
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
client_MAC
status
report
chan-load
noise-hist
beacon
frame
pathloss
None
Release
Modification
7.6
The following example shows how to display the client radio management status information:
(Cisco Controller) >show client ccx rm 00:40:96:15:21:ac status
Client Mac Address............................... 00:40:96:15:21:ac
Channel Load Request............................. Enabled
Noise Histogram Request.......................... Enabled
Beacon Request................................... Enabled
Frame Request.................................... Enabled
Interval......................................... 30
Iteration........................................... 10
The following example shows how to display the client radio management load reports:
(Cisco Controller) >show client ccx rm 00:40:96:15:21:ac report chan-load
Channel Load Report
Client Mac Address............................... 00:40:96:ae:53:bc
Timestamp........................................ 788751121
Incapable Flag................................... On
1655
show Commands
Refused Flag........................................ On
Chan CCA Busy Fraction
----------------------1 194
2 86
3 103
4 0
5 178
6 82
7 103
8 95
9 13
10 222
11 75
The following example shows how to display the client radio management noise histogram reports:
(Cisco Controller) >show client ccx rm 00:40:96:15:21:ac report noise-hist
Noise Histogram Report
Client Mac Address............................... 00:40:96:15:21:ac
Timestamp........................................ 4294967295
Incapable Flag................................... Off
Refused Flag........................................ Off
Chan RPI0 RPI1 RPI2 RPI3 RPI4 RPI5 RPI6 RPI7
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the location calibration summary information:
(Cisco Controller) >show client location-calibration summary
1657
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display a summary of the Wireless Protection System (WPS) access
point neighbor authentication:
(Cisco Controller) > show wps ap-authentication summary
Related Commands
config Commands
This section lists the config commands to configure Radio Resource Management (RRM).
OL-31334-01
config Commands
config 802.11-a
To enable or disable the 4.9-GHz and 5.8-GHz public safety channels on an access point, use the config
802.11-a command.
config {802.11-a49 | 802.11-a58} {enable | disable} cisco_ap
Syntax Description
Command Default
Command History
Examples
802.11-a49
802.11-a58
enable
disable
cisco_ap
The default 4.9-GHz and 5.8-GHz public safety channels on an access point is disabled.
Release
Modification
7.6
The following example shows how to enable the 4.9-GHz public safety channel on ap_24 access point:
(Cisco Controller) > config 802.11-a
1659
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
802.11-a49
802.11-a58
ant_gain
cisco_ap
global
channel_no
Release
Modification
7.6
Before you enter the config 802.11-a antenna extAntGain command, disable the 802.11 Cisco radio with
the config 802.11-a disable command.
After you configure the external antenna gain, use the config 802.11-a enable command to reenable the 802.11
Cisco radio.
Examples
The following example shows how to configure an 802.11-a49 external antenna gain of 10 dBi for AP1:
(Cisco Controller) >config 802.11-a antenna extAntGain 10 AP1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
802.11-a49
802.11-a58
cisco_ap
global
channel_no
Custom channel for a specific mesh access point. The range is 1 through
26, inclusive, for a 4.9-GHz band and 149 through 165, inclusive, for a
5.8-GHz band.
Release
Modification
7.6
1661
config Commands
Syntax Description
Command Default
Command History
Examples
802.11-a49
802.11-a58
txpower
ap
cisco_ap
global
power_level
The default transmission power properties for the 4.9-GHz and 5.8-GHz public safety channels on an access
point is disabled.
Release
Modification
7.6
The following example shows how to configure an 802.11-a49 transmission power level of 4 for AP1:
(Cisco Controller) > config 802.11-a txpower ap 4 AP1
OL-31334-01
config Commands
config 802.11-abgn
To configure dual-band radio parameters on an access point, use the config 802.11-abgn command.
config 802.11-abgn {cleanair {enable | disable} {cisco_ap band band} | {enable | disable} {cisco_ap}}
Syntax Description
Command Default
Command History
cleanair
enable
disable
cisco_ap
band
band
enable
disable
None
Release
Modification
7.6
Usage Guidelines
Only Cisco CleanAir-enabled access point radios can be configured for Cisco CleanAir.
Examples
The following example shows how to enable Cisco CleanAir on an access point:
(Cisco Controller) > config 802.11-abgn cleanair enable AP3600 band 5
1663
config Commands
Syntax Description
enable
disable
mcs tx
Configures 802.11ac 5-GHz Modulation and Coding Scheme (MCS) rates at which
data can be transmitted between the access point and the client.
tx
mcs_index
MCS index value of 8 or 9. MCS data rates with index 8 or 9 are specific to 802.11ac.
When you enable an MCS data rate with index 9, the data rate with MCS index 8 is
automatically enabled.
ss
spatial_stream
Spatial stream within which you can enable or disable an MCS data rate.
Signals transmitted by the various antennae are multiplexed by using different spaces
within the same spectral channel. These spaces are known as spatial streams. Three
spatial streams are available within which you can enable or disable a MCS rate. The
range is from 1 to 3.
Command Default
Command History
None
Release
Modification
7.6
Usage Guidelines
Disabling the 802.11n/ac mode applies only to access radios. Backhaul radios always have 802.11n/ac mode
enabled if they are 802.11n capable.
Examples
The following example shows how to configure the MCS index for spatial stream 3:
(Cisco Controller) >config 802.11a 11acsupport mcs tx 9 ss 3
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
The default network for Cisco wireless LAN solution 802.11g is enabled.
Release
Modification
7.6
Before you enter the config 802.11b 11gSupport {enable | disable} command, disable the 802.11 Cisco
radio with the config 802.11 disable command.
After you configure the support for the 802.11g network, use the config 802.11 enable command to enable
the 802.11 radio.
Note
Examples
To disable an 802.11a, 802.11b and/or 802.11g network for an individual wireless LAN, use the config
wlan radio command.
Changing the 11gSupport will cause all the APs to reboot when you enable
802.11b network.
Are you sure you want to continue? (y/n) n
11gSupport not changed!
1665
config Commands
Syntax Description
Command Default
Command History
long
short
Release
Modification
7.6
Usage Guidelines
Note
You must reboot the Cisco Wireless LAN Controller (reset system) with save to implement this command.
This parameter must be set to long to optimize this Cisco wireless LAN controller for some clients, including
SpectraLink NetLink telephones.
This command can be used any time that the CLI interface is active.
Examples
The following example shows how to change the 802.11b preamble to short:
(Cisco Controller) > config 802.11b preamble short
(Cisco Controller) > (reset system with save)
Related Commands
show 802.11b
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
loud
quiet
disable
None
Release
7.6
Modification
This command was introduced in a release earlier than Release 7.6.
The loud and quiet parameters were introduced in Release 7.6.
Examples
1667
config Commands
Syntax Description
Command Default
Command History
Examples
value
None
Release
Modification
7.6
The following example shows how to configure the 802.11h power constraint to 5:
(Cisco Controller) > config 802.11h powerconstraint 5
Related Commands
show 802.11h
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure a new channel using the 802.11h channel:
(Cisco Controller) > config 802.11h setchannel ap02
Related Commands
show 802.11h
1669
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the 802.11n support on an 802.11a network:
(Cisco Controller) > config 802.11a 11nsupport enable
Related Commands
OL-31334-01
config Commands
Syntax Description
0-7
Specifies the aggregated MAC protocol data unit priority level between 0 through
7.
all
enable
Specifies the traffic associated with the priority level uses A-MPDU transmission.
disable
Specifies the traffic associated with the priority level uses A-MSDU transmission.
Command Default
Usage Guidelines
Aggregation is the process of grouping packet data frames together rather than transmitting them separately.
Two aggregation methods are available: Aggregated MAC Protocol Data Unit (A-MPDU) and Aggregated
MAC Service Data Unit (A-MSDU). A-MPDU is performed in the software whereas A-MSDU is performed
in the hardware.
Aggregated MAC Protocol Data Unit priority levels assigned per traffic type are as follows:
1Background
2Spare
0Best effort
3Excellent effort
4Controlled load
5Video, less than 100-ms latency and jitter
6Voice, less than 10-ms latency and jitter
7Network control
allConfigure all of the priority levels at once.
Note
Configure the priority levels to match the aggregation method used by the clients.
1671
config Commands
Command History
Examples
Release
Modification
7.6
The following example shows how to configure all the priority levels at once so that the traffic associated
with the priority level uses A-MSDU transmission:
(Cisco Controller) > config 802.11a 11nsupport a-mpdu tx priority all enable
Related Commands
OL-31334-01
config Commands
Syntax Description
enable
disable
timeout rt
timeout-value
Command Default
None
Usage Guidelines
Ensure that the 802.11 network is disabled before you enter this command.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the A-MPDU transmit aggregation scheduler realtime traffic
timeout of 100 milliseconds:
(Cisco Controller) > config 802.11 11nsupport a-mpdu tx scheduler timeout rt 100
Related Commands
1673
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
Access point.
A/B/C/D
enable
disable
None
Release
Modification
7.6
The following example shows how to configure transmission to a single antenna for legacy orthogonal
frequency-division multiplexing:
(Cisco Controller) > config 802.11 11nsupport antenna AP1 C enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
any
long
None
Release
Modification
7.6
Related Commands
1675
config Commands
Syntax Description
11nsupport
mcs tx
Command Default
enable
disable
None
OL-31334-01
config Commands
Command History
Examples
Release
Modification
7.6
Related Commands
1677
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
sideA
Specifies the diversity between the internal antennas and an external antenna
connected to the Cisco lightweight access point left port.
sideB
Specifies the diversity between the internal antennas and an external antenna
connected to the Cisco lightweight access point right port.
cisco_ap
None
Release
Modification
7.6
The following example shows how to enable antenna diversity for AP01 on an 802.11b network:
(Cisco Controller) >config 802.11a antenna diversity enable AP01
The following example shows how to enable diversity for AP01 on an 802.11a network, using an external
antenna connected to the Cisco lightweight access point left port (sideA):
(Cisco Controller) >config 802.11a antenna diversity sideA AP01
1679
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
antenna_gain
Antenna gain in 0.5 dBm units (for example, 2.5 dBm = 5).
cisco_ap
None
Release
Modification
7.6
Before you enter the config 802.11 antenna extAntGain command, disable the 802.11 Cisco radio with the
config 802.11 disable command.
After you configure the external antenna gain, use the config 802.11 enable command to enable the 802.11
Cisco radio.
Examples
The following example shows how to configure an 802.11a external antenna gain of 0.5 dBm for AP1:
(Cisco Controller) >config 802.11 antenna extAntGain 1 AP1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
omni
sectorA
sectorB
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure access point AP01 antennas for a 360-degree omnidirectional
pattern on an 802.11b network:
(Cisco Controller) >config 802.11 antenna mode omni AP01
1681
config Commands
Syntax Description
Command Default
Command History
Examples
internal
external
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure access point AP02 on an 802.11b network to use the internal
antenna:
(Cisco Controller) >config 802.11a antenna selection internal AP02
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
global
Specifies the 802.11a operating channel that is automatically set by RRM and
overrides the existing configuration setting.
auto
once
off
restarts
ap_name
channel
Manual channel number to be used by the access point. The supported channels
depend on the specific access point used and the regulatory region.
None
Release
Modification
7.6
When configuring 802.11 channels for a single lightweight access point, enter the config 802.11 disable
command to disable the 802.11 network. Enter the config 802.11 channel command to set automatic channel
selection by Radio Resource Management (RRM) or manually set the channel for the 802.11 radio, and enter
the config 802.11 enable command to enable the 802.11 network.
1683
config Commands
Note
Examples
See the Channels and Maximum Power Settings for Cisco Aironet Lightweight Access Points document
for the channels supported by your access point. The power levels and available channels are defined by
the country code setting and are regulated on a country-by-country basis.
The following example shows how to have RRM automatically configure the 802.11a channels for automatic
channel configuration based on the availability and interference:
(Cisco Controller) >config 802.11a channel global auto
The following example shows how to configure the 802.11b channels one time based on the availability and
interference:
(Cisco Controller) >config 802.11b channel global once
The following example shows how to turn 802.11a automatic channel configuration off:
(Cisco Controller) >config 802.11a channel global off
The following example shows how to configure the 802.11b channels in access point AP01 for automatic
channel configuration:
(Cisco Controller) >config 802.11b AP01 channel global
The following example shows how to configure the 802.11a channel 36 in access point AP01 as the default
channel:
(Cisco Controller) >config 802.11a channel AP01 36
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
global
channel_no
None
Release
Modification
7.6
The following example shows how to enable auto-RF for access point AP01 on an 802.11b network:
(Cisco Controller) >config 802.11b channel ap AP01 global
1685
config Commands
Syntax Description
cisco_ap
Access point.
20
Command Default
Command History
Usage Guidelines
Caution
40
80
Release
Modification
7.6
This parameter can be configured only if the primary channel is statically assigned.
We recommend that you do not configure 40-MHz channels in the 2.4-GHz radio band because severe
co-channel interference can occur.
Statically configuring an access points radio for 20- or 40-MHz mode overrides the globally configured DCA
channel width setting (configured by using the config advanced 802.11 channel dca chan-width-11n
command). If you change the static configuration back to global on the access point radio, the global DCA
configuration overrides the channel width configuration that the access point was previously using.
OL-31334-01
config Commands
Examples
The following example shows how to configure the channel width for access point AP01 on an 802.11 network
using 40-MHz channels:
(Cisco Controller) > config 802.11a chan_width AP01 40
Related Commands
1687
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
802.11a
802.11b
high
medium
low
auto
Configures an auto Rx SOP threshold value for 802.11a/b networks. When you
choose auto, the access point determines the best Rx SOP threshold value.
ap ap_name
default
Configures the Rx SOP threshold value on all access points of an 802.11 network.
Release
Modification
8.0
Rx SOP determines the Wi-Fi signal level in dBm at which an access point's radio demodulates and decodes
a packet. Higher the level, less sensitive the radio is and smaller the receiver cell size. The table below shows
the Rx SOP threshold values for high, medium and low levels for each 802.11 band.
Table 17: Rx SOP Thresholds
802.11 Band
High Threshold
Medium Threshold
Low Threshold
5 GHz
-76 dBm
-78 dBm
-80 dBm
2.4 GHz
-79 dBm
-82 dBm
-85 dBm
OL-31334-01
config Commands
Examples
The following example shows how to configure a high Rx SOP threshold value for all access points in the
802.11a band:
(Cisco Controller) > config 802.11a rx-sop threshold high default
1689
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
global
auto
once
power_level
ap
ap_name
Release
Modification
7.6
The supported power levels depends on the specific access point used and the regulatory region. For example,
the 1240 series access point supports eight levels and the 1200 series access point supports six levels. See the
Channels and Maximum Power Settings for Cisco Aironet Lightweight Access Points document for the
maximum transmit power limits for your access point. The power levels and available channels are defined
by the country code setting and are regulated on a country-by-country basis.
OL-31334-01
config Commands
Examples
The following example shows how to automatically set the 802.11a radio transmit power level in all lightweight
access points:
(Cisco Controller) > config 802.11a txPower auto
The following example shows how to manually set the 802.11b radio transmit power to level 5 for all
lightweight access points:
(Cisco Controller) > config 802.11b txPower global 5
The following example shows how to automatically set the 802.11b radio transmit power for access point
AP1:
(Cisco Controller) > config 802.11b txPower AP1 global
The following example shows how to manually set the 802.11a radio transmit power to power level 2 for
access point AP1:
(Cisco Controller) > config 802.11b txPower AP1 2
Related Commands
1691
config Commands
Syntax Description
Command Default
Command History
Examples
call-admission-limit
G711-CU-Quantum
Configures the value supplied by the infrastructure indicating the current number
of channel utilization units that would be used by a single G.711-20ms call.
limit
quantum
None.
Release
Modification
7.6
This example shows how to configure the call admission limit for 7920 VISE parameters:
(Cisco Controller) > config advanced 802.11 7920VSIEConfig call-admission-limit 4
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
add
channel_number
None
Release
Modification
7.6
The following example shows how to add a channel to the 802.11a network auto RF channel list:
(Cisco Controller) >config advanced 802.11 channel add 132
1693
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
sensitivity
low
medium
high
custom
threshold
threshold_value
None
Release
Modification
7.6
The following example shows how to enable the CleanAir event-driven RRM parameters:
(Cisco Controller) > config advanced 802.11 channel cleanair-event enable
The following example shows how to configure high sensitivity for CleanAir event-driven RRM:
(Cisco Controller) > config advanced 802.11 channel cleanair-event sensitivity high
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
value
None
Release
Modification
7.6
The following example shows how to configure the time of delay when the DCA algorithm starts:
(Cisco Controller) > config advanced 802.11 channel dca anchor-time 17
Related Commands
1695
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
20
40
80
Release
Modification
7.6
If you choose 40, be sure to set at least two adjacent channels in the config advanced 802.11 channel {add
| delete} channel_number command (for example, a primary channel of 36 and an extension channel of 40).
If you set only one channel, that channel is not used for the 40-MHz channel width.
To override the globally configured DCA channel width setting, you can statically configure an access points
radio for 20- or 40-MHz mode using the config 802.11 chan_width command. If you then change the static
configuration to global on the access point radio, the global DCA configuration overrides the channel width
configuration that the access point was previously using.
Examples
The following example shows how to add a channel to the 802.11a network auto channel list:
(Cisco Controller) > config advanced 802.11a channel dca chan-width-11n 40
Examples
The following example shows how to set the channel width for the 802.11ac radio as 80-MHz:
(Cisco Controller) > config advanced 802.11a channel dca chan-width-11n 80
Related Commands
OL-31334-01
config Commands
1697
config Commands
Syntax Description
Command Default
Command History
value
Release
Modification
7.6
Usage Guidelines
If your controller supports only OfficeExtend access points, we recommend that you set the DCA interval to
6 hours for optimal performance. For deployments with a combination of OfficeExtend access points and
local access points, the range of 10 minutes to 24 hours can be used.
Examples
The following example shows how often the DCA algorithm is allowed to run:
(Cisco Controller) > config advanced 802.11 channel dca interval 8
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
RSSI_value
Release
Modification
7.6
The following example shows how to configure the minimum 5-GHz RSSI energy metric for DCA:
(Cisco Controller) > config advanced 802.11a channel dca min-metric 80
In the above example, the RRM must detect an interference energy of at least -80 dBm in RSSI for the DCA
to trigger a channel change.
Related Commands
1699
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
low
medium
high
None
Release
Modification
7.6
The DCA sensitivity thresholds vary by radio band as shown in the table below.
To aid in troubleshooting, the output of this command shows an error code for any failed calls. This table
explains the possible error codes for failed calls.
Table 18: DCA Sensitivity Thresholds
Sensitivity
High
5 dB
5 dB
Medium
15 dB
20 dB
OL-31334-01
config Commands
Examples
Sensitivity
Low
30 dB
35 dB
The following example shows how to configure the value of DCA algorithms sensitivity to low:
(Cisco Controller) > config advanced 802.11 channel dca sensitivity low
Related Commands
1701
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
The default value for the foreign access point 802.11a interference avoidance in the channel assignment is
enabled.
Release
Modification
7.6
The following example shows how to have RRM consider foreign 802.11a interference when making channel
selection updates for all 802.11a Cisco lightweight access points:
(Cisco Controller) > config advanced 802.11a channel foreign enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
The default value for Cisco lightweight access point 802.11a load avoidance in the channel assignment is
disabled.
Release
Modification
7.6
The following example shows how to have RRM consider the traffic load when making channel selection
updates for all 802.11a Cisco lightweight access points:
(Cisco Controller) > config advanced 802.11 channel load enable
Related Commands
1703
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
The default value for non-802.11a noise avoidance in the channel assignment is disabled.
Release
Modification
7.6
The following example shows how to have RRM consider non-802.11a noise when making channel selection
updates for all 802.11a Cisco lightweight access points:
(Cisco Controller) > config advanced 802.11 channel noise enable
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
enable
disable
The default value for 802.11 network DCA list option for outdoor access point is disabled.
Release
Modification
7.6
Usage Guidelines
The config advanced 802.11{a | b} channel outdoor-ap-dca {enable | disable} command is applicable only
for deployments having outdoor access points such as 1522 and 1524.
Examples
The following example shows how to enable the 802.11a DCA list option for outdoor access point:
(Cisco Controller) > config advanced 802.11a channel outdoor-ap-dca enable
Related Commands
1705
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
The default 802.11 network DCA list option for the outdoor access point is disabled.
Release
Modification
7.6
The following example shows how to enable or disable propagation of persistent devices:
(Cisco Controller) > config advanced 802.11 channel pda-prop enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to initiate a channel selection update for all 802.11a network access points:
(Cisco Controller) > config advanced 802.11a channel update
1707
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
Release
Modification
7.6
If you enable coverage hole detection, the Cisco WLC automatically determines, based on data that is received
from the access points, whether any access points have clients that are potentially located in areas with poor
coverage.
If both the number and percentage of failed packets exceed the values that you entered in the config advanced
802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second
period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish
between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is
detected if both the number and percentage of failed clients meet or exceed the values entered in the config
advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands
over a 90-second period. The Cisco WLC determines whether the coverage hole can be corrected and, if
appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.
Examples
The following example shows how to enable coverage hole detection on an 802.11a network:
(Cisco Controller) > config advanced 802.11a coverage enable
Related Commands
OL-31334-01
config Commands
1709
config Commands
Syntax Description
Command Default
Command History
percent
Release
Modification
7.6
Usage Guidelines
If both the number and percentage of failed packets exceed the values that you entered in the config advanced
802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second
period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish
between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is
detected if both the number and percentage of failed clients meet or exceed the values entered in theconfig
advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands
over a 90-second period. The controller determines whether the coverage hole can be corrected and, if
appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.
Examples
The following example shows how to specify the percentage of clients for all 802.11a access points that are
experiencing a low signal level:
(Cisco Controller) > config advanced 802.11 coverage exception global 50
Related Commands
OL-31334-01
config Commands
1711
config Commands
Syntax Description
Command Default
Command History
data
voice
percent
The default failure rate threshold uplink coverage fail-rate value is 20%.
Release
Modification
7.6
Usage Guidelines
If both the number and percentage of failed packets exceed the values that you entered in theconfig advanced
802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second
period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish
between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is
detected if both the number and percentage of failed clients meet or exceed the values entered in the config
advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands
over a 90-second period. The controller determines whether the coverage hole can be corrected and, if
appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.
Examples
The following example shows how to configure the threshold count for minimum uplink failures for data
packets:
(Cisco Controller) > config advanced 802.11 coverage fail-rate 80
Related Commands
OL-31334-01
config Commands
1713
config Commands
Syntax Description
Command Default
Command History
clients
Release
Modification
7.6
Usage Guidelines
If both the number and percentage of failed packets exceed the values that you entered in the config advanced
802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second
period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish
between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is
detected if both the number and percentage of failed clients meet or exceed the values entered in the config
advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands
over a 90-second period. The controller determines whether the coverage hole can be corrected and, if
appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.
Examples
The following example shows how to specify the minimum number of clients on all 802.11a access points
with an RSSI value at or below the RSSI threshold:
(Cisco Controller) > config advanced 802.11 coverage level global 60
Related Commands
OL-31334-01
config Commands
1715
config Commands
Syntax Description
Command Default
Command History
data
voice
packets
The default failure count threshold for uplink data or voice packets is10.
Release
Modification
7.6
Usage Guidelines
If both the number and percentage of failed packets exceed the values that you entered in the config advanced
802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second
period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish
between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is
detected if both the number and percentage of failed clients meet or exceed the values entered in the config
advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands
over a 90-second period. The controller determines whether the coverage hole can be corrected and, if
appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.
Examples
The following example shows how to configure the failure count threshold for uplink data packets:
(Cisco Controller) > config advanced 802.11 coverage packet-count 100
Related Commands
OL-31334-01
config Commands
1717
config Commands
Syntax Description
data
voice
rssi
Command Default
Command History
Usage Guidelines
Release
Modification
7.6
The rssi value that you enter is used to identify coverage holes (or areas of poor coverage) within your network.
If the access point receives a packet in the data or voice queue with an RSSI value that is below the value that
you enter, a potential coverage hole has been detected.
The access point takes RSSI measurements every 5 seconds and reports them to the controller in 90-second
intervals.
If both the number and percentage of failed packets exceed the values that you entered in the config advanced
802.11 coverage packet-count and config advanced 802.11 coverage fail-rate commands for a 5-second
period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish
between real and false coverage holes and excludes clients with poor roaming logic. A coverage hole is
detected if both the number and percentage of failed clients meet or exceed the values entered in the config
advanced 802.11 coverage level global and config advanced 802.11 coverage exception global commands
over a 90-second period. The controller determines whether the coverage hole can be corrected and, if
appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point.
OL-31334-01
config Commands
Examples
The following example shows how to configure the minimum receive signal strength indication threshold
value for data packets that are received by an 802.11a access point:
(Cisco Controller) > config advanced 802.11a coverage rssi-threshold -60
Related Commands
1719
config Commands
Syntax Description
wmm-default
svp-voice
optimized-voice
optimized-video-voice
custom-voice
Command Default
Command History
Release
Modification
7.6
OL-31334-01
config Commands
Examples
Related Commands
show 802.11a
config advanced 802.11b edca-parameters
1721
config Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to return all the 802.11a advanced settings to their factory defaults:
(Cisco Controller) > config advanced 802.11a factory
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
add
remove
controller
controller-ip-address
None
Release
Modification
7.6
The following example shows how to add a controller in the 802.11a automatic RF group:
(Cisco Controller) > config advanced 802.11a group-member add cisco-controller 209.165.200.225
Related Commands
1723
config Commands
Syntax Description
Command Default
Command History
Examples
auto
leader
off
restart
Release
Modification
7.6
The following example shows how to configure the 802.11a automatic RF group selection mode on:
(Cisco Controller) > config advanced 802.11a group-mode auto
The following example shows how to configure the 802.11a automatic RF group selection mode off:
(Cisco Controller) > config advanced 802.11a group-mode off
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
logging channel
on
off
Release
Modification
7.6
The following example shows how to turn the 802.11a logging channel selection mode on:
(Cisco Controller) > config advanced 802.11a logging channel on
Related Commands
1725
config Commands
Syntax Description
Command Default
Command History
Examples
on
off
Release
Modification
7.6
The following example shows how to turn the 802.11a coverage profile violation logging selection mode on:
(Cisco Controller) > config advanced 802.11a logging coverage on
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
on
off
Release
Modification
7.6
The following example shows how to turn the 802.11a foreign interference profile violation logging selection
mode on:
(Cisco Controller) > config advanced 802.11a logging foreign on
Related Commands
1727
config Commands
Syntax Description
Command Default
Command History
Examples
on
off
Release
Modification
7.6
The following example shows how to turn the 802.11a load profile logging mode on:
(Cisco Controller) > config advanced 802.11 logging load on
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
on
off
Release
Modification
7.6
The following example shows how to turn the 802.11a noise profile logging mode on:
(Cisco Controller) > config advanced 802.11a logging noise on
Related Commands
1729
config Commands
Syntax Description
Command Default
Command History
Examples
on
off
Release
Modification
7.6
The following example shows how to turn the 802.11a performance profile logging mode on:
(Cisco Controller) > config advanced 802.11a logging performance on
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
on
off
The default 802.11a transmit power change logging mode is off (disabled).
Release
Modification
7.6
The following example shows how to turn the 802.11a transmit power change mode on:
(Cisco Controller) > config advanced 802.11 logging txpower off
Related Commands
1731
config Commands
Syntax Description
Command Default
Command History
Examples
all
country
dca
The default 802.11a noise, interference, and rogue monitoring channel list is country.
Release
Modification
7.6
The following example shows how to monitor the channels used in the configured country:
(Cisco Controller) > config advanced 802.11 monitor channel-list country
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
Release
Modification
7.6
The following example shows how to set the coverage measurement interval to 60 seconds:
(Cisco Controller) > config advanced 802.11 monitor coverage 60
Related Commands
1733
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
Release
Modification
7.6
The following example shows how to set the load measurement interval to 60 seconds:
(Cisco Controller) > config advanced 802.11 monitor load 60
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable the 802.11a access point monitoring:
(Cisco Controller) > config advanced 802.11a monitor mode enable
Related Commands
1735
config Commands
Syntax Description
Command Default
Command History
protected
transparent
None
Release
Modification
7.6
Usage Guidelines
Before you configure the 802.11 access point RRM NDP type, ensure that you have disabled the network by
entering the config 802.11 disable network command.
Examples
The following example shows how to enable the 802.11a access point RRM NDP type as protected:
(Cisco Controller) > config advanced 802.11 monitor ndp-type protected
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
Release
Modification
7.6
The following example shows how to set the noise measurement interval to 120 seconds:
(Cisco Controller) > config advanced 802.11 monitor noise 120
Related Commands
1737
config Commands
Syntax Description
Command Default
Command History
Examples
seconds
Release
Modification
7.6
The following example shows how to set the signal measurement interval to 120 seconds:
(Cisco Controller) > config advanced 802.11 monitor signal 120
Related Commands
OL-31334-01
config Commands
Syntax Description
802.11a
802.11b
enable
disable
interval
seconds
datarate
mbps
Command Default
Command History
Usage Guidelines
By default, optimized roaming is disabled. The default value for client coverage reporting interval is 90 seconds
and threshold data rate is 0 (disabled state).
Release
Modification
8.0
You must disable the 802.11a/b network before you configure the optimized roaming reporting interval. If
you configure a low value for the reporting interval, the network can get overloaded with coverage report
messages.
1739
config Commands
Examples
The following example shows how to enable optimized roaming for the 802.11a network:
(Cisco Controller) > config advanced 802.11a optimized roaming enable
The following example shows how to configure the data rate interval for the 802.11a network:
(Cisco Controller) > config advanced 802.11a optimized roaming datarate 9
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
percent
Release
Modification
7.6
The following example shows how to set the foreign 802.11a transmitter interference threshold for all Cisco
lightweight access points to 50 percent:
(Cisco Controller) >config advanced 802.11a profile foreign global 50
The following example shows how to set the foreign 802.11a transmitter interference threshold for AP1 to 0
percent:
(Cisco Controller) >config advanced 802.11 profile foreign AP1 0
1741
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
dBm
Release
Modification
7.6
The following example shows how to set the 802.11a foreign noise threshold for all Cisco lightweight access
points to 127 dBm:
(Cisco Controller) >config advanced 802.11a profile noise global -127
The following example shows how to set the 802.11a foreign noise threshold for AP1 to 0 dBm:
(Cisco Controller) >config advanced 802.11a profile noise AP1 0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
value
802.11a Cisco lightweight access point throughput threshold between 1000 and
10000000 bytes per second.
The default Cisco lightweight access point data-rate throughput threshold value is 1,000,000 bytes per second.
Release
Modification
7.6
The following example shows how to set all Cisco lightweight access point data-rate thresholds to 1000 bytes
per second:
(Cisco Controller) >config advanced 802.11 profile throughput global 1000
The following example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:
(Cisco Controller) >config advanced 802.11 profile throughput AP1 10000000
1743
config Commands
Syntax Description
Command Default
Command History
Examples
global
cisco_ap
percent
Release
Modification
7.6
The following example shows how to set the RF utilization threshold for all Cisco lightweight access points
to 0 percent:
(Cisco Controller) >config advanced 802.11 profile utilization global 0
The following example shows how to set the RF utilization threshold for AP1 to 100 percent:
(Cisco Controller) >config advanced 802.11 profile utilization AP1 100
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
receiver
default
rxstartjumpThreshold
value
None
Release
Modification
7.6
The following example shows how to prevent changes to receiver parameters while the network is enabled:
(Cisco Controller) > config advanced 802.11 receiver default
Related Commands
1745
config Commands
Syntax Description
Command Default
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the TPC version as 1 for the 802.11a radio:
(Cisco Controller) > config advanced 802.11a tpc-version 1
Related Commands
OL-31334-01
config Commands
Syntax Description
Command History
Examples
threshold
Release
Modification
7.6
The following example shows how to configure the threshold as 60 dBm for TPC version 1 of the 802.11a
radio:
(Cisco Controller) > config advanced 802.11 tpcv1-thresh -60
Related Commands
1747
config Commands
Syntax Description
Command History
Examples
intensity
Release
Modification
7.6
The following example shows how to configure the computational intensity as 50 for TPC version 2 of the
802.11a radio:
(Cisco Controller) > config advanced 802.11 tpcv2-intense 50
Related Commands
OL-31334-01
config Commands
Syntax Description
Command History
Examples
enable
disable
Release
Modification
7.6
The following example shows how to enable TPC version 2 on a per-channel basis for the 802.11a radio:
(Cisco Controller) > config advanced 802.11 tpcv2-per-chan enable
Related Commands
1749
config Commands
Syntax Description
Command History
Examples
threshold
Release
Modification
7.6
The following example shows how to configure the threshold as 60 dBm for TPC version 2 of the 802.11a
radio:
(Cisco Controller) > config advanced 802.11a tpcv2-thresh -60
Related Commands
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to initiate updates of 802.11a transmit power for an 802.11a access point:
(Cisco Controller) > config advanced 802.11 txpower-update
Related Commands
1751
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
Release
Modification
7.6
Related Commands
debug dot11
debug dot11 mgmt interface
debug dot11 mgmt msg
debug dot11 mgmt ssid
debug dot11 mgmt state-machine
debug dot11 mgmt station
show advanced dot11-padding
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
mac_address
interval
disable
None
Release
Modification
7.6
The following example shows how to enable the client location calibration for the client 37:15:85:2a with a
measurement interval of 45 seconds:
(Cisco Controller) >config client location-calibration enable 37:15:86:2a:Bc:cf 45
1753
Syntax Description
Command Default
Command History
Examples
name
None
Release
Modification
7.6
The following example shows how to set the RF-network name to travelers:
(Cisco Controller) > config network rf-network-name travelers
Related Commands
OL-31334-01
config assisted-roaming
To configure assisted roaming parameters on the controller, use the config assisted-roaming command.
config assisted-roaming {denial-maximum count | floor-bias RSSI | prediction-minimum number_of_APs}
Syntax Description
denial-maximum
count
Maximum number of times that a client is denied for association when the
association request that was sent to an access point does not match any access
point on the prediction list. The range is from 1 to 10.
floor-bias
Configures the RSSI bias for access points on the same floor.
RSSI
RSSI bias for access points on the same floor. The range is from 5 to 25. Access
points on the same floor have more preference.
prediction-minimum
Configures the minimum number of optimized access points for the assisted
roaming feature.
number_of_APs
Minimum number of optimized access points for the assisted roaming feature.
The range is from 1 to 6. If the number of access points in the prediction assigned
to the client is smaller than this number, the assisted roaming feature does not
work.
Command Default
The default RSSI bias for access points on the same floor is 15 dBm.
Usage Guidelines
802.11k allows a client to request a neighbor report that contains information about known neighbor access
points, which can be used for a service set transition. The neighbor list reduces the need for active and passive
scanning.
Examples
This example shows how to configure the minimum number of optimized access points for the assisted roaming
feature:
> config assisted-roaming prediction-minimum 4
Related Commands
1755
Syntax Description
Command Default
neighbor-list
dual-list
Configures a dual band 802.11k neighbor list for a WLAN. The default is
the band that the client is currently associated with.
prediction
enable
disable
wlan_id
Command History
Release
Modification
7.6
Usage Guidelines
When you enable the assisted roaming prediction list, a warning appears and load balancing is disabled for
the WLAN, if load balancing is already enabled on the WLAN.
Examples
The following example shows how to enable an 802.11k neighbor list for a WLAN:
(Cisco Controller) >config wlan assisted-roaming neighbor-list enable 1
OL-31334-01
show assisted-roaming
To display assisted roaming and 802.11k configurations, use the show assisted-roaming command.
show assisted-roaming
Syntax Description
Command Default
None.
Examples
This example shows how to display assisted roaming and 802.11k configurations:
> show assisted-roaming
Assisted Roaming and 80211k Information:
Floor RSSI Bias.................................. 15 dBm
Maximum Denial................................... 2 counts
Minimium Optimized Neighbor Assigned............. 2 neighbors
Assisted Roaming Performance Chart:
Matching Assigned Neighbor.......................
Matching Assigned Neighbor.......................
Matching Assigned Neighbor.......................
Matching Assigned Neighbor.......................
Matching Assigned Neighbor.......................
Matching Assigned Neighbor.......................
Matching Assigned Neighbor.......................
Matching Assigned Neighbor.......................
No Matching Neighbor.............................
No Neighbor Assigned.............................
Related Commands
[0]
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
=
=
=
=
=
=
=
=
=
=
0
0
0
0
0
0
0
0
0
0
config assisted-roaming
config wlan assisted-roaming
debug 11k
1757
debug Commands
debug 11k
To configure the debugging of 802.11k settings, use the debug 11k command.
debug 11k {all | detail | errors| events | history | optimization | simulation} {enable | disable}
Syntax Description
all
detail
errors
events
history
Configures the debugging of all 802.11k history. The Cisco WLC collects
roam history of the client.
optimization
simulation
Configures the debugging of 802.11k simulation data. You can view details
of client roaming parameters and import them for offline simulation.
enable
disable
Command Default
None.
Examples
This example shows how to enable the debugging of 802.11k simulation data:
> debug 11k simulation enable
Related Commands
config assisted-roaming
config wlan assisted-roaming
show assisted-roaming
debug Commands
This section lists the debug commands to manage Radio Resource Management (RRM) settings of the
controller.
OL-31334-01
debug Commands
Caution
Debug commands are reserved for use only under the direction of Cisco personnel. Do not use these
commands without direction from Cisco-certified staff.
1759
debug Commands
debug airewave-director
To configure the debugging of Airewave Director software, use the debug airwave-director command.
debug airewave-director {all | channel | detail | error | group | manager | message | packet | power |
profile | radar | rf-change} {enable | disable}
Syntax Description
all
channel
detail
error
group
manager
message
packet
power
profile
radar
rf-change
enable
disable
OL-31334-01
debug Commands
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to enable the debugging of Airewave Director profile events:
(Cisco Controller) > debug airewave-director profile enable
Related Commands
debug disable-all
show sysinfo
1761
debug Commands
debug dot11
To configure the debugging of 802.11 events, use the debug dot11 command.
debug dot11 {all | load-balancing | management | mobile | nmsp | probe | rldp | rogue | state} {enable |
disable}
Syntax Description
Command Default
Command History
all
load-balancing
management
mobile
nmsp
probe
rldp
rogue
state
enable
disable
None
Release
Modification
7.6
OL-31334-01
debug Commands
Examples
The following example shows how to enable the debugging of 802.11 settings:
(Cisco Controller) > debug dot11 state enable
(Cisco Controller) > debug dot11 mobile enable
Related Commands
debug disable-all
debug dot11 mgmt interface
debug dot11 mgmt msg
debug dot11 mgmt ssid
debug dot11 mgmt state-machine
debug dot11 mgmt station
1763
debug Commands
OL-31334-01
PART
IX
CleanAir Commands
CLI Commands, page 1767
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
This section describes the Cisco CleanAir commands and contains the following sections:
show Commands, page 1767
config Commands, page 1777
test Commands, page 1786
show Commands
This section lists the show commands to display information about the CleanAir configurations on the
controller.
1767
show Commands
Syntax Description
Command Default
Command History
Examples
config
None
Release
Modification
7.6
The following example shows how to display the 802.11a cleanair configuration:
(Cisco Controller) > show 802.11a cleanair
OL-31334-01
show Commands
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Radar....................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Clean Air Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
CleanAir Persistent Devices state............
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled Additional
Enabled
Medium
Disabled
1769
show Commands
Syntax Description
Command Default
Command History
Examples
summary
None
Release
Modification
7.6
The following example shows how to display a summary of the air quality information for the 802.11a network:
(Cisco Controller) > show 802.11a cleanair air-quality summary
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel Avg AQ
------------------ ------- -----CISCO_AP3500
36
95 70
0
CISCO_AP3500
40
93 75
0
Min AQ
------
Interferers
-----------
DFS
---
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
worst
None
Release
Modification
7.6
The following example shows how to display worst air quality information for the 802.11a network:
(Cisco Controller) > show 802.11 cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel Avg AQ
------------------ ------- -----CISCO_AP3500
1
83 57
3
Min AQ
-----5
Interferers
-----------
DFS
---
1771
show Commands
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to display the device access point for the 802.11a network:
(Cisco Controller) > show 802.11a cleanair device ap AP_3500
OL-31334-01
show Commands
Syntax Description
device_type
Command Default
Command History
None
Release
Modification
7.6
1773
show Commands
Examples
The following example shows how to display the information of all the interferers detected by a specified
access point for the 802.11a network:
(Cisco Controller) > show 802.11a cleanair device type canopy
OL-31334-01
show Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to display the automatic channel assignment configuration and statistics:
(Cisco Controller) > show advanced 802.11a channel
1775
show Commands
show ap auto-rf
To display the auto-RF settings for a Cisco lightweight access point, use the show ap auto-rf command.
show ap auto-rf 802.11{a | b} cisco_ap
Syntax Description
Command Default
Command History
Examples
cisco_ap
None
Release
Modification
7.6
The following example shows how to display auto-RF information for an access point:
(Cisco Controller) > show ap auto-rf 802.11a AP1
Number Of Slots..................................
AP Name..........................................
MAC Address......................................
Radio Type.....................................
Noise Information
Noise Profile................................
Channel 36...................................
Channel 40...................................
Channel 44...................................
Channel 48...................................
Channel 52...................................
Channel 56...................................
Channel 60...................................
Channel 64...................................
Interference Information
Interference Profile.........................
Channel 36...................................
Channel 40...................................
Channel 44...................................
Channel 48...................................
Channel 52...................................
Channel 56...................................
Channel 60...................................
Channel 64...................................
Rogue Histogram (20/40_ABOVE/40_BELOW)
Channel 36...................................
Channel 40...................................
2
AP03
00:0b:85:01:18:b7
RADIO_TYPE_80211a
PASSED
-88 dBm
-86 dBm
-87 dBm
-85 dBm
-84 dBm
-83 dBm
-84 dBm
-85 dBm
PASSED
-66 dBm
-128 dBm
-128 dBm
-128 dBm
-128 dBm
-73 dBm
-55 dBm
-69 dBm
@
@
@
@
@
@
@
@
1%
0%
0%
0%
0%
1%
1%
1%
busy
busy
busy
busy
busy
busy
busy
busy
16/ 0/ 0
28/ 0/ 0
OL-31334-01
config Commands
Channel 44...................................
Channel 48...................................
Channel 52...................................
Channel 56...................................
Channel 60...................................
Channel 64...................................
Load Information
Load Profile.................................
Receive Utilization..........................
Transmit Utilization.........................
Channel Utilization..........................
Attached Clients.............................
Coverage Information
Coverage Profile.............................
Failed Clients...............................
Client Signal Strengths
RSSI -100 dBm................................
RSSI -92 dBm................................
RSSI -84 dBm................................
RSSI -76 dBm................................
RSSI -68 dBm................................
RSSI -60 dBm................................
RSSI -52 dBm................................
Client Signal To Noise Ratios
SNR
0 dBm.................................
SNR
5 dBm.................................
SNR
10 dBm.................................
SNR
15 dBm.................................
SNR
20 dBm.................................
SNR
25 dBm.................................
SNR
30 dBm.................................
SNR
35 dBm.................................
SNR
40 dBm.................................
SNR
45 dBm.................................
Nearby RADs
RAD 00:0b:85:01:05:08 slot 0.................
RAD 00:0b:85:01:12:65 slot 0.................
Channel Assignment Information
Current Channel Average Energy...............
Previous Channel Average Energy..............
Channel Change Count.........................
Last Channel Change Time.....................
2004
Recommended Best Channel.....................
RF Parameter Recommendations
Power Level..................................
RTS/CTS Threshold............................
Fragmentation Threshold......................
Antenna Pattern..............................
9/
9/
3/
4/
7/
2/
0/
0/
0/
0/
1/
0/
0
0
0
0
0
0
PASSED
0%
0%
1%
1 clients
PASSED
0 clients
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
0
0
0
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
clients
clients
clients
config Commands
This section explains the config commands to configure CleanAir on the controller.
1777
config Commands
Syntax Description
alarm
air-quality
enable
disable
threshold
alarm_threshold
device
OL-31334-01
config Commands
device_type
Command Default
Command History
Examples
reporting
unclassified
network
cisco_ap
The default CleanAir settings for the 802.11 a or 802.11 b/g network is disabled.
Release
Modification
7.6
The following example shows how to enable the CleanAir settings on access point ap_24:
(Cisco Controller) > config 802.11a cleanair enable ap_24
1779
config Commands
Syntax Description
enable
disable
reporting
enable
disable
device_type
OL-31334-01
config Commands
Command Default
Command History
Examples
The default setting CleanAir reporting for the interference device type is disabled.
Release
Modification
7.6
The following example shows how to enable the CleanAir reporting for the device type jammer:
(Cisco Controller) > config 802.11a cleanair device enable jammer
The following example shows how to disable the CleanAir reporting for the device type video:
(Cisco Controller) > config 802.11a cleanair device disable video
The following example shows how to enable the CleanAir interference device reporting:
(Cisco Controller) > config 802.11a cleanair device reporting enable
1781
config Commands
Syntax Description
air-quality
disable
enable
threshold
alarm_threshold
device
all
reporting
unclassified
OL-31334-01
config Commands
device_type
Command Default
Command History
Examples
Release
Modification
7.6
The following example shows how to enable the CleanAir alarm to monitor the air quality:
(Cisco Controller) > config 802.11a cleanair alarm air-quality enable
The following example shows how to enable the CleanAir alarm for the device type video:
(Cisco Controller) > config 802.11a cleanair alarm device enable video
The following example shows how to enable alarm reporting for the CleanAir interference devices:
(Cisco Controller) > config 802.11a cleanair alarm device reporting enable
1783
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
sensitivity
low
medium
high
custom
threshold
threshold_value
None
Release
Modification
7.6
The following example shows how to enable the CleanAir event-driven RRM parameters:
(Cisco Controller) > config advanced 802.11 channel cleanair-event enable
The following example shows how to configure high sensitivity for CleanAir event-driven RRM:
(Cisco Controller) > config advanced 802.11 channel cleanair-event sensitivity high
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
The default 802.11 network DCA list option for the outdoor access point is disabled.
Release
Modification
7.6
The following example shows how to enable or disable propagation of persistent devices:
(Cisco Controller) > config advanced 802.11 channel pda-prop enable
1785
test Commands
Syntax Description
Command Default
Command History
Examples
None
Release
Modification
7.6
The following example shows how to initiate a channel selection update for all 802.11a network access points:
(Cisco Controller) > config advanced 802.11a channel update
test Commands
This section lists the test commands for CleanAir.
OL-31334-01
test Commands
Syntax Description
Command Default
Command History
Examples
aq all
idr
Displays the interference devices of the 802.11a/n and 802.11b/g/n radio bands
for access points.
ap
Displays the interference devices of the 802.11a/n and 802.11b/g/n radio bands
for an access point.
cisco_ap
all
Displays the interference devices of the 802.11a/n and 802.11b/g/n radio bands
for all access points.
neighbors
summary
None
Release
Modification
7.6
The following example shows how to display a summary of the CleanAir configuration:
(Cisco Controller) > test cleanair show summary
1787
test Commands
OL-31334-01
PART
FlexConnect Commands
CLI Commands, page 1791
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands, page 1791
config Commands, page 1798
Integrated Management Module Commands in Cisco Flex 7500 Series Controllers, page 1835
debug Commands, page 1841
show Commands
1791
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
The following example shows how to display clients associated to an access point and their SSIDs:
(Cisco Controller) >show capwap reap association
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the status of the FlexConnect access point:
(Cisco Controller) >show capwap reap status
1793
show Commands
Syntax Description
Command Default
Command History
Examples
acl-name
None
Release
Modification
7.6
The following example shows how to display the FlexConnect detailed ACLs:
(Cisco Controller) >show flexconnect acl detailed acl-2
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the FlexConnect ACL summary:
(Cisco Controller) >show flexconnect acl summary
ACL Name
Status
-------------------------------- ------acl1
Modified
acl10
Modified
acl100
Modified
acl101
Modified
acl102
Modified
acl103
Modified
acl104
Modified
acl105
Modified
acl106
Modified
1795
show Commands
Syntax Description
Command Default
Command History
Examples
group_name
None
Release
Modification
7.6
The following example shows how to display the detailed information for a specific FlexConnect group:
(Cisco Controller) >show flexconnect group detail 192.12.1.2
Number of Aps in Group: 1
00:0a:b8:3b:0b:c2
AP1200
Joined
Group Radius Auth Servers:
Primary Server Index ..................... Disabled
Secondary Server Index ................... Disabled
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the current list of FlexConnect groups:
(Cisco Controller) >show flexconnect group summary
flexconnect Group Summary: Count 1
Group Name
# APs
Group 1
1
1797
config Commands
Syntax Description
Command Default
Command History
Examples
summary
latency
None
Release
Modification
7.6
The following example shows how to display information about the list of FlexConnect officeExtend access
points:
(Cisco Controller) >show flexconnect office-extend summary
Summary of OfficeExtend AP
AP Name
Ethernet MAC
Encryption Join-Mode
------------------ ----------------- ---------- ----------AP1130
00:22:90:e3:37:70
Enabled
Latency
AP1140
01:40:91:b5:31:70
Enabled
Latency
Join-Time
---------Sun Jan 4 21:46:07 2009
Sat Jan 3 19:30:25 2009
The following example shows how to display the FlexConnect officeExtend access points link delay:
(Cisco Controller) >show flexconnect office-extend latency
Summary of OfficeExtend AP link latency
AP Name
Status Current
Maximum
Minimum
-------------------------------------------------------------------------AP1130
Enabled 15 ms
45 ms
12 ms
AP1140
Enabled 14 ms
179 ms
12 ms
config Commands
OL-31334-01
config Commands
config ap autoconvert
To automatically convert all access points to FlexConnect mode or Monitor mode upon associating with the
Cisco WLC, use the config ap autoconvert command.
config ap autoconvert {flexconnect | monitor | disable}
Syntax Description
Command Default
Command History
flexconnect
monitor
disable
None
Release
Modification
7.6
Usage Guidelines
When access points in local mode connect to a Cisco 7500 Series Wireless Controller, they do not serve
clients. The access point details are available in the controller. To enable access points to serve clients or
perform monitoring related tasks when connected to the Cisco 7500 Series Wireless Controller, the access
points must be in FlexConnect mode or Monitor mode.
Examples
The following example shows how to automatically convert all access points to the FlexConnect mode:
(Cisco Controller) >config ap autoconvert flexconnect
The following example shows how to disable the autoconvert option on the APs:
(Cisco Controller) >config ap autoconvert disable
1799
config Commands
Syntax Description
Command Default
Command History
Examples
backhaul-wlan
resilient
cisco_ap
enable
disable
Release
Modification
8.0
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
wlan_id
cisco_ap
add
delete
enable
disable
override dns
Overrides the DNS server address on the interface assigned by the controller.
When you override DNS in centrally switched WLANs, the clients get their DNS
server IP address from the AP and not from the controller.
enable
disable
nat-pat
Network Address Translation (NAT) and Port Address Translation (PAT) that
you can enable or disable.
enable
disable
None
Release
Modification
7.6
1801
config Commands
Examples
The following example shows how to enable central-DHCP, Override DNS, and NAT-PAT on a FlexConnect
access point:
(Cisco Controller) >config ap flexconnect central-dhcp 1 ap1250 enable override dns enable
nat-pat enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
wlan_id
cisco_ap
enable
disable
acl
acl_name
None
Release
Modification
7.6
Usage Guidelines
This command allows you to configure a local-split tunnel in a centrally switched WLAN using a FlexConnect
ACL. A local split tunnel supports only for unicast Layer 4 IP traffic as NAT/PAT does not support multicast
IP traffic.
Examples
The following example shows how to configure a local-split tunnel using a FlexConnect ACL:
(Cisco Controller) >config ap flexconnect local-split 6 AP2 enable acl flex6
1803
config Commands
Syntax Description
Command Default
Command History
Examples
add
deletes
acl_name
None
Release
Modification
7.5
The following example shows how to add a policy ACL on a FlexConnect access point:
(Cisco Controller) >config ap flexconnect policy add acl1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
primary
secondary
ip_address
auth_port secret
secret
None
Release
Modification
7.6
The following example shows how to configure a primary RADIUS server for a specific access point:
(Cisco Controller) >config ap flexconnect radius auth set primary 192.12.12.1
1805
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
cisco_ap
Disabled. Once enabled, WLANs enabled for local switching inherit the VLAN assigned at the Cisco WLC.
Release
Modification
7.6
This example shows how to enable the access points VLAN tagging for a FlexConnect access:
(Cisco Controller) >config ap flexconnect vlan enable AP02
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
vlan-id
VLAN identifier.
acl
in-acl
out-acl
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure the FlexConnect access point:
(Cisco Controller) >config ap flexconnect vlan add 21 acl inacl1 outacl1 ap1
1807
config Commands
Syntax Description
Command Default
Command History
Examples
vlan-id
VLAN identifier.
cisco_ap
None
Release
Modification
7.6
The following example shows how to configure a native VLAN for a FlexConnect access point mode:
(Cisco Controller) >config ap flexconnect vlan native 6 AP02
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
ip_address
vlan-id
VLAN identifier.
cisco_ap
Release
Modification
7.6
The following example shows how to assign a VLAN ID to a FlexConnect access point:
(Cisco Controller) >config ap flexconnect vlan wlan 192.12.12.1 6 AP02
1809
config Commands
Syntax Description
Command Default
Command History
wlan
wlan_id
cisco_ap
acl_name
enable
disable
FlexConnect ACL for external web authentication in locally switched WLANs is disabled.
Release
Modification
7.6
Usage Guidelines
The FlexConnect ACLs that are specific to an AP have the highest priority. The FlexConnect ACLs that are
specific to WLANs have the lowest priority.
Examples
The following example shows how to enable FlexConnect ACL for external web authentication on WLAN
6:
(Cisco Controller) >config ap flexconnect web-auth wlan 6 AP2 flexacl2 enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
acl_name
None
Release
Modification
7.6
The following example shows how to add a Web Policy FlexConnect ACL on an access point:
(Cisco Controller) >config ap flexconnect web-policy acl add flexacl2
1811
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
add
wlan_id
cisco_ap
acl_name
delete
None
Release
Modification
7.5
Examples
The following example shows how to configure a Layer 2 ACL on a FlexConnect access point.
(Cisco Controller) >config ap flexconnect wlan add 1 AP1600_1 acl_l2_1
OL-31334-01
config Commands
Syntax Description
Command History
Examples
apply
create
Creates an ACL.
delete
Deletes an ACL.
acl_name
Release
Modification
7.6
The following example shows how to apply the ACL configured on a FlexConnect access point:
(Cisco Controller) >config flexconnect acl apply acl1
1813
config Commands
Syntax Description
action
rule_name
rule_index
permit
deny
add
change
index
delete
Deletes a rule.
destination address
ip_address
netmask
start_port
end_port
direction
in
out
any
dscp
OL-31334-01
config Commands
Command Default
Command History
Examples
dscp
protocol
protocol
source address
swap
index_1
index_2
None
Release
Modification
7.6
1815
config Commands
Syntax Description
Command Default
Command History
Examples
arp-cache
Instructs the access point to save the ARP entry for a client in the cache and reply
on its behalf of the client for locally switched WLAN.
None
Release
Modification
8.0
The following example shows how to apply the proxy ARP with locally switched WLAN on FlexConnect
APs.
(Cisco Controller) >config flexconnect arp-cache
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
disable
enable
delay
Specifies the delay for the interface after which the radio interface has to
be shut down.
delay-in-sec
Release
Modification
7.6
Usage Guidelines
You can specify the delay duration only if you enable the radio interface shutdown.
Examples
The following example shows how to enable the radio interface shutdown after a delay duration of 5 seconds:
(Cisco Controller) >config flexconnect fallback-radio-shut enable delay 5
1817
config Commands
Syntax Description
group_name
Group name.
add
delete
ap
add
delete
ap_mac
radius
ap
authority
id
OL-31334-01
config Commands
hex_id
info
auth_info
disable
eap-fast
enable
disable
enable
leap
disable
enable
pac-timeout
timeout
server-key
auto
key
user
add
username
1819
config Commands
password
delete
Deletes a user.
server
add
delete
primary
secondary
server_index
IP_address
auth_port
secret
predownload
disable
enable
master
ap_name
slave
retry-count
max_count
OL-31334-01
config Commands
ap_name
cisco_ap
start
primary
backup
abort
local-split
wlan
wlan_id
acl
acl_name
multicast overridden-interface
vlan
add
vlan_id
VLAN identifier.
in-acl
out-acl
delete
web-auth
1821
config Commands
Command Default
Command History
Usage Guidelines
wlan
wlan_id
cisco_ap
acl
web-policy
add
delete
eap-cert download
eap-tls
peap
policy acl
None
Release
Modification
7.6
Examples
The following example shows how to add a FlexConnect group for MAC address 192.12.1.2:
(Cisco Controller) >config flexconnect group 192.12.1.2 add
The following example shows how to add a RADIUS server as a primary server for a FlexConnect group with
the server index number 1:
(Cisco Controller) >config flexconnect group 192.12.1.2 radius server add primary 1
OL-31334-01
config Commands
The following example shows how to enable a local split ACL on a FlexConnect AP group for a WLAN:
(Cisco Controller) >config flexconnect group flexgroup1 local-split wlan 1 acl flexacl1
enable
1823
config Commands
Syntax Description
Command History
Examples
group_name
add
vlan-id
VLAN ID.
acl
in-aclname
out-aclname
delete
Release
Modification
7.6
The following example shows how to add VLAN ID 1 for the FlexConnect group myflexacl where the in-bound
ACL name is in-acl and the out-bound ACL is out-acl:
(Cisco Controller) >config flexconnect group vlan myflexacl vlan add 1 acl in-acl out-acl
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
overridden-interface
flexgroup
enable
None
Release
Modification
8.0
The following example shows how to enable DHCP broadcast for locally switched clients.
(Cisco Controller) >config flexconnect
group flexgroup dhcp overridden-interface enable
1825
config Commands
Syntax Description
Command History
Examples
group_name
wlan-id
WLAN ID.
acl-name
ACL name.
enable
disable
Release
Modification
7.6
The following example shows how to enable Web-Auth ACL webauthacl for the FlexConnect group myflexacl
on WLAN ID 1:
(Cisco Controller) >config flexconnect group myflexacl web-auth wlan 1 acl webauthacl enable
OL-31334-01
config Commands
Syntax Description
Command History
Examples
group_name
add
delete
acl-name
Release
Modification
7.6
The following example shows how to add the Web Policy ACL mywebpolicyacl to the FlexConnect group
myflexacl:
(Cisco Controller) >config flexconnect group myflexacl web-policy acl add mywebpolicyacl
1827
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
Enables the access point to choose the controller with the least latency when joining.
disable
Disables the access point to choose the controller with the least latency when joining.
cisco_ap
The access point cannot choose the controller with the least latency when joining.
Release
Modification
7.6
When you enable this feature, the access point calculates the time between the discovery request and discovery
response and joins the controller that responds first. This command is supported only on the following controller
releases:
Cisco 2500 Series Controller
Cisco 5500 Series Controller
Cisco Flex 7500 Series Controllers
Cisco 8500 Series Controllers
Cisco Wireless Services Module 2
This configuration overrides the HA setting on the controller, and is applicable only for OEAP access points.
Examples
The following example shows how to enable the access point to choose the controller with the least latency
when joining:
(Cisco Controller) >config flexconnect join min-latency enable CISCO_AP
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
clear-personalssid-config
cisco_ap
OfficeExtend mode is enabled automatically when you enable FlexConnect mode on the access point.
Release
Modification
7.6
Currently, only Cisco Aironet 1130 series and 1140 series access points that are joined to a Cisco 5500 Series
Controller with a WPlus license can be configured to operate as OfficeExtend access points.
Rogue detection is disabled automatically when you enable the OfficeExtend mode for an access point.
OfficeExtend access points, which are deployed in a home environment, are likely to detect a large number
of rogue devices. You can enable or disable rogue detection for a specific access point or for all access points
by using the config rogue detection command.
DTLS data encryption is enabled automatically when you enable the OfficeExtend mode for an access point.
However, you can enable or disable DTLS data encryption for a specific access point or for all access points
by using the config ap link-encryption command.
Telnet and SSH access are disabled automatically when you enable the OfficeExtend mode for an access
point. However, you can enable or disable Telnet or SSH access for a specific access point by using the config
ap telnet or config ap ssh command.
Link latency is enabled automatically when you enable the OfficeExtend mode for an access point. However,
you can enable or disable link latency for a specific access point or for all access points currently associated
to the controller by using the config ap link-latency command.
Examples
The following example shows how to enable the office-extend mode for the access point Cisco_ap:
(Cisco Controller) >config flexconnect office-extend enable Cisco_ap
1829
config Commands
The following example shows how to clear only the access points personal SSID for the access point Cisco_ap:
(Cisco Controller) >config flexconnect office-extend clear-personalssid-config Cisco_ap
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
ap-auth
wlan_id
enable
disable
None
Release
Modification
7.6
Usage Guidelines
Local switching must be enabled on the WLAN where you want to configure local authentication of clients
associated with FlexConnect.
Examples
The following example shows how to enable authentication of clients associated with FlexConnect on a
specified WLAN:
(Cisco Controller) >config wlan flexconnect ap-auth 6 enable
1831
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan_id
enable
disable
Disabled when the config wlan flexconnect local-switching command is disabled. Enabled when the config
wlan flexconnect local-switching command is enabled.
Release
Modification
7.6
8.0
If the client is configured with Layer 2 encryption, the controller cannot learn the client IP address, and the
controller will periodically drop the client. Disable this option to keep the client connection without waiting
to learn the client IP address.
Note
Note
The ability to disable IP address learning is not supported with FlexConnect central switching.
Examples
The following example shows how to disable client IP address learning for WLAN 6:
(Cisco Controller) >config wlan flexconnect learn-ipaddr disable 6
Related Commands
show wlan
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
wlan_id
enable
disable
central-dhcp
enable
disable
nat-pat
enable
disable
override
option dns
enable
disable
Release
Modification
7.6
1833
config Commands
Usage Guidelines
Examples
Release
Modification
8.0
When you enable the config wlan flexconnect local-switching command, the config wlan flexconnect
learn-ipaddr command is enabled by default.
Note
Note
The ability to disable IP address learning is not supported with FlexConnect central switching.
The following example shows how to enable WLAN 6 for local switching and enable central DHCP and
NAT-PAT:
(Cisco Controller) >config wlan flexconnect local-switching 6 enable central-dhcp enable
nat-pat enable
The following example shows how to enable the override DNS option on WLAN 6:
(Cisco Controller) >config wlan flexconnect local-switching 6 override option dns enable
OL-31334-01
Syntax Description
Command Default
Command History
Usage Guidelines
wlan_id
enable
disable
Release
Modification
7.6
You must enable Flexconnect local switching to enable VLAN central switching. When you enable WLAN
central switching, the access point bridges the traffic locally if the WLAN is configured on the local IEEE
802.1Q link. If the VLAN is not configured on the access point, the AP tunnels the traffic back to the controller
and the controller bridges the traffic to the corresponding VLAN.
WLAN central switching does not support:
FlexConnect local authentication.
Layer 3 roaming of local switching client.
Examples
The following example shows how to enable WLAN 6 for central switching:
(Cisco Controller) >config wlan flexconnect vlan-central-switching 6 enable
1835
imm address
To configure the static IP address of the IMM, use the imm address command.
imm address ip-addr netmask gateway
Syntax Description
Command Default
Command History
Examples
ip-addr
netmask
gateway
None
Release
Modification
7.6
8.0
The following example shows how to set the static IP address of an IMM:
(Cisco Controller) >imm address 209.165.200.225 255.255.255.224 10.1.1.1
OL-31334-01
imm dhcp
To configure DHCP for the IMM, use the imm dhcp command.
imm dhcp {enable | disable | fallback}
Syntax Description
Command Default
Command History
Examples
enable
disable
fallback
Enables DHCP for the IMM, but if it fails, then uses static IP of the IMM
Release
Modification
7.6
The following example shows how to enable DHCP for the IMM:
(Cisco Controller) >imm dhcp enable
1837
imm mode
To configure the IMM mode, use the imm mode command.
imm mode {shared | dedicated}
Syntax Description
shared
dedicated
Command Default
Dedicated
Command History
Release
Modification
7.6
Examples
The following example shows how to set the IMM in shared mode:
(Cisco Controller) >imm mode
OL-31334-01
imm restart
To restart the IMM, use the imm restart command.
imm restart
Syntax Description
Command Default
Command History
restart
None
Release
Modification
7.6
1839
imm summary
To view the IMM parameters, use the imm summary command.
imm summary
Syntax Description
Command Default
Command History
Examples
summary
None
Release
Modification
7.6
OL-31334-01
debug Commands
imm username
To configure the logon credentials for an IMM user, use the imm username command.
imm username username password
Syntax Description
Command Default
Command History
Examples
username
password
None
Release
Modification
7.6
The following example shows how to set the logon credentials of an IMM user:
(Cisco Controller) >imm username username1 password1
debug Commands
1841
debug Commands
Syntax Description
Command Default
Command History
Examples
mgmt
load
(Optional) Configures the debugging for payload activities, which is useful when
the FlexConnect access point boots up in standalone mode.
None
Release
Modification
7.6
The following example shows how to configure the debugging of FlexConnect client authentication and
association messages:
(Cisco Controller) >debug capwap reap mgmt
OL-31334-01
debug Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to debug 802.11 management interface events:
(Cisco Controller) >debug dot11 mgmt interface
1843
debug Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
debug Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the debugging of 802.11 SSID management events:
(Cisco Controller) >debug dot11 mgmt ssid
1845
debug Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the debugging of 802.11 state machine:
(Cisco Controller) >debug dot11 mgmt state-machine
OL-31334-01
debug Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the debugging of the management station settings:
(Cisco Controller) >debug dot11 mgmt station
1847
debug Commands
Syntax Description
Command Default
Command History
Examples
event
error
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of FlexConnect RADIUS server events:
(Cisco Controller) >debug flexconnect aaa event enable
OL-31334-01
debug Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of FlexConnect ACLs:
(Cisco Controller) >debug flexconnect acl enable
1849
debug Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of FlexConnect CCKM fast roaming events:
(Cisco Controller) >debug flexconnect cckm event enable
OL-31334-01
debug Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of FlexConnect access point groups:
(Cisco Controller) >debug flexconnect group enable
1851
debug Commands
debug pem
To configure debugging of the access policy manager, use the debug pem command.
debug pem {events | state} {enable | disable}
Syntax Description
Command Default
Command History
Examples
events
state
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the debugging of the access policy manager:
(Cisco Controller) >debug pem state enable
OL-31334-01
PART
XI
Mobility Commands
CLI Commands, page 1855
CLI Commands
The Cisco Wireless LAN solution command-line interface (CLI) enables operators to connect an ASCII
console to the Cisco Wireless LAN Controller and configure the controller and its associated access points.
show Commands, page 1855
config Commands, page 1874
clear, debug and ping Commands, page 1907
show Commands
This section lists the show commands to display information about your mobility configuration settings.
1855
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
The following example shows how to display the client auto handoff mode after excessive retries:
(Cisco Controller) >show advanced client-handoff
Client auto handoff after retries................
130
OL-31334-01
show Commands
show l2tp
To display Layer 2 Tunneling Protocol (L2TP) sessions, use the show l2tp command.
show l2tp {summary | ip_address}
Syntax Description
Command Default
Command History
Examples
summary
ip_address
IP address.
None
Release
Modification
7.6
The following example shows how to display a summary of all L2TP sessions:
(Cisco Controller) > show l2tp summary
1857
show Commands
show logging
To display the syslog facility logging parameters and buffer contents, use the show logging command.
show logging
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the current settings and buffer content details:
(Cisco Controller) >show logging
(Cisco Controller) > config logging syslog host 10.92.125.52
System logs will be sent to 10.92.125.52 from now on
(Cisco Controller) > config logging syslog host 2001:9:6:40::623
System logs will be sent to 2001:9:6:40::623 from now on
(Cisco Controller) > show logging
Logging to buffer :
- Logging of system messages to buffer :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to buffer ...........
- Number of debug messages logged...............
- Number of debug messages dropped..............
- Cache of logging .............................
- Cache of logging time(mins) ...................
- Number of over cache time log dropped ........
Logging to console :
- Logging of system messages to console :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to console ..........
- Number of debug messages logged...............
- Number of debug messages dropped..............
Logging to syslog :
- Syslog facility................................
- Logging of system messages to console :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
- Logging of debug messages to console ..........
- Number of debug messages logged...............
- Number of debug messages dropped..............
- Logging of system messages to syslog :
- Logging filter level..........................
- Number of system messages logged..............
- Number of system messages dropped.............
errors
1316
6892
Disabled
0
0
Disabled
10080
0
disabled
0
8243
Enabled
0
0
local0
disabled
0
8208
Enabled
0
0
errors
1316
6892
OL-31334-01
show Commands
Disabled
0
0
2
Disabled
10.92.125.52
2001:9:6:40::623
Disabled
Disabled
0
0
Enabled
1859
show Commands
Syntax Description
Command Default
Command History
Usage Guidelines
wlan
wlan_id
guest-lan
guest_lan_id
None
Release
Modification
7.6
The status field display (see example) shows one of the following values:
UPThe controller is reachable and able to pass data.
CNTRL_PATH_DOWNThe mpings failed. The controller cannot be reached through the control path
and is considered failed.
DATA_PATH_DOWNThe epings failed. The controller cannot be reached and is considered failed.
CNTRL_DATA_PATH_DOWNBoth the mpings and epings failed. The controller cannot be reached
and is considered failed.
Examples
The following example shows how to display a mobility wireless LAN anchor list:
(Cisco Controller) >show mobility anchor
Mobility Anchor Export List
WLAN ID
IP Address
Status
-------------------------12
192.168.0.15
UP
GLAN ID
IP Address
Status
--------------------------1
192.168.0.9
CNTRL_DATA_PATH_DOWN
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
Controller
--------------9.7.104.10
Learnt From
---------------Self
1861
show Commands
Syntax Description
Command Default
Command History
Examples
wlan
wlan_id
None
Release
Modification
7.6
The following example shows how to get a mobility wireless LAN foreign map list:
(Cisco Controller) >show mobility foreign-map wlan 2
Mobility Foreign Map List
WLAN ID
Foreign MAC Address
------------------------2
00:1b:d4:6b:87:20
Interface
--------dynamic-105
OL-31334-01
show Commands
Syntax Description
hash
Command Default
None
Command History
Examples
Displays the hash keys of the mobility group members in the same domain.
Release
Modification
7.6
The following example shows how to display the hash keys of the mobility group members:
(Cisco Controller) >show mobility group member hash
Default Mobility Domain.......................... new-mob
IP Address
Hash Key
--------------------------------------------------------9.2.115.68
a819d479dcfeb3e0974421b6e8335582263d9169
9.6.99.10
0974421b6e8335582263d9169a819d479dcfeb3e
9.7.7.7
feb3e0974421b6e8335582263d9169a819d479dc
1863
show Commands
Syntax Description
Command Default
Command History
Examples
client
detail
summary
None
Release
Modification
7.3.112.0
The following is a sample output of the show mobility oracle summary command:
(Cisco Controller) >show mobility oracle summary
Number of MCs.................................... 2
IP Address
--------------9.71.104.10
9.71.104.250
MAC Address
----------------88:43:e1:7d:fe:00
e8:b7:48:a2:16:e0
Link Status
-----------------
Client Count
-------------
0
2
The following is a sample output of the show mobility oracle client summary command:
(Cisco Controller) >show mobility oracle client summary
Number of Clients................................ 2
MAC Address
Anchor MC
Foreign MC
AssocTime
----------------- --------------------- ----------------- -------------00:18:de:b0:5c:91 9.72.104.250
00:1e:e5:f9:c9:e2 9.72.104.250
0
0
The following is a sample output of the show mobility oracle client detail command:
(Cisco Controller) >show mobility oracle client detail 00:1e:e5:f9:c9:e2
Client MAC Address : ............................
Client IP address : .............................
Anchor MC IP address : ..........................
Anchor MC NAT IP address : ......................
Foreign MC IP address : .........................
Foreign MC NAT IP address : .....................
00:1e:e5:f9:c9:e2
0.0.0.0
9.71.104.250
9.71.104.250
-
OL-31334-01
show Commands
1865
show Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display statistics of the mobility manager:
(Cisco Controller) >show mobility statistics
Global Mobility Statistics
Rx Errors.....................................
Tx Errors.....................................
Responses Retransmitted.......................
Handoff Requests Received.....................
Handoff End Requests Received.................
State Transitions Disallowed..................
Resource Unavailable..........................
Mobility Initiator Statistics
Handoff Requests Sent.........................
Handoff Replies Received......................
Handoff as Local Received.....................
Handoff as Foreign Received...................
Handoff Denys Received........................
Anchor Request Sent...........................
Anchor Deny Received..........................
Anchor Grant Received.........................
Anchor Transfer Received......................
Mobility Responder Statistics
Handoff Requests Ignored......................
Ping Pong Handoff Requests Dropped............
Handoff Requests Dropped......................
Handoff Requests Denied.......................
Client Handoff as Local.......................
Client Handoff as Foreign ...................
Client Handoff Inter Group ...................
Anchor Requests Received......................
Anchor Requests Denied........................
Anchor Requests Granted.......................
Anchor Transferred............................
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
OL-31334-01
show Commands
Syntax Description
Command Default
None
Command History
Release
Modification
7.6
Usage Guidelines
Examples
Disabled
Disabled
16666
Disabled
snmp_gui
Disabled
0x66bd
10
3
1
0
Multicast IP
0.0.0.0
Status
Up
The following is a sample output of the show mobility summary command with new mobility architecture.
(Cisco Controller) >show mobility summary
Mobility Protocol Port...........................
Default Mobility Domain..........................
Multicast Mode ..................................
Mobility Domain ID for 802.11r...................
Mobility Keepalive Interval......................
Mobility Keepalive Count.........................
Mobility Group Members Configured................
Mobility Control Message DSCP Value..............
Controllers configured in the Mobility Group
IP Address Public IP Address Group Name
Status
9.71.106.2 9.72.106.2
Mobility
Data Path Down
16666
Mobility
Disabled
0xb348
10
3
3
0
Multicast IP
0.0.0.0
MAC Address
00:00:00:00:00:00
Control and
1867
show Commands
9.71.106.3 9.72.106.3
Data Path Down
9.71.106.69 9.72.106.69
Mobility
0.0.0.0
00:00:00:00:00:00
Mobility
0.0.0.0
68:ef:bd:8e:5f:20
Control and
Up
OL-31334-01
show Commands
Syntax Description
Command History
Examples
domain_name
profile
profile_name
Release
Modification
7.6
The following example shows how to display the summary information of a PMIPv6 domain:
(Cisco Controller) >show pmipv6 domain floor1 profile profile1
NAI: @example.com
APN: Example
LMA: Examplelma
NAI: *
APN: ciscoapn
LMA: ciscolma
1869
show Commands
Syntax Description
Command History
Examples
lma
lma_name
nai
nai_string
Release
Modification
7.6
OL-31334-01
show Commands
Syntax Description
Command History
Examples
Release
Modification
7.6
The following example shows how to display the global PMIPv6 parameters of a MAG:
(Cisco Controller) >show pmipv6 mag globals
Domain : D1
MAG Identifier : M1
MAG Interface
Max Bindings
Registration Lifetime
BRI Init-delay time
BRI Max-delay time
BRI Max retries
Refresh time
Refresh RetxInit time
Refresh RetxMax time
Timestamp option
Validity Window
Peer#1:
LMA Name: AN-LMA-5K
Peer#2:
LMA Name: AN-LMA
Peer#3:
LMA Name: AN-LMA
:
:
:
:
:
:
:
:
:
:
:
Management
10000
3600 (sec)
1000 (msec)
2000 (msec)
1
300 (sec)
1000 (msec)
32000 (msec)
Enabled
7
1871
show Commands
Syntax Description
Command History
Usage Guidelines
domain
domain_name
peer
lma_name
Name of the LMA. The LMA name is case sensitive and can be
up to 127 alphanumeric characters.
Release
Modification
7.6
LMA Statistics
Description
PBU Sent
PBA Received
PBRI Sent
OL-31334-01
show Commands
Examples
LMA Statistics
Description
PBRI Received
PBRA Sent
PBRA Received
Number of Handoff
1873
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
The following example shows how to display the summary of the PMIPv6 profiles:
(Cisco Controller) >show pmipv6 profile summary
Profile Name
WLAN IDS (Mapped)
---------------------------Group1
6
config Commands
This section lists the config commands to configure mobility.
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
dscp_value
None
Release
Modification
7.6
The following example shows how to configure the mobility intercontroller DSCP value to 40:
(Cisco Controller) >config mobility dscp 40
1875
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
add
delete
wlan
wlan_id
guest-lan
guest_lan_id
anchor_ip
None
Release
Modification
7.6
Examples
The following example shows how to add a mobility anchor with the IP address 192.12.1.5 to a wireless LAN
ID 2:
(Cisco Controller) >config mobility group anchor add wlan 2 192.12.1.5
The following example shows how to delete a mobility anchor with the IP address 193.13.1.15 from a wireless
LAN:
(Cisco Controller) >config mobility group anchor delete wlan 5 193.13.1.5
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
domain_name
None
Release
Modification
7.6
The following example shows how to configure a mobility domain name lab1:
(Cisco Controller) >config mobility group domain lab1
1877
config Commands
Syntax Description
Command Default
Command History
Examples
count
Number of times that a ping request is sent to a mobility group member before
the member is considered unreachable. The range is from 3 to 20. The default
is 3.
The default number of times that a ping request is sent to a mobility group member is 3.
Release
Modification
7.6
The following example shows how to specify the number of times a ping request is sent to a mobility group
member before the member is considered unreachable to three counts:
(Cisco Controller) >config mobility group keepalive count 3
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
interval
Interval of time between each ping request sent to a mobility group member. The
range is from 1 to 30 seconds. The default value is 10 seconds.
Release
Modification
7.6
The following example shows how to specify the amount of time between each ping request sent to a mobility
group member to 10 seconds:
(Cisco Controller) >config mobility group keepalive 10
1879
config Commands
Syntax Description
Command Default
Command History
Examples
add
MAC-addr
IP-addr
group_name
delete
hash
key
none
None
Release
Modification
7.6
8.0
The following example shows how to add a mobility group member with an IPv4 address to the list:
(Cisco Controller) >config mobility group member add 11:11:11:11:11:11 209.165.200.225
OL-31334-01
config Commands
The following example shows how to add a mobility group member with an IPv6 address to the list:
(Cisco Controller) >config mobility group member add 11:11:11:11:11:11 2001:DB8::1
The following example shows how to configure the hash key of a virtual controller in the same domain:
Note
1881
config Commands
Syntax Description
Command Default
Command History
Examples
group_name
Member switch group name (if different from the default group
name).
ip_address
None
Release
Modification
7.6
8.0
The following example shows how to configure the multicast group IP address 10.10.10.1 for a group named
test:
(Cisco Controller) >config mobility group multicast-address test 10.10.10.1
The following example shows how to configure the multicast group IP address 2001:DB8::1 for a group
named test:
(Cisco Controller) >config mobility group multicast-address test 2001:DB8::1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
local_group_multicast_address
Release
Modification
7.6
The following example shows how to enable the multicast mobility mode for the local mobility group IP
address 157.168.20.0:
(Cisco Controller) >config mobility multicast-mode enable 157.168.20.0
1883
config Commands
Syntax Description
Command Default
Command History
enable
disable
Configures the Cisco WLC to switch to the old flat mobility architecture.
Release
Modification
7.3.112.0
Usage Guidelines
New mobility is supported only on Cisco WiSM2, Cisco 2500 Series Wireless Controllers, Cisco 5500 Series
Wireless Controllers, and Cisco 8500 Series Wireless Controllers. New mobility enables the Cisco WLC to
be compatible with Converged Access controllers with Wireless Control Module (WCM), such as Cisco
Catalyst 3850 Series and the Cisco 5760 Wireless LAN Controllers.
Examples
The following example shows how to enable new mobility on the Cisco WLC:
(Cisco Controller) >config mobility new-architecture enable
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
enable
disable
ip
ip_address
None
Release
Modification
7.3.112.0
8.0
The MO maintains the client database under one complete mobility domain. It consists of a station database,
an interface to the mobility Cisco WLC, and an NTP server. There can be only one MO in the entire mobility
domain.
The IPv6 address format for this command is not supported.
Examples
1885
config Commands
Syntax Description
Command Default
Command History
bridge-domain-id
peer-group-name
bridge domain id
create
Creates an SPG.
delete
Deletes an SPG.
member
add
IP_address
public_IP_address
multicast-address
multicast_IP_address
None
Release
Modification
7.3.112.0
8.0
Usage Guidelines
Examples
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
enable
disable
None
Release
Modification
7.6
The following example shows how to enable the secure mode for mobility messages:
(Cisco Controller) >config mobility secure-mode enable
1887
config Commands
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
domain_name
None
Release
Modification
7.6
The following example shows how to configure a domain name for a PMIPv6 WLAN:
(Cisco Controller) >config pmipv6 domain floor1
1889
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
profile_name
Name of the profile. The profile name is case sensitive and can be up to 127
alphanumeric characters.
nai
user@realm
Network Access Identifier of the client in the format user@realm. The NAI name
is case sensitive and can be up to 127 alphanumeric characters.
@realm
All Network Access Identifiers. You can have profiles based on an SSID for all
users.
lma
lma_name
Name of LMA. The LMA name is case sensitive and can be up to 127
alphanumeric characters.
apn
ap_name
Name of the access point. The access point name is case sensitive and can be up
to 127 alphanumeric characters.
None
Release
Modification
7.6
This command is a prerequisite for using PMIPv6 configuration commands if the controller uses open
authentication.
OL-31334-01
config Commands
Examples
1891
config Commands
Syntax Description
Command Default
Command History
Examples
profile
profile_name
Name of the PMIPv6 profile. The profile name is case sensitive and can be up
to 127 alphanumeric characters.
nai
nai_id
Network Access Identifier of a mobile client. The NAI is case sensitive and
can be up to 127 alphanumeric characters.
all
Specifies all NAIs. When you delete all NAIs, the profile is deleted.
domain
domain_name
Name of the PMIPv6 domain. The domain name is case sensitive and can be
up to 127 alphanumeric characters.
lma
lma_name
Name of the LMA. The LMA name is case sensitive and can be up to 127
alphanumeric characters.
None
Release
Modification
7.6
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Usage Guidelines
apn-name
None
Release
Modification
8.0
By default, the MAG role is WLAN. However, for the lightweight access points, MAG role should be
configured as 3GPP. If the MAG role is 3GPP, it is mandatory to specify an APN for the MAG.
To delete an APN for a MAG, use the config pmipv6 delete mag apn apn-name command.
Examples
1893
config Commands
Syntax Description
Command Default
Command History
Examples
units
Initial timeout between the PBUs when the MAG does not receive the PBAs. The range
is from 100 to 65535 seconds.
Release
Modification
7.6
The following example shows how to configure the initial timeout between the PBUs when the MAG does
not receive the PBAs:
(Cisco Controller) >config pmipv6 mag binding init-retx-time 500
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
units
Lifetime of the binding entries in the MAG. The binding lifetime must be a multiple of
4 seconds. The range is from 10 to 65535 seconds.
Release
Modification
7.6
Usage Guidelines
You must configure a Proxy Mobility IPv6 (PMIPv6) domain before you configure the lifetime of the binding
entries in the controller.
Examples
The following example shows how to configure the lifetime of the binding entries in the controller:
(Cisco Controller) >config pmipv6 mag binding lifetime 5000
1895
config Commands
Syntax Description
Command Default
Command History
Examples
units
Maximum timeout between the PBUs when the MAG does not receive the PBAs. The
range is from 100 to 65535 seconds.
Release
Modification
7.6
The following example shows how to configure the maximum timeout between the PBUs when the MAG
does not receive the PBAs:
(Cisco Controller) >config pmipv6 mag binding max-retx-time 50
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
units
Maximum number of binding entries in the MAG. This number indicates the maximum
number of users connected to the MAG. The range is from 0 to 40000.
Release
Modification
7.6
Usage Guidelines
You must configure a Proxy Mobility IPv6 (PMIPv6) domain before you configure the maximum number of
binding entries in the MAG.
Examples
The following example shows how to configure the maximum number of binding entries in the MAG:
(Cisco Controller) >config pmipv6 mag binding maximum 20000
1897
config Commands
Syntax Description
units
Refresh time of the binding entries in the MAG. The binding refresh time must be a
multiple of 4. The range is from 4 to 65535 seconds.
Command Default
The default refresh time of the binding entries in the MAG is 300 seconds.
Usage Guidelines
You must configure a PMIPv6 domain before you configure the refresh time of the binding entries in the
MAG.
Examples
The following example shows how to configure the refresh time of the binding entries in the MAG:
(Cisco Controller) >config pmipv6 mag binding refresh-time 500
OL-31334-01
config Commands
Syntax Description
Command Default
min
Specifies the minimum amount of time that the MAG waits before retransmitting a
BRI message.
max
Specifies the maximum amount of time that the MAG waits before retransmitting a
BRI message.
time
Maximum or minimum amount of time that the Cisco WLC waits before retransmitting
a BRI message. The range is from 500 to 65535 milliseconds.
The default value of the maximum amount of time that the MAG waits before retransmitting a BRI message
is 2 seconds.
The default value of the minimum amount of time that the MAG waits before retransmitting a BRI message
is 1 second.
Command History
Examples
Release
Modification
7.6
The following example shows how to configure the minimum amount of time that the MAG waits before
retransmitting a BRI message:
(Cisco Controller) >config pmipv6 mag bri delay min 500
1899
config Commands
Syntax Description
retries
Maximum number of times that the MAG retransmits the BRI message before receiving
the BRA message. The range is from 1 to 10 retries.
Command Default
Examples
The following example shows how to configure the maximum number of times that the MAG retries:
(Cisco Controller) >config pmipv6 mag bri retries 5
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
lma_name
Name of the LMA. The LMA name can be a NAI or a string that
uniquely identifies the LMA.
ipv4-address
address
None
Release
Modification
7.6
Usage Guidelines
Examples
The following example shows how to configure an LMA with the MAG:
(Cisco Controller) >config pmipv6 mag lma vodafonelma ipv4-address 209.165.200.254
1901
config Commands
Syntax Description
timestamp
window
time
sequence-no
sequence
mobile_node_timestamp
mobile_node_timestamp
Command Default
Usage Guidelines
Examples
The following example shows how to configure the maximum amount of time difference in milliseconds
between the time stamp in the received PBA message and the current time of day:
(Cisco Controller) >config pmipv6 mag replay-protection timestamp window 200
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
wlan_id
ip_addr
None
Release
Modification
7.6
8.0
The following example shows how to configure the mobility wireless LAN anchor list with WLAN ID 4 and
IPv4 address 192.168.0.14
(Cisco Controller) >config wlan mobility anchor add 4 192.168.0.14
Related Commands
show wlan
1903
config Commands
Syntax Description
Command Default
Command History
Examples
add
delete
wlan_id
foreign_mac_address
interface_name
interface_group_name
None
Release
Modification
7.6
The following example shows how to add an interface group for foreign Cisco WLCs with WLAN ID 4 and
a foreign switch MAC address on WLAN 00:21:1b:ea:36:60:
(Cisco Controller) >config wlan mobility foreign-map add 4 00:21:1b:ea:36:60 mygroup1
OL-31334-01
config Commands
Syntax Description
Command Default
Command History
Examples
wlan_id
None.
Release
Modification
7.6
The following example shows how to configure a default realm name on a PMIPv6 WLAN:
(Cisco Controller) >config wlan pmipv6 default-realm XYZ 6
1905
config Commands
Syntax Description
Command Default
Command History
none
pmipv6
all
wlan_id
None
Release
Modification
7.6
Usage Guidelines
You must disable the WLAN when you configure the mobility type.
Examples
The following example shows how to configure the mobility type as PMIPv6 on a WLAN:
(Cisco Controller) >config wlan pmipv6 mobility-type pmipv6 16
OL-31334-01
Syntax Description
Command Default
Command History
profile_name
wlan_id
None
Release
Modification
7.6
Usage Guidelines
This command binds a profile name to the PMIPv6 WLAN or SSID. Each time that a mobile node associates
with the controller, it uses the profile name and NAI in the trigger to the PMIPV6 module. The PMIPV6
module extracts all the profile specific parameters such as LMA IP, APN, and NAI and sends the PBU to the
ASR5K.
Examples
The following example shows how to create a profile named ABC01 on a PMIPv6 WLAN:
(Cisco Controller) >config wlan pmipv6 profile_name ABC01 16
1907
Syntax Description
Command Default
None
Command History
Examples
Release
Modification
7.6
OL-31334-01
cping
To test mobility data traffic using the new mobility architecture, use the cping command.
cping mobility_peer_IP_address
Syntax Description
Command Default
Command History
mobility_peer_IP_address
None
Release
Modification
7.5
Usage Guidelines
This command tests the mobility data traffic using the new mobility architecture.
Examples
The following example shows how to test the data traffic of a controller with peer mobility IP address as
172.12.35.31:
(Cisco Controller) >cping 172.12.35.31
1909
debug dot11
To configure the debugging of 802.11 events, use the debug dot11 command.
debug dot11 {all | load-balancing | management | mobile | nmsp | probe | rldp | rogue | state} {enable |
disable}
Syntax Description
Command Default
Command History
all
load-balancing
management
mobile
nmsp
probe
rldp
rogue
state
enable
disable
None
Release
Modification
7.6
OL-31334-01
Examples
The following example shows how to enable the debugging of 802.11 settings:
(Cisco Controller) > debug dot11 state enable
(Cisco Controller) > debug dot11 mobile enable
Related Commands
debug disable-all
debug dot11 mgmt interface
debug dot11 mgmt msg
debug dot11 mgmt ssid
debug dot11 mgmt state-machine
debug dot11 mgmt station
1911
debug client
To configure the debugging of a passive client that is associated correctly with the access point, use the debug
client command.
debug client mac_address
Syntax Description
mac_address
Command Default
None
Examples
The following example shows how to debug a passive client with MAC address 00:0d:28:f4:c0:45:
(Cisco Controller) >debug client 00:0d:28:f4:c0:45
OL-31334-01
debug fmchs
To configure debugging of Fixed Mobile Convergence Handover Service (FMCHS) of the controller, use the
debug fmchscommand.
debug fmchs {all | error | event | nmsp | packet} {enable | disable}
Syntax Description
Command Default
Command History
Examples
all
error
event
nmsp
packet
enable
disable
None
Release
Modification
7.6
1913
debug mobility
To configure the debugging of wireless mobility, use the debug mobility command.
debug mobility {ap-list | config | directory | dtls | handoff | keep-alive | multicast | oracle | packet | peer-ip
IP-address | pmk | pmtu-discovery | redha} {enable | disable}
Syntax Description
ap-list
config
directory
dtls
handoff
keep-alive
multicast
oracle
packet
peer-ip
IP-address
pmk
pmtu-discovery
OL-31334-01
Command Default
Command History
Examples
redha
enable
disable
None
Release
Modification
7.6
8.0
The following example shows how to enable the debugging of wireless mobility packets.
(Cisco Controller) >debug mobility handoff enable
1915
eping
To test the mobility Ethernet over IP (EoIP) data packet communication between two Cisco WLCs, use the
eping command.
eping mobility_peer_IP_address
Syntax Description
Command Default
Command History
Usage Guidelines
Note
mobility_peer_IP_address
None
Release
Modification
7.6
8.0
This command tests the mobility data traffic over the management interface.
This ping test is not Internet Control Message Protocol (ICMP) based. The term ping is used to indicate
an echo request and an echo reply message.
The IPv6 address format for this command is not supported.
Examples
The following example shows how to test EoIP data packets and to set the IP address of a controller that
belongs to a mobility group to 172.12.35.31:
(Cisco Controller) >eping 172.12.35.31
OL-31334-01
mping
To test mobility UDP control packet communication between two Cisco WLCs, use the mping command.
mping mobility_peer_IP_address
Syntax Description
Command Default
Command History
Usage Guidelines
Note
Examples
mobility_peer_IP_address
None
Release
Modification
7.6
8.0
This test runs over mobility UDP port 16666. It tests whether the mobility control packet can be reached over
the management interface.
This ping test is not Internet Control Message Protocol (ICMP) based. The term ping is used to indicate
an echo request and an echo reply message.
The following example shows how to test mobility UDP control packet communications and to set the IP
address of a Cisco WLC that belongs to a mobility group to 172.12.35.31:
(Cisco Controller) >mping 172.12.35.31
1917
OL-31334-01