B Cisco Mobility Express 8 8
B Cisco Mobility Express 8 8
B Cisco Mobility Express 8 8
8
First Published: 2018-08-20
Last Modified: 2019-07-05
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
© 2018 Cisco Systems, Inc. All rights reserved.
CONTENTS
Adding Cisco Mobility Express capable Access Point to the Project and associating the controller
config 18
APIC-EM Network Plug and Play Deployment Options with Cisco Mobility Express 19
APIC-EM controller in Private Cloud 20
Cloud Plug and Play Connect redirect to APIC-EM controller 20
Cloud Plug and Play Device Redirect Provisioning Workflow 21
Obtain a Smart Account 21
Create APIC-EM Controller Profile 22
Connecting Cisco Mobility Access Points 28
Pre-requisites 47
Configuring Mobility Express for Site Survey using CLI 48
Creating Employee WLAN using WPA2 Enterprise with External Radius Server 52
Creating Employee WLAN with WPA2 Enterprise and Authentication Server as AP 53
Creating Employee WLAN with WPA2 Enterprise/External RADIUS and MAC Filtering 53
Central Web Authentication Support on WLAN 54
Central Web Authentication Support on WLAN 54
Creating Guest WLANs 55
Creating Guest WLAN with Captive Portal on CMX Connect 55
Creating Guest WLAN with Internal Splash Page 56
Creating Guest WLAN with External Splash Page 57
Walled Garden (DNS Pre-Auth ACLs) 58
Internal Splash Page for Web Authentication 59
Using default internal guest portal 59
Optimal Join 78
Configuring SFTP or TFTP for AP Join 79
Configuring Cisco.com for AP Join 79
Configuring Access Point as 802.1x Supplicant 80
Configuring RF Profiles 80
Configuring RF Profiles 81
Configuring Access Point Groups 82
Configuring Access Point Groups 82
Configuring Management Access 83
• Master Access Point - Cisco Aironet® 1560, 1815W, 1815I, 1815M,1830, 1850, 2800 and 3800 Series
802.11ac Wave 2 Access Points running the virtual Wireless LAN Controller function.
• Subordinate Access Points - Cisco Aironet® Access Points which are managed by Master Access Point
similar to how a Wireless LAN Controller manages Access Points.
Note Master Access Point functions as Wireless LAN Controller, manages Subordinate Access Points and also
serves clients at the same time.
Table 1: Cisco Aironet® Access Points capable of operating as Master Access Points
Note The -x- in the other model numbers is a placeholder for the actual letter indicating the model's regulatory
domain. For information on regulatory domains, see http://www.cisco.com/c/dam/assets/prod/wireless/
wireless-compliance-tool/index.html
Table 2: Cisco Aironet® Access Points capable of operating as Subordinate Access Points
Note The -x- in the other model numbers is a placeholder for the actual letter indicating the model's regulatory
domain. For information on regulatory domains, see http://www.cisco.com/c/dam/assets/prod/wireless/
wireless-compliance-tool/index.html
Note If there are more than 50 Access Points in a Mobility Express network, the Master AP(running the Wireless
LAN controller function) can service a maximum of 20 clients. This limit only applies to Master AP and not
any other Access Point in the Mobility Express network.
On Mobility Express, management traffic is untagged. If Access Points and WLANs are all on different
VLANs, Mobility Express capable Access Points will connect to a trunk port on the switch and traffic for
individual WLANs will be switched locally on individual VLANs. Shown below is a deployment with Access
Points and WLANs on different VLANs.
interface GigabitEthernet1/0/37
description » Connected to Master AP «
switchport trunk native vlan 40
switchport trunk allowed vlan 10,20,30,40
switchport mode trunk
Procedure
Step 1 Login to the Access Point CLI using a console and type AP#show version and check the full output of show
version. The default login credentials are Username:cisco and Password:cisco.
Step 2 If show version output does not display AP Image Type and AP Configuration parameters as highlighted
below, it means that AP is running the CAPWAP image and a conversion to Cisco Mobility Express is required
if you want to run the controller function on the Access Point. To convert from a CAPWAP Access Point to
Mobility Express, go to Conversion section.
cisco AIR-AP1852E-UXK9 ARMv7 Processor rev 0 (v71) with 997184/525160K bytes of memory.
Processor board ID RFDP2BCR021
AP Running Image : 8.2.100.0
Primary Boot Image : 8.2.100.0
Backup Boot Image : 8.1.106.33
AP Image type : MOBILITY EXPRESS IMAGE
AP Configuration : MOBILITY EXPRESS CAPABLE
0 Gigabit Ethernet interfaces
0 802.11 Radios
Radio FW version . 1401b63d12113073a3C08aa67f0c039c0
NSS FW version : NSS.AK.1.0.c4-0Z026-E_cust C-1.24160
If the show version displays AP Image Type: MOBILITY EXPRESS IMAGE and AP Configuration:
NOT MOBILITY EXPRESS CAPABLE , it means that even though the Access Point has the Cisco Mobility
Express image, it is configured to run as a CAPWAP Access Point. In this case Access Point will not run the
controller function and will not participate in the Master Election process upon failure of the active Master
AP.
cisco AI R-AP1852E-UXK9 ARMv7 Processor rev 0 (v7I) with 997184/726252K bytes of memory.
Processor board ID RFDP2BCR021
AP Running Image : 8.2.101.0
Primary Boot Image : 8.2.100.0
Backup Boot Image : 8.1.106.33
AP Image type : MOBILITY EXPRESS IMAGE
AP Configuration : NOT MOBILITY EXPRESS CAPABLE
For this AP to run the controller function, AP Configuration has to be changed to MOBILITY EXPRESS
CAPABLE . To change the AP Configuration, execute the following command from the AP CLI. AP#ap-type
mobility-express tftp://
Access Point will reboot and after it comes up, it will be capable of running the controller function. You can
check the output of show version again to confirm that AP Configuration has changed to MOBILITY
EXPRESS CAPABLE .
If the show version displays AP Image Type: MOBILITY EXPRESS IMAGE and AP Configuration:
MOBILITY EXPRESS CAPABLE , it means that the Access Point has the Mobility Express image and is
capable of running the controller function. For this scenario, the output of the show version is shown below:
cisco AIR-AP3802I-B-K9 ARMv7 Processor rev 1 (v7l) with 1028384/255032K bytes of memory.
Processor board ID FCW2034NXAV
AP Running Image : 8.4.2.66
Primary Boot Image : 8.4.2.66
Backup Boot Image : 8.4.2.34
AP Image type : MOBILITY EXPRESS IMAGE
AP Configuration : MOBILITY EXPRESS CAPABLE
1 Multigigabit Ethernet interfaces
1 Gigabit Ethernet interfaces
2 802.11 Radios
Radio Driver version : 9.0.5.5-W8964
Radio FW version : 9.1.8.1
NSS FW version : 2.4.18
Conversion
One can convert an Access Point running CAPWAP to Cisco Mobility Express and vice versa.
Note If the CAPWAP image on the Access Point is older than the minimum AireOS release capable of supporting
Cisco Mobility Express, Access Point MUST first join a WLC running the minimum AireOS release or higher
to upgrade its CAPWAP image. After the CAPWAP image of the AP has been upgraded, conversion of AP
from CAPWAP to Mobility Express can be performed.
To perform a conversion on an Access Point running CAPWAP to Mobility Express, follow the procedure
below:
Procedure
Step 1 Download the conversion image for the Access Point from cisco.com to the TFTP server. It is a tar file. Do
not untar the file. The following table lists the Cisco Mobility Express software for Cisco Wireless Release
8.7.102.0.
Access Points supported as Master AP Software to be used only for Conversion from Unified
Wireless Network Lightweight AP Software to Cisco
Mobility Express
Cisco Aironet® 1540 Series AIR-AP1540-K9-8-7-102-0.tar
Access Points supported as Master AP Software to be used only for Conversion from Unified
Wireless Network Lightweight AP Software to Cisco
Mobility Express
Cisco Aironet® 1560 Series AIR-AP1560-K9-8-7-102-0.tar
Cisco Aironet® 1815I Series AIR-AP1815-K9-8-7-102-0.tar
Cisco Aironet® 1815M Series AIR-AP1815-K9-8-7-102-0.tar
Cisco Aironet® 1815W Series AIR-AP1815-K9-8-7-102-0.tar
Cisco Aironet® 1830 Series AIR-AP1830-K9-8-7-102-0.tar
Cisco Aironet® 1850 Series AIR-AP1850-K9-8-7-102-0.tar
Cisco Aironet® 2800 Series AIR-AP2800-K9-8-7-102-0.tar
Cisco Aironet® 3800 Series AIR-AP3800-K9-8-7-102-0.tar
Case 2 : If the AP Image type and AP Configuration are not available, it means that the AP is running
CAPWAP image. To do the conversion, execute the command below:
AP#ap-type mobility-express tftp://<TFTP Server IP>/<path to tar file>
Example:
AP#ap-type mobility-express tftp://10.18.22.34/AIR-AP1850-K9-8.7.102.0.tar
Note After the image download is complete, it will be written to the flash followed by a reboot. After the
AP comes up, AP Image type will be MOBILITY EXPRESS IMAGE and AP Configuration
will MOBILITY EXPRESS CAPABLE .
Step 4 If this is the first Access Point in the network, it will start the controller function and will broadcast the
CiscoAirProvison SSID.
<switch_name> and <switch_ip_address> is the name and IP address respectively of the WLC
to which the APs need to be migrate.
Note The above command converts all connected Access Points with AP Configuration: MOBILITY EXPRESS
CAPABLE to AP Configuration: NOT MOBILITY EXPRESS CAPABLE . When this command is
issued, the APs are reloaded, and they come back up and look for the controller (switch_ip_address) to join.
Configuration correct? If yes, system will save it and reset. [yes][NO]: yes
Cleaning up Provisioning SSID
Note The Access Point will reboot and after it comes back up, login to the Mobility Express controller WebUI from
the browser using https://<mangement_ip_address> Cisco Mobility Express controller uses a self-signed
certificate for HTTPS. Therefore, all browsers display a warning message and asks whether you wish to
proceed with an exception or not when the certificate is presented to the browser. Accept the risk and proceed
to access the Mobility Express Wireless LAN Controller login page.
Procedure
Step 1 When the LED on the Access Point chirps green, connect a WiFi enabled laptop to the CiscoAirProvision
SSID. The default password is password. The laptop will get an IP address from subnet 192.168.1.0/24.
Note CiscoAirProvision SSID is broadcast at 2.4GHz.
Step 2 Open a web browser and browse to http://mobilityexpress.cisco. This will redirect to configuration wizard
and the admin account page will appear.
Step 3 Create an admin account on the controller by specifying the following parameters and then click on the Start
button.
• Enter the admin username. Maximum up to 24 ASCII characters.
• Enter the password. Maximum up to 24 ASCII characters. When specifying a password, ensure that:
• The password must contain characters from at least three of the following classes – lowercase letters,
uppercase letters, digits, special characters.
• No character in the password can be repeated more than three times consecutively.
• The new password must not be the same as the associated username and the username reversed.
• The password must not be cisco, ocsic, or any variants obtained by changing the capitalization of
letters of the word Cisco. In addition, you cannot substitute 1, I, or ! for i, 0 for o, or $ for s.
Step 5 Disable Enable DHCP Server(Management Network) if an external DHCP server is being used. If internal
DHCP server on the Mobility Express controller has to be used, specify the DHCP server related information.
Step 6 Click Next.
Step 7 In the Create Your Wireless Network, under Employee Network, configure the following:
• Enter the Network Name
• Select Security as WPA2 Personal or WPA2 Enterprise from the drop-down list
• If WPA2 Personal is selected, enter the Passphrase
Step 8 One can also enable RF Parameter Optimization and configure the following:
• Move the Client Density slider as needed
• From the Traffic Type, select Data or Data and Voice
Pre-requisites
1. APIC-EM Release 1.4 or later with Cisco Network Plug and Play, virtually hosted in a Cisco UCS or
equivalent server.
2. Access Points–Cisco 802.11ac Wave 2 access points running Cisco Mobility Express software.
3. Controller Configuration–Cisco Mobility Express controller configuration file to be uploaded on Network
PnP.
2. On–prem PnP server can be added to DNS using ‘pnpserver.yourlocal.domain’ If DHCP discovery fails
to get the IP address of the APIC-EM controller, for example, because option 43 is not configured, the
Cisco Plug and Play Agent falls back on a DNS lookup method. Based on the network domain name
returned by the DHCP server, it constructs a fully qualified domain name (FQDN) for the APIC-EM
controller, using the preset hostname pnpserver. For example, if the DHCP server returns the domain
name " customer.com ", the Cisco Plug and Play IOS Agent constructs the FQDN "pnpserver.customer.com
". It then uses the local name server to resolve the IP address for this FQDN
3. Cloud redirection service requires a connection to the internet, and valid DNS server that can resolve
‘devicehelper.cisco.com’. The cloud redirection service redirect Cisco Mobility Express Access Point to
APIC-EM.
Procedure
Step 1 Login to APIC-EM controller and navigate to Network Plug and Play > Configurations
Step 2 Click on Upload to upload the controller configuration
Step 3 Select a controller configuration file from your local machine
Creating a Project
Procedure
Adding Cisco Mobility Express capable Access Point to the Project and associating the controller
config
Procedure
• Serial Number–Enter the Serial Number of the Mobility Express Access Point
• Config–You can either upload a new configuration or select the configuration file which was added
earlier
Option 43 points to APIC-EM controller IP address. To configure DHCP scope with Option 43, it is important
follow the format as shown below. In the example below, 192.168.1.123 is the IP address of APIC-EM
controller
ip dhcp pool pnp_device_pool
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
option 43 ascii "5A1N;B2;K4;I192.168.1.123;J80"
To discover APIC-EM controller using the DNS discovery options, configure the DNS server and domain
name on the DHCP scope.
ip dhcp pool pnp_device_pool
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
domain-name cisco.com
dns-server 172.20.229.8
Figure 2: Cloud Plug and Play Device Redirect to APIC-EM controller flow
Procedure
Step 1 Go to http://software.cisco.com
Step 2 Request a Smart Account or Log In (existing Smart Account holders)
Procedure
Step 3 Click on Controller Profiles. Select a Virtual Account. If you do have one, create a Virtual Account first.
Step 4 Click on the Add Profile to create a new controller profile.
Step 5 Select Controller Type as PNP Server from the drop-down list and click on Next.
Note If you select HTTPS, then you would have import a SSL certificate. Also, optionally one can enter
information of the secondary controller.
Step 7 Review the entries and click on Submit button to add the Controller Profile and finally click Done.
Adding Cisco Mobility Express capable Access Point to the Devices list
Procedure
Step 1 Navigate to Provisioning > Plug and Play Connect. Click on Devices.
Step 2 Click on Devices. Select a Virtual Account. If you do have one, create a Virtual Account first.
Step 3 Click on Add Devices button to add a new device (Mobility Express Access Point).
Step 4 Import a csv file with the Device info or select Enter Device info manually. Click Next.
Step 5 Click on Identify Device button. The Identify Device window will pop up. Enter Serial Number, select Base
PID, and Controller Profile(created earlier). Click on the Save button followed by Next button.
Step 6 Review the entries and click on Submit button to add the Device. Finally, click Done.
Step 7 Verify that the Device has been added and the status is Pending (Redirection).
Note Using a mix of Internal DHCP server and External DHCP server at the same time in a Mobility Express
Deployment is not supported at this time.
Procedure
Step 1 Navigate to Wireless Settings > DHCP Server > Add new Pool . The Add DHCP Pool window will pop
up.
Step 2 On the Add DHCP Pool window. Enter the following fields:
• Enter the Pool Name for the WLAN
• Enable the Pool Status
• Enter the VLAN ID for the WLAN
• Enter the Lease Period for the DHCP clients. Default is 1 Day
• Enter the Network/Mask
TLS Gateway
TLS Gateway is virtual machine and is deployed at the central site.
3. IP routing requirements
1. Routing enabled from TLS-GW Private network towards Prime-infra(SNMP), ISE(Radius), DHCP
servers, SSH, Monitoring system and vice-versa
Procedure
Step 3 Browse to the TLS Gateway OVA file on your local machine. Click Next.
Step 5 Specify the name for the TLS Gateway Virtual Machine.
Step 6 For Disk Format, stay with the default and click Next.
Step 7 For Network Mapping, select the Destination Network for the Public Network interface. Click on Next.
Step 8 Verify the Deployment Settings. Enable the 'Power On after deployment' check box and click Finish.
After the OVA for TLS Gateway is deployed and powered up, follow the steps below to configure the TLS
Gateway.
Step 1 Open a console session to the TLS Gateway VM and login using the following credentials:
username: tlsgw
password: tlsgw
Step 2 Type ifconfig to verify the IP address of the Public and Private interfaces as shown below.
Note ens160 corresponds to the Public network interface and in the above example it has got the IP of
10.10.10.11 from the DHCP server. One can also statically assign the IP address which will be
shown the steps ahead. Also, there is no interface for the Private network in the ifconfig output
above. We can also manually configure this and is shown in the steps ahead.
Step 3 At the tlsgw@msp-tls-gw: prompt type sudo bash and enter tlsgw as the [sudo] password for tlsgw.
Step 4 To configure IP address for Public and Private network interface go to /etc/network directory by typing cd
/etc/interfaces at the shell.
Step 5 Open the interfaces file using vi editor by typing vi interfaces at the shell.
Note : ens160 is Public network interface and is configured for DHCP by default. If you want to statically
configure the IP address of Public network interface, replace the ens160 setting with the following
as shown below in the example.
auto ens160
iface ens160 inet static
address 10.10.10.11
netmask 255.255.255.0
network 10.10.10.0
Step 6 To configure the Private network interface IP address, add the following in the interfaces file as shown
below and save the file.
auto ens192
iface ens192 inet static
address 172.20.229.60
netmask 255.255.255.192
network 172.20.229.0
Step 7 To restart the network service, go to /etc/init.d and type ./networking restart . Now, do a ifconfig and you
should see both the Public interface IP address and Private interface IP address. Ping both Public and Private
IP address to verify connectivity.
Configure the TLS Gateway configuration file and start the service
Procedure
Note If you are using a DHCP server behind the TLS Gateway, do not configure dhcp_static_pool_ipv4
in tlsgw_config.txt file. This is because broadcast is sent via Private IP of tls-gw and if DHCP server
exists behind the TLS Gateway, it should assign TLS Client an IP address.
Note A maximum of 3 PSK ID-KEY pairs can be set for TLSGW. PSK-ID can be any character string of length
(3-50), PSK password(or key) can be any character string of length (5-256) , Character ':' or 'space' or 'tab'
are not allowed for both psk-id and psk-key.
Procedure
Step 3 Verify that the PSK ID is configured using the following CLI:
tlsgw-cli# get all psk-id
TLS-GW RESP:
List of stored psk-ids: cisco
TLS Client
TLS Client is integrated in the AireOS Release 8.6 and is natively present in the code. For TLS client to
establish a TLS tunnel with TLS Gateway, Master AP should be able to communicate with the Public IP of
the TLS Gateway.
Procedure
Note RADIUS would be used for ISE and SNMP would be used for Prime Infrastructure.
Pre-requisites
1. Access Points–Cisco 802.11ac Wave 2 access points running Cisco Mobility Express software. The
following APs support Cisco Mobility Express:
2. Power Source–Depending on the Access Point being used for Site Survey, one can use a power adapter
or a battery pack capable of providing sufficient power to the Access Point.
3. Console Cable(Optional)–Cisco Mobility Express can be configure using the CLI or Over-the-air. For
configuring Cisco Mobility Express via CLI, a console connect to the Access Point would be required.
Step 5 Wait for the Access Point to boot up completely. After the Wireless controller has started, log back in to the
controller using administrative username or password configured during the initial setup wizard.
Step 6 (Optional): During the CLI setup wizard, Employee Network Security was configured to PSK. This can be
disabled for easy association of clients and also disable SSID broadcast to avoid unwanted clients from joining
the SSID. To disable PSK and SSID broadcast, enter the following commands in the Controller CLI.
Step 7 To configure channel, TX power, and channel bandwidth for the radios, disable the radio first, make the
changes and then re-enable it.
To change the 2.4GHz radio to channel 6, follow the steps below:
(Cisco Controller)>config 802.11b disable <ap name>
(Cisco Controller)>config 802.11b channel <ap name> <ap name> 6
(Cisco Controller)>config 802.11b enable <ap name>
To change the 2.4GHz radio Transmit Power to power level 3, follow the steps below:
(Cisco Controller)>config 802.11b disable <ap name>
(Cisco Controller)>config 802.11b txPower <ap name> <ap name> 3
(Cisco Controller)>config 802.11b enable <ap name>
To change the 5 GHz radio to channel 44, follow the steps below:
(Cisco Controller)>config 802.11a disable <ap name>
(Cisco Controller)>config 802.11a channel <ap name> <ap name> 44
(Cisco Controller)>config 802.11a enable <ap name>
To change the 5 GHz radio Transmit Power to level 5, follow the steps below:
(Cisco Controller)>config 802.11a disable <ap name>
(Cisco Controller)>config 802.11a txPower <ap name> <ap name> 5
(Cisco Controller)>config 802.11a enable <ap name>
To change the 5 GHz radio channel width to 40MHz, follow the steps below:
(Cisco Controller)>config 802.11a disable <ap name>
(Cisco Controller)>config 802.11a chan_width <ap name> 40
(Cisco Controller)>config 802.11a enable <ap name>
If 2800 and 3800 series access points are being used for Site Survey, please note the following with respect
to the XOR radio.
1. Default operation state of XOR radio is 2.4GHz.
2. One can configure the XOR radio on internal (I) Access Points from 2.4GHz to 5 and vice versa. On an
external (E) Access Point, one must have an external antenna plugged into the DART connector prior to
changing any configuration on the XOR radio.
3. When the XOR (2.4 GHz) radio is configured to operate at 5GHz, 100MHz frequency separation is
required from dedicated 5GHz radio.
4. When the XOR radio is configured to operate in 5GHz mode on an internal (I) Access Points, the Transmit
power (tx) power will be fixed and cannot be modified.
To configure the XOR (2.4GHz) radio to operate at 5GHz on 2800 and 3800 Series Access Points, follow
the steps below:
(Cisco Controller) >config 802.11-abgn disable ap
(Cisco Controller) >config 802.11-abgn role ap manual client-serving
(Cisco Controller) >config 802.11-abgn band ap ap 5GHz
(Cisco Controller) >config 802.11-abgn enable ap
To configure the XOR radio operating at 5 GHz to channel 40, follow the steps below:
To configure the XOR radio operating at 5 GHz channel width to 40MHz, follow the steps below:
(Cisco Controller) >config 802.11-abgn disable ap
(Cisco Controller) >config 802.11-abgn chan_width ap 40
(Cisco Controller) >config 802.11-abgn enable ap
WLANs
Cisco Mobility Express solution supports a maximum of 16 WLANs. Each WLAN has a unique WLAN ID
(1 through 16), a unique Profile Name, SSID, and can be assigned different security policies.
Access Points broadcast all active WLAN SSIDs and enforce the policies that you define for each WLAN.
A number of WLAN Security options are supported on Cisco Mobility Express solution and are outlined
below:
1. Open
2. WPA2 Personal
3. WPA2 Enterprise (External RADIUS, AP)
2. WPA2 Personal
3. Captive Portal (AP)
4. Captive Portal (External Web Server)
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General page, configure the following:
a) Enter the Profile Name.
b) Enter the SSID.
Step 3 Click on the WLAN Security and configure the following:
a) Select Security as WPA2 Personal.
b) Enter the Passphrase and Confirm PassPhrase.
Step 4 Click Apply.
Creating Employee WLAN using WPA2 Enterprise with External Radius Server
Procedure
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General page configure the following:
a) Enter the Profile Name.
b) Enter the SSID.
Step 3 Click on the WLAN Security and configure the following:
a) Select Security Type as WPA2 Enterprise.
b) Select Authentication Server as External Radius.
Step 4 Add the Radius server and configure the following:
• Enter the Radius IP
• Enter the Radius Port
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General page configure the following:
a) Enter the Profile Name.
b) Enter the SSID.
Step 3 Click on the WLAN Security and configure the following:
a) Select Security as WPA2 Enterprise.
b) Select Authentication Server as AP.
Note AP is the Master AP running the controller function. In this use case, controller is the
Authentication Server and therefore Local WLAN user account must exist to onboard the clients.
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General tab, configure the following:
• Enter the Profile Name
• Enter the SSID
Step 3 Click on the WLAN Security tab and configure the following:
• Enable MAC Filtering
To create a WLAN with Central Web Authentication, follow the steps below:
Procedure
Step 1 Navigate to Wireless Settings > WLANs and click Add new WLAN/RLAN.
Step 2 Select the Security Type as Central Web Auth.
Step 3 Click on the Add the RADIUS Authentication Server which is hosting the portal for device registration.
Step 4 Click Apply.
Note Create the pre-authentication ACL under security policies section and apply the ACL to the required
WLAN.
Note You would still need to configure the ISE for CWA to work.
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General tab, configure the following:
• Enter the Profile Name
• Enter the SSID
Step 3 Enable the Guest Network under the WLAN Security tab.
Step 4 Select Captive Portal as CMX Connect.
Step 5 Enter Captive Portal URL.
Note Captive Portal URL must have the following format: https://yya7lc.cmxcisco.com/visitor/login
where yya7lc is your Account ID.
Procedure
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General tab, configure the following:
• Enter the Profile Name
• Enter the SSID
Step 3 Enable the Guest Network under the WLAN Security tab.
Step 4 Select Captive Portal as Internal Splash Page.
Step 5 Select one of the following Access Type as needed:
1. Local User Account–Splash Page will present the user to enter username and password which must be
authenticated by the controller before network access is granted. Local WLAN users must be created on
the controller to onboard the Guest clients.
2. Web Consent–Splash Page will present the user to acknowledge before network access is granted.
3. Email Address–Splash Page will present the user to enter the email address before network access is
granted.
4. RADIUS–Splash Page will present the user to enter username and password which must be authenticated
by the RADIUS server before network access is granted. Select Access Type as RADIUS and enter the
RADIUS server configuration.
5. WPA2 Personal–This is an example of L2 + L3 (Web Consent). Layer 2 PSK security authentication
will happen first followed by Splash Page which will present the user to acknowledge before network
access is granted. Select Access Type as WPA2 Personal and enter the Passphrase.
Procedure
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General tab, configure the following:
• Enter the Profile Name
• Enter the SSID
Step 3 Enable the Guest Network under the WLAN Security tab.
Step 4 Select Captive Portal as External Splash Page.
Step 5 Select one of the following Access Type as needed:
1. Local User Account–Splash Page will present the user to enter username and password which must be
authenticated by the controller before network access is granted. Local WLAN users must be created on
the controller to onboard the Guest clients.
2. Web Consent–Splash Page will present the user to acknowledge before network access is granted.
3. Email Address–Splash Page will present the user to enter the email address before network access is
granted.
4. RADIUS–Splash Page will present the user to enter username and password which must be authenticated
by the RADIUS server before network access is granted. Select Access Type as RADIUS and enter the
RADIUS server configuration.
5. WPA2 Personal–This is an example of L2 + L3 (Web Consent). Layer 2 PSK security authentication
will happen first followed by Splash Page which will present the user to acknowledge before network
access is granted. Select Access Type as WPA2 Personal and enter the Passphrase.
Procedure
Step 1 Navigate to Wireless Settings > WLANs > Add new WLAN/RLAN
Step 2 Under General tab, enter the WLAN values as needed.
Step 3 Under the WLAN Security tab, enable Guest Network. Select Captive Portal as External Splash Page and
enter the Captive Portal URL. Select Access Type as Web Consent. To add DNS Pre-Auth ACLs, click on
the Add URL Rules button and add the URL(s) you want to permit/deny.
Procedure
Procedure
• Customized page Bundle–Click on the Upload button to upload the he customized page bundle to the
Mobility Express controller.
• Preview–You can Preview the Guest portal by clicking on the Preview button.
• Redirect URL After Login–To have the guest users redirected to a particular URL (such as the URL
for your company) after login, enter the desired URL in this text box. You can enter up to 254 characters.
Procedure
Step 1 Add a DHCP Pool for the WLAN which has to bed NAT'ed. To create the scope, navigate to Wireless Settings
> DHCP Server > Add new Pool. The Add DHCP Pool window will pop up. On the Add DHCP Pool
window, configure the following:
• Enter the Pool Name for the WLAN
• Enable the Pool Status
• Enter the VLAN ID for the WLAN
• Enter the Lease Period for the DHCP clients. Default is 1 Day
Step 2 To create WLAN, navigate to Wireless Settings > WLANs. On the Add new WLAN or Edit WLAN window,
click on the VLAN and Firewall tab and configure the following:
• For Client IP Management, select Mobility Express Controller
• Check the Peer to Peer Block to disable communication between two clients on that WLAN
• Enter the Native VLAN ID
• Select the DHCP Scope which was created for Guest clients on the Mobility Express controller
Note : The VLAN for this WLAN should be configured on all the switch ports to which APs are connected.
Procedure
Step 1 Navigate to Wireless Settings > WLAN Users and then click on Add WLAN User button.
Step 2 Configure the following for the WLAN user:
• User Name–Enter the username
• Guest User–For Guest user, enable the Guest User checkbox
• Lifetime–For Guest User, define the user account validity. Default is 86400 seconds (or, 24 hours) from
the time of its creation.
Procedure
Procedure
Procedure
Procedure
Procedure
Step 1 Add a DHCP Pool for the WLAN which has to bed NAT'ed. To create the scope, navigate to Wireless Settings
> DHCP Server > Add new Pool. The Add DHCP Pool window will pop up. On the Add DHCP Pool
window, configure the following:
• Enter the Pool Name for the WLAN
• Enable the Pool Status
• Enter the VLAN ID for the WLAN
• Enter the Lease Period for the DHCP clients. Default is 1 Day
• Enter the Network/Mask
• Enter the Start IP for the DHCP pool
• Enter the End IP for the DHCP pool
• Enter the Default Gateway for the DHCP pool
Note If the scope is for client devices connecting to the Centralized NAT, one must select Mobility
Express Controller for Default Gateway.
Note When creating DHCP Pool, one must select Mobility Express Controller for the Default Gateway
if this scope has to be used for WLAN configured for Centralized NAT.
Step 2 To create WLAN, navigate to Wireless Settings > WLANs. On the Add new WLAN or Edit WLAN window,
click on the VLAN and Firewall tab and configure the following:
• For Client IP Management, select Mobility Express Controller
• Check the Peer to Peer Block to disable communication between two clients on that WLAN
• Enter the Native VLAN ID
• Select the DHCP Scope which was created for Guest clients
Note The VLAN for this WLAN should be configured on all the switch ports to which APs are connected.
Procedure
Step 1 Navigate to Wireless Settings > WLAN Users and click on Local MAC Addresses.
Step 2 Click Add MAC Address.
Step 3 In the Add MAC Address window, configure the following:
• MAC Address–Enter the MAC Address of the device
• Description–Enter the description
• Type–Select whether this MAC has to be WhitleList of BlackList
• Profile Name–Select the WLAN to which the user will connect
The 802.11u AP provides various information listings that provide the HotSpot owner details, roaming partners,
realm list, 3GPP cellular information, and domain name. The realm list also provides listings of the realm
name and its associated EAP authentication type mappings. Knowing this information is essential for the
phone client device so that correct EAP credential exchange may take place.
Through the WLAN configuration, single SSID and multiple SSID will be configured with necessary Passpoint
information. This additional Passpoint information will be added on beacon or probe response information,
so that Passpoint-enabled phone client device can detect and query AP to get further information. During the
query process, standard protocol format called ANQP-Access Network Query Protocol-is followed. Here, the
protocol describes the standard 2-way or 4-way handshake process to get enough information from the AP
and ANQP server to determine the best AP that the phone client device can authenticate and associate with.
This handshake process is called GAS-Generic Advertisement Service-protocol that is defined on IEEE
802.11u standard.
To configure Passpoint, follow the procedure below:
Procedure
Step 1 Enable Expert View on Cisco Mobility Express. Expert View is available on the top banner of the Cisco
Mobility Express WebUI as shown below. This will enable the 802.11u and Hotspot 2.0 tabs on the WLANs.
Step 2 To configure 802.11u and Hotspot 2.0 on WLAN, navigate to Wireless Settings > WLANs. On the Add
new WLAN or Edit WLAN window, click on the 802.11u tab and Hotspot 2.0 tab to enter the relevant
configuration.
Step 3 Click Apply.
Procedure
Step 1 Navigate to Wireless Settings > WLANs and click on Add new WLAN/RLAN button.
Step 2 Under the General tab, select RLAN for Type drop down list.
Step 3 Enter the Profile Name.
Step 4 Under the RLAN Security, select 802.1x for Security Type.
Step 5 Since we are using 802.1x authentication for wired clients, enter the RADIUS server by clicking on the Add
RADIUS Authentication Server.
Step 6 Under the VLAN & Firewall tab, enable Use VLAN Tagging, and enter the Native VLAN ID as well as
the VLAN ID which will be used for Data traffic.
Step 7 Click Apply.
Procedure
Step 1 Navigate to Wireless Settings > Access Point Groups and click on Add new group button.
Step 2 Under the General tab, enter the AP Group Name, description.
Step 3 Under the WLANs tab, click on the Add new WLAN/RLAN button and select the RLAN to be added to
the AP Group.
Step 4 Under the Access Points tab, select the Wall Plate APs to be added to this AP Group.
Step 5 Under the Ports Tab, enable the required LAN ports, and select the RLAN for the port.
Step 6 Click Apply.
Procedure
To enable Application Visibility on WLAN, navigate to Wireless Settings > WLANs. On the Add new
WLAN or Edit WLAN window, click on the Traffic Shaping tab. To enable Application Visibility on this
WLAN, select Enabled for Application Visibility Control.
Procedure
Step 1 Add the Applications widget on the Network Summary Page. To add the Applications widget, click on the
+ icon on the right of the Network Summary banner. Select the Applications widget. The Applications
widget will display the top 10 applications being browsed by the clients in the Mobility Express network.
Step 2 Click on the application you wish to add control. The Add AVC Rule window will pop up. Select the Action.
Action can be Mark, Drop or Rate Limit. For Mark, one can select DSCP as Platinum, Gold, Silver, Bronze
or Custom. If custom is selected, one has to specific he DSCP value. For Rate Limit, one can specify the
Average Rate and Burst Rate for the application.
Step 3 Select one or more AVC Profile/SSID combinations.
Step 4 Click Apply.
Procedure
capable device to join on the WLAN as an FT enabled device and at the same time to allow legacy device to
join as an 11i/WPA2 device.
Cisco Mobility Express Release 8.4 will enable 802.11r on an 802.11i-enabled WLAN selectively for iOS
devices. The capable iOS devices will identify this functionality and perform an FT Association on the WLAN.
The Cisco Wireless infrastructure will allow FT association on the WLAN from devices that can negotiate
FT association on a non-FT WLAN. In addition, with Mobility Express running AireOS 8.4, 802.11k and 11v
features are enabled by default on an SSID. These features help clients roam better by telling them when to
roam and providing them with information about neighboring APs so that no time is wasted scanning when
roaming is needed. Since iOS devices support dual band, the 802.11k neighbor list is updated on dual-band,
adaptively for iOS devices.
To configure 11k, r, v on a WLAN, follow the procedure below:
Procedure
Step 1 Enable Expert View on Cisco Mobility Express. Expert View is available on the top banner of the Cisco
Mobility Express WebUI as shown below and enabled various configurable parameters which are not available
in Standard view.
Step 2 Navigate to Wireless Settings > WLANs. On the Add new WLAN or Edit WLAN window, click on the
Advanced tab. Configure 802.11k, r, v as needed on this page.
Procedure
Step 1 To enable Application Visibility on WLAN, navigate to Wireless Settings > WLANs. On the Add new
WLAN or Edit WLAN window, click on the Traffic Shaping tab. To enable Fastlane on this WLAN, select
Enabled for Fastlane.
Step 2 Click Apply.
Procedure
Procedure
Step 7 Select the Access Points and add them to the Site by clicking on Add to Site button and selecting the Site
from the drop-down list.
Step 8 Finally, navigate to Presence Analytics dashboard. Select the Site you created. Within a few minutes, you
should begin to see Presence data get populated.
Procedure
Step 2 To modify the parameters on an access point, click on the Edit button. The Access Point window will come
up displaying the General parameters about the Access Point.
• Operating Mode(Read only field)-For a master AP, this field displays AP & Controller. For other associated
APs, this field displays AP only.
Step 3 Under the Controller tab (Available only for Master AP), one can modify the following parameters:
• System Name–Enter the System Name for Mobility Express
• IP Address–IP address decides the login URL to the controller's web interface. The URL is in https://<ip
address> format. If you change this IP address, the login URL also changes.
• Subnet Mask–Enter the Subnet Mask.
• Country Code–Enter the Country Code.
Step 4 Under Radio 1 (2.4 GHz) and Radio 2 (5 GHz), one can edit the following parameters:
• Admin Mode–Enabled/Disabled. This enables or disables the corresponding radio on the AP (2.4 GHz
for 802.11 b/g/n or 5 Ghz for 802.11 a/n/ac).
• Channel–Default is Automatic. Automatic enables Dynamic Channel Assignment. This means that
channels are dynamically assigned to each AP, under the control of the Mobility Express controller. This
prevents neighboring APs from broadcasting over the same channel and hence prevents interference and
other communication problems. For the 2.4GHz radio, 11 channels are offered in the US, up to 14 in
other parts of the world, but only 1-6-11 can be considered non-overlapping if they are used by neighboring
APs. For the 5GHz radio, up to 23 non-overlapping channels are offered. Assigning a specific value
statically assigns a channel to that AP.
• 802.11 b/g/n–1 to 11.
• 802.11 a/n/ac –40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157,
161, 165.
• Channel Width - 20 MHz for 2.4GHz and for 20, 40 and 80 for 5 GHz.
• Transmit Power - 1 to 8. The default value is Automatic.
This is a logarithmic scale of the transmit power, that is the transmission energy used by the AP, 1 being the
highest,2 being half of it, 3 being 1/4th and so on. Selecting Automatic adjusts the radio transmitter output
power based on the varying signal level at the receiver. This allows the transmitter to operate at less than
maximum power for most of the time; when fading conditions occur, transmit power will be increased as
needed until the maximum is reached.
Note This feature is supported on 2800, 3800 and 1560 series Access Points.
• SFTP or TFTP server details and the Access Point images path information has to be configured on the
Software Update page.
• If the Master AP has 8.3.102.0 or later code, one can configure the Cisco.com login credentials on the
Software Update page and the code on the new Access Point will be automatically downloaded from
cisco.com when an Access Point joins.
Note For Software download to take place directly from Cisco.com, Master AP should be the one with the
SMARTNet Contract.
Procedure
Step 1 Navigate to Management > Software Update. Select TFTP or SFTP for Transfer Mode and configure the
SFTP or TFTP Parameters.
Step 2 Enable Optimal Join as shown below.
Optimal Join
To enable Optimal join, follow the procedure below:
Procedure
Step 1 Navigate to Management > Software Update. Select TFTP or SFTP for Transfer Mode and configure the
SFTP or TFTP Parameters.
Step 2 Enable Optimal Join as shown below.
Step 1 Download the Access Point image zip file from cisco.com on a TFTP server. The bundle version must be the
same as the one running on the Master AP. Unzip the file to extract the individual Access Point images.
Step 2 Navigate to Management > Software Update. Select SFTP or TFTP for Transfer Mode and configure the
SFTP or TFTP Parameters.
Navigate to Management > Software Update. Select Cisco.com as the Transfer Mode and configure
parameters related to the Cisco.com user account.
Note During the image download, there is no service interruption. After the image download is complete,
the AP automatically re-boots and join the Master AP.
Procedure
Configuring RF Profiles
Starting AireOS Release 8.6, Cisco Mobility Express will support six pre-built RF Profiles as well as creation
of RF Profiles.
RF Profiles allows you to tune groups of APs that share a common coverage zone together and selectively
change how RRM will operates the APs within that coverage zone. For example, a university might deploy
a high density of APs in an area where a high number of users will congregate or meet. This situation requires
that you manipulate both data rates and power to address the cell density while managing the co-channel
interference. In adjacent areas, normal coverage is provided and such manipulation would result in a loss of
coverage. Using RF profiles and AP groups allows you to optimize the RF settings for AP groups that operate
in different environments or coverage zones. RF profiles are created for the 802.11 radios. RF profiles are
applied to all APs that belong to an AP group, where all APs in that group will have the same profile settings.
The RF profile gives you the control over the data rates and power (TPC) values. One can either associate a
build in RF Profile with AP Groups or create a new RF Profile and then associate that with the AP Group.
Configuring RF Profiles
To configure RF Profiles, enable Expert View on Cisco Mobility Express. Expert View is available on
the top banner of the Cisco Mobility Express WebUI as shown below and enabled various configurable
parameters which are not available in Standard view.
Procedure
Procedure
Step 4 Under the WLANs tab, click on the Add WLAN button to add the WLAN to the AP Group
Step 5 Under the Access Points tab, select the Access Points which must be added to the AP Group
Step 6 Under the RF Profiles tab, select the RF Profile for 2.4 and 5.0 GHz band. The RF Profile will be applied to
this AP Group.
Step 7 Click Apply.
Note Maximum of 50 AP Groups are supported on Mobility Express and a maximum of 100 APs can be added to
a single AP Group.
Procedure
Note The local user database is limited to a maximum of 2048 entries, which is also the default value. This database
is shared by local management users (including lobby ambassadors), local network users (including guest
users), MAC filter entries, exclusion list entries. Together they cannot exceed the maximum value.
Procedure
Step 1 Navigate to Management > Admin Accounts and click on the Add New User button.
Step 2 Enter the following to configure the admin user account.
• Account Name–Enter the admin user name. Username is case-sensitive and can contain up to 24 ASCII
characters. Username cannot contain spaces and must be unique.
• Access - Select Read/Write, Read Only or Lobby Ambassador access for the admin account.
• New Password & Confirm Password - Enter a password for the admin user account, in-keeping with
the following rules:
• Passwords are case sensitive and cannot contain spaces
• The password should contain a minimum of 8 characters from ALL of the following classes:
• Lowercase letters
• Uppercase letters
• Digits
• Special characters
• No character in the password can be repeated more than three times consecutively
• The password should not contain the word Cisco or a management username. The password
should also not be any variant of these words, obtained by reversing the letters of these words,
or by changing the capitalization of letters, or by substituting 1, |, or ! or substituting 0 for o
or substituting $ for s.
Procedure
Procedure
Step 1 Enable Expert View on Cisco Mobility Express. Expert View is available on the top banner of the Cisco
Mobility Express WebUI as shown below and enables various configurable parameters which are not available
in Standard view.
Step 2 Navigate to Management > Admin Accounts and click on the Management User Priority Order.
Note By default, the local database is always queried first. If the username is not found, the controller
switches to the RADIUS server if configured for RADIUS or to the TACACS+ server if configured
for TACACS+. The default setting is local and then RADIUS.
Step 3 To change the priority, between TACACS+ and RADIUS, click on either and move UP or DOWN. Please
note Local Admin Accounts cannot be moved to Priority 3. It can only be either 1 or 2.
Procedure
Note Synchronization of the date and time with the NTP Server occurs each time the controller reboots
and at each user-defined polling interval.
Note Master AP does not have AP images. It facilitates the transfer of new software from the configured Transfer
Mode to the Access Points requesting for Software Update.
Software download on the Access Points is automatically sequenced to ensure that not more than 5 APs are
downloading the software simultaneously and the queue refreshes till all the Access Points requiring upgrade
have downloaded the new image.
Cisco Mobility Express supports the following Transfer Mode for Software Update:
1. Cisco.com
2. HTTP
3. SFTP
4. TFTP
Note There is no service interruption during pre-image download. After pre-image download is complete on all
APs, a Manual or scheduled reboot of Mobility Express network can be triggered.
In order to perform Software Update using cisco.com Transfer Mode, follow the procedure below:
Procedure
Step 1 To perform Software Update via Cisco.com, navigate to Management > Software Update and configure the
following:
• Select Cisco.com for Transfer Mode.
• Enter Cisco.com Username.
• Enter Cisco.com Password.
• Enable Automatically Check for Updates. Check is done once in 30 days.
• Click on the Check Now button to retrieve the Latest Software Release and the Recommended Software
Release from Cisco.com.
Step 6 Click on the Auto Restart checkbox if automatic restart of all access points in the network is desired after
the software update is finished. Click Next.
Step 7 Click Confirm to start the software update.
To monitor the download progress on individual Access Points, expand the Predownload image status.
Procedure
Step 1 Download the AP Image bundle from cisco.com to the local machine. The table below points to Release
8.7.102.0 images.
Note The above images are for AireOS Release 8.4.100.0. The image bundle would be different for
different releases.
Step 3 Unzip the AP Image bundle to extract individual AP Images. Mapping of Access Points to their corresponding
images is shown below:
Step 4 To perform Software Update via HTTP Transfer Mode, navigate to Management > Software Update and
configure the following:
• Select HTTP for Transfer Mode
• Browse to the local AP image, corresponding to the Access Point in your network
• Click on the Auto Restart checkbox if automatic restart of all access points in the network is desired after
the software update is finished
Procedure
Step 1 Download the AP Image bundle from cisco.com to the SFTP server.
Step 2 Unzip the AP Image bundle to extract individual AP Images.
Step 3 To perform Software Update via SFTP Transfer Mode, navigate to Management > Software Update and
configure the following:
• Select SFTP for Transfer Mode
• Enter the IP Address and Port Number of the SFTP server.
• Enter the File Path to the unzipped AP images on the SFTP Server.
• Enter the Username and Password of the SFTP Server
Note The most common mistake made is entering this path correctly. It is important that this path be
entered correctly before going to the next step. Do not point to individual AP image. You need to
only point to the directory which contains the AP images.
Step 4 Click on the Auto Restart checkbox if automatic restart of all access points in the network is desired after
the software download is finished.
Step 5 Click Apply.
Step 6 Click on Update Now button to initiate software update.
Note To Schedule Update at a later time, user must select a date and time in Set Update Time field and
then click on the Schedule Later button. It is recommended that the Set Reboot Time should be at
least 2 hours from the time pre-image download was initiated. This will ensure that pre-image
download on all Access Points in the Mobility Express Network has completed.
Procedure
Step 1 Download the AP Image bundle from cisco.com to the TFTP server.
Step 2 Unzip the AP Image bundle to extract individual AP Images.
Step 3 To perform Software Update via TFTP Transfer Mode, navigate to Management > Software Update and
configure the following:
• Select TFTP for Transfer Mode.
• Enter the IP Address of the TFTP server in the IP Address (IPv4) field.
• Enter the File Path to the unzipped AP images on the TFTP Server.
Note The most common mistake made is entering this path correctly. It is important that this path be
entered correctly before going to the next step. Do not point to individual AP image. You need to
only point to the directory which contains the AP images.
Note To Schedule Update at a later time, user must select a date and time in Set Update Time field and
then click on the Schedule Later button. It is recommended that the Set Reboot Time should be at
least 2 hours from the time pre-image download was initiated. This will ensure that pre-image
download on all Access Points in the Mobility Express Network has completed.
Procedure
Step 1 Login to AP running Mobility Express controller via SSH or Telnet(if it is enabled).
Step 2 Specify the datatype.
(Cisco Controller) >transfer download datatype ap-image
Note The most common mistake made is entering this path correctly. It is important that this path be
entered correctly before going to the next step. Do not point to individual AP image. You need to
only point to the directory which contains the AP images.
Step 8 Wait for the pre-image download to complete on the Access Points.
(Cisco Controller) >show ap image all
Total number of APs............... 3
Number of APs
Initiated.........................1
Predownloading....................2
Completed predownloading..........0
Not Supported.....................0
Failed/BackedOff to Predownload...0
Step 9 After the pre-download is complete, issue a reset system as shown below.
(Cisco Controller) >reset system
The system has unsaved changes.
Would you like to save them now? (y/N) y
Configuration Saved!
System will now restart!
Note Passive Client support is not available for Guest and CWA WLANs.
Procedure
Procedure
Step 1 Enable Expert View on Cisco Mobility Express. Expert View is available on the top banner of the Cisco
Mobility Express WebUI as shown below and enabled various configurable parameters which are not available
in Standard view.
• Automatic Flexible Radio Assignment - If there are 2800 and 3800 series access points in the Cisco
Mobility Express deployment which supports Flexible Radio Assignment, one can choose to enable or
disable it.
• Optimized Roaming–This is a global setting and can be enabled or disabled.
• Event Driven RRM–This is a global setting and can be enabled or disabled.
• CleanAir Detection–CleanAir is supported on 2800 and 3800 series access points and one can choose
to enable or disable it.
• 5.0 GHz Channel Width–Global setting is configured to best but one can select 20, 40, 80 or 160 MHz
for channel width.
• 2.4 GHz Data Rates–Move the slider to disable/enable data rates in the 2.4 GHz band
• 5.0 GHz Data Rates–Move the slider to disable/enable data rates in the 5.0 GHz band
• Select DCA Channels–One can select (click on individual channels) the channels to be included in DCA
for both 2.4 GHz and 5.0 GHz band
Note Green with an underline below the channel indicates that it is selected.
Procedure
CALEA Support
Support for The Communications Assistance for Law Enforcement Act (CALEA) is available in Cisco Mobility
Express starting Release 8.5. To configure CALEA Server, follow the procedure below:
Procedure
Step 1 Enable Expert View on Cisco Mobility Express. Expert View is available on the top banner of the Cisco
Mobility Express WebUI as shown below.
Step 2 Navigate to Advanced > Controller Tools. Click on the CALEA Tab and configure the following:
• Enable the CALEA status
• Enter the CALEA server IP address and Port
• Enter the Sync interval in minutes
• Enter the Venue information
Note Mobility Express uses MAC 00-00-5E-00-01-VRID where VRID is 1 so if there are other instances of VRRP
running in the environment, use VRID other than 1 for those instances.
Master AP Failover
To have redundancy in the Mobility Express network, it must have two or more Mobility Express capable
Access Points. These Access Points should have AP Image type as MOBILITY EXPRESS IMAGE and AP
Configuration as MOBILITY EXPRESS CAPABLE. In an event of a failure of Master AP, another Mobility
Express capable AP is elected as a Master automatically. The newly elected Master AP has the same IP and
configuration as the original Master AP.
Note Given Access Point models support different scale limits in terms of the number of Access Points supported,
it is highly recommended to have at least two or more Access Points which support the same scale limits. For
example, if you need to support scale of 100 Access Points, you should have at least two or more of either
3800, 2800 or a combination of both.
Note Access Points, which have the Mobility Express Image but AP Configuration, is NOT MOBILITY EXPRESS
CAPABLE, will not participate in the Master AP election process.
Note During the Master Election process, even though the Master AP running the controller function is down, the
remaining Access Points will fall into Standalone mode and will continue to service connected clients and
switch data traffic locally. After the new Master is elected, the Standalone Access points will move to connected
mode.
As mentioned above, Master Access Point election is based on a set of priorities. The priorities are as follows:
Procedure
Step 1 User Defined Master–User can select an Access Point to be the Master Access Point. If such a selection is
made, no new Master will be elected in case of a failure of the active Master. After five minutes, if the current
Master is still not active, it will be assumed dead and Master Election will begin to elect a new Master. To
manually define a Master, follow the procedure below:
a) Navigate to Wireless Settings > Access Points.
b) From the list of Access Points, click Edit icon of the Access Point which you would like to select as the
Master AP.
c) Under the General tab, click on Make me Controller button.
d) Click Yes on the Confirmation window.
Note The previous Master will reboot and the selected Access Point will immediately launch the
controller and become the active Master.
Step 2 Next Preferred Master–Admin can configure the Next Preferred Master UI and CLI. When this is configured
and the active Master AP fails, the one configured as the Next Preferred Master will be elected as a Master.
To configure the Next Preferred Master, follow the procedure below:
Note Only one Next Preferred Master can be configured on Cisco Mobility Express.
Step 3 Most Capable Access Point– If the first two priorities are not configured, Master AP election algorithm will
select the new Master based on the capability of the Access Point. For example, 3800 is the most capable
followed by 2800, 1850, 1830 and finally the 1815 Series.
Note All 1815 Series Access Points have the same capability.
Step 4 Least Client Load– If here are multiple Access Points with the same capability i.e. multiple 3800 Access
points, the one with least client load is elected as the Master Access Point.
Step 5 Lowest MAC Address–If all of the Access Points are the same and have the same client load, then Access
Point with the lowest MAC will be elected as a Master.
Step 1 Navigate to Management > Software Update. Select TFTP or SFTP for Transfer Mode and configure the
SFTP or TFTP Parameters
Step 2 Enable Efficient Join as shown below and click Apply.
Schedule WLAN
ME supports an option to schedule availability of each and every WLAN. By default, all WLANs are available
24/7 when they are initially created. Each WLAN would present the user options to create a scheduler as
follows:
• Predefined:
• Mon – Fri 8am to 5pm ON, all else OFF
• Sat – Sun 8am to 8pm ON, all else OFF
• User-defined:
• User can select each day of the week and check whether the WLAN would be ON for hourly intervals
Configuration can be defined from UI or CLI. Schedule WLAN configuration will also be included in
configuration file that can be delivered to ME through PnP.
Scheduling WLAN
Procedure
Step 1 Navigate to Wireless Settings > WLANs and select WLAN required for setting WLAN schedule.
Step 2 Click on the Scheduling tab you will have the option to Disable or Enable Schedule on the WLAN.
Step 3 In the screen shot below, an example of scheduling the WLAN to be enabled on Monday only is shown.
mDNS support
Bonjour protocol is an Apple service discovery protocol which locates devices and services on a local network
with the use of multicast Domain Name System (mDNS) service records. The Bonjour protocol operates on
service announcements and service queries. Each query or advertisement is sent to the Bonjour multicast
address ipv4 224.0.0.251 (ipv6 FF02::FB). This protocol uses mDNS on UDP port 5353.
The address used by the Bonjour protocol is link-local multicast address and therefore is only forwarded to
the local L2 network. Routers cannot use multicast routing to redirect the traffic because the time to live (TTL)
is set to 1. This meant that all the service providers/sources (which advertise the service) and Bonjour
clients(which ask for service) had to be in the same subnet. This lead to scalability problems.
In order to address this issue, the Cisco Wireless LAN Controller (WLC) acts as a Bonjour Gateway. The
WLC listens for Bonjour services, caches these Bonjour advertisements (AirPlay, AirPrint etc.) from the
source/host. For example, Apple TV and responds back to Bonjour clients when they ask/request for a service.
This way you can have the sources and clients in different subnets.
Cisco WLC works as a Bonjour gateway in local mode today. The WLC listens for Bonjour services and by
caching those Bonjour Advertisements (AirPlay, AirPrint etc.) from the source/host e.g. AppleTV and
responding back to Bonjour clients when they ask/request for a service.
Procedure
Step 1 Navigate to Services > mDNS and Enable mDNS Global Snooping as shown below.
Step 2 Navigate to Wireless Setting > WLANs and create a WLAN for clients with any security type and Enable
mDNS on the WLAN. By default mDNS Profile set as the default-mdns-profile to allow the Bonjour services
that you require to be advertised on a particular WLAN.
Step 3 Create another WLAN for services as shown and enable mDNS as we dids in step 2.
Step 4 Check if ipad/iphone and Apple TV are connected to the correct SSIDs and make sure they have ip addresses
assigned from two different subnets.
Configuring SFTP
Navigate to management and select SFTP as your transfer method. Specify SFTP ip address and
username/password configured.
Configuring Videostream
Procedure
Step 1 Navigate to Services > Media Stream and enable Global Multicast mode and Multicast Direct as shown
below
Step 2 Click on Add new Stream to add multicast stream to controller. Choose Stream Name and select multicast
range.
Step 3 To enable VideoStream on WLAN One or all WLANs/SSIDs configured can be enabled for streaming video
with VideoStream. This is another configuration step that can control the enabling of the VideoStream feature.
Enabling or disabling the VideoStream feature is non-disruptive.
All wireless clients requesting to join a stream will be assigned video QoS priority on admission.
Wireless client streaming video prior to enabling the feature on the WLAN will be streaming using normal
multicast. Enabling the feature switch the clients to multicast-direct automatically on the next IGMP snooping
interval. Legacy multicast can be enabled on the WLAN by not checking the Multicast Direct feature. This
will show that wireless clients streaming video are in Normal Multicast mode.
Step 4 Make sure the wireless clients are associated to the access point(s), and are configured for a correct interface.
As seen in the Figure , there are two clients associated to one AP. The two clients have an IP address from
VLAN X (SSID name—enjoy).The associated clients have an IP address and good uplink connectivity to the
AP.
Enable streaming on the wired side by connecting a video server with a configured multicast address
229.77.77.28. Refer the following link to know how to stream from a Video Sever: https://wiki.videolan.org/
Documentation:Streaming_HowTo_New/#Streaming_using_the_GUI
The Wireshark capture on the client shows the Multicast to Unicast Video Stream. The Ethernet header contains
the MAC address of the client as the Destination MAC address, for example, 7c:d1:c3:86:7e:dc.
Step 1 RFID Tag data Collection is enabled by default, CLI shown below should show default configuration.
RFID Tag data Collection......................... Enabled
RFID timeout.................................... 1200 seconds
RFID mobility....................................
RFID Rate limit................................. 1000
Step 2 Place RFID tag near AP, “show rfid summary” should show RFID tags.
(Cisco Controller) >show rfid summary