Deploying A Secure Wireless Lan: Day One
Deploying A Secure Wireless Lan: Day One
The explosion of mobile device usage, from smartphones to iPads, has created a de-
mand for mobility that is making the entire IT industry sit up and take notice. People
want to work wherever they are, whenever they need to. And that means wireless LANs.
Whether you need to replace legacy wi-fi systems or need to build out a new LAN, you
need a secure system that doesn’t increase your workload.
Day One: Deploying a Secure Wireless LAN walks you through how to plan and deploy
a simple wireless network step by step. You’ll be introduced to wireless basics, review
some of the tools for wireless network planning, and then take part in the actual de-
ployment configuration. It’s time to cut through the clutter and get this wireless solution
done in a day.
“This Day One book is a fabulous resource. It’s packed with everything you need to know to get
up and running on a secure Juniper wireless network in no time.”
Steve Troyer, VP, Product Line Management and Technical Marketing,
Campus and Branch Business Unit, Juniper Networks, Inc.
IT’S DAY ONE AND YOU HAVE A JOB TO DO, SO LEARN HOW TO:
n Understand wireless networking basics.
n Understand wireless network planning and the tools and resources necessary to
fine-tune your wireless plan.
n Console into a wireless controller and configure basic IP connectivity.
Juniper Networks Books are singularly focused on network productivity and efficiency. Peruse the
complete library at www.juniper.net/books.
ISBN 978-1936779482
51200
07100152
9 781936 779482
Juniper Wireless Technologies
© 2012 by Juniper Networks, Inc. All rights reserved. About the Authors
Laura A. Phillips is a longtime writer of documentation
Juniper Networks, the Juniper Networks logo, Junos, for wireless products, beginning with a wireless firewall
NetScreen, and ScreenOS are registered trademarks of in 2002.
Juniper Networks, Inc. in the United States and other
countries. Junose is a trademark of Juniper Networks, Tim McCarthy is a Technical Marketing Manager for the
Inc. All other trademarks, service marks, registered Juniper WL and Branch SRX product lines. Tim has been
trademarks, or registered service marks are the property designing and deploying enterprise WLAN solutions for
of their respective owners. the past 10 years.
MORE? It is highly recommended that you become familiar with the Juniper
Networks Mobility System Software Configuration Guide, and the
Mobility System Software Command Reference, available at http://
www.juniper.net/techpubs/.
WAN
Corporate Office
Floor 2
EX (PoE)
VLAN - Corp
EX (Aggregation)
75.126.225.99
WLA 532s (PoE)
SRX 650
Radius/DHCP/DNS
172.24.111.1/24 172.24.111.115
Floor 1
EX (PoE) EX
VLANs- Corp, Guest 172.24.111.2
WLC 880R
172.24.111.110
The IP addresses from Figure A.1 are used in the example configura-
tion steps in this book. Also, you can see that there are two VLANs
configured on the network with different access privileges.
In general, best practice recommends naming WLAs based on the
location of the WLAs, as shown in Table A.1, where the naming
convention used is a floor-department hybrid. It’s a naming scheme
recommended by Juniper TAC and Professional Services, and aids
when troubleshooting an access point (AP), as you can instantly know
the location of the AP by the name.
Table A.1 Example Naming Convention for WLAs
NOTE Each country has different channels available for use on wireless
networks. Check with your country regulations to see the available
channels.
L PA
AAA
Switching Models
There are two different network switching models used on the
wireless network, and both are supported in the software and
hardware.
Centralized switching occurs when the WLA encapsulates user data
in TAPA/CAPWAP and forwards it to the WLC for delivery to the
appropriate VLAN. The data is also returned through the WLC. This
forwarding model provides a high level of control over the end-user
data path. It also provides a high level of security for guest access.
Local switching occurs when user data is placed directly onto the
appropriate VLAN at the WLA, and both forward and reverse paths
are through the WLA. There are two advantages to local switching:
Reduced latency – for delay sensitive traffic such as VoIP or
video. Local switching removes two hops from the outbound
and inbound data paths and removes the need to encapsulate
and decapsulate user traffic in TAPA.
Greater system capacity – for high bandwidth client devices
such as 802.11n-capable clients. The WLC is removed from the
data path and WLC processing power is not a limiting factor
for these clients.
16 Day One: Deploying a Secure Wireless LAN
NOTE Other features supported by the WLAs include local switching, high
availability, and spectrum analysis. These products are just a few from
the complete line of WLAs available from Juniper Networks. Go to
http://www.juniper.net/us/en/products-services/wireless/.
WLA522
The WLA522 is a high-performance 802.11n, dual-radio, 2x2 MIMO
indoor access point designed for high-density deployments requiring
Chapter 1: Learning Wireless Networking Basics 17
WLA532
The WLA532offers the highest level of integration of security, perfor-
mance, and manageability while delivering the best WLAN user
experience. It features an energy efficient power design, enhanced
security, dual radios, 3x3 MIMO, 3 stream, and 1 GE uplink port, all
in the smallest footprint package in its class. The WLA532 can lower
capital expenses by requiring fewer APs per floor. It also lowers
operational expenses through reduced IT staffing demands. It has
improved reliability with concurrent spectrum analysis and can help
robust deployments designed around known interference sources.
WLA632
The WLA632 Wireless LAN Access Point is a rugged dual-radio 3x3
MIMO access point designed for outdoor deployment in all weather
conditions. It provides mesh services to extend wireless access in areas
where Ethernet cabling cannot reach or is not desired, as well as
enabling wireless users to stay seamlessly connected as they roam from
building to building. Point-to-point bridging is also supported, allow-
ing the WLA632 to interconnect different sites over the air, without
needing to lay or lease fiber.
The WLA632 is simple to deploy, easy to manage, and supports any
kind of mobility service, including data, voice, video, and location,
over wireless connections. Its weatherproof enclosure is suitable for
extreme outdoor environments.
NOTE These are just a few products from the complete line of WLCs available
from Juniper Networks. Go to http://www.juniper.net/us/en/products-
services/wireless/.
WLC2
The WLC2 Wireless LAN Controller is 802.11n-ready, providing
intelligent switching that combines centralized and distributed data
forwarding for up to four WLA Series access points.
The WLC2 is intended for branch office, retail store, and small business
deployments where fewer than five access points are needed, yet full
operation is required even if the branch becomes disconnected from the
corporate network. Key features include:
Supports four access points
2 x 10/100 Ethernet ports (one with PoE support)
Dimensions = 7.5” x 5.75” x 1.25” and 1.5 lb
NOTE This device does not carry a redundant power supply. Use the WLC880.
WLC880
The WLC880 Wireless LAN Controller brings the scalability, manage-
ability, reliability, and resiliency of wired networks to wireless LANs.
Designed for mainstream 802.11n deployment, it also offers future-
proofing for up to 256 802.11n access points equipped with support for
three spatial streams each.
The WLC880R also enables the WLAN to be extended to branch offices
using AES encrypted tunnels over the Internet. This enables a simplified
branch office wireless network deployment model that eliminates
complexity while leveraging the existing corporate security infrastruc-
ture and policies. The result is easier and more rapid deployment of
secure wireless LAN services in small branch or retail offices, needing
only low cost “Remote APs” and no local controller in the branch. Key
features include:
Supports up to 256 access points
4 x GbE SFP ports and 4 x 10/100/1000 Mbps RJ45 Ethernet ports
Chapter 1: Learning Wireless Networking Basics 19
WLC2800
The WLC2800 scales to wireless networks deployed in medium- to
large-size enterprises. Key features include:
Supports up to 512 access points
28 Gbps throughput
8 x GbE ports with fiber or RJ45 interfaces, and 2 x 10 GbE
ports
Hot-swappable redundant power supply options
Dimensions – 17.4” x 18” x 2.594” and 18 lb
RingMaster Software
RingMaster software is a management suite for planning, configuring,
deploying, monitoring, and optimizing an enterprise wireless LAN
network. Single or multi-site wireless LAN networks can be managed
from one RingMaster console.
RingMaster develops an accurate RF (radio frequency) plan for the
building using scanned or generated floor plans, outdoor obstacle
maps, and the RF characteristics of common building materials. This
wireless LAN network planning software automatically determines the
number of access points to install in any part of the building, including
a report to show technicians precisely where to install the access
points.
SmartPass Software
SmartPass is a WLAN security management application that gives
network managers dynamic access control over all users and devices
on a wireless LAN. This WLAN security management application can
adjust access privileges as a user’s circumstances change and securely
provision hundreds of guest users on demand.
SmartPass includes standards-based APIs for integrating with third
party applications. Billing, facility management, hospitality registra-
tion, intrusion prevention/intrusion detection systems, custom report-
ing applications, and other access applications can all be integrated
into SmartPass.
MORE? If you need more complete coverage of wireless network planning, see
the Juniper Networks RingMaster Planning Guide at http://www.
juniper.net/techpubs/en_US/release-independent/wireless/information-
products/pathway-pages/wireless-lan/index.html.
RF Auto-Tuning or RF
Do I need to locate users? RF Auto-Tuning
Auto-Tuning with modeling
RF Auto-Tuning or RF
Do I need to locate rogue clients? RF Auto-Tuning
Auto-Tuning with modeling
And for comparison, here is a list of steps used for planning outdoor
wireless networks and a screen capture of Ringmaster working in the
wild:
Create and configure outdoor areas
Upload and scale a plan or image
Place RF obstacles
Create and configure outdoor coverage areas
Compute and place WLAs
Review and adjust coverage
Optimize channels and WLA transmit power
STORAGE
STORAGE TRAINING STG
ROOM OFFICE
BREAK
STORAGE ROOM OFFICE
EMERGENCY OFFICE
EXIT
TELE
REST REST
RM. RM. OFFICE
STORAGE COMPUTER
W/MEZZ ABOVE
OFFICE
OPEN OFFICE OPEN
OFFICE
STG OPEN OFFICE OPEN OFFICE
OFFICE
DEMO
BREAK
STG
TELE STG
OFFICE EMERGENCY
EXIT
OFFICE TRAINING
ROOM OPEN OFFICE
OPEN
OFFICE OFFICE
OFFICE OPEN OFFICE WOMEN MEN
ELECT.
30'
OFFICE OFFICE OFFICE OFFICE OFFICE OFFICE
Or, you can estimate that one WLA supports 20-25 users and place the
WLAs on the grid with additional WLAs in areas with more users.
With your plan in place, install the WLAs. Use the installation guide
that comes with the products. Once installed, let’s get into your lab or
server room and begin the deployment.
Chapter 3
Distributed WLAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Distributed WLAs
To be able to configure the WLA, you must choose how the WLA
connects to the WLC. You can connect a WLA directly to the WLC,
but that’s a topic for a different wireless book.
The WLA is not directly connected to the WLC, but is connected to a
Layer 2 or Layer 3 switch between the WLA and WLC. Communica-
tion occurs over any subnet on the network. You must also provide
PoE on the connection to the WLA as well as DHCP services on the
network. We’ll go over DHCP requirements and booting processes in
the next section.
or:
host: hostname1,hostname2, ...
You can’t use an IP address list and a host list at the same time. You have
to use one or the other. Let’s examine a DAP using broadcast messages
and DHCP Option 43 as illustrated here in Figure 3.1.
The chain of events in Figure 3.1 is:
1. DAP1 sends a DHCP Discover message from WLA port 1 (wired
network port).
2. DHCP server receives the Discover message (through a relay agent)
and replies with a DHCP Offer message containing the IP address for
the WLA, the router IP address for the DAP1 IP subnet, the DNS server
address, and the domain name. WLAN then sends a DHCP Request
message to the server and receives an acknowledgment from the server.
32 Day One: Deploying a Secure Wireless LAN
WLC1
4
System IP 10.10.10.4
Active WLAs = 49 EX Switch
DAP 1
serial-id:032219999
model:WLA532
LAN
1 3 5
2
DAP 1
serial-id:032219999
model:WLA532
DHCP Server
It’s worthwhile to take a minute and understand what the DNS server
provides to the WLA, as you may not be familiar with the process as it
applies to a WLA.
If the intermediate network between the distributed WLAs (DAPs)
includes one or more IP routers, create a jnpr.mynetwork.com or
wlc-switch.mynetwork.com entry on the DNS server. The entry needs
to map one of these names to a WLC IP address. For redundancy, you
can create more than one DNS entry and map each entry to a different
WLC in the subnet.
The DNS entry allows the WLA to communicate with a WLC not on
the WLA subnet. If the WLA can’t locate a WLC on the same subnet, it
sends a DNS request to both JNPR and wlc-switch, and the DNS suffix
for mynetwork.com is obtained through DHCP.
If you define only the JNPR DNS entry, the WLA contacts the WLC
with an IP address returned for JNPR.
If you define only the wlc-switch DNS entry, the WLA contacts the
WLC with the IP address for wlc-switch.
If both are defined, the WLA contacts the WLC with the IP address for
JNPR and ignores the IP address for wlc-switch. In addition, if both
are defined, and the WLA can’t contact the IP address for JNPR, the
WLA doesn’t boot.
Rather straightforward, isn’t it? Let’s compare it to using DNS as
illustrated in Figure 3.2 on the following page.
And the chain of events in Figure 3.2 is:
1. The WLA sends DHCP Discover message from port 1 on the WLA.
2. The DHCP server replies with a DHCP Offer message containing
the IP address for the WLA, the default router IP address for the WLA
IP subnet, the DNS server address, and the domain name. WLA then
sends a DHCP Request message to the server and receives an
acknowledgment from the server.
3. The WLA then sends a DNS request for JNPR.example.com and
wlan-switch.example.com.
5. The DNS server sends the system IP address of the WLC mapped to
JNPR.example.com or wlan-switch.example.com. In this example, the
IP address is located on WLC1.
6. The WLA sends a unicast Find WLC message to WLC1.
7. The WLC sends its IP address in the WLC Reply message to the
WLA.
34 Day One: Deploying a Secure Wireless LAN
DAP 1 6
serial-id:032219999
model:WLA532
LAN
3 5
DHCP Server
1
EX Switch
4 DAP 1
serial-id:032219999
model:WLA532
DNS Server 7
JNPR.example.com = 10.10.10.4
DAP 1
static IP 172.16.0.42
4
Layer 2
5 3
WLC800R
System FQDN
mx800
1. After the WLA is configured with the static IP address and controller
IP address, the next time that the WLA boots on the network, the
WLA sends an ARP request for the IP address to see if the IP address is
available.
2. The WLA sends a Find WLC message to the WLC wlc8.
3. The WLC wlc8 responds to the Find WLC message.
4. The WLA sends a unicast message to WLC wlc8 and determines if
the WLA should use a locally stored operational image or download it
from the WLC.
5. Once the operational image is loaded, WLC wlc8 sends
configuration information to the WLA.
36 Day One: Deploying a Secure Wireless LAN
NOTE If the WLA does not receive a reply after 10 seconds, the WLA reboots
and starts the boot process again. This applies to all four methods of
booting a WLA on the network.
Country of Operation
You must select the country code of the location at which you’re
installing the WLA to meet regulations. Each country has different
regulatory requirements and the country code determines the transmit
power level (strength of transmitted signal) and channels. To stay on
the right side of the law use the country code of the country in which
you are physically installing the WLA.
Using the Quickstart command is the easiest way of getting your WLC
configured and adding WLAs. All you need to do is follow the steps and
answer the questions about the parameters used on your wireless
network. Brief explanations about each question are provided so you
know the impact of your answer on the configuration.
However, using the complete Quickstart procedure configures some
parameters by default, so in order to have more control over the configu-
ration, let’s divide the configuration into two steps:
Initial WLC configuration
Wireless configuration
Using the CLI is not the only way to access a WLC to configure it.
You can also access a Web-based interface called WebView which
allows you to use a GUI to configure the WLC. WebView has
limited functionality, so not all features are available to you, and
you can explore the GUI on your time.
You can configure a WLC if you have RingMaster software
installed on your network. This method also allows you to config-
ure a WLC using a GUI, and it has the full feature set of the CLI.
Another technique for configuring WLCs is called auto provision-
ing or drop ship configuration. You can preconfigure a WLC2 (not
other WLC models) using RingMaster and send it to a remote site
on the corporate network. Once you’ve entered the WLC2 IP
address on the corporate DNS server and the WLC2 boots up in
the remote location, the WLC uses DHCP to obtain an IP address
to communicate with the RingMaster server.
MORE? You can find more information on configuring and deploying a WLC in
the Wireless LAN Controllers Installation Guide at http://www.juniper.
net/techpubs/en_US/release-independent/wireless/information-products/
pathway-pages/wireless-lan/index.html.
You configure the WLC and the WLA primarily with set, clear, and
show commands:
Use set commands to change parameters.
Use clear commands to reset parameters to their defaults. In
many cases, you can overwrite a parameter with another set
command.
Use show commands to display the current configuration and
monitor the status of network operations.
You can only use set and clear commands when the CLI is in “enable”
mode. Show commands can be used without accessing enable mode.
1 stop
No parity
Hardware flow control off or disabled
5. Open a connection on a serial port.
6. Be sure that the WLC is powered on, and then press Enter on your
keyboard three times to display the command prompt:
WLC>
(Each WLC has a unique system name that contains the model number
and the last half of the WLC MAC address.)
2. Access the enabled level of the CLI by typing enable at the com-
mand prompt:
WLC880-aabbcc>enable
Chapter 4: Using the Quickstart Command 41
The command prompt changes from a > to a # indicating that you can
now configure the WLC:
WLC880-aabbcc#
NOTE Default values are indicated by [ ] following the question. You can
press Enter to continue accepting default values.
System Name [WLC880]: WLC1
Country Code [US]: US
System IP address: 172.24.111.110
System IP address netmask []: 255.255.255.0
Default route []: 172.24.111.1
In some cases, when VLANs are applied across multiple WLCs, you
may want to use VLAN tagging on your network.
If you’re familiar with VLAN tagging and it’s required for your
network topology, then use VLAN tagging on the WLC.
Do you need to use 802.1Q tagged ports on the default VLAN? [n]:
n
Enabling WebView
WebView is the GUI that you can use to configure the WLC instead of
using the CLI. WebView is accessible using a network cable, a com-
puter, and a WLC. See the MSS Configuration Guide for more infor-
mation on this feature.
Enable WebView [y]: y
42 Day One: Deploying a Secure Wireless LAN
Now you can add a guest SSID for guest access to the wireless network.
You can do this as part of adding a service profile that provides captive
Web portal authentication.
WLC1# set service-profile acme-guest ssid-name acme-guest
success: change accepted.
The CLI doesn’t display the password as you type it. It’s a security
thing – no one can look over your shoulder and see what you’re typing
as the password.
Now you can map the user to the acme-guest SSID, which only allows
this user account to be used on the guest network.
WLC1# set user roundtuit-guest attr ssid acme-guest
success: change accepted.
Chapter 4: Using the Quickstart Command 45
You have now allowed guest users to log onto the wireless network
with a username and password. When guest users attempt to access the
wireless network, the login page is displayed as shown in Figure 4.1.
After the WLAs have booted up on the network, you can see the status
using the show ap status command.
NOTE Since you used ap auto mode, WLAs are assigned AP numbers auto-
matically starting with 9999.
48 Day One: Deploying a Secure Wireless LAN
Wow, that was easy! All ten WLAs booted up on the network and
located the WLC with the configuration that they needed, using a
single command. Pat yourself on the back – great job!
There’s a little more to do to get your wireless network operational but
you’ve completed the core configuration.
Chapter 5
You should also add yourself to the local user database before you go
any further.
WLC# set user yourself password gl0ww0rm
success:change accepted.
Okay, you should feel a little better now. Let’s save it.
WLC# save config
success: configuration saved.
If you want to add more users, you can add up to 100 on the local
database, just use the set user command.
MORE? For more information about additional admin users, see the MSS
Configuration Guide at http://www.juniper.net/techpubs/en_US/
release-independent/wireless/information-products/pathway-pages/
wireless-lan/software-77.html.
3
2
WLA1 WLA2
Client with Tablet
WLC880 4
RADIUS Server 1
Wired Connection
Wireless Connection
RADIUS Server 2
If the ping is successful, then you can continue with your RADIUS set
up between the WLC and the RADIUS server. If it’s not successful,
then you’ll have to troubleshoot the connection before moving ahead
with the RADIUS configuration.
Now let’s add the RADIUS server information to the WLC, by adding
the IP address and creating a name for the server. Let’s call the server
radius1:
WLC1# set radius server radius1 address 172.24.111.115 key
p0p0ver$
Success:change accepted.
You can configure multiple RADIUS servers on the WLC, but before
you do, you have to add it to a RADIUS server group. So let’s create
the RADIUS server group, acme-radius and add the current RADIUS
server to it. Then you’re good to go to add more servers whenever the
demand requires it.
WLC1# set server group acme-radius member radius1
Success: change accepted.
54 Day One: Deploying a Secure Wireless LAN
MORE? For more information on setting up your wireless network for RADIUS
access, see the MSS Configuration Guide http://www.juniper.net/
techpubs/en_US/release-independent/wireless/information-products/
pathway-pages/wireless-lan/ software-77.html.
MORE? Configuring the RADIUS server is outside the scope of this Day One
book, but Juniper does have products available to provide RADIUS
authentication on your network. See http://www.juniper.net/us/en/
products-services/security/uac/#features-benefits.
7. Click Settings.
8. Clear the Validate server certificate check box.
9. Under Select Authentication Method, the default method is Secured
password (EAP-MSCHAPv2).
10. Click Configure.
11. Clear the Automatically use my Windows logon name and
password (and domain if any) check box. Click OK.
12. Click OK, and then click Close.
13. Click the Wireless icon in the toolbar, and select acme-corp from
the list of available wireless networks. And let’s connect to the acme-
corp SSID; this is really easy!
If your laptop doesn’t automatically find the SSID, open Network
Connections, and then right-click on the Wireless Connection icon.
Select View Available Wireless Networks to display the list of net-
works in the area.
In Figure 6.1, there are two SSIDs displayed, acme-guest and acme-
corp, and double-click on acme-corp to get connected.
This symptom has more than one Type one of the following
possible cause: commands:
show radius
The client is failing authentication show user
or isn’t authorized for a VLAN. show mac-user
to ensure that the authentication
rules on the WLC allow the client
to authenticate.
I have a laptop that cannot connect to the network. What could be some possible
reasons?
Be sure the wireless radio is turned on. Duh, but it might be turned off
accidentally.
Check the closest AP to see if the LEDs are lit and green. Flashing
amber LEDs indicate a problem on the AP. Go to http://www.juniper.
net/techpubs and look for documentation on the WLA series. Check
your network card configuration to be sure it is configured correctly.
Download the latest drivers for your network card. Old drivers are
commonly an issue for a wireless card.
Open a command prompt and type ipconfig – you should be able to
see if the wireless connection is getting an IP address.
Be sure that you’re not in a “dead zone” like a stairwell or reinforced
concrete room.
I want my corporate visitors to access the wireless network but I don’t want them in my
private files. How do I configure this option?
Configure a clear SSID for public access.
Add a VLAN specifically for public clients.
Provision the rest of your network in other VLANs.
Install SmartPass to support guest services. Check with your Juniper
reseller or partner for more information.
62 Day One: Deploying a Secure Wireless LAN
The connection to the wireless network gets interrupted intermittently, what could
cause that?
Look for possible sources of RF interference such as a microwave,
cordless phone, or a Bluetooth device. Are you sitting in or near the
break room at lunchtime? Is your colleague microwaving his lunch?
Check for interference using a WLA532 or WLA522 and the Spectrum
Analysis feature.
3. If you are having trouble authenticating with Web Portal, add the
Web Portal to the traces:
set trace web level 10 mac
NOTE To copy a file from the MX to a tftp server use the copy <file name on
MX> tftp://<ip-tftpserver>/<filename> command.
Running Traces
Running trace commands enables you to perform diagnostic routines.
You can set a trace command with a keyword such as authentication
or sm, to trace activity for a particular feature, such as authentication
or the session manager. Four areas that you might find useful are
authentication, authorization, session manager, and 802.1X users
(dot1x).
To run a trace, use the following command:
WLC# set trace area level level
MORE? To find out more about running traces, refer to the SS Configuration
Guide at http://www.juniper.net/techpubs/en_US/release-independent/
wireless/information-products/pathway-pages/wireless-lan/index.
html.
64 Day One: Deploying a Secure Wireless LAN
To see all of the information about users on your network, use the show
sessions verbose command.
Chapter 7: Troubleshooting Wireless Connectivity 65
MORE? For more information on show sessions commands and the output, see
the Juniper Networks MSS Command Reference at http://www.juniper.
net/techpubs/en_US/release-independent/wireless/information-prod-
ucts/pathway-pages/wireless-lan/index.html.
You can also see the MAC address of the client, the connection state,
the VLAN, and the user’s identity using verbose commands:
WLC# show user verbose
WLC# show user *john* verbose
User name: johndoe
Status: disabled
Password: iforgot(encypted)
Group: Admin
VLAN: red
Password-expires-in: 12 days
Other attributes:
ssid: Juniper
end-date: 01/08/23-12:00
idle-timeout: 120
acct-interim-interval: 180
66 Day One: Deploying a Secure Wireless LAN
Field Description
Facility Portion MSS affected by the message – The six most useful facilities are APM (AP
Management), Cluster, Dot1X, SM (Session Manager), VLAN, and Config.
You must resolve critical conditions. If you don’t, the WLC can reboot or shut
crtitical
down.
Events that can potentially cause system problems have occurred. These are
notice
logged for diagnostic purposes. No action is required.
Output from debugging. The debug level produces a lot of messages, many of
debug which appear cryptic. Debug messages are primarily requested by JTAC for
troubleshooting purposes.
buffer Sends log information to the nonvolatile Buffer is enabled and shows error-level
system buffer. events.
console Sends log information to the console. Console is enabled and shows error-
level messages.
NKNK-612current Sends log information to the current Settings for the type of user session with
Telnet or console session. the WLC.
server Sends log information to the syslog server Server is set during configuration and
ip-address at the specified IP address. displays error-level messages.
sessions Sets defaults for Telnet sessions. Logging is disabled and shows
information-level events when enabled.
Sends log information to the volatile trace Trace is enabled and shows debug
Trace
buffer. output.
MORE? There is much more to logging, but only the basics are covered here.
See http://www.juniper.net/techpubs.
You can display the most recent or the oldest messages by typing a
positive number, +100 for the 100 oldest messages, or typing a nega-
tive number, -100, to see the newest 100 messages.
You can also search for strings by using the keyword matching and
typing a string like a username or IP addresses.
You can copy the image file only into the boot partition that was not
used for the most recent restart. For example, if the currently running
image was booted from partition 0, you can copy the new image only
into partition 1.
Set the boot partition to the one with the upgrade image for the next
restart.
To verify that the new image file is installed, type show boot.
When you restart the WLC, the WLC boots using the new MSS image.
The WLC also sends the WLA version of the new boot image to WLAs
and restarts the WLAs. After a WLA restarts, the version of the new
WLA boot image is checked to make sure the version is newer than the
version currently installed on the WLA. If the version is newer, the
WLA completes installation of the new boot image by copying the
boot image into the WLA flash memory, which takes about 30 seconds,
then it restarts again. The upgrade of the WLA is complete after the
second restart.
Upgrade Example
WLC800# save config
success: configuration saved.
WLC800# backup system tftp:/10.1.1.107/sysa_bak
success: sent 28263 bytes in 0.324 seconds [ 87231 bytes/sec]
WLC800# copy tftp://10.1.1.107/MSS077021.880 boot1:MSS077021.880
................................................................................
................................................................................
success: received 10266629 bytes in 92.427
seconds [ 111078 bytes/sec]
WLC800# set boot partition boot1
success: Boot partition set to boot1:MSS077021.200 (7.7.0.2).
WLC800# show boot
Configured boot version: 7.7.0.2
Configured boot image: boot1:MSS077421.800
Configured boot configuration: file:configuration
Backup boot configuration: file:backup.cfg
Booted version: 7.7.0.2
Booted image: boot1:MSS07333.800
Booted configuration: file:configuration
Product model: WLC
WLC800# reset system
...... rebooting ......
When saving the backup file, MSS copies the file to a temporary
location to compare it against an existing file for any errors that may
have been introduced during the copying process. After verifying that
the file is error-free, MSS deletes the file from the temporary location.
70 Day One: Deploying a Secure Wireless LAN
http://www.juniper.net/us/en/products-services/wireless/
Obtain general product information on Juniper’s wireless product
portfolio.
http://www.juniper.net/us/en/local/pdf/brochures/1600052-en.pdf
Download a brochure on Juniper’s Wireless LAN Solution.
http://www.juniper.net/techpubs/en_US/release-independent/wireless/information-
products/pathway-pages/wireless-lan/index.html
Download a brochure on Juniper’s Wireless LAN Services Product
Documentation.
http://www.juniper.net/us/en/local/pdf/design-guides/jnpr-horizontal-campus-
validated-design.pdf
Juniper’s Validated Design guides include the complete configurations
to stand up a campus network, including WLAN.