Cisco 500 Series Wireless Express Mobility Controller Configuration Guide
Cisco 500 Series Wireless Express Mobility Controller Configuration Guide
Cisco 500 Series Wireless Express Mobility Controller Configuration Guide
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick
Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified
Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation,
Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ
Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing,
ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0501R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Preface vii
Audience vii
Purpose vii
Conventions vii
Abbreviations and Acronyms viii
Related Documentation ix
Obtaining Documentation and Submitting a Service Request ix
Translated Warning x
Statement 1071—Warning Definition x
CHAPTER 6 Restarting, Resetting, Backing Up, and Restoring the Controller 6-1
APPENDIX A Configuring DHCP Option 43 for Cisco 520 Series Access Points A-1
Overview A-1
INDEX
This preface provides an overview of the Cisco 500 Series Wireless Express Mobility Controller
Configuration Guide, Software Release 1.5, references related publications, and explains how to obtain
other documentation and technical assistance, if necessary.
Audience
This guide is for the networking professional who installs and manages these devices. To use this guide,
you should be familiar with the concepts and terminology of wireless LANs.
Purpose
This guide describes how to configure the Cisco 526 Wireless Express Mobility Controller (hereafter
referred to as the WLC526 or the controller) and Cisco 521 Wireless Express Access Points using the
Cisco Configuration Assistant (hereafter referred to as the CCA).
Note This version of the Cisco 500 Series Wireless Express Mobility Controller Configuration Guide pertains
specifically to CCA software release1.5. If you are using an earlier version of CCA software, you might
notice differences in features, functionality, and GUI windows (for instructions on obtaining the latest
CCA software, refer to the “Obtaining and Installing CCA” section on page 1.
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
• Commands and keywords are in boldface text.
• Arguments for which you supply values are in italic.
• Square brackets ([ ]) mean optional elements.
• Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
• Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
Note Means reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
Abbreviation or
Acronym Used Additional References (generic or collective) Cisco Product or Service Name
AP521 autonomous access point Cisco 521 Wireless Express Access Point
Cisco 500 series access point
Cat3750 DHCP server Cisco Catalyst 3750 Series Switch
CCA Cisco Configuration Assistant
CE520 switch Cisco Catalyst Express 520 Series Switch
Catalyst Express 500 Series Switches
CLI Command Line Interface
CUWN Cisco Unified Wireless Network
GUI controller GUI controller web-browser interface
LAP521 lightweight access point Cisco 521 Wireless Express Lightweight Access Point
controller-based access point
RRM radio resource management (feature)
SBCS Cisco Smart Business Communications System
UC500 UC500 devices Cisco UC500 series appliances
WCS Cisco Wireless LAN Control System
WLC526 controller Cisco 526 Wireless Express Mobility Controller
Wireless Express 500 series controllers
Related Documentation
This guide assumes that you are installing your WLC526 within the Cisco Smart Business
Communications System. The following documents provide information about system components and
include configuration procedures:
• Quick Start Guide: Cisco 526 Wireless Express Mobility Controller—Contains basic installation and
configuration instructions for the WLC526.
• Cisco Smart Business Communications System Setup Guide—Contains instructions for installing,
configuring, and monitoring the SBCS. You should use this document to configure all the
components of the smart business system (referred to as the “Smart Doc” in some documents).
• Cisco Unified Communications 500 Series for Small Business Getting Started Guide—Provides
basic installation and setup instructions for the UC500 appliance.
• Getting Started Guide for the Catalyst Express 520 Switches—Provides basic installation and setup
instructions for the CE520 switch.
• User Guide for the Catalyst Express 520 Switches—Provides advanced configuration information
for the CE520 switch.
• Cisco Configuration Assistant Quick Start Guide—Contains basic installation and configuration
instructions for the CCA.
• Quick Start Guide: Cisco 521 Wireless Express Access Point—Contains mounting instructions for
the AP521.
Follow these steps to obtain these documents on Cisco.com:
Translated Warning
This warning symbol means danger. You are in a situation that could cause
bodily injury. Before you work on any equipment, be aware of the hazards
involved with electrical circuitry and be familiar with standard practices for
preventing accidents. Use the statement number provided at the end of each
warning to locate its translation in the translated safety warnings that
accompanied this device. Statement 1071
Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die
zu Verletzungen führen kann. Machen Sie sich vor der Arbeit mit Geräten mit
den Gefahren elektrischer Schaltungen und den üblichen Verfahren zur
Vorbeugung vor Unfällen vertraut. Suchen Sie mit der am Ende jeder Warnung
angegebenen Anweisungsnummer nach der jeweiligen Übersetzung in den
übersetzten Sicherheitshinweisen, die zusammen mit diesem Gerät
ausgeliefert wurden.
Dette advarselssymbolet betyr fare. Du er i en situasjon som kan føre til skade
på person. Før du begynner å arbeide med noe av utstyret, må du være
oppmerksom på farene forbundet med elektriske kretser, og kjenne til
standardprosedyrer for å forhindre ulykker. Bruk nummeret i slutten av hver
advarsel for å finne oversettelsen i de oversatte sikkerhetsadvarslene som
fulgte med denne enheten.
Este símbolo de aviso significa perigo. Você está em uma situação que poderá
ser causadora de lesões corporais. Antes de iniciar a utilização de qualquer
equipamento, tenha conhecimento dos perigos envolvidos no manuseio de
circuitos elétricos e familiarize-se com as práticas habituais de prevenção de
acidentes. Utilize o número da instrução fornecido ao final de cada aviso para
localizar sua tradução nos avisos de segurança traduzidos que acompanham
este dispositivo.
Este símbolo de aviso indica peligro. Existe riesgo para su integridad física.
Antes de manipular cualquier equipo, considere los riesgos de la corriente
eléctrica y familiarícese con los procedimientos estándar de prevención de
accidentes. Al final de cada advertencia encontrará el número que le ayudará
a encontrar el texto traducido en el apartado de traducciones que acompaña
a este dispositivo.
This chapter provides an overview of the Cisco 526 Wireless Express Mobility Controller components
and features. It contains these sections:
• System Overview, page 1-1
• WLC526 Controller Overview, page 1-4
• Configuration Options, page 1-6
System Overview
The Cisco 526 Wireless Express Mobility Controller (also referred to as the WLC526 or just the
controller) is a network appliance that is optimized for secure transmission of data, voice, and video as
part of the Cisco Mobility Express solution of the Cisco Smart Business Communications System
(SBCS).
Some of the features available in the controller-based architecture of the Cisco Mobility Express
Solution include:
• Centralized management—Cisco Configuration Assistant (also referred to as CCA) enables users to
quickly and easily set-up and manage clients, access points, and network policies through a single
wizard interface and predefined configuration templates.
• Radio resource management—Features such as quality of service (QoS) and load balancing
optimize traffic of voice, video, and data, thus optimizing bandwidth.
• Up to eight virtual networks—This allows one physical infrastructure to be segmented for multiple
uses—such as by organization, security level, voice or data requirement, and so on. One network can
also be configured as a secure guest network.
• Mobility management—Allows movement from one access point to another without losing a
connection.
• Mobility services—Supports advanced mobility services traditionally reserved for enterprise
businesses, including:
– Standards-based security
– Secure guest access
– Optimized voice over Wi-Fi
Note Cisco 500 series access points can associate only with Cisco 500 series controllers. Because the needs
of Cisco Mobility Express customers are different than those of enterprise customers, these access points
do not operate with other controllers.
For more information about Cisco 521 Wireless Express Access Points, refer to the Quick Start Guide:
Cisco 521 Wireless Express Access Point.
Features Benefits
Secure network access for guest users Secure guest access enables you to easily create and
manage a virtual guest network with a Web login
portal page for users such as customers, vendors, and
contractors. Visitors can have Internet access while
safely partitioned from the sensitive corporate LAN.
Support for Cisco voice-over-WLAN optimization Voice-over-WLAN optimization is a package of
features that deliver quality of service, call admission
control, and fast, secure inter-access-point handoff to
improve the quality of a wireless voice infrastructure.
Easy management tool Within CCA are Smart Assist features that enable
plug-and-play functionality and optimize network
settings.
Support for Cisco Lightweight Access Point Protocol Uses Cisco LWAPP for communication between
(LWAPP) Cisco 500 series access points and WLC526
controllers to simplify deployment and management,
and to automate functions required for seamless
wireless coverage.
Support for up to 6 access points per controller and The wireless network easily expands as business
up to 2 controllers per network for a total of 12 requirements for additional wireless coverage and
access points mobility services increase.
Multi-access-point Radio Resource Management RRM automatically optimizes radio coverage and
(RRM) capacity while working around potential points of
interference. This real-time radio coordination
simplifies deploying multiple access points.
Secure authentication mechanism support Supports a wide range of authentication mechanisms
to enable scalable security architectures and
minimizes security interoperability problems (see the
“Security/Authentication Standards” section on
page 1-5)
Wired/wireless network virtualization Supports the use of up to 8 SSID/VLANs so that one
physical WLAN infrastructure can be safely shared
by users, applications, or organizations with different
network and security requirements.
Item Specification
Physical Interfaces • Two 10/100 Ethernet ports for uplink and management
• Two USB console ports (future expansion)
• One RJ-45 serial port for direct console access
Wired/Switching/Routing protocols • IEEE 802.3 10BASE-T
• IEEE 802.3u 100BASE-TX
• IEEE 802.1Q VLAN tagging
Management Options • CCA software (recommended primary interface)
• Controller web-browser interface
• Limited command-line interface for troubleshooting
using Telnet, SSH, or console port access
Security/Authentication Standards • None/Open • WEP/Open
• MAC Filtering • WPA/Open with EAP
• WPA/Network EAP • WPA-PSK/Network EAP
• WPA-PSK/Open with EAP • WPA2/AES CCMP
• Protected EAP • Cisco LEAP
• EAP- TLS • EAP Generic Token Card
• EAP-SIM
RADIUS Authentication • IEEE 802.1x RADIUS authentication (external RADIUS
server required)
Multiple Service Set Identifiers (SSIDs) • Eight SSIDs supported (each access point may support
multiple SSIDs)
• One SSID broadcast in SSID beacon
Support for Cisco Secure Guest Access • Guest SSID/VLAN
through CCA
• Auto-expiring guest user accounts
• Custom guest login page
Support for Voice-over-WLAN • Quality of service
Optimization
• Call admission control
• Fast inter-access point hand-off
• Other optimization features designed to improve the
quality of a wireless voice infrastructure
Configuration Options
Like many Cisco devices, the WLC526 controller can be configured and operated through more than one
interface. They are:
• Cisco Configuration Assistant (CCA)
• Controller web-browser interface (GUI)
• Command-line interface (CLI)
This section explains use and limitations of each interface.
Note There is no charge to download or use this software. For information about downloading and installing
CCA, refer to Getting Started with Cisco Configuration Assistant 1.5.
The following sections highlight some of the setup and configuration tools available in CCA.
Note The CCA Device Setup Wizard supports WLC526 controllers running software versions 4.2 and above.
For controllers running earlier versions, see the “Using the Controller Web-Browser Interface (GUI)”
section on page 1-8.
• Easy WLAN monitoring through a single-screen snapshot view of all WLAN network elements and
statistics
• Extensive online help for configuring common client devices.
1 Examples of features that are available in 2 Examples of features that are available only in
guide mode and expert mode expert mode
Note The CCA Smartports option is accessible when there is one or more 520 series switch connected to the
network.
Note WLC526 controllers running software releases 4.2 and later can use the CCA Device Setup
Wizard.
• Advanced configuration tasks—IT professionals who have experience with Cisco GUIs can also
use the Wireless Express 500 series controller GUI to perform a number of advanced configuration
tasks that cannot be done in the current version of CCA. GUI-only tasks include:
– Advanced monitor and client statistics
– Advanced WLAN configuration options
– Advanced QoS settings
– Advanced WLAN layer 2 and 3 settings
– Controller advanced interface settings
– Controller advanced CDP settings
– Controller advanced DHCP settings
– Wireless advanced access point configuration settings
– Wireless advanced access point QoS, timers, and regulatory settings
– Wireless advanced RRM configuration
– Security advanced configuration settings
– Advanced MAC filtering
– Advanced security for client management
Note The WLC526 controller is simple to install and operate; therefore, the controller CLI consists of a
limited number of primarily show and debug commands.
This chapter provides instructions on adding a WLC526 controller and controller-based LAP521 access
points to your network using CCA. These sections are provided in this chapter:
• Obtaining and Installing CCA, page 2-1
• Starting CCA, page 2-1
• Adding a New Controller, page 2-2
• Verifying and Configuring Your Ethernet Adapter, page 2-9
• Adding LAP521 Access Points, page 2-11
Starting CCA
Double-click the CCA icon on your desktop to start the application and the CCA window appears (see
Figure 2-1).
For additional information about the CCA interface, windows, icons, or menus, refer to Getting Started
with Cisco Configuration Assistant 1.5.
Note The CCA device setup wizard only supports WLC526 Release 4.2 controllers.
The Ethernet adapter on your PC must be configured to automatically receive an IP address from a DHCP
server (see the “Verifying and Configuring Your Ethernet Adapter” section on page 2-9).
Follow these instructions to use the device setup wizard to configure a new controller:
Step 1 To start the wizard, click Setup > Device Setup Wizard. The Step 1: Select a Device window appears
(see Figure 2-2).
b. Click Next and the Step 2: Prepare a device window appears (see Figure 2-4
Step 2 Verify that an Ethernet cable is not connected to any of the controller ports and click Next. The Step 3:
Power up a device window appears (see Figure 2-5).
Step 4 Connect a Category 5 Ethernet cable from your PC and to Port 1 on the controller.
Step 5 When the wizard verifies successful connection, the Step 5: Verify Connection with Device window
displays a successful connection message (see Figure 2-7).
Step 6 Click Next and the Step 6 Enter Hostname and User Authentication Information window appears
(see Figure 2-8).
Figure 2-8 Step 6: Enter Hostname and User Authentication Information Window
Note The user name cannot contain these characters: space + # % / \ ? ; ' < > { } | ^ ~ [ ] ` " !
b. Enter the administrator password (up to 24 ASCII characters) into the Password field.
Note The password cannot contain these characaters: space + ? / \ < > # % { } | ^ ~ [ ] ` "
space + ? / \ < > # % { } | ^ ~ [ ] ` "
Note The VLAN identifier is set to 0 for an untagged VLAN. This setting cannot be changed with
the CCA. This setting must be the same on the switch.
d. Accept the default controller port 1 setting or click the drop-down arrow to choose port 2. These
ports are located on the controller front panel and are used to connect the controller to the network.
e. Enter the IP address of the DHCP server in the DHCP Server IP Address field.
Note The default for the Transport Mode is Layer 3 and cannot be changed with the CCA.
f. For the AP Manager interface, enter the IP address for the AP Manager in the IP Address field.
g. Click Next and the Step 9 Summary window appears (see Figure 2-11).
Step 10 Carefully review the summary settings and perform one of these operations:
a. If the summary is incorrect or you desire to make changes, click Previous and the previous window
appears.
b. If the summary is correct, click Finish and the wizard begins to transfer the configuration
information to the controller (a progress bar appears). When the transfer is complete, the wizard
indicates the finish status on the window (see Figure 2-12).
Note Prior to using your PC and CCA to monitor your network, you need to reconfigure your PC
Ethernet adapter to a static IP address within the subnet of your network.
Step 13 Mount your access point in the desired location. For mounting information refer to the Quick Start Guide:
Cisco 526 Wireless Express Mobility Controller.
Step 14 Connect a Category 5 Ethernet cable from the controller management interface port (1 or 2 as configured
in Step 9, above) to your switch.
Your controller is now configured and ready to accept access point connections.
Step 1 Click Start > Run and the Run pop-up window appears.
Step 2 Type cmd in the Open field and click OK. The cmd.exe pop-up window appears.
Step 3 In the pop-up window, type ipconfig and press Enter (see Figure 2-13).
Step 4 After verifying the IP address of your Ethernet adapter, close the window by clicking the Red X box.
Note The WLC526 controller supports only controller-based LAP521 access points. It does not support Cisco
Aironet lightweight access points, such as the 1000, 1130, 1200, 1240, 1250, 1300, 1500, or 1520 series
access points.
Note The switch ports to which you connect your access points must be configured as access point smart
ports. You can use CCA or the switch web-browser interface to configure the switch ports.
The access points can be powered by PoE from your switch, by a power injector, or by a power module.
On power up, the access points begin a discovery process that automatically connects them with your
controller. The discovery process is indicated by the Status LED indicator on the access point blinking
green, red, and amber. When the access point associates with the controller, the Status LED changes to
light green. For more information about the LED color codes, refer to the Quick Start Guide: Cisco 521
Wireless Express Access Point.
When the LAP521 associates to the WLC526, the controller automatically downloads the latest
operating system and configures the access point.
This chapter describes how to create a community of devices and describes how to connect to a
community using the CCA. This chapter contains these sections:
• Community Overview, page 3-1
• Creating a Community of Devices Using the Connect Window, page 3-2
• Connecting To a Community, page 3-6
Community Overview
This section provides only a brief overview of communities. For additional information on CCA and
communities refer to the Getting Started with Cisco Configuration Assistant document available on
Cisco.com at this URL:
http://www.cisco.com/en/US/products/ps7287/prod_installation_guides_list.html
CCA manages device groups called communities. In a community, every device must have an IP address.
CCA communicates directly with all members of the community, so an HTTPS link is possible with
every member.
Characteristics of a Community
In addition to offering the security of HTTPS links, a community has these characteristics:
• It can contain up to 25 SBCS devices, including the UC500, CE520, WLC526 controllers, and
stand-alone AP521 access points. Specific limitations include:
– Five routers
– Three AP521 autonomous wireless access points
– Two wireless controllers (which can control up to an additional 12 AP521 access points
– As many Cisco IP phones as there are available switch ports in the network
• Because every member has an IP address, if you lose communication with a member, you can still
communicate with other members.
• A basic set of networking tasks is supported for community members, including routers and access
points. The tasks are
– Managing user access
– Upgrading software
– Saving a running configuration
– Backing up and restoring a configuration
– Managing the system time
– Getting system message notifications
– Changing the HTTP port number
– Getting an inventory report
Creating a Community
You can create a community in either of these ways:
• When you launch CCA, you can use the Connect window that appears.
• Choose Application > Communities from the menu bar and use the Communities window that
appears.
• Choose Application > Connect and use the Connect window that appears.
• Click the Connect icon on the tool bar and use the Connect window that appears.
Community Limits
Table 3-1 lists the limits on the number of specific device types that can be supported in a community.
IP phones do not count toward the 25-device community limit. You can connect as many IP phones as
there are switch ports in the community’s UC500 appliances and CE500 switches.
If you exceed the device limits, you cannot manage the community until you remove enough devices to
comply with the limits.
There is no limit to the number of communities that CCA can manage.
CCA starts in a disconnected mode, it is not connected to a community or a standalone device. In this
mode, you see the menu bar in the CCA window and only the Setup and Monitor options of the feature
bar. The feature bar is populated with device features only when CCA is connected to a community.
The Connect window gives you these choices:
• Creating a new community. You first create the community and then connect to it.
• Connecting to an existing community or to a standalone device.
• Working offline. When you are offline, only the Voice feature is available on the feature bar. You
can specify options for voice communication, save them, and retrieve them in a later session, when
you do connect to a community or a standalone device.
To use the Connect window to create a new community of devices, follow these instructions:
Step 1 Check Create community in the Connect window (see Figure 3-1).
Step 2 Click OK and the Create Community window appears (see Figure 3-2).
Step 3 Enter the community name in the Name field (up to 64 characters, A-Z, a-z, 0-9, hyphen, and
underscore).
Step 4 (Optional) Enter your company name, your organization, or any other identifying text in the Company
Name field. The text is used as the default SSID (service set identifier) for your network.
Step 5 CCA uses the information from the Discovery option to discover devices and their neighbors using the
Cisco Discovery Protocol (CDP). The discovered devices and their neighbors are added to your
community. Choose a discover option by clicking the drop-down arrow in the Discover field and enter
the requested information as listed below:
– A single device by IP address—Enter the IP address of the device you want CCA to discover.
– Devices using a seed IP address—(default) Enter the IP address of a device with neighbors that
you want CCA to discover.
– Devices on a subnet—Enter the IP address and a subnet mask.
– Devices in an IP address range—Enter the start and end IP addresses of the range.
Step 6 Click Start. CCA begins the discovery process and displays a progress bar. When devices are
discovered, CCA includes the discovered devices in the Device table.
Step 7 If a pop-up window appears that indicates the expected amount of time for the discovery process, click
Yes or No to continue.
Step 8 If a Security Certificate Alert pop-up window appears (see Figure 3-3) to indicate that a certificate site
cannot be identified as a trusted site, you might want to examine the certificate by clicking View
Certificate. After examining the certificate, click Yes, No, or Always.
Step 9 If an Authentication: Device pop-up windows appears (see Figure 3-4), enter the administrative
username and password for the indicated device.
Note For the WLC526 controller and the CE500 switch, the default username and password are both
admin.
When the discovery process complete, the discovered devices are listed in the Devices table
(see Figure 3-5).
Connecting To a Community
When you connect to a community, you can use CCA to communicate with and manage all of the
members. To connect to a community using the Connect window, follow these instructions:
Step 3 Click OK. CCA displays a discovery progress bar on the lower left side of the screen. When CCA
completes the discovery process, the Topology View window appears (see Figure 3-7).
The topology shows the devices discovered, their connections, the connection ports, and other
information for the community that you specified. CCA provides topology options that specify the
information displayed for a device. To change the information displayed, right click on the information
and choose Topology Options.
Note After CCA has connected to a community, the Feature bar expands to cover additional device feature
options.
This chapter describes how to use CCA to create and modify wireless LANs (WLANs) and virtual LANs
(VLANs). The chapter contains these sections:
• Creating a New WLAN, page 4-1
• Modify a WLAN, page 4-7
• Adding a VLAN, page 4-10
• Modifying a VLAN, page 4-14
Step 1 Click Configure > Wireless > WLANs (SSID) and the WLANs (SSID) window appears (see
Figure 4-1).
Step 2 Click the Hostname drop-down arrow and choose the controller that you want to configure.
If you fail to configure a RADIUS server, a WLANs (SSIDs) pop-up window appears to indicate that
you should create a new RADIUS server (see Figure 4-2).
Step 3 Click Configure and the Configure RADIUS Servers window appears (see Figure 4-3).
Step 4 Click Create and the Create RADIUS Server window appears (see Figure 4-4).
Step 9 Click Yes on the pop-up message and the WLANs (SSIDs) window appear again (see Figure 4-1).
Step 10 Click Create to create a WLAN and Figure 4-6 appears.
Note For voice or data WLAN types, the VLAN ID is automatically selected.
Step 12 Enter an SSID in the SSID field (up to 32 alphanumeric characters without spaces).
Note For the guest WLAN type, the SSID can contain a space character but not a leading or trailing
space character.
Step 13 Uncheck Broadcast in Beacon if you don’t want the SSID included in the beacon packets.
Step 14 Accept the VLAN or click the drop-down arrow to choose another configured VLAN.
Step 15 To add a VLAN, click Add VLAN (for instructions on adding a VLAN refer to the “Adding a VLAN”
section on page 4-10).
Step 16 Check Web Authentication if you want to create a guest or employee user. This option is enabled by
default for Guest WLANs.
Step 17 Click the Security Type drop-down arrow and choose one of these security options:
• No Security—This is the least secure option. Select it only for an SSID that is used in a public place
(guest SSID), and associate it with a VLAN that restricts access to your network. There is no
encryption, and the authentication type is open authentication.
• WEP—This security setting requires that the access point and the client device (a device that
connects to the wireless device such as a laptop or a PC) share the same WEP key to keep the
communication private.
• EAP—This security setting enables IEEE 802.1X authentication and requires you to select the IP
address of a RADIUS server. The encryption type is WEP, and the authentication type is IEEE
802.1x.
• WPA—This security setting is more secure than the EAP setting. It enables WPA authentication and
requires you to select the IP address of a RADIUS server. Client devices that associate with the
access point by using this SSID must be WPA-capable.
• WPA-PSK—Select this security setting when you want to use the WPA encryption and you do not
have access to a RADIUS server. It requires that the access point and the client device share the same
WPA-PSK. The key can be from 8 to 63 characters long.
• WPA2—This security setting is more secure than the WPA setting. It enables WPA2 authentication
and requires you to select the IP address of a RADIUS server. Client devices that associate with the
access point by using this SSID must be WPA2-capable.
• WPA2-PSK—Select this security setting when you want to use WPA2 encryption and you do not
have access to a RADIUS server. It requires that the access point and the client device share the same
WPA2-PSK. The key can be from 8 to 63 characters long. The authentication type is WPA2-PSK.
• MAC—Select this security setting when you want to authenticate client devices by using MAC
address-based authentication. There is no encryption, and the authentication type is IEEE 802.1x.
Step 18 If you choose WEP security, perform these steps:
a. In the Authentication field, click the drop-down arrow and choose Open or shared key.
b. In the Key Format field, click the drop-down arrow and choose Hex or ASCII.
c. Click the Hex Key field drop-down arrow and choose 1, 2, 3, 4.
d. Click the key size drop-down arrow and choose one of these options:
– 104 bits—Requires 13 ASCII characters or 26 Hex digits.
– 40 bits—Requires 5 ASCII characters or 20 Hex digits.
e. If you selected a hex key format, choose one of these options:
– Enter the encryption key (see key size above).
– Enter a passphrase (8 to 63 characters) and click Generate for the encryption key to be
automatically created (see Figure 4-7).
Note The authentication is WPA-PSK, WPA2-PSK, or WPA2-PSK corresponding to the security type.
Modify a WLAN
To modify a WLAN, follow these steps:
Step 1 Click Configure > Wireless > WLANs and the WLANs window appears (see Figure 4-12):
Step 3 Change the WLAN information as needed and then click OK. Figure 4-11 appears with the changed
information.
Adding a VLAN
To add a new VLAN, follow these steps:
Step 1 Click Configure > Wireless > VLANs and the VLANs window appears (see Figure 4-12):
Step 2 Click Create and the Create VLANs window appears (see Figure 4-13).
The VLANs window (see Figure 4-15) appears and contains the added VLAN.
Step 5 If you need to add more VLANS, click Apply and repeat Steps 2 through Step 4.
Step 6 When you have finished adding VLANs, click OK.
Step 7 If CCA detects an error or a conflict with a settings already configured in the switch, a pop-up message
appears indicating you should revise the field indicated with a red box. Make necessary corrections and
click OK.
Step 8 If a pop-up message appears (see Figure 4-16) that indicates the corresponding VLANs in all switches
will be updated, click OK.
Step 9 When a pop-up message appears (see Figure 4-17) that asks if you want to create an SSID using the
VLAN data, click Yes or No.
Step 10 If you choose Yes to create an SSID, go to Step 10 in the Create WLAN section to enter the new SSID
information.
Modifying a VLAN
To modify an existing VLAN, follow these steps:
Step 1 Click Configure > Wireless > VLANs and the VLANs window appears (see Figure 4-18):
Step 2 Click the VLAN that you want to modify to highlight it (see Figure 4-18).
Step 3 Click Modify and the Modify VLAN window appears (see Figure 4-19).
Step 4 Use the left mouse button to highlight the data you want to modify, then enter the desired data.
Step 5 When you have finished modifying the data fields, click OK. Figure 4-20 appears and contains the
revised VLAN.
Step 6 If you need to revise additional VLANs, click Apply and repeat Step 2 through Step 5.
Step 7 When you have finished modifying the VLANs, click OK.
This chapter describes how to upgrade WLC526 controller software using CCA. This chapter contains
these sections:
• Obtaining the Controller Software Image, page 5-1
• Upgrading Controller Software, page 5-1
Step 1 Click Maintenance > Software Upgrade and Figure 5-1 appears.
Step 2 Highlight your switch and click Upgrade Settings. Figure 5-2 appears.
Step 3 Click the drop-down arrow in the Mode field and choose Standard or Remote TFTP Server.
Step 4 If you selected Standard, enter the path/filename of the controller software image in the IOS Image field
or click Browse and navigate to the controller software image file on your hard drive.
Step 5 If you selected Remote TFTP Server, perform these steps:
a. Enter the filename of the controller software image in the IOS Image field.
b. Enter the TFTP server IP address in the corresponding field.
Note The controller software image file must be in your TFTP server download directory.
The upgrade status field indicates CCA is uploading the software image to the controller.
You can click Status at any time to view status information (see Figure 5-2).
When the controller software upgrade is completed, a pop-up message (Figure 5-7) appears and
indicates the successful upgrade of the controller. The message indicates that the controller must be
reloaded to use the new software and asks if you want to reload the software.
Step 9 Click Yes to reload the controller and Figure 5-8 appears indicating the controller is being reloaded.
Step 10 If you click Status, Figure 5-9 appears and indicates the reload status.
When the reload completes, Figure 5-10 appears and indicates the upgrade status is successful.
Step 11 After reviewing the information provided in the window, close the window by clicking the red X button
the top right of the window.
This chapter describes how to restart the controller, reset the controller to factory defaults, backup the
controller configuration, and restore the controller configuration. The chapter contains these sections:
• Restarting the Controller Using CCA, page 6-1
• Resetting the Controller to Factory Default Values Using CCA, page 6-3
• Backing Up the Controller Configuration, page 6-4
• Restoring the Controller Configuration, page 6-8
• Manually Restarting the Controller Using the Reset Button, page 6-11
• Manually Resetting the Controller to Factory Defaults, page 6-12
Step 2 For your controller, check Restart. Figure 6-2 appears and shows the controller restart check box has
been checked.
Step 3 If you need to restart another controller, click Apply and return to Step 2.
Step 4 Click OK and a pop-up message appears (see Figure 6-3). The message indicates the controller(s) will
reload in approximately 1 minute. The message also indicates that you might need to refresh the CCA
screen by clicking Application > Refresh after the controllers are restarted.
Step 2 On the controller line, check Reset to Factory Defaults. Figure 6-5 appears and indicates the reset will
being in approximately 1 minute for the selected devices. The message indicates CCA will loose
connectivity with the controller after it has been reset to factory defaults. To reconfigure the controller,
go to the “Adding a New Controller” section on page 2-2.
Step 3 If you want to backup your current controller configuration, go to the “Backing Up the Controller
Configuration” section on page 6-4 for additional instructions.
Step 4 If you want to continue with the reset of the controller, click Yes.
When the reset process is complete, CCA returns to the main CCA screen displaying the Topology View.
If you click the Refresh icon, CCA refreshes the topology view and the previously configured controller
is shown not connected to the switch. CCA also detects the unconfigured controller with a default IP
address of 192.168.1.1 connected to the controller. To configure the controller, go to the “Adding a New
Controller” section on page 2-2.
Note On CCA Release 1.5, the CCA restore function only supports backup files created using CCA
Release 1.5. You cannot use backup files created with CCA Release 1.1. CCA Release 1.1 supports
binary configuration files, but CCA Release 1.5 and higher supports XML configuration files.
Step 1 Click Launch Configuration Archive from the Restart/Reset pop-up message window or click
Maintenance > Configuration Archive. Figure 6-6 appears.
Step 2 Click the drop-down arrow in the Hostname field and choose the controller that you want to backup the
configuration.
Step 3 Enter a backup description about the controller and the configuration that you are backing up in the
Backup Note field.
Step 4 If you want to change the Backup Directory location, follow these steps:
a. click Preferences and the Preferences Window appears (see Figure 6-7).
A backup complete message appears when the backup is complete (see Figure 6-9).
Note On CCA Release 1.5, the CCA restore function only supports backup files created using CCA
Release 1.5. You cannot use backup files created with CCA Release 1.1. CCA Release 1.1 supports
binary configuration files, but CCA Release 1.5 and higher supports XML configuration files.
Step 1 Click Maintenance > Configuration Archive and Figure 6-10 appears.
Step 3 Click the drop-down arrow in the Hostname field and choose your controller from the list.
Step 4 Choose one of these backup options:
• Show backed-up configurations of the selected device—displays only the backed-up
configurations for the controller you selected.
• Show backed-up configurations of the selected device type—displays all the backed-up
configurations for all controllers in your community.
• Show all backed-up configurations—displays all the backed-up configurations in the backup
directory.
Step 5 Choose one of the listed backup-configurations by clicking the controller’s hostname. Review the
backup note field for information about the backup configuration.
Step 6 Click Restore and a progress bar appears indicating the restore progress. A description above the restore
progress bar indicates the controller being restored. This will take a few minutes to complete.
When the restoration is complete, a pop-up message appears (see Figure 6-13) and indicates the
controller was successfully restored and has been rebooted.
Step 9 When you are finished restoring controller configurations, click OK on the Configuration Archive
window.
1 2 3 4 9
Cisco 520 Series Wireless LAN Controller
CONSOLE
2 1
1
230871
2
5 6 7 8
To restart the controller using the Reset button, follow these instructions:
Step 1 Place a straightened paper clip into the Reset button hole (see Figure 6-14).
Step 2 While observing the controller LEDs, gently push and hold the Reset button with the paper clip.
Step 3 When the Status LED turn amber, release the Reset button by removing the paper clip.
Step 4 The controller configuration settings are not reset. If you have configured the controller, it reboots and
loads the active configuration. If you have not configured the controller, the startup wizard GUI appears.
Step 1 Place a straightened paper clip into the Reset button hole (see Figure 6-14).
Step 2 While observing the controller LEDs, gently push and hold the Reset button with the paper clip.
Step 3 When the Alarm LED turns green, release the Reset button by removing the paper clip.
Step 4 The controller power cycles and reboots. The controller configuration settings are reset to factory
defaults and the startup wizard GUI appears.
This chapter describes how to add guest access with web authentication and contains these sections:
• Adding a Guest Access VLAN, page 7-1
• Creating a New SSID for the Guest VLAN, page 7-6
• Adding a Guest User, page 7-9
Step 2 Click Guest for a guest VLAN and Figure 7-3 appears.
Note For a Guest VLAN type, the VLAN name field is set with a predefined VLAN name
(cisco-guest) and cannot be changed.
Note For Guest VLAN types, the VLAN name field is set with a predefined VLAN name that is based
on the selected VLAN type. It cannot be changed.
b. From the Port list, select a port (1 or 2) for the VLAN. The default is 1.
c. In the IP Address field, enter an IP address for the VLAN.
d. From the Subnet Mask list, accept the default or click the drop-down arrow and choose the subnet
mask for the VLAN. The default is 255.255.255.0.
e. In the Gateway IP Address field, enter the IP address of the default gateway.
f. In the DHCP Server IP Address field, enter the IP address of the DHCP server.
g. When you complete this window (see Figure 7-4), click OK to save your changes and to close the
window.
Step 4 Click OK and Figure 7-6 appears and lists the new guest VLAN.
Step 5 Click OK and a VLANs pop-up message appears (Figure 7-7) asking if you want to create an SSID using
the new VLAN.
Step 6 Click Yes to create an SSID for the guest VLAN and Figure 7-8 appears. Go to Step 1.
Step 1 Figure 7-8 appears after clicking Yes on the VLANs pop-up SSID message (see Figure 7-7).
Note You can also click Wireless > WLAN (SSIDs) to add a guest WLAN SSID and Figure 7-8
appears.
Step 2 Click Create to create a new WLAN and Figure 7-9 appears.
Use the window to create a new SSID and to specify the security settings.
Step 3 Click Guest to create a guest WLAN and Figure 7-10 appears.
On a guest WLAN, these options are automatically configured and cannot be changed:
• The default guest VLAN selected. Only one guest VLAN can be created.
– If you click the Add VLAN button, Figure 7-11 appears indicating the maximum number of
VLANs has been reached.
b. Accept or uncheck the default Broadcast in Beacon setting. When checked, the guest WLAN SSID
is broadcast in beacon messages so that the devices that do not specify an SSID can associate
(establish a wireless connection) with the access point. Only the guest SSID can be included in the
beacon.
c. When finished, click OK and WLANs Window (Figure 7-13) reappears with the new guest WLAN
added.
Step 5 Click OK and a pop-up message (Figure 7-14) appears asking if you want to create WLAN users for the
new WLAN.
Step 6 Click Yes to add new guest users and Figure 7-15 appears. Go to Step 1.
Step 1 Figure 7-15 appears after clicking Yes on the WLAN (SSIDs) pop-up message (see Figure 7-14).
Note You can also click Wireless > WLAN Users to add guest users and Figure 7-15 appears.
Step 2 Click the drop-down arrow in the Hostname field and choose your controller.
Step 3 Click Create and Figure 7-16 appears.
Note For guest accounts, the SSID cannot be changed. If there is a guest SSID already present and if
you click the Add SSID button, a pop-up SSID message appears and indicates that you cannot
add a new SSID.
f. Accept the default values for the End Time or change the values.
g. When complete, click OK and Figure 7-17 appears.
Step 5 Click Configure to configure the web login page and Figure 7-18 appears.
Step 6 Click the drop-down arrow in the Hostname field and choose your controller.
Step 7 Check Internal or Customized in the Web Login Page Type field.
Step 8 If you checked Internal, perform these steps:
a. Check Show to display the Cisco logo or check Hide to hide the Cisco logo.
b. In the Redirect URL after Login field, enter a URL to which the user will be redirected after logging
in. The URL format is www.companyname.com and can contain up to 254 characters.
c. In the Headline field, enter the login page headline or summary, up to 127 characters. The default is
Welcome to the Cisco wireless network.
d. In the message field, enter the message text up to 2047 characters. The default message is shown in
Figure 7-18.
e. Click Set Default to use the default settings.
f. When complete, click OK and a web login pop-up message appears (see Figure 7-20). Go to
Step 10.
Step 9 If you checked Customized, Figure 7-19 appears.
Note The TFTP server cannot be located on the same computer as the CCA application, because
they both use the same communication port.
b. In the Maximum Retries field, enter the number of attempts that the WCS526 controller tries to load
the web authentication file from the TFTP server on a failure. The default value is 3.
c. In the Timeout (seconds) field, enter the timeout period (in seconds). If the WLC526 controller is
not able to start downloading the file within this time period, loading does not occur.
d. In the File Path field, enter the path of the web authentication file on the TFTP server. The default
value is a slash (/).
e. In the File Name field, enter the name of the file to be transferred.
f. Click Download to download the customized login file.
Note If you click OK or Apply, the download starts and the customized login file is applied to the
device.
Note The download process takes at least 3 minutes and overwrites the existing login file.
g. When you complete this window, click OK to save your changes and to close the window. A web
login pop-up message appears (see Figure 7-20).
This chapter describes how to add employee access with web authentication and contains these sections:
• Adding an Employee Access VLAN, page 8-1
• Creating a New WLAN SSID for the Employee VLAN, page 8-5
• Adding an Employee User, page 8-10
h. When you complete this window (see Figure 8-3), click OK to save your changes and to close the
window. A create VLAN pop-up message (Figure 8-4) appears.
Step 5 Click OK and Figure 8-5 appears and lists the new employee VLAN.
Step 6 Click OK and another VLANs pop-up message appears (Figure 8-6) asking if you want to create an
SSID using the new VLAN.
Step 7 Click Yes to create an SSID for the employee VLAN and Figure 8-7 appears. Go to Step 1.
Step 1 Figure 8-7 appears after clicking Yes on the VLANs pop-up SSID message (Figure 8-6).
Note You can also click Wireless > WLAN (SSIDs) to add a employee access WLAN SSID and
Figure 8-7 appears.
Step 2 Click Create to create a new WLAN and Figure 8-8 appears.
Use the window to create a new WLAN SSID and to specify the security settings.
Step 3 Accept the default SSID or enter a new SSID value in the SSID field. The SSID can be up to 32
alphanumeric characters.
Step 4 Check Broadcast in Beacon if you want to broadcast the SSID so that the devices that do not specify an
SSID can associate (establish a wireless connection) with the access point. Only one SSID can be
included in the beacon (the employee access WLAN SSID).
Step 5 From the VLAN list, select the data VLAN ID that you want to associate with the SSID.
Step 6 If you click Add VLAN, the Add VLAN window appears that enables you to add a new VLAN. To do
this, see “Adding an Employee Access VLAN” section on page 8-1.
Step 7 Check Web Authentication.
Step 8 Click the Security Type drop-down arrow and choose one of these security options:
• No Security—This is the least secure option. Select it only for an SSID that is used in a public place
(guest SSID), and associate it with a VLAN that restricts access to your network. There is no
encryption, and the authentication type is open authentication.
• WEP—This security setting requires that the access point and the client device (a device that
connects to the wireless device such as a laptop or a PC) share the same WEP key to keep the
communication private.
• EAP—This security setting enables IEEE 802.1X authentication and requires you to select the IP
address of a RADIUS server. The encryption type is WEP, and the authentication type is IEEE
802.1x.
• WPA—This security setting is more secure than the EAP setting. It enables WPA authentication and
requires you to select the IP address of a RADIUS server. Client devices that associate with the
access point by using this SSID must be WPA-capable.
• WPA-PSK—Select this security setting when you want to use the WPA encryption and you do not
have access to a RADIUS server. It requires that the access point and the client device share the same
WPA-PSK. The key can be from 8 to 63 characters long.
• WPA2—This security setting is more secure than the WPA setting. It enables WPA2 authentication
and requires you to select the IP address of a RADIUS server. Client devices that associate with the
access point by using this SSID must be WPA2-capable.
• WPA2-PSK—Select this security setting when you want to use WPA2 encryption and you do not
have access to a RADIUS server. It requires that the access point and the client device share the same
WPA2-PSK. The key can be from 8 to 63 characters long. The authentication type is WPA2-PSK.
• MAC—Select this security setting when you want to authenticate client devices by using MAC
address-based authentication. There is no encryption, and the authentication type is IEEE 802.1x.
Step 9 If you choose WEP security, perform these steps:
a. In the Authentication field, click the drop-down arrow and choose open or shared key.
– Open authentication—an authentication method that allows any device to authenticate and then
attempts to communicate with the access point.
– Shared key authentication—an authentication method in which the access point sends an
unencrypted challenge text string to any device attempting to communicate with it. If the
challenge text is correctly encrypted, the access point allows the requesting device to
authenticate.
b. In the Key Format field, click the drop-down arrow and choose Hex or ASCII.
c. Click the Hex Key field drop-down arrow and choose 1, 2, 3, 4.
d. Click the key size drop-down arrow and choose one of these options:
– 104 bits—Requires 13 ASCII characters or 26 Hex digits.
– 40 bits—Requires 5 ASCII characters or 20 Hex digits.
e. If you selected a hex key format, choose one of these options:
– Enter the encryption key (see key size above).
– Enter a passphrase (8 to 63 characters) and click Generate for the encryption key to be
automatically created (see Figure 8-9).
Note When you click the Generate key, a pop-up window appears, reminding you to make note of the
key in a safe place (see Figure 8-10).
Note The authentication is wpa-psk, wpa2-psk, or WPA2-PSK corresponding to the security type.
Step 13 Click OK and a pop-up message (Figure 8-12) appears asking if you want to create WLAN users for the
new WLAN.
Step 14 Click Yes to add new employee users and Figure 8-13 appears. Go to Step 1.
Step 1 Figure 8-13 appears after clicking Yes on the WLAN (SSIDs) pop-up message (see Figure 8-12).
Note You can also click Wireless > WLAN Users to add employee users and Figure 8-12 appears.
Step 2 Click the drop-down arrow in the Hostname field and choose your controller.
Step 3 Click Create and Figure 8-14 appears.
Note If no SSID is present in the drop-down list, click Add SSID, and complete the Add SSID window
and click OK. See Figure 8-15.
Step 5 Click Configure to configure the web login page and Figure 8-17 appears.
Step 6 Click the drop-down arrow in the Hostname field and choose your controller.
Step 7 Check Internal or Customized in the Web Login Page Type field.
Step 8 If you checked Internal, perform these steps:
a. Check Show to display the Cisco logo or check Hide to hide the Cisco logo.
b. In the Redirect URL after Login field, enter a URL to which the user will be redirected after logging
in. The URL format is www.companyname.com and can contain up to 254 characters.
c. In the Headline field, enter the login page headline or summary, up to 127 characters. The default is
Welcome to the Cisco wireless network.
d. In the message field, enter the message text up to 2047 characters. The default message is shown in
Figure 8-17.
e. If you want to revert to the default settings, click Set Default.
f. When complete, click OK and a web login pop-up message appears (see Figure 8-19). Go to
Step 10.
Step 9 If you checked Customized, Figure 8-18 appears.
Note The TFTP server cannot be located on the same computer as the CCA application, because
they both use the same communication port.
b. In the Maximum Retries field, enter the number of attempts that the WCS526 controller tries to load
the web authentication file from the TFTP server on a failure. The default value is 3.
c. In the Timeout (seconds) field, enter the timeout period (in seconds). If the WLC526 controller is
not able to start downloading the file within this time period, loading does not occur.
d. In the File Path field, enter the path of the web authentication file on the TFTP server. The default
value is a slash ( / ).
e. In the File Name field, enter the name of the file to be transferred.
f. Click Download to download the customized login file.
Note If you click OK or Apply, the download starts and the customized login file is applied to the
device.
Note The download process takes at least 3 minutes and overwrites the existing login file.
g. When you complete this window, click OK to save your changes and to close the window. A web
login pop-up message appears (see Figure 8-19).
Step 10 Click OK and the WLAN Users window reappears (see Figure 8-20).
This chapter describes how to add voice access with web authentication and contains these sections:
• Adding a Voice-Enabled VLAN, page 9-2
• Creating a New SSID for the Voice VLAN, page 9-6
Step 2 Click Voice for a voice VLAN and Figure 9-3 appears.
Note For a Voice VLAN type, the VLAN name field is set with a predefined VLAN name
(cisco-voice) and cannot be changed.
Note For Voice VLAN types, the VLAN name field is set with a predefined VLAN name that is
based on the selected VLAN type. It cannot be changed.
b. From the Port list, select a port (1 or 2) for the VLAN. The default is 1.
c. In the IP Address field, enter an IP address for the VLAN.
d. From the Subnet Mask list, accept the default or click the drop-down arrow and choose the subnet
mask for the VLAN. The default is 255.255.255.0.
e. In the Gateway IP Address field, enter the IP address of the default gateway.
f. In the DHCP Server IP Address field, enter the IP address of the DHCP server.
g. When you complete this window (see Figure 9-4), click OK to save your changes and to close the
window.
Step 4 Click OK and Figure 9-6 appears and lists the new voice VLAN.
Step 5 Click OK and a VLANs pop-up message appears (Figure 9-7) asking if you want to create an SSID using
the new VLAN.
Step 6 Click Yes to create an SSID for the voice VLAN and Figure 9-8 appears. Go to Step 1.
Step 1 Figure 9-8 appears after clicking Yes on the VLANs pop-up SSID message (see Figure 9-7).
Note You can also click Wireless > WLAN (SSIDs) to add a voice WLAN SSID and Figure 9-8
appears.
Step 2 Click Create to create a new WLAN and Figure 9-9 appears.
Use the window to create a new SSID and to specify the security settings.
Step 3 Click Voice to create a voice WLAN and Figure 9-10 appears.
On a voice WLAN, these options are automatically configured and cannot be changed:
• The default voice VLAN selected. Only one voice VLAN can be created.
– If you click the Add VLAN button, Figure 9-11 appears indicating the maximum number of
VLANs has been reached.
Note When you click the Generate key, a pop-up window appears, reminding you to make note of the
key in a safe place (see Figure 9-13).
Step 9 From the Voice CAC type area, select Wireless MultiMedia Policy, which requires client devices to
use WMM, or select 7920 CAC (AP and Client), which supports Cisco 7920 IP telephones on your
network. The default setting is Wireless Multimedia Policy.
Note Do not select Wireless Multimedia Policy if you use Cisco 7920 phones on your network.
Step 10 When finished, click OK and the WLANs Window (Figure 9-16) reappears with the voice WLAN SSID
added.
This appendix describes the steps needed to configure DHCP Option 43 on an enterprise DHCP server,
such as a Cisco Catalyst 3750 series switch, for use with the Cisco 520 series access points (AP521 and
LAP521). This appendix contains these sections:
• Overview, page A-1
• Configuring Option 43 for Cisco 520 Series Access Points, page A-2
Overview
This section contains a DHCP Option 43 configuration example on an enterprise DHCP server, such as
a Cisco Catalyst 3750 series switch, for use with Cisco 520 series access points. For other DHCP server
implementations, consult their product documentation for configuring DHCP Option 43. In Option 43,
you should use the IP address of the controller web-browser interface (GUI).
Note DHCP Option 43 is limited to one access point type per DHCP pool (AP521 or LAP521). You must
configure a separate DHCP pool for each access point type.
The Cisco 520 series access points use the type-length-value (TLV) format for DHCP Option 43. DHCP
servers must be programmed to return the option based on the access point’s DHCP Vendor Class
Identifier (VCI) string (DHCP Option 60). The VCI strings for the Cisco 520 series is listed in
Table A-1:
Table A-1 Cisco 520 Series Lightweight Access Point VCI String
The format of the TLV block for 520 series access points is listed below:
• Type: 0xf1 (decimal 241)
• Length: Number of controller IP addresses * 4
• Value: List of WLC management interfaces
Where:
<pool name> is the name of the DHCP pool, such as LAP521
<IP Network> is the network IP address where the controller resides, such as 10.0.15.1
<Netmask> is the subnet mask, such as 255.255.255.0
<Default router> is the IP address of the default router, such as 10.0.0.1
<DNS Server> is the IP address of the DNS server, such as 10.0.10.2
For the VCI string, use the value from Table A-1. The quotation marks must be included.
Step 4 Add the option 43 line using the following syntax:
option 43 hex <hex string>
The hex string is assembled by concatenating the TLV values shown below:
Type + Length + Value
Type is always f1(hex). Length is the number of controller management IP addresses times 4 in hex. Value
is the IP address of the controller listed sequentially in hex.
For example, suppose that there are two controllers with GUI IP addresses 10.126.126.2 and
10.127.127.2. The type is f1(hex). The length is 2 * 4 = 8 = 08 (hex). The IP addresses translate to
0a7e7e02 and 0a7f7f02. Assembling the string then yields f1080a7e7e020a7f7f02. The resulting Cisco
IOS command added to the DHCP scope is listed below:
option 43 hex f1080a7e7e020a7f7f02
This appendix provides instructions for using CCA to convert an autonomous AP521 access point into
a controller-based (or lightweight) LAP521 access point. The appendix contains these sections:
• Verifying the Software Version of the AP521 Access Point, page B-1
• Obtaining the AP521 Access Point Conversion Image File, page B-2
• Using CCA to Convert an AP521 Access Point, page B-3
Step 1 Check the topology view of your network to ensure an AP521 access point is available (see Figure B-3).
Note An AP521 access point is identified by a circle icon in a small box next to the access point, such
as the access point with an IP address of 192.168.10.23 in Figure B-1.
Step 2 Right click on the AP521 access point and choose Properties in the pop-up. Figure B-2 appears.
Note The access point conversion image must be chosen to match the current software version of your
AP521 access point.
Step 1 Use your Internet browser to access the Cisco Software Center on Cisco.com at the following URL:
http://www.cisco.com/en/US/products/ps7319/index.html
Step 2 Click Download Software in the Support box.
Note Save the copy of the image file to the PC where CCA is installed if you plan to use the Standard
Mode when converting the access points (see Figure B-6 on page B-5); save the copy to a remote
TFTP server if you plan to use Remote TFTP Server mode (See Figure B-7 on page B-5).
Caution The CCA conversion process is a one-way process. CCA can only convert an AP521 into an LAP521.
CCA cannot reconvert an access point back to autonomous operation.
Step 1 Check the topology view of your network to ensure an autonomous AP521 is available, such as
Figure B-3.
Note An autonomous access point is identified by a circle icon in a small box next to the access point,
such as the AP521 with an IP address of 192.168.10.23 in Figure B-3.
Note An AP521 must be added to the community, before the Convert to LAP option is visible.
Step 2 Click Configure > Wireless > Convert to LAP and Figure B-4 appears.
Step 3 Click on the target access point to highlight the line. Figure B-5 appears.
You can choose multiple AP521 access points by pressing the shift or control key on your PC keyboard
while clicking multiple access points.
Note When converting multiple autonomous access points, your DHCP server must be able to handle
multiple requests and sessions simultaneously.
Step 5 If you want the converted access point to obtain a new IP address using DHCP, check DHCP IP
Address.
Note If you check the DHCP IP Address box, the Domain Name and DNS IP Address fields will be
filled in from the corresponding DHCP server.
Step 6 If you want to keep the access point hostname, check Retain Hostname.
Step 7 Click the drop-down arrow in the Mode field and choose Standard to use a conversion image that is
stored locally on your PC, otherwise choose Remote TFTP Server to use TFTP to access a remote
conversion image.
Step 8 If you choose Standard, enter the path and filename for the conversion image in the Conversion Image
field or click Browse to locate the conversion image file on your PC.
Step 9 If you choose Remote TFTP Server, perform these steps (see Figure B-7):
a. In the Conversion Image field, enter the path and filename for the remote conversion image.
b. In the TFTP Server IP Address field, enter the IP address for your TFTP server.
Step 10 In the Domain Name field, enter the domain name for your network (if used).
Step 11 In the DNS IP address field, enter the IP address for your DNS server (if used).
Note If you check the DHCP IP Address box, the Domain Name and DNS IP Address fields will be
filled in from the corresponding DHCP server.
Step 12 Click OK to save your settings and Figure B-8 appears and contains your conversion settings.
Step 13 Click Convert to begin the autonomous access point conversion process. This process will take
approximately 1 to 2 minutes per access point to complete.
Note Do not remove power or the Ethernet cable from the access point during the conversion process
or the conversion process will be aborted. You can check the conversion status by clicking
Status.
Step 14 Click Yes on the pop-up message indicating that multiple access points can be converted.
Step 15 Click OK on the pop-up message indicating that the devices need to be reloaded.
Note The converted access point icon disappears from the topology view until the new software image
is loaded from the controller and the LAP521 access point gets an IP address. The process might
take a minute or more before the access point appears in the topology as an LAP521 access point.
Note When an autonomous AP521 access point is converted to controller-based operation using the
CCA, the access point properties screen continues to indicate that the access point is an
AIR-AP521G-A-K9 after the conversion. This is in agreement with the product label on the
access point. However, the CCA displays a small triangle icon next to the converted access point
to indicate that the access point is now operating as a controller-based LAP521 access point.
This appendix provides deployment recommendations and a list of supported and unsupported features
for the Cisco 526 Wireless Express Mobility Controller. The appendix contains these sections:
• Deployment Recommendations, page C-1
• Software Feature List for the WLC526 Controller, page C-2
Deployment Recommendations
The Cisco Mobility Express is an integral part of the Cisco Smart Business Communications System
(SBCS), and comprises the mobility solution tools, including the WLC526 controller and Cisco 500
series access points. All elements of the SBCS share intuitive GUI-based management tools (such as
CCA, Cisco Smart Assist, and Cisco Monitor Director) for quick and easy network setup and network
management. These solutions reduce the time and effort required by small and medium businesses
(SMBs) to install and operate their network, thus allowing them to focus more time on their core
business.
As a targeted solution for small and medium businesses, Mobility Express and SBCS are not designed
for mid-market and enterprise deployments. Use Table C-1 to verify that Mobility Express is the correct
solution for your business.
Table C-1 Comparison of Cisco Mobility Express and Cisco Unified Wireless Network Solutions
Table C-1 Comparison of Cisco Mobility Express and Cisco Unified Wireless Network Solutions (continued)
Table C-2 Cisco Mobility Express and CUWN Wireless Controller Feature Comparison
Table C-2 Cisco Mobility Express and CUWN Wireless Controller Feature Comparison
communities
A
create using Connect window 3-2 to 3-6
abbreviations and acronyms table viii device type limitations table 3-2
access point. See AP521, LAP521, Cisco 500 series access overview 3-1
points
description and feature overview 1-3
Advanced Encryption Standard (AES) 9-10
Device Properties window B-2
AP521
Device Setup Wizard
autonomous conversion to controller-mode
Connect Device to Your PC/Laptop window 2-5
image file location B-2
Enter Hostname and User Authentication
image version requirement B-2 Information window 2-6
obtaining image file B-2 Management and AP Manager Interface
one-way conversion warning B-3 Information window 2-7
See also Cisco 521 Catalyst Express Access Point support limitations 2-2
support restrictions 1-6
Verify Connection with Device window 2-5
B Discovery option 3-4
guide and expert mode, described 1-7
Broadcast in Beacon setting, explained 7-8
installation instructions 2-1
remote configuration support 1-3
C resetting controller to factory defaults 6-3
restart controller 6-1
Catalyst Express 500 Series Switches. See CE520 1-8
Restore function restrictions 6-4, 6-8
CCA
starting window 2-2
adding a controller 2-2 to 2-9
static IP address requirement 2-10
autonomous access point conversion B-3 to B-6
support for SBCS devices 1-3
backing up the controller 6-4 to 6-8
support for Smartports 1-8
CCA vs. CUWN feature comparison C-1
Topology View B-1
Cisco Smart Assist features 1-6
unsupported tasks requiring GUI 1-8
upgrading software 5-1 to 5-6 Cisco Smart Business Communications System. See SBCS
using setup and configuration tools 1-6 Cisco Smart Business Communications System Setup
CE520 guide ix
Cisco Smartport technology, described 1-8
CCA Smartport support 1-8
CCA support 1-3
Cisco Software Center web site B-2
Cisco UC500 series appliances. See UC500
Cisco 500 series access points
converting autonomous to controller-mode B-1 to B-6
Cisco Unified Communications 500 Series for Small
Business Getting Started Guide ix
interoperability limitations 1-2
Cisco Unified IP Phones, CCA and SBCS support 1-3
LED descriptions 2-11
Cisco Unified Wireless Network
Quick Start Guide 1-2
deployment recommendations C-1
smart ports, configuring 2-11
feature comparison with SBCS C-2
Cisco 500 Series Wireless Express Mobility Controller.
Cisco Unified Wireless Network. See CUWN
See WLC526, controller
Cisco 500 Series Wireless Mobility Express Controller CLI
Configuration Guide described, limitations 1-9
conventions vii command-line interface. See CLI
locating related documents ix communities
related documentation ix Authentication: Device window 3-5
software release support vii characteristics 3-1
translated warnings x Community Drop-Down List display 3-7
Cisco 521 Mobility Express Access Point connecting to a community 3-6
description and types 1-2 Create Community window 3-4
See also AP521, LAP521 create using CCA Connect window 3-2 to 3-6
Cisco 526 Wireless Express Mobility Controller. See creating, options 3-2
WLC526, controller device type limitations table 3-2
Cisco Catalyst 3750 series switch A-1
Discovered Community Devices display 3-6
Cisco Configuration Assistant. See CCA limitations 3-1
Cisco Configuration Assistant Quick Start Guide ix
overview 3-1
Cisco Lightweight Access Point Protocol. See LWAPP Security Certificate Alert window 3-5
Cisco Mobility Express
supported networking tasks 3-1
deployment recommendations C-1
Topology View window 3-7
device descriptions 1-2
Configuration Archive window Backup option 6-5
features 1-1
Connect window
Cisco Monitor Director
creating communities using CCA 3-2 to 3-6
feature overview 1-3
display 3-3
Quick Start guide 1-3
controller
Cisco Monitor Director Agent. See Cisco Monitor Director adding using CCA 2-2 to 2-9
Cisco Smart Assist feature list 1-6
backing up 6-4 to 6-8
Cisco Smart Business Communications System backup complete message 6-8
overview 1-1
Q T
Quick Start Guide: Cisco 521 Wireless Express Access Temporal Key Integrity Protocol (TKIP) 9-10
Point ix
tools, network monitoring and reporting 1-3
Quick Start Guide: Cisco 526 Wireless Express Mobility transport mode default 2-8
Controller 3-ix
type-length-value (TLV) A-1
Quick Start Guide: Cisco 526 Wireless Express Mobility
Controller 2-9
U
R
UC500, defined 1-3
remote configuration, CCA support 1-3 User Guide for the Catalyst Express 520 Switches ix
remote monitoring, using Cisco Monitor Director 1-3
Restart/Reset window 6-3
V
RRM
benefits 1-4 Vendor Class Identifier (VCI) A-1
defined 1-4 VLANs
feature highlights 1-1 adding 4-10
benefuts 1-4
Create VLAN window 4-11, 7-2, 8-2, 9-3
S
employee access 8-1 to 8-17