WLC Faq
WLC Faq
Questions
Introduction
Troubleshoot FAQ
NetPro Discussion Forums − Featured Conversations
Related Information
Introduction
This document provides information on the most frequently asked questions (FAQ) about the troubleshoot of
Cisco Wireless LAN (WLAN) Controllers (WLCs).
Refer to Cisco Technical Tips Conventions for more information on document conventions.
Troubleshoot FAQ
Q. What is the procedure to upgrade the operating system (OS) software
on a Cisco WLC?
A. The document Wireless LAN Controller (WLC) Software Upgrade provides the procedure
for a software upgrade on your WLC.
Q. Can I install an access point (AP) at a remote office and install a Cisco
WLC at my headquarters? Does the Lightweight AP Protocol (LWAPP)
work over a WAN?
A. Yes, you can have the WLCs across the WAN from the APs. LWAPP works over a WAN.
Note: Not all lightweight APs support REAP. For example, the 1030 AP supports REAP, but
the 1010 and 1020 AP do not support REAP. Before you plan to implement REAP, check to
determine if the APs support it. Cisco IOS® Software APs that have been converted to
LWAPP do not support REAP.
Q. I want to set up the Cisco 1030 Lightweight Access Point (AP) with a
Cisco WLC in Remote Edge AP (REAP) mode. In this mode, is all
wireless traffic tunneled back to the WLC? Additionally, if the AP cannot
contact the WLC, what happens to the wireless clients?
A. The 1030 AP tunnels all WLC traffic (control and management traffic) to the WLC via
Lightweight AP Protocol (LWAPP). All data traffic stays local to the AP. The 1030 REAP
can only reside on a single subnet because it cannot perform IEEE 802.1Q VLAN tagging. As
such, traffic on each service set identifier (SSID) terminates on the same subnet on the wired
network. So, while wireless traffic may be segmented over the air between SSIDs, user traffic
is not separated on the wired side. Access to local network resources is maintained throughout
WAN outages.
At times of WAN link outage, all WLANs except the first is decommissioned. Therefore, use
WLAN 1 as the primary WLAN and plan security policies accordingly. Cisco recommends
that you use a local authentication/encryption method, such as the Wi−Fi Protected Access
(WPA) Pre−Shared Key (WPA−PSK), on this first WLAN.
Note: Wired Equivalent Privacy (WEP) suffices, but this method is not recommended
because of known security vulnerabilities.
If you use WPA−PSK (or WEP), properly configured users are still able to gain access to
local network resources even when the WAN link is down.
Q. Can a Cisco IOS Software−based access point (AP) that has been
converted to lightweight mode register with Cisco 4100 Series WLCs?
A. No, Cisco IOS Software−based APs that are converted to lightweight mode cannot register
with the Cisco 40xx, 41xx, or 3500 WLCs. These lightweight APs (LAPs) can register only
with the Cisco 4400 and the 2000 series WLCs. For information on the restrictions of APs
that are converted to lightweight mode, refer to the Restrictions section of Upgrading
Autonomous Cisco Aironet Access Points to Lightweight Mode.
In order to enable EAP through the GUI on the WLC, complete these steps:
Q. Does the Cisco 2000 Series WLC support Web Authentication for
guest users? Is the WLC solution able to refrain from the broadcast of
the service set identifier (SSID)?
A. Web Authentication is supported on all Cisco WLCs. In order to enable this feature,
complete these steps:
1. From the GUI, click Edit in order to edit the specific WLAN parameters, check the
Web Authentication check box, and click Apply.
2. Save and reboot in order for the Web Authentication feature to take effect.
3. Under Security, choose Local Net User, and complete these actions:
a. Define the guest username and password for the guest to use in order to log
on. These values are case sensitive.
b. Select the WLAN ID that you use.
A. In order to disable SSID broadcast, uncheck the Broadcast SSID check box in the WLAN
Edit window.
Q. We have begun the conversion of more than 200 access points (APs)
from Cisco IOS Software to Lightweight AP Protocol (LWAPP) with a
Cisco 4404 WLC. We have completed the conversion of 48 APs and we
receive a message on the WLC that states: "[ERROR] spam_lrad.c 4212:
AP cannot join because the maximum number of APs on interface 1 is
reached". Why does the error occur?
A. You must create additional AP−manager interfaces in order to support more than 48 APs.
Otherwise, you receive the error that looks like this:
Wed Sep 28 12:26:41 2005 [ERROR] spam_lrad.c 4212: AP cannot join because
the maximum number of APs on interface 1 is reached.
If you try to configure more than 512 users without increasing the default database size, the
WLC displays an error. For example, if you try to add a MAC filter when there are already
512 users configured in the database and the database size is not increased from its default
value, this error message appears.
In order to increase the local database to 2048, use this command from the CLI.
Cisco 4400 Series Controllers support LAG in software release 3.2 and later, and LAG is
enabled automatically on the controllers within the Cisco WiSM and the Catalyst 3750G
Integrated Wireless LAN Controller Switch. Without LAG, each distribution system port on
the controller supports up to 48 access points. With LAG enabled, the logical port of a 4402
controller supports up to 50 access points, the logical port of a 4404 controller supports up to
100 access points, and the logical port on each Cisco WiSM controller supports up to 150
access points.
Refer to Enabling Link Aggregation for more information on LAG and how to enable LAG
on WLCs.
Begin with the LAPs joined to the Layer 2 Lightweight Access Point Protocol (LWAPP)
mode controller, in Local mode.
1. From the GUI, go to the Wireless page and make a note of the intended Bridge AP
MAC addresses.
2. Click Bridging.
3. Check Enable Zero Touch Configuration.
4. Enter an ASCII or HEX Bridging Shared Secret Key that is used to verify LAP
identities.
5. Go to the Security page, and click MAC Filtering located under AAA on the left.
Add the MAC addresses of the intended Bridge APs, and specify the WLAN and the
associated Interface.
6. Go to the Wireless page. Bridge capable LAPs show Bridging Information in addition
to Detail in order to help identify them. Click Detail on one of your intended Bridge
APs. Under Inventory Information on the right side, verify the LAP model and if
REAP mode is supported.
7. Check AP Static IP, and enter an IP address, Netmask, and Gateway in the subnet of
the interface that is used. Ensure these IPs are not in the DHCP scopes that are given
to clients.
You are now prepared to configure the AP mode, change the role of the AP from Local to
Bridge AP, and click Apply.
If the setup does not work as expected, follow the recovery process outlined here.
1. From the controller GUI, choose Wireless > Bridging and check Enable Zero
Touch Configuration.
2. From the controller GUI, choose Security > MAC Filtering and add a new MAC
filter with AP MAC address.
3. Go to the controller CLI and issue the config network allow−old−bridge−aps
enable command.
This allows the APs to join. Complete these steps once they join.
1. Go to the controller GUI and choose Wireless > Cisco APs > Detail.
2. Check if the AP supports REAP mode. This should be YES for indoor bridging APs.
3. Check the AP mode. If it says Bridge, then change it back to Local. This changes the
Bridge AP to Normal AP.
1. The WLAN client sees the administration−defined virtual address as the DHCP
server address. The recommended address is usually 1.1.1.1 because this address is
not normally a routable network address.
Refer to Using DHCP Relay for more information on how to use PIX in order to provide
DHCP services.
Q. We have a wireless network with over 500 access points (APs), and
we have some VLANs that can only exist in certain buildings for security
reasons. How do I restrict a service set identifier (SSID) by AP so that
every SSID is not sent to every AP on the system?
A. You can use the WLAN Override feature. Complete these steps in order to configure
WLAN Override:
1. In the WLC GUI, navigate to Wireless and choose whether you want to work with the
IEEE 802.11b/g radios or the IEEE 802.11a radios.
2. In order to select the AP that you want to modify, click the Configure link that is
next to the name of that AP.
3. From the WLAN Override drop−down menu, choose Enable.
Note: The WLAN Override menu is the last item on the left side of the window.
The list of all WLANs that are configured on the WLC appears.
4. From this list, check the WLANs that you want to appear on the AP, and click Apply.
5. Save your configuration after you make these changes. If you save your
configuration, the changes remain when the WLC reboots.
Q. I have ten Cisco 1000 Series Lightweight Access Points (LAPs) and
two WLCs in the same VLAN. How can I register six LAPs to associate to
WLC 1, and the other four LAPs to associate to the WLC 2?
A. The Lightweight AP Protocol (LWAPP) allows for dynamic redundancy and load
balancing. For example, if you specify more than one IP address for option 43, an LAP sends
LWAPP discovery requests to each of the IP addresses that the AP receives. In the WLC
LWAPP discovery response, the WLC embeds this information:
♦ Information on the current LAP load, which is defined as the number of LAPs that
are joined to the WLC at the time
♦ The LAP capacity
♦ The number of wireless clients that are connected to the WLC
The LAP then attempts to join the least−loaded WLC, which is the WLC with the greatest
available LAP capacity. Furthermore, after an LAP joins a WLC, the LAP learns the IP
addresses of the other WLCs in the mobility group from its joined WLC. Subsequently, the
AP sends LWAPP primary discovery requests to each of the WLCs in the mobility group.
The WLCs respond with a primary discovery response to the AP. The primary discovery
response includes information about the WLC type, total capacity, and current AP load. As
long as the WLC has the "AP Fallback" parameter enabled, the AP can decide to change over
to a less−loaded WLC.
Refer to Remote−Edge AP (REAP) with Lightweight APs and Wireless LAN Controllers
(WLCs) Configuration Example for more information on REAP.
Change this value to 180 seconds in order to make the client reauthenticate after three
minutes. Refer to the WLANs > Edit section of Cisco Wireless LAN Controller Online Help,
Release 3.2 for more information.
Note: Mobility anchor should not be configured for Layer 3 mobility. Mobility anchor is used
only for Guest tunnelling.
When a client first associates to a controller of a mobility group that has been preconfigured
as a Mobility Anchor for a WLAN, the client associates to the controller locally, and a local
session is created for the client. Clients can be anchored only to preconfigured anchor
controllers of the WLAN. For a given WLAN, you should configure the same set of anchor
controllers on all controllers in the mobility group. Refer to Auto−anchor Mobility for more
information.
This is documented in Cisco bug ID CSCsd02837 ( registered customers only) . The workaround
is to switch from WPA2 to WPA1/TK1P.
Q. When I install the new Wireless Services Module (WiSM) blade in the
6509 switch and implement Protected Extensible Authentication Protocol
(PEAP) with the Microsoft IAS server, I receive this error:
A. RADIUS and dot1x debugs show that the WLC sends an access request, but there is no
response from the IAS server. Complete these steps in order to troubleshoot the problem:
You must reboot the WLC in order for the new software to take effect. Therefore, there is a
period of network downtime. Be sure to schedule a maintenance window for the upgrade.
The possible workaround is to configure the DHCP server on the same subnet as the WLC. If
the DHCP server is on a different subnet, then either a router must be in place in order to
route between the WLAN and the DHCP server or you can configure the internal DHCP
server on the WLC with a scope for the WLAN.
This problem is due to an incorrect clock setting on the WLC. In order to set the clock on the
WiSM modules you can use the show time and config time commands.
Q. Does all network traffic from and to a WLAN Client tunnel through a
Wireless LAN Controller (WLC) once the access point (AP) gets
registered with the controller?
A. When the AP joins a controller, a Lightweight Access Point Protocol (LWAPP) tunnel is
formed between the two devices. All traffic, including all client traffic, is sent through the
LWAPP tunnel.
The only exception to this is when an AP is in Remote−Edge AP (REAP) mode. When the
AP is in REAP mode the control traffic is still tunneled to the controller but the data traffic is
bridged locally on the local LAN.
In order to change the LWAPP Transport Mode using the GUI, go to the WLC page and
locate the second selection in the main field which is LWAPP Transport Mode. Change this
to Layer 3 and reboot the controller. Now, your LAP is able to register with the controller.
Q. I have two Wireless LAN Controllers (WLCs) named WLC1 and WLC2
configured within the same Mobility group for failover. My lightweight
access point (LAP) is currently registered with WLC1. If WLC1 fails, does
the AP registered to WLC1 reboot during its transition towards the
surviving WLC (WLC2)? Also, during this failover, does the WLAN client
lose WLAN connectivity with the LAP?
A. Yes, the LAP does de−register from WLC1, reboot, and then re−registers with WLC2, if
WLC1 fails. Since the LAP reboots, the associated WLAN clients lose the connectivity to the
rebooting LAP.
Q. Can I use the internal DHCP server on the WLC in order to assign IP
addresses to the lightweight access points (LAPs)?
A. You can accomplish this with version 4.0 on the WLC. All other versions can assign IP
address only to the clients.
♦ Platinum/Voice
♦ Gold/Video
♦ Silver/Best Effort (default)
♦ Bronze/Background
You can configure the voice traffic WLAN to use Platinum QoS, assign the low−bandwidth
WLAN to use Bronze QoS, and assign all other traffic between the remaining QoS levels.
Q. What is PKC and how does it work with the Wireless LAN Controller
(WLC) ?
A. PKC stands for Proactive Key Caching. It was designed as an extension to the 802.11i
IEEE standard.
PKC is a feature enabled in Cisco 2006/410x/440x Series Controllers which permits properly
equipped wireless clients to roam without full re−authentication with an AAA server. In order
to understand PKC, you first need to understand Key Caching.
Key Caching is a feature that was added to WPA2. This allows a mobile station to cache the
master keys (Pairwise Master Key [PMK]) it gains through a successful authentication with
an access point, and re−use it in a future association with the same access point. This
means that a given mobile device needs to authenticate once with a specific access point, and
cache the key for future use. Key Caching is handled via a mechanism known as the PMKID
(or the PMK Identifier), which is a hash of the PMK (Pair−Wise Master Key), a string, the
station and the MAC addresses of the access point. The PMKID uniquely identifies the PMK.
Even with Key Caching, a wireless station must authenticate with each access point it wishes
to get service from once. This introduces significant latency and overheads, which delays the
hand−off process and can inhibit the ability to support real−time applications. In order to
resolve this issue, PKC was introduced with WPA2.
PKC allows a station to re−use a PMK it had previously gained through a successful
authentication process, eliminating the need for the station to authenticate against new access
points when roaming.
PKC is enabled by default with WPA2. So, when you enable WPA2 as Layer 2 security under
the WLAN configuration of the WLC, PKC is enabled on the WLC. Also, configure the AAA
server and the wireless client for appropriate EAP authentication.
The supplicant used at the client side should also support WPA−2 in order for PKC to work.
PKC can also be implemented in an inter−controller roaming environment.
Q. No traps are generated by the WLC for Ad−Hoc rogues and SNMP
debugs on the WLC do not show any traps from the WLC for Ad−Hoc
even though the WLC GUI reported the Ad−Hoc rogues. The WLC runs
firmware version 3.2.116.21. Why does this happen?
A. This is due to Cisco bug ID CSCse14889 ( registered customers only) . The WLC consistently
sends traps for detected rogue access points (APs) but not for detected Ad−Hoc rogues. This
bug is fixed in WLC firmware versions 3.2.171.5 and later.
Q. When you have a wireless user that attempts to authenticate via web
authentication on a service set identifier (SSID) and the WLC sends the
authentication request to an Access Control Server (ACS) (RADIUS),
then which IP address on the WLC is used as the source address for the
network access server (NAS) from the perspective of the RADIUS server
in this scenario?
A. Use the management IP address interface of the WLC for the NAS IP address.
1. From the Wireless Downloads page, click on Wireless LAN Controller and select
the controller platform for which you need the MIBs.
2. The Software Download page for the controller appears. This page contains all the
files for the WLC including the MIBs.
Standard−MIBS−Cisco−WLC4400−2000−XXXXXX.zip
Cisco−WLC−MIBS−XXXX.zip
Q. Does Layer 3 mobility work with an access point (AP) Group VLAN
configuration?
A. Yes, Layer 3 mobility works with an AP Group VLAN configuration. Currently, traffic
sources from a Layer 3 roamed wireless client is put on the dynamic interface assigned on the
WLAN or the interface of the AP Group VLAN.
1. When a wireless client roams to a new WLC (for example, WLC1), WLC1 sends
mobility packets to all WLCs in the same mobility group.
2. The old WLC (for example, WLC2) sends a mobility packet to WLC1 and lets
WLC1 know the IP address of the wireless client.
3. From then, WLC1 puts traffic from the wireless client to the local interface on
WLC1. It is not the same interface on WLC2.
4. Any traffic to the wireless client is sent to WLC2. WLC2 forwards the packet using
Ethernet over IP (EoIP) to WLC1, which in turn sends the traffic to the wireless client
via a Lightweight Access Point Protocol (LWAPP) tunnel.
Related Information
• Cisco Wireless LAN Controller Module Q&A
• Cisco Wireless LAN Controllers Q&A
• Cisco Wireless LAN Controller Configuration Guide, Release 3.2
• Wireless Support Page
• Technical Support & Documentation − Cisco Systems
All contents are Copyright © 1992−2006 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.